content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Among the various categories of natural disasters (geologic, atmospheric, other natural hazards), the hurricane has earned its reputation as an unrestrained, malignant and dreadful threat. These truths, born out in both world and United States history, warrant greater public awareness of the phenomenon, formal acknowledgement of its increasing risk and lethal potential and a renewed interest in prediction, warning, mitigation and response strategies.
Hurricanes: The Definition, Risks, Impact and Prevention of a Natural Disaster
Perhaps no other natural phenomenon matches the formidable raw power, unbridled destructive capability, magnitude of risk to life and property or threat to economic and social dislocation more than a hurricane of maximal intensity bearing down on a defenseless coastline and vulnerable population. As the havoc wreaked by hurricane Katrina testifies, the hurricane is among the most meteorologically understood, yet uniquely unpredictable and ruinous categories of natural disasters due to its effects on natural ecosystems and man-made habitat (Veenema, 2013).
The August 2005 example of Katrina, perhaps forever changed our society’s definitions of mass calamity and view of the enormity of wreckage and deprivation that a hurricane can create. According to The White House (2006) “the overall destruction wrought by Hurricane Katrina, which was both a large and powerful hurricane as well as a catastrophic flood, vastly exceeded that of any other major disaster, such as the Chicago Fire of 1871, the San Francisco Earthquake and Fire of 1906 and Hurricane Andrew in 1992.” Katrina reaffirmed the unpredictable impact that hurricanes can have, despite the Saffir-Simpson scale and twenty-first century meteorology. According to the The White House (2006) “Seventy-five hurricanes of Katrina’s strength at landfall at Category 3 have hit the mainland United States since 1851, roughly once every two years. Yet Katrina was anything but a “normal” hurricane.” First, Katrina outsized most every other recorded storm. Hurricane Camille, a 1969 Category 5 storm, had top wind speeds that exceeded those of Katrina upon landfall. Camille’s winds extended seventy-five miles from its center compared to Katrina’s extension some 103 miles from its center. As a result, Katrina’s tumultuous storm surge affected a larger area than did Hurricane Camille’s, impacting nearly 93,000 square miles across 138 parishes and counties.
Further, Katrina completely reformatted two important historic statistical benchmarks in post-disaster evaluation. First, even though a final accounting figure is unknown nine years later, recovery efforts continue and hurricane damage estimation is not a physical science, according to The White House (2006) “considering property damage alone, Hurricane Katrina is America’s first disaster natural or man-made to approach the $100 billion mark.” Second, Katrina is the first natural disaster to negate an important previous historic trend among natural disasters in the United States. According to The White House (2006), “for at least a century, America’s most severe natural disasters have become steadily less deadly and more destructive of property.” Hurricane Katrina, by contrast not only damaged far more property than any previous natural disaster, but was also deadlier than any United States storm since Hurricane San Felipe in 1928.
Hurricane Risk
The risk and damage potential of hurricanes is increasing compared to other natural disasters. This risk is quantifiable as a function of increasing storm strength characteristics; increasing storm frequency and duration and increasing vulnerability of the communities devastated at landfall.
Since the 1970s, the destructive potential of tropical storms in the North Atlantic has increased by about 50 percent. This increase correlates with longer storm lifetimes and greater storm intensities with an increase of 0.9 to 1.3 degrees Fahrenheit in sea-surface temperatures in the main development area for tropical storms in the North Atlantic (National Wildlife Federation, 2008). In addition, the heights of waves have increased by 20% since the late 1970’s resulting in tides that are higher than 10 feet and are likely to be present during strong storms along the eastern United States (U.S.) during hurricane season.
The frequency of North Atlantic hurricanes have also increased over the last century from an average of 3.5 per year in the early 1900’s up to an average of 8.4 per year for 1995-2005 (National Wildlife Federation, 2008). As oceans warm and glaciers melt, sea levels will continue to rise and create higher storm surges, which increases coastal flooding and subsequent storm damage along coasts. The risk of flooding is increased with the associated heavy rains that can extend hundreds of miles inland (Ekwurzel, 2006). Recent scientific studies indicate a connection between higher ocean temperatures and the destructive force of hurricanes, attributed in part to global warming. Lastly, the rising population in coastal regions and commensurate concentration of sensitive infrastructure considerably heightens the risk of financial hardship, property damage and unfortunate fatalities due to these unpredictable tropical cyclones (Ekwurzel, 2006).
Hurricanes are among the most consistently lethal natural disasters in terms of all-cause mortality. The deadliest tropical cyclone in world history is the Great Bhola Cyclone that caused approximately 500,000 deaths and struck in Bangladesh in 1970. More recently, Cyclone Nargis caused catastrophic destruction and at least 138,000 fatalities after making landfall in Myanmar in 2008. The Galveston Hurricane of 1900 remains the deadliest hurricane to strike the U.S. and was responsible for over 6,000 lives. Somewhere along the United States Gulf or Atlantic coast, an average of two major hurricanes make landfall every 3 years. Since 1851, the year 2005 tied for the second most U.S. major hurricane strikes. In the history of the U.S., Hurricane Katrina was the largest and costliest in terms of combined devastation, size of area impacted, loss of life, and number of people affected (University of Rhode Island, 2010).
Morbidity and Mortality
Morbidity and mortality often occurs from hurricanes because the population fails to evacuate or effectively shelter in place. When living in hurricane-prone areas, a working knowledge of the community’s warning signals and systems, evacuation routes and emergency shelters is crucial for survival, injury avoidance and asset or property protection (Department of Health and Human Services Center for Disease Control and Prevention, 2013). During any disaster, special needs populations are among the most vulnerable and deserve unusual consideration regarding evacuation and shelter. Further, individual, household and municipal preparedness plans are vital for at-risk communities. Each household should prioritize preparation of first aid kits, emergency food and water supplies and a communications plan and modality with the ability to sustain it during a power outage. Household and neighborhood plans should be tailored to address the unique concerns of children, pets, pregnant women, the elderly, immobile and those who need special assistance (Veenema, 2013, p. 99).
A broad range of bodily insults, physical afflictions and illnesses accompany the onset, duration, aftermath and recovery phases of hurricanes. At the onset and during hurricanes, lacerations, bone fractures, puncture wounds and falls from winds and flying debris can cause serious injury. Blunt trauma and crush injuries plague victims who are unable to avoid windows, exterior doors and the basements of unstable structures and homes vulnerable to collapse. During the immediate aftermath phase of hurricanes, protective clothing, waterproof footwear and reinforced hazard gear can provide protection from migrating or floating debris and rubble, electrocution, toxic and waste exposure from disabled utilities and environmental hazards such as snake and animal attack, disease and insect infestation.
Hurricanes produce flooding and standing waters, which presents some of the largest challenges for communities in regards to morbidity and mortality after the storm. With flash flooding being unpredictable and swift in development, roadways as community lifelines are immediately rendered impassable, deceptively deep and more risk-prone than they appear. In addition to thwarting formal rescue and post-storm evacuation efforts, driving by individuals is particularly hazardous. During Hurricane Floyd in 1999, 24 of the 52 deaths were attributed to motorists attempting to navigate flooded roads (N.C. Department of Health and Human Services, 2010). Further, the often invisible risks of standing water and static flooding include fast undersurface currents, sudden depth changes and drop-offs and terrain changes that erode familiar landmarks, which are especially dangerous for children, the elderly and others trying to move about (N.C. Department of Health and Human Services, 2010). Drowning is an avoidable, but all too common form of demise after hurricanes, thus, use of caution with attempts at relocation and complying with the orders and assistance of emergency personnel is important. Until such aid is available, employing lifesaving precautions, such as the use of lifejackets, simple monitoring of water levels changes in the immediate vicinity and maintaining escape routes from homes and shelters, while anticipating the need for extra time with children and the infirmed, can make the difference in surviving or not.
The recovery and cleanup phases of hurricanes pose their own unique risks. The disruption and dislocation of wildlife (e.g. native species, snakes, insects, domestic animals from zoos and pets) create the increased risk of foreseeable human-animal contact which compounds the danger of an already fractured, post-storm habitat. Animals displaced from customary settings and handlers may become frightened, aggressive, unpredictable and emboldened in the same way as humans whose survival is threatened following a massive environment shift after a storm. Caution and avoidance should be standard procedure when dealing with upset and unfamiliar domestic and wild animals. Mosquitoes, bees and other insect varieties that were eco-friendly or contained prior to a storm, now become quickly replicating pests that have had typical habitats disrupted in the post-storm setting. Not only do these kinds pose increased nuisance risks for stranded human populations, but now become community based vectors for uncontrolled disease spread among marooned survivors and animals. Protection and sanitation where possible of living environments, waste control and repellant application are key strategies in reducing insect attraction and exposure. Lastly, as a consequence of ocean storm surge and the mixing of overflow from inland lake and major tributaries, a peculiar feature of hurricane sequelae is the translocation of marine life, snakes and amphibians into the previous “dry” human habitat after the storm. With rising flood water, venomous snakes, stinging marine life (jellyfish, etc.) and predators may survive in flood waters that would not be their normal habitat (N.C. Department of Health and Human Services, 2010).
On a different front, powerful hurricane winds, power loss from disrupted utilities, damage to storage facilities and factories and heavy equipment failures (electricity, natural gas, water purification, chemical reservoirs, sewage and waste removal) portend yet another category of post-storm risk to survivors and rescue personnel. Downed live power lines, electrocutions, fires, toxic exposure and poisonous or chemical residue often threaten unsuspecting stranded masses before being identified and quarantined by authorities. Personal vigilance, avoidance and reporting of such dangers by the lay public may play a role in limiting fatalities until addressed by the proper crisis management teams, business and utility companies and municipal authorities (N.C. Department of Health and Human Services, 2010).
Finally, insults to hospitals and health facility supply chains, computer and communications capabilities, diagnostic and therapeutic technologies and patient housing and transport are expected in the wake of hurricanes. Following Katrina, newly formulated hospital and institutional emergency preparedness plans and hierarchies that anticipate patient safety and evacuation priorities, power failure, replacement and maintenance of medical equipment, meals-readily-eaten (MRE’s) and emergency staffing issues have been devised and are now in place in most vulnerable communities. Local medical preparedness support often now stands ready to jointly respond and interface with municipal, state and Federal Emergency Management Agency (FEMA) authorities, private entities and interstate partners to sustain the medical disaster response beyond the community’s capability (The White House, 2006). Legislative proposals such as the Uniform Emergency Volunteer Health Practitioners Act (UEVHPA) of 2007 and the adoption of state based laws to suspend bureaucratic obstructions that hinder response efforts and resources have added to response capacity (The Center for Law and The Public's Health, 2008). Despite these encouraging preparedness initiatives, the risks of impact to the health-care sector and medical response has not been completely erased due to the unpredictable, post-hurricane chaos that befalls the affected community.
According to Veenema (2013, p. 6) the five basic phases of a disaster management program include preparedness, mitigation, response, recovery and evaluation. Given the aforementioned definitions, damage capabilities, ecosystem and habitat disruption, property, business, economic and financial loss and mortality, a renewed interest and awareness of hurricane prevention and mitigation is warranted.
Prevention of fatalities and property loss due to hurricanes, at its core, is about preparedness. Ready.gov (2013) a division of the Federal Emergency Management Agency (FEMA) outlines pre-impact hurricane prevention steps which include: 1) having an individual or household emergency kit and communication plan established, 2) knowledge and assessment of the home and surrounding vicinity’s physical vulnerabilities to the ravages of hurricane impact (i.e. flood plain, home or shelter design, elevation, etc.). If forced to shelter in place during a hurricane, concurrent steps include monitoring authoritative information sources for updates via battery operated radio or TV, fortifying and insulating the shelter or home windows and doors, securing movable objects and suspending utilities such as natural gas and water. Post-hurricane steps mainly include continuous monitoring via radio regarding specific risks and for flooding (FEMA, 2013).
According to (Veenema, 2013, p. 6) mitigation is defined as the steps taken to decrease the devastation from disasters by reducing the effect on human and economic infrastructures. Effective communication, planning, preparedness, risk assessment are key aspects of mitigation (Veenema, 2013).
According to Cigler (2006), FEMA is concerned with general, broad-based risk assessment. Their mitigation efforts usually involve mapping flood-prone areas, educating communities, relocating homes and communities and setting strict building codes for structural reinforcements (p. 5). Individuals and communities, however, should be aware of their surroundings and understand the peculiarities of a hurricane prone area. Community measures should mandate the strengthening of homes and vital structures within the community (i.e. banks, hospitals, power plants, etc.) and re-emphasize community knowledge and information about hurricanes and early warning systems. Communities should require larger scale survey of the strengths, weaknesses, condition and durability of vital infrastructure such as bridges, dams, trees, land mass, retaining walls, levies and major roads. Any deficiencies demand pre-storm correction and certification according to municipal and state building and storm reinforcement codes. Further, individuals and communities should invest in pre-storm itemization of property and assets in order to streamline post-hurricane insurance claims. Pre-impact research and preparations such as these may do much to reduce the anxiety for residents in storm-prone areas (FEMA, 2013).
The most devastating feature of a hurricane is the strong winds and rains produced. Minimizing the damage created by a hurricane is the primary focus of mitigation efforts (Veenema, 2013). According to Veenema (2013), flooding is the main product of a hurricane causing structural damage to buildings and homes (p. 268). Therefore, a major concern for contractors is how to improve the structural design of a building to keep water out and prevent them from floating away when submerged (Barista, 2006, p. 50).
Barista (2006, p. 51) mentions six flood-proof barrier options to implement to prevent flooding and water damage. For example, lift-out barriers are inexpensive but require physical labor and time. Stop logs are like Lincoln Logs and are similar to lift-out barriers in that they require time and physical labor to assemble. Side-hinged gates are units that are not removable; they swing closed to prevent water from entering the ground floor of a building. They are permanent, do not require assembly, but need room to swing. Side-hinged flood doors are set up quickly and very effective in preventing the oncoming water from entering a building. Sliding flood barriers are like pocket doors hidden until needed, take seconds to set up, but are expensive. Bottom-hinged floodgates are expensive, are hidden in the ground until needed and rise up preventing water from entering the structure.
Finally, communication response, command and control and government/agency accountability is critical to a robust and effective disaster reaction and mitigation. According to Cigler (2006, p. 5), communication between governments, agencies, private entities and humanitarian organizations was lacking during hurricane Katrina. State and national governments feuded over resource requests, timing, delivery and destination. Infighting strained the effective use of available and trained resources such as the National Guard and military and thwarted coordination efforts between well-intentioned agencies. These post-Katrina insights have set the stage for improvement in local, state and national government communication and interactions for future disaster response. Communication and coordination may be facilitated by increased understanding by government departments and agencies of the other’s specific functions, avoidance of redundancies in administrative purview, streamlining of personnel and accountability hierarchy and timely dissemination of updates regarding specific regulations and changes. Cigler (2006) mentions, “a necessary precondition of better mitigation and more effective response and recovery is to sort out legal authorities among and between various levels of governments” (p. 6).
Hurricanes may be nature’s most menacing and consequential of natural disasters. Compared to wild fires, earthquakes, winter blizzards and the like, no other natural disaster phenomenon has been responsible for greater cumulative human toll, physical disruption and financial casualty in United States history than hurricanes (The White House, 2006). The hurricane’s unrivaled destructive force, historic track record of devastation and death, coupled with its apparent increasing frequency and risk render it a serious economic and national security threat. Renewed commitments to individual, community and national educational campaigns; community, business and health care sector preparatory action, combined with twenty-first century early forewarning technologies may be the best formula for reducing future risk. Vital lessons learned and strategies to be disseminated are as simple as the individual household emergency kit, to as comprehensive as state and national legislation and agency reorganization. Each plays a pivotal role in lives saved and habitat preserved. The ability to effectively anticipate, respond to, survive and recover from the impact of a disaster like the hurricane is still a work in progress. | https://ininet.org/hurricanes-the-definition-risks-impact-and-prevention-of-a-nat.html |
Applied physical chemistry
Physical Chemistry is the application of physical principles and measurements to understand the properties of matter, as well as for the development of new technologies for the environment, energy and medicine. Acid bases include acid base reactions, aqueous solutions, buffers, ionization constants, polyprotic acids and bases. Nuclear chemistry includes applications of nuclear chemistry, applied nuclear chemistry, components of the nucleus, fission and fusion, nuclear reactions, nuclear chain reactions, thermodynamic stability of the atomic nucleus. Quantum mechanics discuss about waves and particles, fundamentals of quantum mechanics, postulates of quantum mechanics, angular momentum, molecular spectroscopy, quantum states of atoms and molecules. Spectroscopy provide different kinds of information as a result of interaction of atoms with light and deals with Vibrational spectroscopy, Electronic spectroscopy, Infrared spectroscopy, Raman spectroscopy, Rotational spectroscopy, photoelectron spectroscopy. Surface science is the study of physical and chemical phenomena that occur at the interface of two phases, including solid–liquid interfaces, solid–gas interfaces, solid–vacuum interfaces, and liquid–gas interfaces. | https://www.omicsonline.org/conferences-list/applied-physical-chemistry |
Downtown Development Authority (DDA) and Loveland Downtown Partnership (LDP) announced today the recruitment process to fill Board of Director seats to help guide the revitalization of downtown Loveland.
The Loveland Downtown Partnership (LDP), created as a 501(c)(4) nonprofit, entered into a 10-year service contract with the City of Loveland in 2015 to provide for economic revitalization, development and redevelopment of the physical downtown Loveland. This includes the coordination of activities, projects and programs to enhance and promote the downtown area and its business interests. The LDP is tasked with building a coalition of both public and private resources for development and redevelopment, and for creating favorable marketing of downtown businesses. The LDP has three board vacancies: one seat filling a resigning board member’s term that expires in January 2021, and the second and third seats to be new terms of four years that will expire in January 2024. Applicants must be 18 years or older and live within the City of Loveland. The LDP board meets on the third Monday of each month at 8:00 a.m.
The Downtown Development Authority (DDA) was created in February 2015 under the laws of the State of Colorado. The purpose of the DDA is to halt, prevent and correct deterioration within the geographic boundaries identified as the “district,” and to create and implement development plans for the district, utilizing Tax Increment Financing (TIF) for the completion of authorized projects that are part of a comprehensive DDA development plan. At their September 3, 2019 meeting, the Loveland City Council approved adding two new seats to the DDA board, bringing the new total to nine. The DDA now has two board vacancies: one seat being a term of two years and the other being a term of four years. Applicants must be 18 years or older and be a resident, own or lease property, or be an employee or manager of an entity that owns or leases property with the DDA boundaries. The DDA board meets on the second Monday of each month at 4:00 p.m.
For more information about the Loveland Downtown District, please contact Fawn Floyd-Baltzer, Marketing & Membership Manager at [email protected] or 970-541-4337.To learn more about the open seats, time commitments or to receive a copy of the application, please contact Sean Hawkins, Executive Director of the LDP and DDA, via email at [email protected] or by phone at 970-699-2856. The application deadline for both organizations is October 20, 2019. If you feel you are eligible, please apply online by clicking the respective links below: | https://nocostyle.com/2019/09/23/loveland-downtown-district-announces-board-of-director-opportunities/ |
Lessons From Holy Qur'an, Sayings Of The Messenger (Peace Be Upon Him), Teachings Of Islam, Religion Of Wisdom, Pillars Of Islam,
Sunday, 24 May 2015
Sectarian Conflict Among the Muslims - Sunni & Shia
An ancient religious divide is helping fuel a resurgence of
conflicts in the Middle East and Muslim countries. Struggles between Sunni and
Shia forces have fed a Syrian civil war that threatens to transform the map of
the Middle East, spurred violence that is fracturing Iraq, and widened fissures
in a number of tense Gulf countries. Growing sectarian clashes have also
sparked a revival of transnational jihadi networks that poses a threat beyond
the region.
Islam’s schism, simmering for fourteen centuries, doesn’t explain
all the political, economic, and geostrategic factors involved in these
conflicts, but it has become one prism through which to understand the
underlying tensions. Two countries that compete for the leadership of Islam,
Sunni Saudi Arabia and Shia Iran, have used the sectarian divide to further
their ambitions. How their rivalry is settled will likely shape the political
balance between Sunnis and Shias and the future of the region, especially in
Syria, Iraq, Lebanon, Bahrain, and Yemen.
Alongside the proxy battle is the renewed fervor of armed
militants, motivated by the goals of cleansing the faith or preparing the way
for the return of the messiah. Today there are tens of thousands of organized
sectarian militants throughout the region capable of triggering a broader
conflict. And despite the efforts of many Sunni and Shia clerics to reduce
tensions through dialogue and counterviolence measures, many experts express
concern that Islam’s divide will lead to escalating violence and a growing
threat to international peace and security.
Sunni and Shia Muslims have lived peacefully together for
centuries. In many countries it has become common for members of the two sects
to intermarry and pray at the same mosques. They share faith in the Quran and
the Prophet Mohammed’s sayings and perform similar prayers, although they
differ in rituals and interpretation of Islamic law.
Shia identity is rooted in victimhood over the killing of Husayn,
the Prophet Mohammed’s grandson, in the seventh century, and a long history of
marginalization by the Sunni majority. Islam’s dominant sect, which roughly 85
percent of the world’s 1.6 billion Muslims follow, viewed Shia Islam with suspicion,
and extremist Sunnis have portrayed Shias as heretics and apostates.
UN INDEPENDENT
INTERNATIONAL COMMISSION OF INQUIRY ON THE SYRIAN ARAB REPUBLIC
Origins of the Schism
Mohammed unveiled a new faith to the people of Mecca in 610. Known
as Islam, or submission to God, the monotheistic religion incorporated some
Jewish and Christian traditions and expanded with a set of laws that governed
most aspects of life, including political authority. By the time of his death
in 632, Mohammed had consolidated power in Arabia. His followers subsequently
built an empire that would stretch from Central Asia to Spain less than a
century after his death. But a debate over succession split the community, with
some arguing that leadership should be awarded to qualified individuals and
others insisting that the only legitimate ruler must come through Mohammed’s
bloodline.
A group of prominent early followers of Islam elected Abu Bakr, a
companion of Mohammed, to be the first caliph, or leader of the Islamic
community, over the objections of those who favored Ali ibn Abi Talib,
Mohammed’s cousin and son-in-law. The opposing camps in the succession debate
eventually evolved into Islam’s two main sects. Shias, a term that stems
from shi’atuAli, Arabic for “partisans of Ali,”
believe that Ali and his descendants are part of a divine order. Sunnis,
meaning followers of the sunna, or “way” in Arabic, of Mohammed,
are opposed to political succession based on Mohammed’s bloodline.
Ali became caliph in 656 and ruled only five years before he was
assassinated. The caliphate, which was based in the Arabian Peninsula, passed
to the Umayyad dynasty in Damascus and later the Abbasids in Baghdad. Shias
rejected the authority of these rulers. In 680, soldiers of the second Umayyad
caliph killed Ali’s son, Husayn, and many of his companions in Karbala, located
in modern-day Iraq. Karbala became a defining moral story for Shias, and Sunni
caliphs worried that the Shia Imams—the descendants of Husayn who were seen as
the legitimate leaders of Muslims (Sunnis use the term “imam” for the men who
lead prayers in mosques)—would use this massacre to capture public imagination
and topple monarchs. This fear resulted in the further persecution and
marginalization of Shias.
Even as Sunnis triumphed politically in the Muslim world, Shias
continued to look to the Imams—the blood descendants of Ali and Husayn—as their
legitimate political and religious leaders. Even within the Shia community,
however, there arose differences over the proper line of succession. Mainstream
Shias believe there were twelve Imams. Zaydi Shias, found mostly in Yemen,
broke off from the majority Shia community at the fifth Imam, and sustained
imamate rule in parts of Yemen up to the 1960s. Ismaili Shias, centered in
South Asia but with important diaspora communities throughout the world, broke
off at the seventh Imam. Most Ismailis revere the Aga Khan as the living
representative of their Imam. The majority of Shias, particularly those in Iran
and the eastern Arab world, believe that the twelfth Imam entered a state of
occultation, or hiddenness, in 939 and that he will return at the end of time.
Since then, “Twelvers,” or Ithna Ashari Shias, have
vested religious authority in their senior clerical leaders, called ayatollahs
(Arabic for “sign of God”).
Many Christian, Jewish, and Zoroastrian converts to Islam chose to
become Shia rather than Sunni in the early centuries of the religion as a
protest against the ethnic Arab empires that treated non-Arabs as second-class
citizens. Their religions influenced the evolution of Shia Islam as
distinct from Sunni Islam in rituals and beliefs.
Sunnis dominated the first nine centuries of Islamic rule
(excluding the Shia Fatimid dynasty) until the Safavid dynasty was established
in Persia in 1501. The Safavids made Shia Islam the state religion, and over
the following two centuries they fought with the Ottomans, the seat of the
Sunni caliphate. As these empires faded, their battles roughly settled the
political borders of modern Iran and Turkey by the seventeenth century, and
their legacies resulted in the current demographic distribution of Islam’s
sects. Shias comprise a majority in Iran, Iraq, Azerbaijan, and Bahrain,
and a plurality in Lebanon, while Sunnis make up the majority of more than
forty countries from Morocco to Indonesia.
1 / 17 Timeline: Origins of the
Sunni-Shia Schism
Early Muslims split into two camps following the
death of the Prophet Mohammed. This chronology explains how the sects evolved
from 632 until the late twentieth century. (Photo: Abbas Al-Musavi/Brooklyn
Museum
632 - The
Death of Mohammed
Early
followers of Islam are divided over the succession of the Prophet Mohammed, who
founded the religion in Arabia. Prominent members of the community in Mecca
elect Abu Bakr, a companion of Mohammed, with objections from those who favor
Ali ibn Abi Talib, Mohammed’s cousin and son-in-law. Ali eventually becomes
caliph, or ruler of the Islamic community, in 656, and is assassinated in 661
after a power struggle with the governor of Damascus, Mu’awiya. Mu’awiya claims
the caliphate and founds the Umayyad dynasty, which rules the Muslim empire
from Damascus until 750.
661-1258 - Umayyad and Abbasid
Dynasties Target Shias
Umayyads,
and later Abbasids, who replace the Umayyads and rule from Baghdad after 750,
oppress and kill the successors of Husayn, known as Imams, who pose a political
threat to Sunni caliphs. The sixth Shia Imam, Ja'far al-Sadiq, orders his
followers to hide their true beliefs for the survival of the faith. Shia
branches such as Ismaili and Zaydi emerge from different interpretations of
succession for Imams. The Sunni caliphate becomes hereditary.
se
661 - The Early Shias
The
partisans of Ali, or shi’atu Ali, grow discontented after the
murder of their leader in 661. They reject the authority of the caliphs during
the Umayyad dynasty, which rules over an expanding empire stretching from
Pakistan through northern Africa to Spain. Shias argue that the legitimate
leaders of Islam must be the sons of Ali and Fatima, Mohammed’s daughter. Husayn,
one of Ali’s sons, eventually leads a revolt from Kufa, in modern-day Iraq.
680 - The
Battle of Karbala
Yazid,
the Umayyad ruler, dispatches an army to crush the Kufa revolt. A battle in
Karbala, north of Kufa, ends with the massacre of Husayn and many of his
companions. Husayn's martyrdom and its moral lessons help shape Shia
identity, and the sect grows despite the murder of its leaders. Husayn’s death
is commemorated by Shias during the annual ritual of Ashura, which includes
practices, such as self-flagellation, that are distinct from Sunni Islam.
939 -) Occultation of the Mahdi
Most
Shias today are Twelvers. They believe that the line of Imams continued to the
twelfth Imam, Mohammed al-Mahdi, or the guided one, who entered a state of
occultation, or hiddenness, in 939. Shias expect the Mahdi to return at the end
of time. Sunni Islam becomes a broad umbrella term for non-Shia Muslims who are
united on the importance of the Quran and practices of Mohammed, though they
may differ in legal opinion.
969 -
Fatimids: The First Shia Dynasty
Ismailis,
who break off from the Twelver line after the sixth Imam, take control of Egypt
and large parts of North Africa and expand to western Arabia and Syria,
creating the Fatimid dynasty. The Fatimids, who assume the titles of both imam
and caliph, establish al-Azhar Mosque, which centuries later becomes the
intellectual center of Sunni Islam. The Shia Fatimid caliphate fades in the
twelfth century, and the Ismaili community spreads to Yemen, Syria, Iran, and
western India.
1268 - Ibn Taymiyya in
Damascus
By the ninth century,
Sunnis adhere to four schools of Islamic jurisprudence: Hanafi, Shafii, Maliki,
and Hanbali. Ibn Taymiyya, a religious scholar, moves to Damascus in 1268 and
studies the Hanbali school, which condemns Shias as rafidha, or
rejecters of the faith. He preaches a return to the purity of Islam in its
early days. Ibn Taymiyya opposes celebrating Mohammed’s birthday and other
practices that resemble Christian and pagan rituals. His ideas help shape Wahhabi
and Salafi thought centuries later. (Photo: Bernard Gagnon)
1501 -
Wahhabi Islam Emerges in Arabia
Mohammed
ibn Abd al-Wahhab establishes a religious movement on the Arabian peninsula in
the eighteenth century steeped in the Hanbali school of Sunni Islam. Wahhabis,
as his followers are known, preach a puritanical faith that puts them in
conflict with other Sunnis as well as Shias. Wahhabi fighters desecrate the
shrine of Husayn in Karbala and destroy Mohammed’s tombstone in Medina. They
join Mohammed bin Saud to found the first Saudi kingdom, which is defeated by
Ottoman forces in the early nineteenth century.
1703 -
Sykes–Picot and the End of the Caliphate
The
secret Sykes-Picot agreement is reached between France and the United Kingdom
to divide the Arab provinces of the Ottoman Empire, which has been in decline
and weakens further during World War I. Colonial rulers elevate minorities to
powerful positions in Iraq and Syria, a policy which later contributes to
sectarian tensions in these countries. Tempering these tensions are new ideas
of secularism and nationalism that sweep through the Turkish and Arab province
of the former Ottoman Empire. The newly founded secular Republic of Turkey
abolishes the caliphate in 1924. In the Arab world, identity politics stressing
pan-Arabism and a unity among Muslims helps mute sectarianism, especially
during the fight for independence against the European
1916 -
Saud Dynasty Establishes a Kingdom
Abdul
Aziz Ibn Saud and his army of Wahhabi warriors consolidate control of the
Arabian peninsula and form the Kingdom of Saudi Arabia in 1932. During the
founding battles, fighters attack fellow Sunnis in western Arabia and Shias in
eastern Arabia and southern Iraq. Wahhabi preachers go on to dominate the
kingdom’s judiciary and education system, and their teachings are spread first
in Saudi Arabia and then internationally as the country grows wealthy from its
large oil resources. The rise of Wahhabi and the related Salafi branches of
Islam fuels Sunni-Shia tensions today.
1932 -
Ottomans Conquer Iraq
Safavids
briefly gain control of Iraq, an Arab territory, but lose it in 1639 to the
Ottomans, who claim the title of the Sunni caliphate in Turkey. The
Ottoman–Safavid wars eventually establish the modern contours of Turkey, Iraq,
and Iran. Shia Islam dominates Iran, and Shia Muslims in Turkey are killed or
displaced, shifting the demography in favor of Sunnis, a development that makes
both these countries far more homogenous than their neighbors.
1501 -
Safavid Dynasty and the Rise of Shias in Persia
Ismail,
leader of the Safavid dynasty, defeats the Mongols and brings the territories
of former Persian empires under central authority, including modern-day Iran,
Iraq, Armenia, Georgia, Azerbaijan, and parts of Afghanistan, Pakistan, and
Turkey. Shi’ism becomes the official religion of the Safavids and is often
spread through force. As the Safavid dynasty declines in the eighteenth
century, the power of Shia clergy in civil affairs grows in Iran.
1947 -
Ba’ath Rule Begins in Syria
Syria’s
first years of independence are riddled with coups until Ba’athists in the
military seize power in 1963. The Ba’ath Party, popular in Iraq and Syria,
promotes a secular, pan-Arab, socialist ideology and is hostile to Islamists.
Hafez al-Assad, a Ba’ath leader and member of the heterodox Shia sect known as
Alawis, takes power in 1970 and rules until his death in 2000, after more than
a thousand years of Sunni dominance in Syria. His son Bashar continues to rule
the country amid civil war in 2014.
1963
- Lebanese Civil War
Lebanon experiences a sectarian civil war that (with important
exceptions at various times) pits the Christian minority that has held
political power since independence in 1943 against the Muslim majority. Syria
intervenes in the fighting in 1976 and Israel intervenes in 1982. After the
Israeli intervention, Iran sponsors the establishment of a Shia Lebanese
militia, Hezbollah, which over time becomes the most powerful force in Lebanese
politics. Under pressure from Hezbollah, Israel withdraws its last forces from
Lebanon in 2000. (Photo: AP)
1976-1989 Sectarian
Harmony: The Azhar Fatwa
Sheikh Mahmoud Shaltut, the rector of Cairo's al-Azhar Mosque,
which Sunnis view as the preeminent religious institution, issues a
religious ruling, or fatwa, that recognizes Shia law as the fifth school of
Islamic jurisprudence. After decades of colonialism and then secular
nationalism, many Sunni and Shia religious authorities throughout the Muslim
world unite to confront these common threats. This harmony is tarnished as
secular states weaken.
1947 -
The Birth of Pakistan
India’s
struggle for independence includes an Islamic awakening, resulting in the
creation of Pakistan in the partition of India at the end of British rule. The
Sunni-majority country is founded by a Shia, Mohammed Ali Jinnah, who
emphasizes the need for a secular Pakistan where all citizens are equal
irrespective of "religion or caste or creed." Pakistanis elect prime
ministers from both sects. But the Islamization of the state, promoted by Saudi
Wahhabi clerics, accelerates after army chief General Zia ul-Haq, a Sunni,
seizes power in 1978. Sectarian violence escalates after the 1980s.
Share
Modern Tensions
Iran’s Islamic Revolution in 1979 gave Shia cleric Ayatollah Ruhollah
Khomeini the opportunity to implement his vision for an Islamic government
ruled by the “guardianship of the jurist” (velayat-e faqih), a
controversial concept among Shia scholars that is opposed by Sunnis, who
have historically differentiated between political leadership and religious
scholarship. Shia ayatollahs have always been the guardians of the faith.
Khomeini argued that clerics had to rule to properly perform their function:
implementing Islam as God intended, through the mandate of the Shia Imams.
Under Khomeini, Iran began an experiment in Islamic rule. Khomeini
tried to inspire further Islamic revival, preaching Muslim unity, but supported
groups in Lebanon, Iraq, Afghanistan, Bahrain, and Pakistan that had specific
Shia agendas. Sunni Islamists, such as the Muslim Brotherhood and Hamas,
admired Khomeini’s success, but did not accept his leadership, underscoring the
depth of sectarian suspicions.
Saudi Arabia has a sizable Shia minority of roughly 10 percent,
and millions of adherents of a puritanical brand of Sunni Islam known as
Wahhabism (an offshoot of the Sunni Hanbali school) that is antagonistic to
Shia Islam. The transformation of Iran into an overtly Shia power after the
Islamic revolution induced Saudi Arabia to accelerate the propagation of
Wahhabism, as both countries revived a centuries-old sectarian rivalry over the
true interpretation of Islam. Many of the groups responsible for sectarian
violence that has occurred in the region and across the Muslim world since 1979
can be traced to Saudi and Iranian sources.
Saudi Arabia backed Iraq in the 1980–1988 war with Iran and
sponsored militants in Pakistan and Afghanistan who were primarily fighting
against the Soviet Union, which had invaded Afghanistan in 1979, but were also
suppressing Shia movements inspired or backed by Iran.
The transformation of Iran into an agitator for Shia movements in
Muslim countries seemed to confirm centuries of Sunni suspicions that Shia
Arabs answer to Persia. Many experts, however, point out that Shias aren’t
monolithic—for many of them, identities and interests are based on more than
their confession. Iraqi Shias, for example, made up the bulk of the Iraqi army
that fought Iran during the Iran-Iraq War, and Shia militant groups Amal and
Hezbollah clashed at times during the Lebanese civil war. The Houthis, a Zaydi
Shia militant group in Yemen, battled the government of Ali Abdullah Saleh, a
Zaydi, several times between 2004 and 2010. Then, in 2014, the Houthis captured
the capital Sana'a with ousted president Saleh's support.
For their part, both mainstream and hard-line Sunnis aren’t
singularly focused on oppressing Shias. They have fought against coreligionists
throughout history, most recently in the successive crackdowns on the Muslim
Brotherhood in Egypt, Iraq’s 1990 invasion of Kuwait, and Saudi Arabia’s
battles against al-Qaeda and related Sunni
militant groups. Sharing a common Sunni identity didn’t eliminate power
struggles among Sunni Muslims under secular or religious governments.
But confessional identity has resurfaced wherever sectarian
violence has taken root, as in Iraq after the 2003 U.S.-led invasion removed
Saddam Hussein, a dictator from the Sunni minority who ruled over a
Shia-majority country. The bombing of a Shia shrine in Samara in 2006 kicked
off a cycle of sectarian violence that forced Iraqis to pick sides, stirring
tensions that continue today.
In the Arab world, Shia groups supported by Iran have recently won
important political victories. The regime of Bashar al-Assad, which has ruled
since 1970, relies on Alawis, a heterodox Shia sect that makes up about 13
percent of Syria’s population, as a pillar of its
power. Alawis dominate the upper reaches of the military and security
services in Syria and are the backbone of the forces fighting to support the
Assad regime in Syria’s civil war. Since the 2003 invasion of Iraq
unseated Saddam Hussein and instituted competitive elections, the Shia majority
has dominated the parliament and produced its prime ministers. Hezbollah, the Lebanese Shia militia
and political movement, is the strongest political actor in Lebanon. Shia
militants in Yemen, tenuously linked to Iran, have become the country's
dominant power. Iran’s regional influence has swelled as its allies in these
countries have accumulated power.
Sunni governments, especially Saudi Arabia, have increasingly
worried about their own grips on power, a concern that was exacerbated with the
protest movement that began in Tunisia in late 2010. The Arab
Awakening, as the uprisings are known, spread to Bahrain and Syria,
countries at the fault lines of Islam’s sectarian divide. In each, political
power is held by a sectarian minority—Alawis in Syria, where Sunnis are the
majority, and a Sunni ruling family in Bahrain, where Shias are the majority.
The civil war in Syria, which is a political conflict at its core, has exposed
sectarian tensions and become the staging ground for a vicious proxy war
between the region’s major Sunni and Shia powers. In Yemen, Houthi rebels have
expanded their territory south of Saudi Arabia, providing Iran a potential
beachhead along the strategic shipping routes in the Red Sea. Some analysts
view the Syrian conflict as the last chance for Sunnis to limit and reverse the
spread of Iranian power and Shia influence in the Arab world.
1 / 18
Timeline: Modern
Sunni-Shia Tensions
Iran’s
Islamic revolution, which brought Shias to power in 1979, and the Sunni
backlash have fueled a competition for regional dominance. This timeline
highlights Sunni-Shia tensions in recent decades. (Photo: Henri
Bureau/Corbis)
Iran’s Islamic
revolution, which brought Shias to power in 1979, and the Sunni backlash have
fueled a competition for regional dominance. This timeline highlights
Sunni-Shia tensions in recent decades. (Photo: Henri Bureau/Corbis)
JANUARY
16,1979
Ayatollah Khomeini
returns to Tehran in 1979 after fourteen years of exile. AP Photo
Iran’s
Islamic Revolution
Iran’s
ruler, Mohammad Reza Shah Pahlavi, flees the country after months of
increasingly massive protests. Exiled Shia cleric Ayatollah Ruhollah Khomeini
returns and leads an Islamic republic based on a constitution that grants him
religious and political authority under the concept of velayat-e faqih (“guardianship
of the jurist”). Khomeini is named supreme leader and starts to export the
Islamic revolution, which is viewed with suspicion by Sunni rulers in countries
with significant Shia populations, such as Iraq, Bahrain, Kuwait, the United
Arab Emirates, Pakistan, Saudi Arabia, and Lebanon.
DECEMBER
24, 1979 Soviet Army Invades Afghanistan
Soviet
forces invade Afghanistan after the communist government in Kabul requests
military aid to fight Islamist rebels. The insurgents, known as mujahadeen
(“those who fight jihad”), attract mainly Afghan fighters and are augmented by
thousands of foreign Sunni fighters, including a young Saudi named Osama bin
Laden. Weapons and cash for the mujahadeen are supplied through Pakistan by
Saudi Arabia and the United States. The war, which is framed as a resistance to
Soviet occupation, raises the profile of fundamentalist Sunni movements.
JULY
5, 1980 Shia Protests in Pakistan Exposes Sectarian Tensions
Tens of
thousands of Shias protest in Islamabad against the imposition of some Sunni
laws on all Muslims. Pakistan’s president gives Shias an exemption, but the
sectarian confrontation becomes an important political issue in the country.
Sunni groups such as Lashkar-e-Jhangvi and Sipah-e-Sahaba, funded by Wahhabi
clerics in Saudi Arabia, kill thousands of Shias over the next three decades.
Smaller Shia sectarian militant groups such as Tehrik-e-Jafria also emerge but
are responsible for fewer attacks.
SEPTEMBER
22, 1980 Iraq Sparks a War with Iran
Iraqi
president Saddam Hussein, a Sunni ruling over a majority-Shia country who fears
the spillover effects of the Iranian Revolution, sends his troops to occupy
part of an oil-rich province in Iran. The move sparks an eight-year war,
resulting in roughly one million deaths. Iraq is backed by Saudi Arabia and the
United States, the latter responding to hostility from Tehran’s new government
following the Islamic revolution and taking hostage of U.S. diplomats.
FEBRUARY
28, 1991 Saddam Crushes Shia Insurgency After Gulf War
Riots
erupt in the Shia cities of Basra and Najaf after U.S.-led allies drive Iraqi
troops from Kuwait and rout them on the battlefield in the first Gulf War. The
Shia protestors are in part motivated by a perception that they will receive
U.S. backing if they turn against Saddam. U.S. officials say this was never
promised. Saddam’s forces mount a brutal crackdown, killing
tens of thousands of Shias, shelling the shrines of Najaf and Karbala, and
razing parts of Shia towns.
AUGUST
8, 1998 Taliban Massacres Shia in Mazar-e-Sharif
Taliban
militants, Sunni fundamentalists who seized power after the defeat of Soviet
forces, capture the city of Mazar-e-Sharif in northwest Afghanistan. TheTaliban kills at least two thousand Shias in Mazar-e-Sharif and
Bamiyan in 1997 and 1998. The offensive in northwest Afghanistan, backed by Pakistan,
helps the Taliban consolidate power in the country. Militants kill eight
Iranian diplomats based in Mazar-e-Sharif, prompting Tehran to deploy its
troops to the border, but United Nations mediation averts a confrontation.
SEPTEMBER
11, 2001 Al-Qaeda Strikes the U.S., Killing Thousands
In
response to the attacks on New York and Washington, U.S. forces pursue al-Qaeda
leaders and militants to their bases in Afghanistan and overthrow the Taliban
government. U.S.-led international troops help set up a new order in the
country. The toppling of the anti-Iranian Taliban government in Afghanistan,
followed shortly thereafter by the U.S. invasion of Iraq that brings down
another Iranian foe, Saddam Hussein, fans Sunni fears in Jordan and Gulf states
of a Shia revival.
MARCH
19, 2003 U.S. Forces Topple Saddam Hussein in Iraq
A
coalition led by the United States invades Iraq and ends Saddam’s regime and
centuries of Sunni dominance in Iraq. Sectarian violence erupts as remnants of
the deposed Ba’ath party and other Sunnis, both secular and Islamist, mount a
resistance against coalition forces and their local allies, the ascendant Shia
community. Shia militias also emerge, some of which also oppose the U.S.
military presence. Foreign Sunni militants, many affiliated with al-Qaeda,
flock to Iraq to participate in what evolves into a sectarian war. Iranian
influence in Iraq grows dramatically as Tehran backs Shia militants, as well as
the Shia political parties that come to dominate the electoral process.
Former
Lebanese prime minister Rafik Hariri is killed in a car bomb after spearheading
an effort to raise international pressure on Syria to withdraw its forces,
which have been in Lebanon since 1976. His assassination is seen as a Syrian
plot supported by Syria’s Lebanese allies, including Hezbollah, and leads to
massive demonstrations that convince Syria to withdraw. The assassination and
subsequent mobilization pit the Lebanese Sunni community, whom Hariri had come
to represent, against Hezbollah and Lebanese Shias, who remain allied with
Syria. Lebanese Christians split, with some supporting the Hariri camp and
others supporting Hezbollah.
FEBRUARY
22, 2006 Bombing of Shia Shrine Escalates Iraq Violence
Sectarian
killings become normal in Iraq, with both Sunni and Shia militias targeting
civilians across the country. The bombing that destroys the golden dome of
al-Askari mosque in Samarra, home to the tombs of the tenth and eleventh Shia
Imams, triggers a more intense wave of violence that almost doubles the monthly
civilian death toll in Iraq to nine hundred.
DECEMBER
30, 2006 Saddam’s Execution Inflames Sunnis
Saddam
Hussein, responsible for the deaths of thousands of Shias and Sunnis in Iraq,
is executed amid taunts by witnesses who chant the name of Shia cleric and
Mahdi army militia leader Muqtada al-Sadr. The unruly scene, captured on video,
elevates Saddam’s status as a martyr among many Sunnis in the region and
underscores the new reality of rising Shia power in Iraq.
FEBRUARY 11, 2011
Protests Erupt in the
Middle East, Exposing Sectarian Fault Lines
A wave of pro-democracy protests sweeps across
the region, starting with the overthrow of Tunisia’s president, and then Egypt’s
on February 11, eventually spreading to other Arab states in what is known as
the “Arab Spring” or the “Arab Awakening.” Iranian officials welcome the fall
of long-term U.S. allies like Egypt’s president, Hosni Mubarak, and unrest in
Bahrain, home to an oppressed Shia majority. As protests reach Syria in March,
Tehran backs the government, which is dominated by Alawis, a heterodox Shia
sect, while the opposition is dominated by members of the majority Sunni
community. Dormant sectarian tensions in Syria are revived and a regional
sectarian showdown begins. (Courtesy Reuters)
AUGUST
30, 2012 Egypt’s Morsi Visits Iran
President
Mohamed Morsi’s trip to Tehran, the first visit by an Egyptian leader since
Cairo’s recognition of Israel in the 1980s, signals the potential for a new
relationship between Iran and Sunni Islamists. Iran tries to rebrand the Arab uprisings as an “Islamic Awakening” and
an extension of the Islamic Revolution of 1979. But the visit by Morsi, of the
Muslim Brotherhood, exposes Islam’s deep cleavage. He praises Islam’s first
three caliphs, whom Shias reject, and says opposing the Assad regime is a
“moral obligation,”remarks that Iranian officials criticize.
OCTOBER
1, 2012 Hezbollah Commander Killed in Syria
Civil war
divides Syrians largely along sectarian lines, with Sunnis supporting rebels,
and Alawis, Shias, and other minorities backing the Assad regime. Foreign Sunni
fighters trickle and then flood into the country, and signs of increased
involvement from Iran and its Lebanese proxy militia, Hezbollah, emerge. The
death of Hezbollah founding member Ali Hussein Nassif comes months before the
group publicly acknowledges its role in the war. Saudi Arabia and other Gulf
countries fund rebels, turning the fighting in Syria into a regional proxy war.
APRIL
8, 2013
8 April 2013 -
Al-Qaeda’s Iraq Affiliate Expands in Syria
The Islamic State of
Iraq, al-Qaeda’s affiliate in the country, extends its activities into Syria,
creating the Islamic State of Iraq and Syria (ISIS). Known for its brutality
against Shias and most Sunnis who oppose it, the group proves to be too extreme
for al-Qaeda and is eventually expelled from the network. ISIS attacks in Iraq
and Syria add an additional layer of sectarian violence to the region, and its
control of territory in both states threatens to dissolve borders and fracture
countries in the Middle East. (Yaser Al-Khodor/Courtesy Reuters)
20 April
2014 - Anti-Shia Sentiments Spread to Indonesia
Asian
Muslims, influenced by the sectarian violence in the Middle East and Pakistan,
aim to avoid potential tensions by suppressing the growth of their tiny Shia
communities. Indonesian clerics and radical Islamists hold an “Anti-Shia
Alliance” meeting in the world’s largest Muslim country, which is more than 99
percent Sunni. Malaysia, where Sunnis are also dominant, has implemented laws forbidding the propagation of the Shia
faith.
JUNE
10, 2014 Shia Militias Mobilize as ISIS Advances in Iraq
ISIS
militants and other armed Sunni groups seize Mosul, Iraq’s second-largest city,
with little resistance from the Iraqi army. The Sunni insurgency, brewing for
years in response to what it sees as exclusionary policies of Shia prime
minister Nouri al-Maliki, expands toward Baghdad and the borders with Syria and
Jordan. ISIS threatens to destroy sacred Shia shrines, prompting a call to arms
by Iraq’s top Shia cleric, Grand Ayatollah Ali al-Sistani. Shia civilians
respond to a mass recruitment drive that swells the ranks of militias and
elevates sectarian tensions.
Practicing the Faith
Sunnis and Shias agree on the basic tenets of Islam: declaring
faith in a monotheistic God and Mohammed as his messenger, conducting daily
prayers, giving money to the poor, fasting during the Muslim holy month of
Ramadan, and performing the pilgrimage to Mecca.
There are divisions even over the precepts of Islam, but the main
difference relates to authority, which sparked the political split in the seventh
century and evolved into divergent interpretations of sharia, or Islamic law,
and distinct sectarian identities.
Shias believe that God always provides a guide, first the Imams
and then ayatollahs, or experienced Shia scholars who have wide interpretative
authority and are sought as a source of emulation. The term “ayatollah” is
associated with the clerical rulers in Tehran, but it’s primarily a title for a
distinguished religious leader known as a marja, or source of
emulation. Iran’s supreme leader, Ali Khamenei, was appointed by an elected
body of Iranian clerics, while maraji (plural of marja) are
elevated through the religious schools in Qom, Najaf, and Karbala. Shias can
choose from dozens of maraji, most of whom are based in holy cities in Iraq and
Iran. Many Shias emulate a marja for religious affairs and defer to Supreme
Leader Ali Khamenei in Iran for political guidance. For Sunnis, authority is
based on the Quran and the traditions of Mohammed. Sunni religious scholars,
who are constrained by legal precedents, exert far less authority over
their followers than their Shia counterparts.
Both sects have subdivisions. The divisions among Shias were
discussed above. Four schools comprise Sunni jurisprudence: Hanafi, Shafii,
Maliki, and Hanbali, the latter spawning the Wahhabi and Salafi movements in
Saudi Arabia. Sunnism, a broad umbrella term for non-Shia Islam, is united on
the importance of the Quran and practice of Mohammed but allows for differences
in legal opinion.
Dear Karbala, dear Najaf, dear Kadhimiyah, and
dear Samarra, we warn the great powers and their lackeys and the terrorists,
the great Iranian people will do everything to protect them.
IRANIAN PRESIDENT
HASSAN ROUHANI
Sectarian Militants
Communal violence between Islam’s sects has been rare
historically, with most of the deadly sectarian attacks directed by clerics or
political leaders. Extremist groups, many of which are fostered by states, are
the chief actors in sectarian killings today.
The two most prominent terrorist groups, Sunni al-Qaeda and Shia
Hezbollah, have not defined their movements in sectarian terms, and have
favored using anti-imperialist, anti-Zionist, and anti-American frameworks to
define their jihad, or struggle. They share few similarities beyond the use of
violence. Hezbollah has developed a pragmatic political wing that competes
in elections and is part of the Lebanese government, a path not chosen by
al-Qaeda, which operates a diffuse network largely in the shadows. Both groups
have deployed suicide bombers, and their attacks shifted from a focus on the
West and Israel to other Muslims, such as al-Qaeda’s killing of Shia civilians
in Iraq and Hezbollah’s participation in the Syrian civil war.
Conflict and chaos have played a role in the reversion to basic
sectarian identity. In Iraq, for instance, remnants of the Ba’athist regime
employed Sunni rhetoric to mount a resistance to the rise of Shia power
following the ouster of Saddam. Sunni fundamentalists, many inspired by
al-Qaeda’s call to fight Americans, flocked to Iraq from Muslim countries,
attacking coalition forces and many Shia civilians. Abu Musab al-Zarqawi, who
founded al-Qaeda’s franchise in Iraq, evoked ancient anti-Shia fatwas, or
religious rulings, to spark a civil war in hopes that the Shia majority would
eventually capitulate in the face of Sunni extremist violence. The Shia
community absorbed thousands of deaths before fighting back with their own
sectarian militias.
Syria’s civil war, which exceeded the casualty toll of Iraq’s
decade-long conflict in its first three years, has amplified sectarian tensions
to unprecedented levels. The war began with peaceful protests in 2011 calling
for an end to the Assad regime, which has ruled since 1970. The Assad family
and other Alawis have stirred resentment by Syria’s majority Sunnis after
decades of repression and a sectarian agenda that elevated minority Alawis in
government and the private sector. The 2011 protests and brutal government
crackdown uncovered sectarian tensions in Syria, which have rippled across the
region.
Tens of thousands of Syrian Sunnis joined rebel groups such as
Ahrar al-Sham, the Islamic Front, and al-Qaeda’s Nusra Front, which all employ
anti-Shia rhetoric; similar numbers of Syrian Shias and Alawis enlisted with an
Iran-backed militia known as the National Defense Force to fight for the Assad
regime. Foreign Sunni fighters from Arab and Western countries joined the
rebels, while Lebanon’s Hezbollah and some Shia militias from Iraq such as
Asaib Ahl al-Haq and Kata'ib Hezbollah backed the Syrian government. Even Afghan Shia refugees in Iran have
reportedly been recruited by Tehran for the war in Syria, pitting them against
Sunni foreign fighters who may have forced the Afghans into exile decades
earlier. Syria’s civil war has attracted more militants from more countries
than were involved in the conflicts in Afghanistan, Chechnya, and Bosnia
combined.
Al-Qaeda in Iraq, decimated by the “Awakening” of Sunni Iraqis who
joined the fight against extremists, the U.S.-led military surge, and the death
of Zarqawi, found new purpose in exploiting the
vacuum left by the receding Syrian state. It established its own transnational
movement known as the Islamic State in Iraq and Syria (ISIS). The
group expanded its grip on Sunni provinces in Iraq and eastern regions in
Syria, seizing Iraq’s second-largest city, Mosul, in June 2014. It defied
orders from al-Qaeda’s top commanders to curtail its transnational ambitions
and extremism, which led to ISIS’s expulsion from al-Qaeda in February 2014.
ISIS rebranded as the Islamic State in July 2014 and declared its leader, Abu
Bakr al-Baghdadi, as caliph. The group's highly publicized killing of
Western hostages triggered a campaign of air strikes by the United States and
its regional allies Jordan, Qatar, Saudi Arabia, and the United Arab Emirates.
Extremist groups have come to rely on satellite television and
high-speed Internet over the past two decades to spread hate speech and rally
support. Fundamentalist Sunni clerics, many sponsored by wealthy Sunnis from
Saudi Arabia and the Gulf states, have popularized anti-Shia slurs. Shia
religious scholars have also taken to the airwaves, mocking and
cursing the first three caliphs and Aisha, one of Mohammed’s wives.
Sectarian rhetoric dehumanizing the “other” is centuries old. But
the volume is increasing. Dismissing Arab Shias as Safawis, a term that paints
them as Iranian agents (from the Safavid empire) and hence traitors to the Arab
cause, is increasingly common in Sunni rhetoric. Hard-line Sunni Islamists have
used harsher historic terms such as rafidha, rejecters of the
faith, and majus, Zoroastrian or crypto Persian, to describe
Shias. Iranian officials, Iraq’s prime minister, and Hassan Nasrallah, the
leader of Hezbollah, routinely describe their Sunni opponents as takfiris (code
for al-Qaeda terrorists) and Wahhabis. This cycle of demonization has been
exacerbated throughout the Muslim world.
For Sunni extremists, new technologies and social-media
channels have revolutionized recruitment opportunities. Fundamentalists no
longer have to infiltrate mainstream mosques and attract recruits
surreptitiously, but can now disseminate their call to jihad and wait for
potential recruits to contact them. These channels aren’t as useful for
recruiting Shia militants, who benefit from state support in Syria, Iraq,
and Iran, and can openly advertise their calls for sectarian jihad.
Terrorist violence in 2013 was fueled by
sectarian motivations, marking a worrisome trend, in particular in Syria,
Lebanon, and Pakistan.
U.S. DEPARTMENT OF
STATE
Flash Points
Sunni-Shia tensions contribute to multiple flash points in Muslim
countries that are viewed as growing threats to international peace and
security. The following arouse the most concern among regional specialists:
Rising
Militancy
Notable
concern about the role of sectarian violence increased in 2013. Extremists were“fueled by sectarian motivations” in
Syria, Lebanon, and Pakistan, according to the U.S. State Department. After
years of steady losses for al-Qaeda–linked groups, Sunni extremist recruitment
is rising, aided by private funding networks in the Gulf, particularly in Kuwait, with
much of the violence directed at other Muslims rather than Western targets.
Shia militants are also gaining strength, in part to confront the threat of
Sunni extremism, miring many Muslim communities in a vicious cycle of sectarian
violence.
U.S.
officials such as FBI director James B. Comey have warned that the war in
Syria, which attracted thousands of fighters from Europe and the United States,
poses a long-term threat to Western interests. The eventual outflow of these
militants, battle-hardened and with Western passports, is viewed as a potential
“terrorist diaspora” that could eclipse the global terror networks that emerged
after the Afghan war against the Soviet Union in the 1980s.
Saudi-Iranian
Rivalry
Saudi
Arabia and Iran have deployed considerable resources to proxy battles,
especially in Syria, where the stakes are highest. Riyadh closely
monitors potential restlessness in its oil-rich eastern provinces, home to
its Shia minority, and has deployed forces along with other Gulf countries to
suppress a largely Shia uprising in Bahrain. It also assembled a coalition of
ten Sunni-majority countries, backed by the United States, to reverse the
growing influence of Houthis in Yemen. Saudi Arabia provides hundreds of
millions of dollars in financial support to the predominantly Sunni rebels in
Syria, while simultaneously banning cash flows to al-Qaeda and extremist jihadi
groups fighting the Assad regime.
Iran has
allocated billions of dollars in aid and loans to
prop up Syria’s Alawi-led government, and has trained and equipped Shia
militants from Lebanon, Iraq, Syria, and Afghanistan to fight with various
sectarian militias in Syria. At the same time, the widening proxy battle may
also be stirring concern among leaders in Riyadh and Tehran about the
consequences of escalation. The two sides have repeatedly postponed efforts to
establish a dialogue for settling disputes diplomatically. Iran is fighting the
Islamic State in parts of Iraq, while Saudi Arabia and other Sunni-majority
countries joined a U.S.-led air campaign against the extremist group in Syria
and Iraq.
Humanitarian
Crisis
The
ongoing civil war in Syria has displaced millions internally, and almost three
million civilians, mostly Sunni, are now refugees in Lebanon, Jordan, Iraq, and
Turkey. The influx of more than a million Syrians into Lebanon, a state with a
historically combustible religious mix that experienced its own fifteen-year
civil war in the 1970s and 1980s, has burdened its cash-strapped government and
pressured communities hosting refugees. Jordan and Iraq are still struggling to
provide housing and services to an impoverished and traumatized population.
Turkey has the greatest capacity to provide humanitarian aid, yet Ankara must
increasingly balance “the public’s sympathy for and unease toward refugees,” the
International Crisis Group reports.
Fractured
States
Syria’s
civil war, as well as Iraq’s sectarian conflict, is threatening to redraw the
map of the Middle East bequeathed to the region by British and French colonial
authorities. The Assad regime in Syria has consolidated control over the
Mediterranean coast, the capital of Damascus, and the central city of Homs,
which together comprise a rump state that connects with Hezbollah strongholds,
threatening the territorial integrity of Lebanon. Other parts of the country
are contested or controlled by various rebel and Islamist groups, including
ISIS, which seeks to dominate the eastern regions of Syria that link to its
territory in Iraq. And Kurdish groups in northern Syria, which, like their
Iraqi cousins, have long campaigned for basic rights denied under the Ba'athist
government, are on the verge of gaining de facto independence. Yemen,
which was unified in 1990, is at risk of re-fracturing into two countries,
largely along sectarian lines.
The
United States spent more than one trillion dollars to stabilize Iraq, but
the country remains in a precarious state. Sectarian tensions are mounting in
Iraq as the newly ascendant Shia majority struggles to accommodate the Sunni
minority and deal with the Kurdish Regional Government in the north of the
country while confronting extremist Sunni groups. Most politicians and
activists in Iraq, Syria, and Lebanon reject attempts to redraw the map of the
region, but the vanishing borders and emergence of new areas of influence based
on sectarian and ethnic identities are a growing existential challenge.
Sunnis had no other option but to defend
themselves and use arms. We reached a point of to be or not to be.
| |
Since the 1.14 update, the creation of a lectern in Minecraft can be a revolution in terms of gameplay. In principle for its advantages in multiplayer, but also has a significant impact in solo matches.
How to make or create a lectern in Minecraft - Creating a lectern
Thanks to the lectern, several players can now simultaneously read a book that is on it, which they would not require endless copies . It also generates a redstone signal that varies based on the number of pages passed while reading.
If you want to know how to get your music stand, you are in the right place, pay attention to these tips so as not to complicate yourself.
Hallar un atril in Minecraft
If, as you can see, making a lectern in Minecraft isn't the only way to get one, you can also find it. To do this, you just need to search for a village generated after the 1.14 update and locate a library . If the village has one, it will surely have a lectern as well.
This is undoubtedly the fastest way if you are near a city as the production process can be a bit more tedious. If you are out of luck or prefer to do it yourself, go to the next point.
Create a lectern in Minecraft
Like many other objects, the lectern can be crafted at the worktable , but to do this you will need to get four wooden slabs and a shelf. In the case of the slabs there are no major complications, you can make them with 3 wooden blocks in line and you will get 6 slabs.
In contrast, the manufacturing process of the shelf is a bit more complicated and lengthy. You can get the shelf directly by using a tool with the enchantment "touch of silk" and extract it from a library.
Otherwise, the only thing you would get would be the three books used in its elaboration. If you don't have this tool or can't find shelves, books and paper, this would be the complete procedure:
À la Carte
Get 3 reed units (usually located on the banks of rivers and coasts) and place them on the workbench forming a horizontal line of 3 objects. This will give you 3 sheets of paper.
Book
Already with your sheets you can make books if you put them together with leather (which you can get from animals like cows, horses, etc.). You can do this from your inventory by having a sheet in each corner in the crafting section and leather in the last one. Repeat this process 3 times to get 3 books.
Shelving
Now that you have the books you need to go to a workbench with approx 6 wooden blocks . Place 3 books forming a horizontal line in the middle and 2 wooden lines above and below. This way you will get your shelf and now you can create a lectern in Minecraft.
music stand
With all the elements already in your possession, you just have to place them correctly on production table. To do this, display the grid by assigning a number to each box from left to right and top to bottom.
Now yes, place a wooden slab in positions 1, 2, 3 and 8 . The bookcase must be placed in position 5 and all other spaces must remain empty.
It's ready! Have you been able to create a lectern in Minecraft. Put it where it's most comfortable for you and don't forget to put a book on top if it's better written. Remember that any player can read it and that you can also use it to activate redstone mechanisms.
On the other hand, with a lectern in a library that doesn't have a librarian , there is a possibility that a villager will take over this work. Lecterns are certainly a marvel of the imagination, you already know how to have yours, now you just have to make the most of it.
Other elements that you can create or create yourself in Minecraft are barrels , pots, buckets or iron buckets, among other elements that will make your gaming experience easier. You can also create bigger items like an elevator or an elevator. | https://www.dohowit.com/en/how-to-craft-or-craft-a-lectern-in-minecraft-creation-of-lectern |
We live in a globalised world with unprecedented movement of people across continents. Consequently, our societies need a sustainable solution to achieving inclusion, global collaborations, and non-discrimination.
ERF believes that, evidence based research must be conducted to confirm that only a curriculum that reflects the contribution of diverse cultures and civilisations to our modern world can help achieve this. ERF also believes cultural identity of societies must not only be relevant and sensitive to young people but must also be engaging to enhance their understanding of humanity’s common heritage.
ERF is building its core operational structure around a process based on diagnosis, forecast, and commitment for the introduction of the principle of balance and inclusivity in the curricula, content, and pedagogy offered by educational systems and institutions. This will include 1) analysis of local contexts for adapting the materials and the approach of teaching; 2) focusing on delivery of tailored Training of Trainers (ToT) programmes that meet specific needs; 3) and, finally, ensuring that ERF’s ToTs offer sufficient flexibility to teachers for adapting their materials and approach of teaching to local requirements.
Currently, ERF is working towards opening a dialogue to make the case for balanced and inclusive education, with policy makers and stakeholders of educational institutions in Africa, Asia, Latin America and Europe.
The findings from these meetings will be used to outline recommendations for the necessary steps that can be made available at the country level where governments may adopt the recommendations and chart development strategies in favour of imparting balanced and inclusive curriculum and pedagogy in schools and higher education institutions. The recommendations will also be used as a basis by ERF to commission academic research to provide the scientific evidence as the driving force for policy uptake. Next, ERF will operate projects in partnership with ministries of education, other NGOs and similar organisations to underpin a learning framework to collate and analyse evidence, followed by continual adjustment of implementation plans based on what has been learned, relying on data, facts, and robust arguments including those derived from new academic research.
The efficacy of curricula enhancement in terms of measurable improvement and impact must be demonstrated starting with recommendations from senior stakeholders. For this, ERF will feature a dynamic series of 4 regional stakeholder consultations in Africa, Asia, Latin America and Europe.
Visit our website regularly for updates on these meetings.
Our Consultation Meetings carry two-pronged objectives: 1) To make recommendations on young people’s development through balanced and inclusive education in the context of the ever-increasing complexity of the regional economic, socio-cultural, and political environment, and 2) To make proposals for principles, policies and practice for the delivery and uptake of balanced and inclusive education based on intraculturalism, transdisciplinarity, dialecticism and contextuality (ERF’s four pillars of balanced and inclusive education).
ERF and the Southeast Asian Ministers of Education Organisation Council, Regional Meeting 5-6 July 2017 - Bangkok, Thailand.
In partnership with the SEAMEO Council - The Southeast Asian Ministers of Education Organisation, ERF hosted a high-level meeting in Bangkok. This consultative meeting helped draw upon the expertise of the invited experts to enrich the regional evidence to policy makers with regards to implementing and embedding balanced and inclusive curriculum from the perspective of UNESCO's Universal Declaration on Cultural Diversity, in educational institutions of Southeast Asia.
The Southeast Asian Ministers of Education Organisation (SEAMEO) is a regional intergovernmental organisation established in 1965 among governments of Southeast Asian countries to promote regional cooperation in education, science and culture in the region. As an organisation that has continued to nurture human capacities and explored the peoples’ fullest potential, the SEAMEO maintains its work and aspirations for development with peoples of the region to make lives better in quality and equity in education, preventive health education, culture and tradition, information and communication technology, languages, poverty alleviation and agriculture and natural resources. The organisation's highest policy-making body is the SEAMEO Council, which comprises the 11 Southeast Asian education ministers. The SEAMEO Secretariat is located in Bangkok, Thailand. Read more about SEAMEO.
Read what SciDev.net said on the meeting.
ERF and the Nigerian Academy of Science, Regional Meeting 25-26 July 2017 - Lagos, Nigeria
A regional consultation meeting was hosted by ERF and the prestigious Nigerian Academy of Science in Lagos to consult directly with the stakeholders of SDG4 in order to jointly produce a work plan to invest ERF's resources in an agenda that is aligned with the priorities of the regional engagements around the theme of SDG4 and more particularly on Balanced and Inclusive Education (BIE).
The Nigerian Academy of Science (NAS) is the foremost independent scientific body in Nigeria which was established in 1977 (but incorporated in 1986). NAS is uniquely positioned to bring scientific knowledge to bear on the policies/strategic direction of the country and is also dedicated to the development and advancement of science, technology and innovation in Nigeria. Read more on NAS
Press Report from The Guardian, Nigeria. | http://educationrelief.org/index.php/en/programmes/mnu-projects/our-regional-consultations |
Sustainable approaches in apparel patternmaking have been applied and explored among various apparel designers. The concept of minimal waste design can be traced through historical dresses and is increasingly popular in modern clothing design. Designers such as Holly McQuillan embrace the zero-waste principles using unconventional patternmaking methods, which reincorporate all cut-out pattern pieces into the garment design and result in reduced pattern cutting sections and fabric in draped garments (Brown, 2010). | https://lib.dr.iastate.edu/itaa_proceedings/2014/design/39/ |
I first had the chance to watch Israel Galván perform in 2005, when La Edad de Oro premiered at the Festival de Jerez in Jerez de la Frontera, Spain. I suppose my experience was as clichéd as it could get for a Canadian travelling to Spain in pursuit of her flamenco dreams: a late-night show in the intimate setting of an old church-turned-theatre set against a backdrop of the narrow, windy streets of this magical Andalusian town. But, Israel’s performance was anything but clichéd that night. I remember being captivated by his attention to detail, commitment to movement and unexpected energy shifts and choreographic choices. He has since had a profound impact on me as an artist, triggering an ongoing interest in questioning the boundaries of flamenco dance.
I had several other chances to watch Israel perform and even study with him at the festival in subsequent years. I remember standing at a bar next to the theatre after seeing one of his shows, with a manchego cheese sandwich drenched in anchovies and olive oil in one hand and a glass of sherry in the other, overhearing an old man’s conversation next to me. The old man - whom I had earlier watched angrily walk out of Israel’s show - voiced his disgust over the evening’s performance, describing it as too intellectual and rigid and lacking in emotion. He was clearly offended. And that’s not the last time I would experience someone take offense to Israel’s work.
For flamencos purists, Israel’s work can be a hot topic of discussion, raising questions about definitions of flamenco and creative freedom within a structured form so rooted in tradition. Based on what I’ve learned about Israel, his intention is not to purposely be different or innovative, but instead to create sincerely based on his deep devotion to the flamenco tradition. The idea of authenticity is central to Israel’s work. As authenticity is critical to any art practice, his approach inadvertently opens the doors to the possibilities of flamenco dance as an art form, beyond just folklore or cultural representation. His work becomes a sort of necessary demonstration of how authenticity can find space within a traditional art form.
I was excited to learn that Israel was returning to Canada, this time adding stops in Vancouver, Toronto and Ottawa, in addition to a return to Montreal. I believe there is room for growth for flamenco dance in Canada, and I think audiences here have much to gain from exposure to approaches to flamenco dance like Israel’s. This type of work raises questions and challenges expectations, which eventually leads to an audience that begins to ask more questions and place less emphasis on expectations. These are the steps towards an improved critical dialogue regarding flamenco dance in Canada, which is absolutely necessary for the art form and the practicing artists here to have space to grow, and for flamenco to gain an increasingly informed recognition within the Canadian dance landscape.
La Edad de Oro is a seemingly simple show which honours the trinity of song, guitar and dance which is at the root of the flamenco tradition, while propelling the audience into the complexity of Israel’s approach to flamenco dance. Yes, as a performer, Israel deserves to be hailed for his technical mastery, musicality and precision in movement, and his work can justifiably be described as innovative, avant-garde and genius. Whether or not an audience likes Israel’s work I don’t think matters. What do I think is most important to take away from Israel’s performances? His courage. His courage to work comfortably among risk and boldly carve his own unique artistic path. I wish more flamenco artists did the same.
I remember Israel as the seemingly quiet, unassuming man with a slight stutter and air of shyness and humility about him, who walked into class one day at the Festival de Jerez, appearing uneasy as his students applauded his performance from the previous night. I saw an artist then that showed traces of vulnerability matched with a strong artistic voice and necessity for personal expression. In that moment, I began to uncover my flamenco. And everything changed.
First published on the Vancouver International Dance Festival blog. March 2014.
Shared with kind permission on The Dance Current online. March 2014. | https://rosannaflamenco.com/artwork/3480641-A%20Flamenco%20Of%20One%27s%20Own.html |
Flavia Mattioli MDClinical Neurologist, Professor of Neurology, and Professor of Neuropsychology, Spedali Civili of Brescia, Brescia, Italy
Flavia Mattioli, MD, is Clinical Neurologist at the Spedali Civili of Brescia, Italy; Chief of the Neuropsychology Unit; and Professor of Neurology and Professor of Neuropsychology.
After residency of Neurology in Italy (University of Milan) and a stay in Toronto (CA for research periods) she always worked in Neurology Department (Brescia Hospital), involved in general clinical neurology. She is an expert of the sequels of strokes, brain injuries, multiple sclerosis impact on cognition, dementia and developmental dyslexia. She is the author of more than 100 papers published on indexed journals (https://scholar.google.it/citations?user=mpimtJ0AAAAJ&hl=it; H index 28). She has conducted several researches on neuropsychological interventions and functional correlates of cognitive training, coordinating studies on cognitive treatments of aphasia, Multiple Sclerosis and cognitive effects of drugs. She is currently involved in the group studying the consequences of COVID-19 in Brescia.
She has discussed her results at the American Academy of Neurology and at Academy of aphasia. She is a member of the Società Italiana di Neurologia (SIN), European federation of Neuropsychology and Società Italiana di Neuropsicologia (SINP). She received research grants from Fondazione Italiana Sclerosi Multipla. | https://www.practiceupdate.com/author/flavia-mattioli/5310 |
A masterful, twisted tale of ambition, jealousy, betrayal, and superpowers, set in a near-future world.
Victor and Eli started out as college roommates—brilliant, arrogant, lonely boys who recognized the same sharpness and ambition in each other. In their senior year, a shared research interest in adrenaline, near-death experiences, and seemingly supernatural events reveals an intriguing possibility: that under the right conditions, someone could develop extraordinary abilities. But when their thesis moves from the academic to the experimental, things go horribly wrong.
Ten years later, Victor breaks out of prison, determined to catch up to his old friend (now foe), aided by a young girl whose reserved nature obscures a stunning ability. Meanwhile, Eli is on a mission to eradicate every other super-powered person that he can find—aside from his sidekick, an enigmatic woman with an unbreakable will. Armed with terrible power on both sides, driven by the memory of betrayal and loss, the archnemeses have set a course for revenge—but who will be left alive at the end?
This is a dark book, nothing like the YA series that Victoria Schwab has out right now. This is more of an X-Men meets Clive Barker style of book. What starts out as a story between 2 college roommates, turns into something much darker and deeper than most friendships can go.
Eli and Victor are in a class discussing what their thesis papers will be about, and Eli chooses to do his paper on EO’s (Extra Ordinary’s), where Victor’s choice is more level minded and dealing with adrenaline effects on the body. During the research phase of their papers, Eli discovers that EO’s are “created” from NDE’s (Near Death Experiences) and a traumatic event. Victor starts to egg Eli on about actually testing the theory out to see if this is in fact true.
The end results are somewhat surprising; since it seems that your last thoughts before you die is what triggers the EO ability. Each person that does survive the NDE will show the signs of different EO abilities which vary per person. Some can carry bad luck with them; some can have the power to manipulate others thoughts and actions and others can bring the dead back to life.
Eli has taken it upon himself to be the one to choose who is worthy to stay alive and use their new found abilities, and those who should be killed due to being an abomination of God. Victor has found a way to trigger his own EO abilities, but at the expense of a colleague, which in turn places Victor in prison. Victor has time to think about what he did and how to get back at Eli.
The timeline of the story I found highly interesting because it was broken down between the past and the present day, all leading up to the final confrontation between Eli and Victor. There were some side characters that were along for the story which I found very likeable.
There is a quote at the end of the book that I feel speaks volumes for this story and just how human thought process works when it comes to choosing if you are doing things for the right reason or for the wrong reason. “When no one understands, that’s usually a good sign that you’re wrong.”
If you are looking for an adult book to read with no romance, very little profanity, and a lot of action and violence this is the book for you. I will most likely be reading this for a second or even third time later on this year or going into 2014. | http://danielled.booklikes.com/post/163072/vicious |
In-home preventive health care offers seniors the opportunity to maintain an independent life, while at the same time getting the care they need. However, this type of care, in which a visiting nurse works with seniors to prevent falls and hospitalizations and improve their overall quality of life, may not be as beneficial as you think, according to a new study published Wednesday in the journal PLOS ONE. Seniors who receive in-home preventive care don’t fare any better than seniors who don’t get it, according to the study, but experts say there are steps you can take to maximize the benefits.
Researchers from the University of Oxford analyzed 64 studies on the effects of preventive in-home health care, looking at data on 28,642 people older than 65, some of whom had preexisting conditions that put them at risk of falls or hospitalization. They found a startling lack of evidence for the benefits of preventive in-home care. Seniors living independently who received in-home care and those who lived independently but didn’t receive preventive in-home care had similar risks when it came to mortality rate, risk of hospitalization, risk of injury, overall quality of life and more.
“The people who are most likely to receive this type of intervention are those who are very old and who are becoming frail,” said study author Evan Mayo-Wilson, MPA, DPhil, who was a research associate with the University of Oxford in the UK while conducting the study, and is now an assistant scientist in the department of epidemiology with the Johns Hopkins Bloomberg School of Public Health in Maryland. “These studies looked at in-home measures to prevent falls, hospitalization and death, but these events can be so unpredictable.”
The preventive measures included helping ensure proper medication adherence, conducting balance exercises, removing fall hazards and more.
RELATED: Should Seniors With Dementia Live Alone?
Fifty-three of the 64 studies reported the mortality rate of the seniors, and they showed no meaningful difference in the mortality rate between seniors who received in-home care and seniors who did not. In addition, 29 studies looked at the difference in the senior’s quality of life and 15 studies examined the rate of hospitalizations, according to the study, and found that the difference in outcomes was negligible.
There did appear to be a reduction in the rate of falls for seniors who received in-home care, according to the study, but researchers said the difference in rate was not significant, nor did the programs provide any long-term benefits.
“Falls are one of the major reasons why seniors end up in the hospital, so preventing them is a major goal of preventive in-home care” Dr. Mayo-Wilson said. “However, after looking at all the evidence, we can’t say for sure whether or not these programs actually work.”
Although the evidence seems to indicate that preventive in-home care is ineffective, the truth is that we still don’t know for sure.
“We found an issue with the quality of the reports,” Mayo-Wilson said. “Many of the studies we analyzed failed to elucidate exactly how the researchers went about trying to help these people. We weren’t able to get a full idea of what went on, because the researchers didn’t report all the necessary information.”
Some of the studies failed to catalog the exact type of intervention they provided or for how long, he said.
“There just wasn’t enough information about what was done on the ground level,” Mayo-Wilson said.
In addition, some of the studies simply targeted random seniors for preventive care, said Alice Bonner, PhD, RN, an associate professor of nursing at the Bouve College of Health Sciences at Northeastern University in Boston.
“Randomly going out to people who are over the age of 65 is not going to be effective,” she said. “If we don’t target the intervention properly, we’re not going to see an effect.”
Both Bonner and Mayo-Wilson said that targeting seniors with conditions such as dementia, who were excluded from this meta-analysis, is the best way to see the true benefit of these programs.
“You can make a very strong argument that people with dementia are the ones who would benefit the most from this type of preventive [care],” Bonner said. “They’re the group that really needs this type of help, especially to prevent falls.”
So what should you do if your parent, grandparent or other loved one is currently receiving this type of care? The first thing is to not take the care away, said Mayo-Wilson.
“There isn’t enough information to tell people to stop getting this care,” he said. “People shouldn’t make any hasty decisions and withdraw care based off of this.
The second thing you need to do is to work with the individual caregiver and their organization to come up with a plan of care, said Sharon Roth Maguire, MS, RN, a gerontological nurse practitioner and senior vice president of quality & clinical operations for BrightStar Care, an in-home care agency. Every senior is different, and their needs vary. | https://www.everydayhealth.com/news/when-your-loved-one-needs-home-care/ |
Effects of lipoxygenase inhibitors on the arachidonic acid cascade in the rabbit cornea after injury.
A cryogenic lesion in the rabbit cornea that promotes the formation of arachidonic acid metabolites was used as a model to test the action of two new lipoxygenase inhibitors, TEI-8005 and TEI-8006. The action of these two inhibitors was compared with that of CBS-113A, a new dual inhibitor of cyclooxygenase and lipoxygenase reactions, and with that of nordihydroguaiaretic acid (NDGA), a monooxygenase inhibitor and antioxidant. Injured corneas were incubated for 1 h at 36 degrees with 1-14C-arachidonic acid. Inhibitors at concentrations of 1, 10 and 100 uM were added 10 minutes prior to the addition of arachidonic acid. TEI-8006 inhibited 5-hydroxyeicosatetraenoic acid (HETE) at 10 uM, and both 5- and 12-HETE at 100 uM. At 100 uM, CBS-113A also had the same effect, while TEI-8005 at 100 uM induced a more selective inhibition of 5-lipoxygenase. NDGA was the most potent inhibitor of lipoxygenase reactions, but was not selective. Prostaglandins were also affected differentially by the inhibitors. TEI-8006 and NDGA partially inhibited cyclooxygenase products at all concentrations, and CBS-113A produced inhibition at 10 and 100 uM. TEI-8005 did not affect the total cyclooxygenase products, but selectively inhibited thromboxane B2 and increased prostacyclin production at 100 uM. The effects of these inhibitors may be of value in understanding the mechanisms involved in corneal inflammation.
| |
Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with ICTD International Centre for Training and Development.Full disclaimer.
Description
This course provides leadership training in the skills required to manage yourself and other people, and demonstrates how excellent leadership transforms organizations.
There are major challenges facing the leaders of today who seek to shape organizations for tomorrow. New models of leadership are emerging to address these challenges, and these developments require a different approach to thinking about effective leadership. There is also an increasing demand for ethical and engaging leadership that enhances the performance and well-being of employees, as well as the performance of the organization.
Course Objectives
This course defines and examines what is meant by Crisis Management noting the special need for crisis management in today’s world. The vital importance to an organization of having a crisis management plan in place is emphasized. Effective crisis management is accomplished through prompt response, early and continuous communication and effective execution.
Upon completion of this course the student will be able to:
- Define organizational crisis
- Identify types of crisis situations
- Identify the phases of a typical crisis
- Forecast and assess risks
- Identify key elements of a best practice model for crisis management
- Define Crisis management team responsibilities
Develop the Business continuity plan (BCP), the Disaster Recovery Plan and the Crisis Communication Plan.
Course Outline
Unit 1: Introduction to Crisis Management
- Crises management definition
- Crisis management Purpose
- Elements of crises management
- Frame of crisis management
- Planning for Crisis Management
- Communication in crisis management
- Examples and Case Studies
Unit 2: Crisis Management Models and Theories
- Characteristics of crisis management
- Types of crisis situations
- The phases of a typical crisis
- Categories of crisis risk
- Identify the need for crisis management
- Key elements of a best practice model for crisis management
Unit 3: Risk Management
- Categories of Risk
- Risk Management Strategy
- Risk Management: planning, resourcing, monitoring and controlling
- Risk Assessment: identification, estimation and evaluation
- Assessment ratings and risk assessment matrix
Unit 4: Crisis Management Planning
- Benefits of having a crisis management plan
- Recommended practices in crisis management planning
- Guidelines for preparing for potential risks
- Guidelines for developing crisis management plan
- Business Continuity Plan
- Disaster Recovery Plan
- Crisis Communication Plan
Unit 5: Crisis Communications
- Information services emergency plan
- Identify features of an emergency contact list
- Crisis management plan templates
- The benefits of having a communications plan
- Identify key questions asked in every crisis
- Planning communication with stakeholders
Course Methodology
A variety of methodologies will be used during the course that includes:
- (30%) Based on Case Studies
- (30%) Techniques
- (30%) Role Play
- (10%) Concepts
- Pre-test and Post-test
- Variety of Learning Methods
- Lectures
- Case Studies and Self Questionaires
- Group Work
- Discussion
- Presentation
Who should attend
This course is designed for Senior Managers, Executives within any organization, HR Managers, Communication Officers, Team Leaders, Facilitators and Project Managers. | https://coursalytics.com/courses/high-achievement-leadership-crisis-management-ictd-international-centre-for-training-and-development |
A Charles Darwin University PhD candidate will travel to one of the world’s largest mangrove conservation conferences to discuss an initiative that aims to recover the vital ecosystem in Indonesia.
Benjamin Brown said technology was available to restore entire degraded mangrove forest landscapes in Indonesia, but the initiative still required political and landholder support.
Mr Brown said he would present findings from a feasibility assessment recently conducted in various regions of Indonesia, during the upcoming “Mangroves and Macrobenthos Meeting IV” in Florida, United States.
He will be joined at the conference by fellow PhD candidates at CDU’s Research Institute for the Environment and Livelihoods, Clint Cameron and Sigit Deni Sasmito.
Mr Brown interviewed 400 residents and political leaders from communities in Sumatra, Java, Kalimantan and Sulawesi for the assessment on whether they supported large-scale mangrove restoration in their regions.
He said the Tanjung Panjang Nature Reserve in northern Sulawesi received the widest community and local government support to restore 6600 hectares of degraded mangroves.
“People are aware of the value of mangroves and how to restore them but, before we can move forward, we need to address the drivers that caused them to be converted in the first place,” Mr Brown said.
He said the conversion of mangrove forests into aquaculture ponds was the biggest cause of mangrove degradation in Indonesia, despite many ponds being unproductive or disused.
Mr Brown said the process of restoring mangrove forests from converted ponds involved improving the pond’s hydrology to recreate natural water flows.
“For a little mangrove restoration work, you get a lot more bang for your buck, with mangroves being able to store 100 times the amount of carbon per hectare than tropical rainforests,” he said.
Mr Brown founded the non-government organisation, “Mangrove Action Project – Indonesia”, in 2000 and then in 2013 co-founded the “Blue Forests” group, which works in regions of Indonesia from Sumatra to West Papua. | https://www.cdu.edu.au/enews/stories/mangrove-usa |
Endoscopic management of biliary complications after liver transplantation.
Liver transplantation is the only effective treatment for chronic liver diseases and terminal survival rate has increased in recent decades. However, biliary complications have high incidence and remain as the "Achilles heel" for liver transplantation. To evaluate retrospectively endoscopic treatment outcomes of biliary complications in post-liver transplantations. The sample consisted of post-liver transplantation patients for endoscopic retrograde cholangiopancreatography due to suspected biliary complications. Fifteen patients were included (10 male, mean age of 49.57 years) and 36 endoscopic retrograde cholangiopancreatographies were undertaken (2.4/patient). Biliary stricture was diagnosed in 13 patients and endoscopic treatment was successful in 56% (38,46% still in treatment). Biliary leaks were found in one patient and dysfunction of the hepatobilliary ampulla with choledocholithiasis was diagnosed in one patient, both cured by endoscopic treatment. Post-liver transplantation biliary complications are relatively common and endoscopic treatment may result in satisfactory outcome. Stenosis was the more frequent complication in this series.
| |
The Effects of Global Climate Change on Polar Bears The polar bear is the largest terrestrial carnivore known to man, and is known by the scientific name Ursus maritimus or "the sea bear". It is a species that is completely dependent on sea ice for life (Morrison, 2004). Over time, polar bears have adap... Terrifying news about polar bears - Fabius Maximus website The summary: a brief essay explaining why polar bears are thriving despite global warming. Zoos abrogate their position of trust by misleading the public about polar bears. Eating Polar Bears Is Okay in Greenland | Nathan Myhrvold ...
A teacher in Hayward, California, creates a polar bear lesson which inspires an entire school on Earth Day.
Polar Bears and Climate Change | Pages | WWF Polar bears (Ursus maritimus) are the poster child for the impacts of climate change on species, and justifiably so.To date, global warming has been most pronounced in the Arctic, and this trend is projected to continue. Why Care About the Polar Bear? Economic Analysis of Natural ... Why Care About the Polar Bear? Economic Analysis of Natural Resources Law and Policy By Lisa Heinzerling* Cost-benefit analysis is all the rage in pollution control law. So far, however, it has not played as significant a role in the evolution of natural resources law and policy. Perhaps this is Grizzly Bear VS. Polar Bear by Kevin Meier on Prezi
Essay on wildlife - Writing an Academic Term Paper Is a Trifle!
Russian islands declare emergency after mass invasion of polar bears ...
What is a catchy title for an essay on polar bears and global ...
FW583 Essay Climate Change Affecting the Biodiversity of Polar Bears. With temperatures rising and ice caps melting, biodiversity in the Arctic is being required ... Global Warming Affects Polar Bears Essays - PaperAp Find the best essay sample on Global Warming Affects Polar Bears in our leading paper example online catalog! How Polar Bears are adapted to their Environment - WriteWork The Polar Bear's fur is extremely thick and it traps the heat so well, you can't see one in ... Essay by burninbabe666, High School, 11th grade, November 2004. informativeessay - Erin Bernaciak Informative Essay Polar Bears Polar ... View Notes - informativeessay from ENG 101-EMB at Minnesota State University, Mankato. Erin Bernaciak Informative Essay Polar Bears Polar bears are one of ...
Get help on 【 Polar Bears Research Paper Polar BearsSaving Essay 】 on Graduateway Huge assortment of FREE essays & assignments The best writers!
Polar Bears Essay - 1482 Words | AntiEssays Polar Bears Essay 281 Words | 2 Pages. Polar bears are very unique in appearance. One of the biggest and strongest animals are polar bears and they have a thick, white shaggy coat which lets them blend with the snow to stay safe from predators. GLOBAL WARMING AND THE MELTING ARCTIC POLAR ICE CAPS: The ... GLOBAL WARMING AND THE MELTING ARCTIC POLAR ICE CAPS: The Endangered Lives of Polar Bears This topic submitted by Mike Montgomery ([email protected]) at 2:38 PM on 6/8/07. A fabulous sunset at Drake Bay near Corcovado national park, Costa Rica. See other beautiful phenomena. from the Costa Rica. Essay on panda bears extinction - Custom Essays.org Free descriptive essay example on panda bears extinction . Title: The extinction of panda bears . Introduction . The Panda is a large mammal which is about the same size as a Black Bear. Giant pandas bears have a massive head, heavy body, short tail, rounded ears and plantigrade feet (both heel and toe make contact with the ground when walking in a manner simila The Effects of Global Warming on Polar Bears | Antarctica Journal
SAVING THE POLAR BEAR - biologicaldiversity.org The great white polar bear is the youngest and largest of the world's bear species — a mighty hunter and fierce defender of its young that's among the world's most vulnerable animals. Two-thirds of the world's polar bears could be extinct by 2050 if greenhouse gas-fueled global warming keeps melting their Arctic sea-ice habitat. Polar Bear Writing Paper - Essay Writing Service from $ 6 Polar Bear Writing Paper Meet Singles San Diego People are registered with these dating sites and the opportunity to meet other people from the same region or community and get to explore more about them and if they find enough other supports, can go for a true encounter as well. The Arctic keeps warming. And polar bears are feeling the ... | https://writekdmjyos.netlify.app/bernecker80605rum/essay-on-polar-bears-199.html |
10 Hardest Courses at Texas A&M University
Texas A&M University is a public research university in College Station, Texas, United States. The institution prides itself in offering more than 125 undergraduate degree programs, 200 master's degree programs, 100 doctoral degree programs, and 5 first professional degrees. Of all the courses offered at the institution, below are some of the hardest.
1. BIOL 451 - Bioinformatics
This biology course discusses the entire field of bioinformatics. Students will learn very technical and challenging concepts. They will also have to spend time in the lab performing equally challenging practicals. This course is recommended for biology majors.
2. CHEM 466 - Polymer Chemistry
This is an advanced course in chemistry discusses concepts related to polymer chemistry. Students find this course hard because of the technical topics involved. Throughout the course, students will learn technical concepts that are very difficult to comprehend.
3. ASTR 403 - Extragalactic Astronomy and Cosmology
Students in this course will discuss the physical makeup of individual galaxies and large scale structures in the universe. The course will include very engaging practicals where students will observe and experiment with some heavenly bodies such as meteorites.
4. AERO 420 - Aeroelasticity
This course in aerospace engineering focuses on the classical analysis of fundamental aeroelastic phenomena with application to aerospace vehicles. Students will throughout the course study very complex and technical concepts. They will also be exposed to a series of very time-demanding practical sessions.
5. PHYS 414 - Quantum Mechanics II
This course in physics discusses very complex and advanced topics related to quantum mechanics and its application to atomic, solid state, nuclear or high energy physics. Students will have to allocate more study hours in order to grasp the very technical concepts discussed in the course and excel in the exams.
6. MATH 433 - Applied Algebra
Math is never considered easy by many students. This advanced course discusses very advanced and complex concepts in math. Students will have to implement very complex formulas and mathematical theories that they will learn to solve mathematical problems.
7. MEEN 430 - Nanomaterials
This is a course in mechanical engineering that discusses the fundamentals of nanotechnology, including nanomaterials, types of nanomaterials, fabrication, characterization methods, and applications. The course is considered hard because of the technicality and depth of the topics. Students will spend long lecture hours just to cover the topics involved.
8. ECEN 419 - Genomic Signal Processing
This electrical and computer engineering course focuses on very complex and technical concepts related to genetics and the application of engineering principles to systems biology. Students will be introduced to very technical terminologies and concepts throughout the course.
9. CSCE 440 - Quantum Algorithms
This advanced course in computer science and engineering involves discussions about the design and analysis of quantum algorithms. Students will learn very technical and complex concepts. The course also involves a series of mathematical calculations that may be challenging to most students.
10. STAT 438 - Bayesian Statistics
This statistics course is considered complex by students because it discusses very advanced statistical methods and theories. Topics discussed in the course include the Analysis of scalar and vector-valued parameters, Bayesian linear models, Monte Carlo computational method, and prior elicitation. | https://oneclass.com/blog/texas-a-m-university/151469-10-hardest-courses-at-texas-a26m-university.en.html |
Derek is Affiliate Professor of Organisational Behaviour at INSEAD. His interests include leadership development, burnout and resilience, the impact of emotionally demanding tasks on work groups.
Derek Deasy is directing INSEAD Coaching Certificate.
His research and practice in these areas are informed by a systems-psychodynamics approach that takes into account how group tasks, organizational structures and cultures are affected by, and affect, individuals’ experience at and of work.
Derek works regularly in leadership development programmes for high potentials and senior executives at INSEAD, and has contributed to open and in-company executive Programs, as well as to the full time MBAs, at the Copenhagen Business School in Denmark, and at IMD in Switzerland. He has given input on the psychodynamics of organisations to the Clinical Psychology doctoral programme at Trinity College, Dublin. He also has a varied coaching and consulting practice, currently including individual work with corporate leaders and work with teams in the technology sector and in entrepreneurial ventures.
Derek brings to all his work a particular focus on the personal benefits and costs of authenticity, effectiveness and success. He supports executives in developing functional approaches to self-care and resilience when dealing with jobs and tasks that require personal presence and intense emotional investment. Over the past decade, he has worked with corporations and executives in a wide range of sectors including construction, pharmaceuticals, fashion, technology and professional services.
Prior to and alongside his work in executive education and development, Derek spent many years working as a Director in health care delivery. His particular area of expertise was child sexual abuse. He led a multidisciplinary team offering forensic and therapeutic services to vulnerable children and their families. His work in this arena taught him the importance of sound management and effective self-care in service delivery.
Derek holds a doctorate in Clinical Psychology from Trinity College, Dublin, and BA and MA degrees in Psychology from University College Dublin. He also trained at the Tavistock Clinic in London gaining a Masters in Organisational Consultancy. In 2011 he was granted the title of Honorary Associate Professor of the Institute of Work, Health and Organisation with the University of Nottingham. He consults regularly to group relations conferences in Europe and the United States. He is married and has three young sons. | https://www.insead.edu/faculty-research/faculty/derek-deasy |
Preparing online teams for success
I’ve been asked to talk a little more about how I help prepare teams for success in my online courses. Fortunately, I’m not the only one writing about this. A recent article in Inside Higher Ed by Zahir Latheef (January 13, 2021) Avoiding the Goans, Signs, and Eye Rolls provides some tips on how to prepare students for online group work. I figured I’d start there as a jumping off point and a few of my strategies.
I should note that my students are graduate students and they are educators, so as much as they hate group work they like to talk and they like to share their learning, so it is often not difficult to get them to build trust relatively quickly.
I assign the following readings: Roberts, T. S., & McInnerney, J. M. (2007). Seven problems of online group learning (and their solutions). Educational Technology & Society, 10(4), 257-268.
This reading helps students understand why the group assignments are structured the way they are. It also gives them language to help have meaningful conversations with each other about group work.
I also try to assign a reading about leaving one’s ego at the door. I don’t have a specific one that I recommend, just that I think it is a concept that is important for people to hear so that they are entering the teamwork space with the right mindset. I’ve had students comment to me that it hadn’t occurred to them that ego was part of what was making them not great teammates.
I also mention my blog post about what online groups could learn from sociocracy. The biggest think I think they can learn is to take turns talking and making sure that everyone feels heard.
I assign the groups. I usually do a survey which is different for each class I teach. I make sure that the groups I assign have some time overlap – that is, that they are all available to do group work at the same time. Finding the times that work is a huge challenge for students who are often working full time, as most of my students are, so starting the group off knowing that they will find a time jumpstarts them to success. I let them know the group assignments a week before the scheduled group sync session.
I setup the first group meeting to happen during a regularly schedule sync session. My courses only do a maximum of one sync session a week (for one hour). Some weeks we don’t meet. The majority of my courses happen asynchronously (truly anytime-anywhere). However, to kick start group work, I allow for the first group meeting during “class time”. I tell students they can use that time to complete their first assignment, but at a minimum they need to decide when and how they will meet next. I also set this up as an “open ended” session. That is, I setup the breakout rooms and let them stay open as long as students want – we don’t return to class. Some groups stay on for 2-3 hours, others for 5-10 minutes. Either way, it gives them that first point of contact.
The first assignment is a group agreement. Latheef mentions this in the Inside Higher Ed article. A couple of the questions I’ve added to my list of requirements is: list your strengths and areas where you want to learn more. This helps students know where they can learn from one another. I will often have a student who has excellent video skills and others that want to learn, this helps them figure out who the experts are. Here are the prompts I use for the team agreement:
- At least one area of strength for each team member (e.g. Rebecca is good at PowerPoint).
- At least one area where each person would like to improve (e.g. Rebecca would like to improve her video editing skills).
- What are the different roles each of you will perform in creating your group presentation? (e.g. who will take notes at meetings, who will initiate meetings, who will send out reminders, who will submit the assignments, who will do which parts of the presentation). Note that this may change as you work through your project, but it is good to start with specific guidelines
- How often will you meet? When? – Be specific and put it in your calendar
- What tools will you use to communicate? (share necessary communication information such as email address or other contact info)
- How quickly should group members be expected to respond to emails or other communication?
- How will you make sure everyone in the group feels like their ideas are being heard?
- How will you deal with potential conflict? (do not overthink this, but also do not say ‘refer to the instructor’, rather talk over how you will initially deal with misunderstandings, also how will you do deal when someone is not participating?)
- What other guidelines do you have for working together (e.g. we will always assume good intentions).
I introduce collaboration tools as a low stakes activity. In conjunction with the lesson on teamwork itself, I also have students evaluate collaboration tools. This is a low-stakes activity where each team needs to evaluate one tool per person (so each member writes up a discussion post reviewing the likes/dislikes of a tool). The idea is that the team evaluates the various tools together. It is low stakes because it only counts towards participation points, and each learner gets their own points, so it isn’t graded as a team – and yet it gives the team a ‘warm up’ activity to help them figure out how they work together.
I do a self and peer review. The final assignment in the team project is a self and peer review. I have students describe their contributions to the team, and have them rate both themselves on a scale of 1 to 5 and each of their teammates on a variety of characteristics, for example:
- Respect for group members’ opinions
- Contributions to the group project
- Completion of assigned tasks
- Quality of work
- Timeliness of work
- Your desire to work with this person again
- Overall, how well did this person work with the rest of the group?
I mostly use this information to provide feedback to students who are not performing well as group members. Since most of the groups in my classes are high performing, I rarely have negative comments here, but if someone is slacking off, this is where I find out.
I make sure the group project is substantial. I try to avoid small group projects. I try to make sure they are substantial enough that one person doesn’t feel like they could do it all themselves. Where possible I ensure that each member of the group must provide their opinion. For example, when evaluating an instructional design model, I include a requirement that the presentation must include the opinion of each team member.
I’ve been teaching online for more than five years and most of my courses involve a significant teamwork project. In my course on the Design and Instruction of Online Courses course, I highlight to my students that most students have never been taught how to work in an online team. They may have learned how to work in face-to-face team during their K-12 education, but rarely have they been shown how to work online. As a result, as instructors we need to design scaffolds to help them learner how to have a good online group work experience.
What scaffolds do you provide to help your students have successful online group work experiences? | https://demystifyinginstructionaldesign.com/2021/01/preparing-online-teams-for-success/ |
Looking for life elsewhere in the universe has often been described as looking for a black dog at night. Our only light is the knowledge that life is thriving on at least one planet. When we look into the universe, Earth is the measure of all things, but maybe we need to expand our parameters.
In a new paper, published in Astrobiology, Rice University's Adrian Lenardic and colleagues suggest that we need to expand the current habitability conditions we use to search for life. The researchers think that the "Goldilocks zone" is too restrictive and that habitable planets might lie outside of it.
The Goldilocks zone is the area around stars where planets are not too warm and not too cold; the conditions are just right enough to host life. Traditionally, Earth and Venus are seen as distinct types of planetary evolution. Earth in the Goldilocks zone teems with life, while Venus (outside the habitable zone) is a deadly hell.
The study, which is not based on extrasolar planet observations, turns this assumption on its head. Earth and Venus have many similar properties (mass, composition, and so on), and at the beginning of the Solar System, they could both have hosted life. Yes, the planets are now different, but the changes that led to the differences might have been gradual and not sudden.
“Our paper is in many ways about imagining, within the laws of physics, chemistry and biology, how things could be over a range of planets, not just the ones we currently have access to,” said Lenardic in a statement. “Given that we will have access to more observations, it seems to me we should not limit our imagination as it leads to alternate hypothesis.”
The team also argues that maybe mechanisms like plate tectonics, which are believed to be critical for life on Earth, might not be crucial. Maybe other volcanic phenomena (like the ones seen on Venus, Mars, and Jupiter's moon Io) could be equally as important.
While the paper raises an interesting point, current technology and limited resources constrain our search for alien life significantly. When future missions, like the James Webb Space Telescope, are finally able to provide a closer look at exoplanets, we will have to once again question how likely it is for life to be like us. | https://www.iflscience.com/space/life-may-develop-even-outside-the-habitable-zone/ |
Confabulation Montreal and Victoria are reunited (and it feels so good).
This week's podcast is co-hosted by Matt and Cassandra Tognari, a producer and storyteller from Confabulation Victoria. This episode features Cassandra's story about the timeline of a friendship, and was told in February 2020, in Victoria, B.C.
Cassandra is the co-producer, co-host, and story coach for Victoria BC's monthly Confabulation series. She has been living in Victoria for five years where she works in government communications and sits on the Board of Directors for Intrepid Theatre.
Thanks to the Conseil des Arts de Montreal for their support of Confabulation. | https://www.buzzsprout.com/655636/4981988-57-reunited |
Username:
Username
Password:
Password
Login
Sign in with Google
Pelham
Elementary School
Pelham
Elementary
Pelham
Memorial
Pelham
High School
District
About Us
School Profile
2020-2021 School Schedule
Mission Statement
Departments
Administration Team
Guidance
Nurse
Library
Nutrition Services
Preschool Program
Student Services
Title I Program
Technology
Transportation
Academics
PreSchool
Kindergarten
Grade 1
Grade 2
Grade 3
Grade 4
Grade 5
Unified Arts
Parents
PES Reopening Guide
2021-2022 Pre-K, K and 1st Grade Registration- Going Live 1/29/21 @ 3pm
Bus Routes
PES Handbook
Messenger Alerts
Newsletters
Portal Instructions
Resource Guide
School Closing
Start/Dismissal Times
Nutrition Services
Parent Focus Group
PES PTA
Report Bullying
Parent Portal
Pelham School Age Child Care (PSACC)
Student Dismissal/ Tardy Notification
New Student Registration Packet
Students
Library Quick Links
Circulation Guidelines
Fun Online Resources
Grade 4 Resources
Library Blog
Links to Great Books
Mission Statement
Online Research Sites
Professional Literature
Community
Staff
Staff Directory
Staff Resources
Calendar
Title I Program
Title I Program
Title I Apps
Title I FAQs
Title I Program
The Title I Program is a federally funded program. Our goal is to help students improve their basic reading and math skills by supporting and reinforcing classroom instruction. Most of our Title I services are provided using an "in class" model.
Title I services are available for our PES students in grades K-5. We offer reading or math support as a supplement to classroom instruction.
Children are often referred to the Title I Program based on iReady results, classroom assessments, teacher recommendation and/or the Student Assistance Team Recommendation. A teacher completes a referral/selection form with specific questions about the students academics and classroom performance. The project manager and Title I team determines the students qualification based on the referral form. Parents are notified regarding if the students qualifies for the program and given a “Permission to Participate” form, along with test results. This form must be signed and returned before Title I services can begin. If a student does not qualify for Title I services parents will be notified with a do not qualify letter.
Info Sessions
Please join us for a virtual Informational Session for Title 1
Thursday, November 19th from 5:30-6:30
Please click the link below for additional information and to register for the meeting. | https://www.pelhamsd.org/TitleIProgram.aspx |
Two major events of my internship are over, and it’s time to thoroughly reflect upon what they have taught me.
(My realization that I’m reaching the end of this internship journey, illustrated by the pathway towards the Chicago Botanical Gardens)
The first skill that I’ve found to be infinitely useful in the world of social justice is adaptability. Situations can change quickly and you have to be able to quickly reassess what needs to be done. While at the Convening, there was one particular instance where I was forced to think on my feet.
The first one: At the Convening I was in charge of recharging the translation equipment and I learned the hard way that some of our charging equipment had broken and most of the batteries had not charged over night. Given the immediacy of the next bilingual panel, I found out how many receivers we actually needed, replaced those with batteries from other working receivers, and assessed which chargers were actually working so that they could be continually replaced.
As technology is continually developing and society is changing, the demand for particular jobs ebbs and flows. Being able to adapt to the circumstances presented before me will help me make an impact in a dynamic workplace.
Another quality that has proved to be important is that of patience.
(A statue of Mother Cabrini at the Cabrini Retreat Center. Her story is one of kindness, patience and persistence.)
I joke often that this manifests most apparently in the commute I take to work. While public transportation is overwhelmingly a net good, I’ve had my fair share of delayed trains and nosy passengers. Music helps.
But in the case of organizing, patience is realizing that most of the issues we are dealing with are systemic and well-rooted. One demonstration isn’t going to always result in change. I may have to call hundreds of people before one agrees to attend an event, or donates towards a certain cause. Those frustrations, however, is what makes the success all that sweeter.
When it comes to myself, I’ve found that beyond exhibiting these two qualities, I found great joy in listening, learning more and adapting my world view from the experiences of those around me. At this national convening, I was honored to make the acquaintance of organizers from New Mexico to Maine and learn their stories and I networked with the IWJ representative from Massachusetts in hopes of continuing my involvement once I return to Brandeis.
Furthermore, I’ve realized how important it is that I continue to hone my communication skills and continually think outside of the box like Kim Bobo did when she formed an organization to bridge the communication gap between labor and religious leaders. Sometimes one just has to take the first step in starting the conversation. That’s why I’m excited about Labor in the Pulpits encouraging religious leaders to talk to their constituents about faith and worker justice. That first conversation can change everything.
In the future, I hope to take these general and infinitely important skills to be a leader in my future workplace that will be attentive to my clients and always striving towards creative and efficient problem-solving. | https://blogs.brandeis.edu/wowblog/2017/07/17/skills-ive-honed-and-the-faith-that-ive-gained/ |
This past June, U.S. Secretary of Defense Ashton Carter announced that Washington would pre-position heavy military equipment in eastern and central Europe, a move that would allow the United States to respond more quickly and effectively to Russian aggression toward NATO’s exposed eastern member states. Once deployed, the equipment would serve as a physical sign of commitment of the U.S. willingness to protect NATO allies, and would facilitate further movement of U.S. forces into the region in the event of an attack against NATO frontline states by Moscow. Positioning U.S. military equipment forward is a welcome step, but it does not go far enough in deterring potential Russian aggression and coercion, not least because these deployments represent only a modest force in the face of the power and capabilities Russia could bring to bear in the event of war in the area.
Accordingly, NATO (or, if the alliance as a whole cannot agree to take such action, the United States and other interested members) should pursue a dual-track approach toward the problem that strengthens the alliance’s military posture in the exposed frontline states while simultaneously providing incentives for Moscow to reduce its military threat to these states by offering to limit these deployments. One prong of this policy should be to deploy troops, heavy equipment, and support and headquarters components to exposed NATO members in eastern Europe beyond what the United States has proposed, and do so on a permanent basis, beyond the smaller and avowedly temporary deployments pledged in June. The second prong should be for NATO to propose a new conventional arms control arrangement that would substantially limit (or even roll back) such deployments in exchange for the verifiable withdrawal and exclusion of particularly threatening Russian forces from areas close to NATO territory.
Measures to beef up NATO’s defenses in northeastern Europe in particular are necessary due to Russia’s local military superiority around the shores of the eastern Baltic. With its military advantages, Moscow could invade and occupy portions of the Baltic states and possibly even Poland with relative ease and speed, and thereby present Washington and its NATO partners with a fait accompli. Once situated on NATO territory, Russian forces would be difficult and painful to dislodge, necessitating a bloody military campaign that some NATO states would be reluctant to undertake. The alliance would therefore be well served by having a serious local defense in the area to preclude such a Russian capability. The force would not need to singlehandedly repel a determined Russian attack but, rather, would need to be able only to materially slow, complicate, and retard such an incursion, while also enabling the more effective, secure, and rapid reinforcement of such forces by NATO elements coming from out of the area.
As a consequence, NATO and the United States should build a better defense in Eastern Europe—especially within the Baltics. This should go beyond what the Defense Department announced in June, which represents a step in the right direction but is rotationally manned and thinly spread across NATO’s full eastern perimeter. A more adequately potent posture would emphasize forces designed for territorial defense, especially heavier forces, as these would diminish Moscow’s ability to seize territory quickly and easily. Their presence would also be more likely to dissuade Russian aggression, as any attempt to seize NATO ground in the face of such forces would thus be a much more formidable and dicey proposition that would require a much larger and more brazen effort than currently required. Such an attack would make a NATO response more clearly justifiable and therefore more likely, and thus should encourage caution in Moscow. A stronger deterrent would therefore contribute to—rather than detract from—stability. Larger deployments would also be compatible with a reasonable interpretation of the NATO-Russia Founding Act of 1997, even if the act is now of diminished applicability, given Russia’s aggressiveness in the last year and a half.
From NATO’s perspective, such a conventional arms control regime would mitigate Russia’s threat to the alliance’s vulnerable eastern members. Contrarily, if Moscow rebuffed the offer, its recalcitrance would shift the blame for increased tensions to Russia, thereby generating vital political support in Europe for U.S. and NATO deployments. The United States and NATO pursued a similar dual-track approach in the 1970s and 1980s when the United States deployed intermediate-range nuclear weapons to Europe, then negotiated them away as a bargaining chip that removed the Soviet systems that had prompted their deployment in the first place.
More from CNAS
-
PodcastPause & Review
KCRW talks with Andrea Kendall-Taylor about the design of this sanctions package and what it shows about the Biden administration’s strategy for advancing American interests t...
By Andrea Kendall-Taylor
-
PodcastNATO, China, and Russia: A Balancing Act? with Sara Bjerg Moller and Ian Brzezinski
Sara Bjerg Moller and Ian Brzezinski join Andrea Kendall-Taylor and Jim Townsend to discuss the future of NATO and its ability to balance security challenges from both China a...
By Andrea Kendall-Taylor, Jim Townsend, Sara Bjerg Moller & Ian Brzezinski
-
PodcastUS imposes raft of new sanctions on Russia
Andrea Kendall-Taylor discusses implications of new U.S. sanctions on Russia with the BBC. Listen to the full conversation from the BBC....
By Andrea Kendall-Taylor
-
PodcastRussia's Military Buildup on the Ukrainian Border, with Maxim Samorukov and Michael Kofman
What is motivating Russia's recent military buildup on the Ukrainian border? On April 6, 2021, Maxim Samorukov and Michael Kofman joined Andrea Kendall-Taylor and Jim Townsend... | https://www.cnas.org/publications/commentary/the-united-states-nato-and-dissuading-russian-aggression |
Manila, Philippines – In today’s generation, many of our youth are slowly losing their Asian identity when it comes to preserving the traditions and customs of their parents or grandparents. But not in the province of Batangas particularly in the small towns of Lemery and Bauan in the Philippines. I recently visited these two small towns about 2 hours from Manila. A friend of mine who teaches kids how to play string and percussion instruments as well as bamboo blow pipes unique to the Philippines, arranged for me to visit two schools to witness the kids that I have been supporting financially now for some time.
Our first stop was at the Lemery Pilot Elementary School in the town of Lemery. We were greeted by some teachers of the school who came this Saturday just to be with us. We were introduced to 15 beautiful kids ages 5 to 11 years old. Each were holding string instruments introduced to the country by the Spaniards during the 400 hundred years of Spanish occupation. These instruments, mostly with 14-15 strings were called the
“Banduria,” the “Octavina,” the “Mandolina,” the “Laud,” and of course the “Guitara.” Combining these instruments, you form a Philippine “Rondalla” uniquely Philippines. After the introduction, these kids starting to show off what they have learned only in the last three months. They played three folks songs that is familiar to every Filipino. Looking at these kids play and managed those 14 strings awed and mesmerized me andmy companions. After all, these were 5 to 11 years old only! I couldn’t help but wonder, could these kids be the future “millennium” generation who prefers to preserve the cultures of the Philippines rather in exchange of hip-hop music? I hope so.
Our next stop was at the St. Theresa College of Bauan in the small town of Bauan, Batangas. This time we had about 20 high school kids waiting for us to show off their talents in playing the same instruments plus now with some additions of Philippine exotic percussion instruments made of solid brass called “Kulintang,” “Agung,” “Tambur” and bamboo blow pipes called “bombing.” I could wait to hear what they were going to play combining these instruments. Finally, after a short introduction by their Director and conductor, we were treated to a 20 minutes concert of beautiful Philippine “kundiman” (love songs) from the sounds of the string and percussion instruments.
I have no doubt, that if these musical tradition is kept alive by every Filipino and Filipino-Americans, the future of preserving the Philippine cultures, music, and traditions will have a chance to be with us for a very long time.
And if you want to hear and witness some Filipino-Americans play some these instruments, go to the website of the Philippine Cultural Foundation, Inc. (PCFI) of Tampa, Florida and subscribe to their website to see schedule of events of the foundation specially of the “Musikong-Kawayan- Bamboo Ensemble, the Philippine Performing Arts Dance Company and the Philippine Choral Group at www.pcfitampa.org. PCFI is a Philippine cultural foundation whose main purpose is to preserve the Philippine folk, music, songs and dances for generations to come here in the United States. | https://asiatrend.org/arts/preserving-philippine-traditions/ |
Q:
How strong are these dinosaurs?
This question asks about how long a sub can survive, but the content is about how long the crews can survive. The answers given there suggest that the greatest problem is food. Since the food supply brought by the sub is limited, then to survive, the crew would have to secure their own food. With fishes being gigantic, making fishing them not a very good idea, I think they would have to land somewhere and start hunting smaller animals. Problem is, we have carnivorous dinosaurs on the land too. Thus to survive, they'd have to be able to fight large dinosaurs and at times maybe they also need to kill them.
Thus, my question, how strong are some of the dinosaurs in that era? By strong here I mean durable. How much action/force is needed to kill these dinosaurs?
Allosaurus
Dilophosaurus
Stegosaurus
Brachiosaurus
Archaeopteryx
A:
By dinosaur:
Archaeopteryx: small and fragile, anything which would kill/disable a turkey would have the same effect.
Brachiosaurus: One of the largest land animals ever, would take a large amount of blunt force similar to an elephant. However, a much higher center of gravity would allow it to tip more easily.
Stegosaurus: Essentially, a much spikier (and larger) bison. Not as tough as the Brachiosaurus, but still rather hard to put down.
Dilophosaurus: similar to an ostrich, although more sturdy.
Allosaurus: about as much as a massive angry bear.
However, if your submarine crew is armed, these animals should for the most part be no trouble, as the herbivores could be either safely ignored or shot and unless Dilophosaurus was a pack hunter it would likely ignore a group of 100+ crew. Allosaurus would also likely retreat at the very least if it was shot a few times.
| |
The African Traditions Online Encyclopedia (Atoe) is the result of two important parts of Bappa’s life, as a chief of his village and career as a senior IT consultant. He told the Guardian’s David Smith "ICT is the only way to store traditions for the next generations. Between now and 2100 there will be 4 billion people in Africa; if we don't know our traditions, we won't be able to manage our economic development."
Do you agree? Does Africa need it’s own version or are existing platforms up to the job? If you were to use the Atoe what’s the one thing you’d preserve? How else should we be preserving African cultures? We’d love to hear your thoughts in the comments below.
If you have any problems posting you can tweet @GuardianAfrica, or email [email protected], please state if you’d like to remain anonymous.
| |
MONTCLAIR, NJ (CelebrityAccess) — The Wellmont Theater in downtown Montclair, N.J., is undergoing a $135 million renovation that will see it at the center of a new mixed-use district.
According to Venues Today, the 2,500-capacity theater will anchor a mixed-use district that encompasses 3.5 acres, and which includes 200 residential units, as well as restaurants and office space.
The theater will also see a new parking garage constructed next to the venue that will be able to accommodate tour buses and provide direct access to the theater’s back of house for load-in and load-out, as well as 250 spaces for concert-goers.
Construction is expected to start in mid-May and take up to three years to complete, Venues Today reported.
Originally opened in 1922 as a Vaudeville theater, the Wellmont spent most of its life as a movie theater until it was acquired 2006 by real estate developer Greenwood Development for conversion into a music venue. Live Nation currently has an exclusive booking deal at the venue. | https://celebrityaccess.com/caarchive/montclairs-wellmont-theater-undergoing-major-rehab/ |
Truthfulness and accuracy are critical for effective organizational functioning, but dishonesty (in the form of lying, misrepresentation, and fraud) continue to be pervasive in organizational life. Workplace dishonesty is an inherently unique behavior that should be distinguished from broader categories of unethical workplace behavior and organizational deviance, in that dishonesty is an overt social behavior—that is, requiring an audience to exist as a behavior. Compared to stealing or cheating, dishonest acts require knowing fabrication of false information, intended to deceive an anticipated audience. Thus, considering the overt social aspect of dishonesty (compared to the relatively clandestine behaviors of cheating and stealing) may add conceptual clarity to the construct of workplace dishonesty, which is surprisingly absent from extant literature. The potential audience for dishonest acts in the workplace is notably critical, in that dishonest organizational actors generally anticipate characteristics of the audience (in terms of relationship closeness, as well as expertise and motivation to evaluate the claim) and likely adapt and tailor their dishonesty accordingly. Historically two underlying paradigms have been used to study workplace dishonesty: the rational actor (economic) paradigm and the behavioral ethics (psychological) paradigm, but an emerging and nascent third paradigm (the social actor paradigm) may offer new opportunities for understanding antecedents of workplace dishonesty that do not occur exclusively for self-interested reasons. This novel paradigm suggests here important areas of inquiry related to the aftermath of workplace dishonesty: when will workplace dishonesty be detected in social interactions; what are the social and relational consequences of discovering dishonesty; how are dishonest actors likely to behave in the aftermath of their dishonest actions. Finally, two varying discrepancies relevant to workplace dishonesty should accordingly be considered when predicting subsequent behavior of the dishonest actor: the magnitude of the discrepancy between the truth and the fabrication, and the temporal discrepancy between the trigger event and dishonest act. | https://oxfordre.com/business/browse?btog=chap&pageSize=20&sort=titlesort&subSite=business&t=ORE_BUS%3AREFBUS007&t0=ORE_BUS%3AREFBUS017 |
The following article reprinted with permission from Financial Post confirms our thoughts on how Canadians are doing a disservice to businesses by not complaining when they receive service or products that are below their expectations. Businesses desperately need this information so that they can address the issues at hand and improve their customer retention rate. For businesses, this is clearly a case of what you don’t know will hurt you. That’s why we strongly feel that implementing an on-premise feedback survey app like Insights is imperative for businesses to gather valuable data that will help them improve their customer experience, their retention rate and, ultimately, their revenue.
PreviousHow Do You Measure Good Customer Service? NextWhy Innovate With Technology to Improve the Customer Experience? | http://inevex.com/canadians-are-hurting-businesses-by-not-complaining/ |
Other cognitive assessments are based on patient self-reporting or observable symptoms. The subjective nature of these assessments can result in a high margin of error.
Unlike subjective cognitive assessment tools, VoxNeuro analyzes brain health using biomarkers called ERPs (event-related potentials), which indicate the health of your core cognitive functions including memory, information processing, attention & concentration.
VoxNeuro supports: | https://voxneuro.com/helpie_faq/how-are-cognitive-health-assessments-different-from-other-cognitive-assessments/ |
Lots of Irish people worked in Britain, the US, Europe and further afield before coming home. Gerry Scully explains how the pension contributions they made while working abroad can be used to get a better pension in Ireland.
Question
Dear Age Action,
I worked abroad for a few years and made social security contributions and I'm now back living in Ireland. I've heard that my contributions outside of Ireland can be used to get a better pension here. Is that correct?
Michelle from Ennis
Answer
Depending on where you worked, the answer is yes.
You can use them if you don’t have enough Irish Contributions or to possibly get a pension from the other country or countries in which you worked.
If you worked in one or more countries with which Ireland has a bilateral social security treaty you can use contributions you made in those countries to increase the value of your Irish pension.
Ireland has nine separate bilateral treaties with foreign countries that allow people claiming Irish pensions to use the contributions they made there to get a better pension.
The exact system for doing this varies from country to country but they are roughly similar. And remember that because we are part of the European Union we have default agreements with the other 27 countries of the EU.
How it works
When you apply for an Irish State Pension you are asked to indicate if you worked abroad and to give details of any employment you had while abroad. This will include name of employer, your address and your social security number while there.
If you do not have enough Irish contributions to entitle you to a full pension (at least an average of 48 over your working life) the Department of Employment Affairs and Social Protection will automatically contact the equivalent department in the other country or countries you’ve worked to find out what contributions you made there.
The Department of Employment Affairs and Social Protection will then use the combination of your Irish and foreign contributions to figure out the pension you should get.
The United States will also allow you to use your Irish contributions to qualify for a full American pension even if you are also using them to get a pro-rata pension from the Irish government. In effect, you can use the same Irish contribution twice.
It really is worth checking with the social security department in each country you have worked to see how they calculate pension entitlement using foreign contributions.
Colm's story
It might be easier to understand if we have an example. Colm worked for five years in Ireland and 30 years in the United States. He has 280 Irish contributions and 560 American.
Since he doesn’t have enough Irish contributions he would not normally be eligible for a State Pension but because there is a treaty with the United States he can use his American contributions.
The Department adds together his Irish and American contributions to get a figure of 840 which is divided by the 35 years of Colm's working life to give a yearly average of 24.
In theory, this would entitle him to a pension of €202.80.
But because Ireland uses the principle of pro-rata payment there is a second calculation to determine the portion of your entitlement that Ireland will pay.
They multiply the notional pension entitlement €202.80 by the number of Irish contribution and divide the answer by the total number of contributions
So, 202.80 is multiplied by 280 and then divided by 840 to give Colm a total weekly State Pension of €67.60.
He might also be entitled to some form of pension from the United States and he should contact them to find out.
Countries with which Ireland has these agreements
- All EU member states
- Australia
- Canada
- Japan
- New Zealand
- Quebec (They have a slightly different protocol than the rest of Canada)
- Republic of Korea
- The Swiss Confederation
- The United Kingdom (at the moment covered by EU regulations)
- The United States of America
Comments
ThomasBlabe
says
Living in France is one thing desired by many individuals. If you want to live in France then you have to get French property. You can read the advertisement section of the newspapers which has the section of houses for sale in France. After making a suitable choice, you should research about the properties for sale in France. French property is now a days very much wanted also.
If you want to live in France and spend your life there you should select a proper house. French property is not cheap and you need to make a major investment. You must also know about the properties for sale in France at various locations. The houses for sale in France come in different prices depending on the location
Desmond Moor
says
My understanding is that you can only use contributions from another country if you do not have the minimum contributions necessary ( 520) in Ireland. You cannot use overseas contributions to increase you average if you have more that 520 contributions.
Gerard Scully
says
Hi Desmond,
Thanks for getting in touch with Age Action. While one of the outcomes of using foreign contributions is to allow an individual to qualify for a State Contributory Pension if they do not have the required minimum 520 contributions it is also possible that foreign contributions may increase the level of your Irish State pension. It is true however that the method used by the Irish State to calculate an individual’s level of pension, when combining Irish and Foreign contributions, makes it unlikely that your Irish State pension will increase. As we said in the blog the Irish State will only pay a pro-rata pension, i.e. a portion of the pension that the combined contributions would entitle an individual to if all contributions were Irish. There is no rule that excludes the possibility of increasing the Irish portion of the pension by using foreign contributions.
Desmond Moore
says
Can you confirm that the Minimum Retirement Income is Euro 12,700 and not Euro 18,000. Last year my wife transferred her occupational pension to an AMRF on the basis that the minimum retirement income was 12,700.
Gerard Scully
says
Hi Desmond according to the Pensions Authority Website the minimum retirement income is €12,700. The figure of €18,000 was introduced in rule changes in 2011 but in the Finance Act of 2013 the new 2011 rules were rescinded meaning the figure of €12,700 applies at the moment. The 2011 rules were due to come into force again in 2016 but have not done so.
Rolande Hall
says
It may be useful for some to know that a person who qualifies for a full Irish Contributory pension (based on Irish contributions) may also qualify for a partial UK pension (based on UK contributions). | https://www.ageaction.ie/blog/2018/01/31/working-abroad-can-help-you-get-irish-pension |
Schonthal, David. 2017. Travis Kalanick's 'Profound Apology' Is a Cautionary Lesson for Young Founders. Entrepreneur Magazine. | https://www.kellogg.northwestern.edu/faculty/research/researchdetail?guid=f4037888-155b-11e7-9872-0050569b3e41 |
Cellectis Relaunches Halted CAR-T Trials
The U.S. Food and Drug Administration lifted the clinical hold on two phase I trials of Cellectis’ UCART123, its gene-edited allogeneic chimeric antigen receptor...
Access to Care, Survival Are Enduring Hurdles for Patients With Sickle Cell Disease
As part of an ongoing series on discrimination in the United States, NPR reported that while life expectancy for almost every major illness is...
Trump Administration to Support Work Requirements for Medicaid Beneficiaries
The Trump Administration announced it will approve proposals from states to require work or community engagement for those who want to receive Medicaid. Community...
FDA Approves First-Ever Treatment for Rare Blood Cancer
The U.S. Food and Drug Administration (FDA) expanded the approval of vemurafenib, a kinase inhibitor, to include the treatment of adult patients with BRAF-V600-mutated...
Congress Considers Eliminating Incentives for Orphan Drugs in New Tax Bill
The Republican tax plan includes a proposal to end tax credits for the development of drugs for rare diseases. Ending the credit, which is...
FDA Grants Accelerated Approval to Acalabrutinib for Mantle Cell Lymphoma
The U.S. Food and Drug Administration (FDA) granted accelerated approval to acalabrutinib, a second-generation Bruton tyrosine kinase, as secondline treatment for patients with mantle...
Medical Device and Drug Shortages Loom During Puerto Rico’s Hurricane Recovery
When Hurricane Irma devastated Puerto Rico, the more than 80 pharmaceutical manufacturing facilities and more than 50 medical-device factories in the U.S. territory were...
Early Data From Ongoing JCAR017 Trials Show High Remission Rates
Preliminary data from the ongoing TRANSCEND trial showed that patients with relapsed or refractory diffuse large B-cell lymphoma (DLBCL) who were treated with the...
Improvements in Manufacturing Overcomes Challenges of Gene Therapy for Sickle Cell Disease
Data from two patients in an ongoing phase I/II clinical trial of LentiGlobin BB305, a gene therapy for sickle cell disease (SCD), suggest that...
Enasidenib Manufacturers Plan to Submit Mutant IDH1 Inhibitor to FDA
Agios Pharmaceuticals announced plans to seek approval from the U.S. Food and Drug Administration (FDA) for its second leukemia drug – ivosidenib, a mutant IDH1... | https://www.ashclinicalnews.org/category/online-exclusive/ |
by: Ilse Strauss
Monday, 27 July 2020 | The Malali watermelon has things a bit backwards. With normal watermelons, you feast on the flesh and discard the seeds. However, with this Israeli watermelon named for Kfar Malal, the agricultural community in central Israel where it was first cultivated, you feast on the seeds as a crunchy, nutritious snack and discard the bland flesh and rind.
While the Malali watermelon contributes some 2,800 tons of seeds to the nut industry every year, growing a crop only to dispose of 97% of its total weight is not ideal. In fact, an estimated 56,000 tons of Malali watermelon pulp is discarded annually. “The wastage here is clear and glaring,” Yoram Gerchman, associate professor of the Department of Biology and Environment at the University of Haifa and the Oranim Academic College told ZAVIT Environment and Science News Agency.
However, a recent study conducted by one of Gerchman’s students found that the pulp can be used to produce ethanol, an alternative renewable biofuel for vehicles.
The benefits of biofuel are sung worldwide. Ethanol-based fuel reduces carbon monoxide emissions, harmful particulates, hydrocarbons and sulfates. Moreover, it also reduces the dependence on limited reserves of fossil fuels like coal, oil and natural gas.
The flipside is, however, that making ethanol requires land and resources, which means earmarking agricultural land to produce industrial and non-food crops. In tiny Israel where every inch is precious, this has been impossible, putting the Jewish state’s ethanol industry on the backburner—until now. Since the Malali watermelon is an existing crop, producing ethanol from the pulp means salvaging something that usually goes to waste without requiring additional agricultural land, ZAVIT Environment and Science News Agency reports.
Moreover, the Malali watermelon requires much less water than its edible counterparts, which makes it an ideal crop with a high yield for arid regions.
Gerchman has ample experience researching ethanol production from organic material such as pruning, olive and paper waste. He does, however, feel that the Malali watermelon holds particular promise for the ethanol industry. “It turns out that watermelons are fermenting very well. This is the easiest waste I have ever worked with.”
Posted on July 27, 2020
Source: (Bridges for Peace, July 27, 2020)
Photo Credit: www.twin-loc.fr/flickr.com
Photo License: flickr.com
All logos and trademarks in this site are property of their respective owner. All other materials are property of Bridges for Peace. Copyright © 2020.
Website Site Design by J-Town Internet Services Ltd. - Based in Jerusalem and Serving the World. | https://www.bridgesforpeace.com/report-israeli-watermelons-fueling-the-future/ |
PROBLEM TO BE SOLVED: To reduce the difficulty in cleaning, processing and manufacturing a raised tongue of complicated shape.
SOLUTION: The roaster has the structure in which a radiation plate 30 of a ring-shape on a plan view provided with a gas passage hole in vertical direction is formed to a cross sectional angular shape, a first radiation plate 38 located inside is slanting downwardly in the inner side, a second radiation plate 39 located outside is slanting downwardly in the outer side, and an inside cylindrical part 28 is attached to an inner edge of the first radiation plate 38 located inside. Further an outside cylindrical part 29 is attached to an outer edge of the second radiation plate 39 located outside, a burner 18 is formed to a ring-shape, and a tip nozzle of burner 18 is arranged in the position approximately immediately below or outside of the outside cylindrical part 29. With the structure mentioned above, the cleaning and manufacturing of the gas passage holes of the first radiation plate 38 and the second radiation plate 39 are easily performed by simply cutting them, and combustion gas guided through a circulation space 46 between the inside cylindrical part 28 and the outside cylindrical part 29 heats up the whole radiation plate 30 of the angular shape.
COPYRIGHT: (C)2003,JPO | |
The seven assumptions set the scope and purpose for the project and were developed from our initial research completed in 2012. They were the starting point for the 2013 TalentNZ Journal, and have continued to guide our thinking as we receive feedback and develop more clarity over the work programme going forward.
A focus on talent is inclusive, and extends to all New Zealanders.
Every Kiwi has a range of talents, however, not everyone is fully aware of what these talents might be, how they might be developed or how they might connect with other Kiwis interested in similar outcomes. In 2013 we undertook a great deal of research to determine what was meant by talent, and concluded that there was not a single definition. From the Institute’s perspective, talent is a mixture of personality, smart practice and character, but most importantly, we believe character is key. In the 2013 TalentNZ Journal we use the diagram to the right to explain that the most important area for parents and educationalists to focus on is character. Although we tend to focus on technology in the 30 interviews in the 2013 TalentNZ Journal, we see talent as a very broad term. Character is about values. Smart practice is about working on natural skills/goals over time in areas such as sports, music, academia and the arts. Personality is what you wake up with, while character is what you need to work on all day, every day. Everyone has personality, character and smart practise which is why we see talent as inclusive and extends to all New Zealanders.
A focus on a talent-based economy will deliver better outcomes than a singular focus on jobs, innovation or specific areas such as agriculture.
What we focus on (or decide not to focus on) will deliver different outcomes. A focus on jobs is likely to lead us down a path of the quantity not the quality of jobs. A focus on innovation is likely to lead us down a path of invention, not innovation in terms of new ways of doing old things. A focus on agriculture is likely to lead us down a path of more dependence on agriculture and therefore more economic vulnerability to overseas economies. Critically it is not that jobs, innovation or agriculture are not important (they are), but rather a focus on talent will deliver value to all three. It will also provide us a more secure future through the creation of a dynamic, flexible and empowered workforce that is connected, engaged and committed to our country’s long-term future. New Zealand came on to the world stage as an economy based on natural resources, which then evolved into an agricultural-based economy. This is how most developed countries started, but most then went on to develop based on services and intellectual property. New Zealand has arguably not yet made this leap and would benefit from a more diverse economic base.
To make progress towards a talent-based economy, four key work-streams have become apparent: we must (1) grow, (2) attract, (3) retain and (4) connect talent.
These four work-streams evolved from the 30 interviewees in the 2013 TalentNZ Journal. Each work stream requires a combination of stakeholders to enable progress towards the goal of a talent-based economy, but interestingly each work-stream has a key enabler: Grow (the Ministry of Education), Attract (organisations), Retain (organisations) and Connect (communities). Interestingly, the four work-streams align quite closely with the Global Talent Competitiveness Index 2013. This index was published late 2013 by a collaboration of the INSEAD, the Human Capital Leadership Institute and Adecco Group.
Progress towards a talent-based economy can be measured and quantified.
Traditional measures of economic progress based on jobs and skills need to be reconfigured so as to take account of the role of talent. Many different types of employment relationships are coming into existence (see the continuum on page 90 of the 2013 TalentNZ Journal), and the value produced by work needs to be better integrated into economic metrics that currently focus on the amount of time worked.
Strong correlations exist between talent, economic wealth and community wellbeing.
Talented people may work and sleep 16 hours a day but they also play eight hours a day. The quality of those eight hours of play is critically important, both in terms of attracting and retaining talent but also in terms of growing and connecting talent – this is why cities are such an important component in building a talent-based economy.
Collaboration between communities (rather than competition) will create more connections and going forward produce more benefits for New Zealanders.
Without collaboration, communities are more likely to use their limited resources trying to obtain the exact same outcome. For example, if five communities wanted to become the movie-mecca of New Zealand, only one is likely to achieve the ultimate aim while the other four will expend the same resources for no gain. However, if they were to collaborate and only one focused on movies, while the others focused on specific areas such as high-end tourism, marine research and aquaculture, agriculture, and tech/communication, they will not only create higher benefits for themselves individually, but the impact of those surrounding communities also being successful will in turn produce additional flow-on benefits.
The most important resource in the 21st century will be talent.
The mismatch between supply and demand of talent is increasing both nationally and globally (see Global Talent Competitiveness Index 2013). In very general terms human talent has only been recognized and studied in terms of organisations, leading to human resources departments in most large organisations. Early this century this mismatch of talent supply and talent demand has become apparent, creating a broader discussion over talent mismatches between countries. What is surprising is that there is little research on the role of cities as creators of talent-based economies. Countries, cities and regions will all need to work hard to grow, attract, retain and connect talent; those that do not will struggle. Talent is the new currency just as programming is the new language. Countries that understand this new currency will get a first mover advantage. New Zealand could and should be one of these countries. | http://talentnzmenu.org/home/the-seven-assumptions/ |
This comprehensive narrative account of religion in America from the sixteenth century through the present depicts the religious life of the American people within the context of American society. It addresses topics ranging from the European origins of American religious thought and the diversity of religion in America, to the relation of nationhood with religious practice and the importance of race, ethnicity, and gender in American religious history. Split into four parts this textbook covers:
Religion in a Colonial Context, 1492-1789
The New Nation, 1789-1865
Years of Midpassage, 1865-1918
Modern America, 1918- Present
This new edition has been thoroughly updated to include further discussion of colonialism, religious minorities, space and empire, religious freedom, emotion, popular religion, sexuality, the ascent of the "nones," Islamophobia, and the development of an American mission to the world.
With a detailed timeline, illustrations and maps throughout, and an accompanying companion website Religion in America is the perfect introduction for students new to the study of this topic who wish to understand the key themes, places, and people who shaped the world as we know it today.
Publisher: Taylor & Francis Inc
ISBN: 9780815392606
Number of pages: 610
Weight: 1365 g
Dimensions: 246 x 189 mm
Edition: 9th New edition
MEDIA REVIEWS
This edition updates an older classic, bringing together the strengths of different approaches to understanding the history of religion in America, maintaining a vigorous narrative throughout, and incorporating the newest research in diverse religious groups. An ideal text for courses in American religious history. Paul Harvey, University of Colorado, USA
For decades, Religion in America by John Corrigan and Winthrop Hudson has been a classic. This new edition is the best yet. Not only is this book an authoritative history, it is also an excellent guide to the diverse and conflicted marketplace of religion in America today. Religion in America brings the American religious past and present into dialog better than any other book available. James P. Byrd, Vanderbilt University, USA.
In the 9th edition of the classic text, Religion in America, Corrigan continues the tradition started with the publication of the early editions by his late co-author, Winthrop Hudson, over fifty years ago. This work provides an informative, comprehensive, readable, and balanced religious history of the United States from colonial times to the present. In each succeeding revision by Professor Corrigan he has over the years succeeded in making appropriate improvements upon the previous solid text. For close to 30 years I have utilized Religion in Americaas a main text in my American Religious History classes and look forward to having students read this fine ninth edition. Sandy D. Martin, The University of Georgia, USA.
You may also be interested in...
ReviewsSign In To Write A Review
Please sign in to write a review
Sign In / Register
Sign In
Download the Waterstones App
Would you like to proceed to the App store to download the Waterstones App? | https://www.waterstones.com/book/religion-in-america/john-corrigan/winthrop-hudson/9780815392606 |
Warning:
more...
Generate a file for use with external citation management software.
It is shown that the native globular actin (G-actin) is the thermodynamically unstable (quasi-stationary) form of the protein. This state is stabilized by Mg2+ (in vitro replaced by Ca2+). In vivo this state occurs as a result of complex energy-consuming post-translational folding processes including chaperone Hsp70, prefoldin and CCT complex, providing the formation of the native structure stabilized by Ca2+ and ATP. Structures formed by actin polypeptide chain constantly form complexes with their partners (chaperones Hsp70, prefoldin and chaperonin CCT in folding process, with an Mg ion and ATP in the native state, with numerous actin-binding proteins during the formation and functioning of the cell cytoskeleton, with myosin and other proteins of the muscle contraction in the muscle cells). Actin denaturation is accompanied by self-association of molecules, so the inactivated actin is the thermodynamically stable compact structure consisting of 14-16 protein molecules. Apparently, proteins with quasi-stationary native state are widespread in nature. The emergence of these states is energy-consuming and is conjugated with the inability of the polypeptide chain to form the native compact structure without assistants (complex machinery of protein folding in the cell) and without interaction with their natural partners, in particular with metal ions.
National Center for
Biotechnology Information, | https://www.ncbi.nlm.nih.gov/pubmed?Db=pubmed&Cmd=ShowDetailView&TermToSearch=26591059 |
*The library uses the Library of Congress system to organize the books on the shelves. It is an alpha-numberic system. Each item in the library has a label on the spine of the book with letters and numbers (together called a call number) which indicates its place on the shelf. The letters indicate a subject area and the numbers which follow further subdivide the broader topic into more specific categories.
What are course reserves?
The reserve service in the library assists faculty by making more readily available those resources which multiple students must use intensively for a short period of time or repeatedly throughout the semester. Resources placed on reserve by instructors may be marked as unable to be checked out (so others can have access) or specified with one-, two- or three-night check out privileges.
How do I access course reserves?
You will probably use these books at some point, ask about them at the circulation desk. Students may access the course reserves by presenting their student i.d. card at the circulation desk. The professor designates the circulation policy of the resource. Some resources are for library use only while others may be checked out daily or weekly. You can also search the Course Reserves by course, professor, or department.
|
|
|
|
Popular
|
|
Scholarly
|
|
Trade
|
|
Authority/Authorship
|
||
||
|
|
|
Intended Audience
|
||
||
|
|
|
Content
|
||
||
|
|
|
Level of Language
|
||
||
|
|
|
References or Bibliography of Sources
|
||
||
|
|
|
Review Policy
|
||
||
|
|
|
Advertisments
|
||
||
|
|
|
Examples
|
||
||
|
In all disciplines, knowledge is built by responding to the ideas and discoveries of those who came before us. Scholarly journal articles are unique in that they require authors to document and make verifiable the sources of the facts, ideas, and methods they used to arrive at their insights and conclusions. Scholarly articles also strive to identify and discuss the merits of alternative explanations and viewpoints for the positions they espouse. This makes it easier to assess the truth, as well as the strengths and weaknesses, of the claims made in a paper. This is the case for those with knowledge of a subject (for example, your professor), as well as for those just beginning to learn about a subject (for example, you).
As you know, anyone can say just about anything in articles posted on the web. While you might agree with the conclusions of a paper found on the web, you are often not given the chain of evidence you need to assess the truth of those conclusions. Likewise, articles published in popular magazines, while they provide information and opinions, are not required to document evidence that either supports or negates their conclusions. Scholarly journal articles, unlike web-based or popular magazine articles, are designed and structured to provide the elements necessary to most thoroughly evaluate the validity and truth of an author's position. | https://lib-guides.letu.edu/c.php?g=375568&p=2541571 |
There are many factors that need to be considered when planting marijuana seeds, and knowing these will help you ensure a successful growing experience. Here are some of the main tips to help you ensure a successful growing experience:
Soaking seeds in water
Soaking marijuana seeds is a great way to ensure a successful germination. They do best when they’re kept at a high moisture level, 70-80% relative humidity, and at a temperature between 21 and 26 degrees Celsius. Keep in mind that this is crucial for the germination process; lower temperatures and humidity can promote rot and fungus. The seeds can benefit from soaking overnight before planting.
To test whether the marijuana seed is viable, simply soak it in water for at least 12 hours. Seeds should start floating, then sink to the bottom of the glass. After this time, look for a white tap root breaking through the seed shell. Older seeds will take longer to break through their shells. Soaking seeds for a longer period may cause them to drown. If you do find that your marijuana seed does not sprout after a few days, don’t worry. Instead, leave it in a warm, moist place.
While you’re soaking marijuana seeds, make sure you don’t disturb them. Even if they seem a bit flimsy, they may still germinate if they’re not crushed. However, if you’re planning on breeding or cloning your cannabis plants, don’t disturb them. You’ll risk causing more damage than good. It’s best to keep them in the same place, where they won’t be disturbed.
During germination, the marijuana seeds should be kept moist. Seed germination takes a few hours or even days. Having adequate moisture levels will ensure a successful outcome. Otherwise, they’ll stop taking moisture from their grow medium and will not open properly. To ensure the moisture level of your seeds, you’ll need to check the paper towel daily, especially if you’re in a warm room. To fix the paper towel that is getting dry, you can use a spray bottle to spray water onto it.
Soaking seeds in seedling pellets
The first step to grow your marijuana is to soak your marijuana seeds in seedling pellets. The water should be distilled, or purified if you’re growing young plants. Place the pellets in a humid area that keeps a high humidity. Wait for about 10 minutes, and then gently squeeze the pellets to expand. Once they have expanded, place one seed in each hole. When the seed head is fully developed, it will begin to push up above the pellets. Within a couple of days, the cotyledons should open. Within three to four days, the seedlings will emerge from the pellets.
Ideally, your cannabis seedlings will have emerged from their media with the seed casing intact. This allows the cotyledons to open. If the seed casing remains on, the cannabis plant is still too young to germinate. This is because it can be exhausting to the seedlings’ energy supply. Once this happens, the seedlings will start growing normally. They should be well-hydrated, with a ph around 6.0.
Once your marijuana seedlings have sprouted, you can place them in a moist but not soaking medium. When these seeds sprout, they will have roots that burrow into the growing medium. Alternatively, you can soak marijuana seeds overnight in warm water. This is especially useful for hard-shelled seeds. This will also help wake up older seeds, which have a hard shell. If you want to grow marijuana in a greenhouse, soaking your marijuana seeds overnight in seedling pellets will give you the most success.
You should soak Jiffy pellets for at least 10 minutes before placing them in the seedlings. Make sure to place them in the middle of the pellet, and not too deep. If your seeds are too deep, they won’t sprout. If you’re planting seeds too deep, you should use extra peat that has risen to the sides of the pellet. Some peat pellet trays are equipped with humidity leads.
Soaking seeds in a sunny window
Growing cannabis on a windowsill is possible, but there are a few things to keep in mind. The primary challenge is limited sunlight exposure. The most direct light comes from south-facing windows. As the sun rises in the east and moves west during the day, it provides eight to ten hours of direct sunlight daily. You can increase this number by orienting your window towards sunrise and early afternoon sunlight.
Before sowing seeds, make sure the air around the glass is relatively humid. Seeds need to get enough moisture, oxygen, and a warm temperature to germinate. The ideal temperature range is 70 to 80 degrees Fahrenheit. After soaking for a few days, you can plant the seeds. Be sure not to touch the seeds until they sprout. Then, place the pots under a fluorescent lamp.
To sow the seeds, place them in a warm place that is 70 to 80 degrees Fahrenheit. You must cover them with a paper towel to prevent them from drying out. Set the paper towels on a grate or in the window sill, allowing water to drain off and air to circulate. Check the seeds every two or three days and add water as necessary. Never let the seeds dry out.
Before sowing your marijuana seeds, be sure to select quality seeds. Choose seeds that are fat, rounded, and dark. Seeds that are cracked, wrinkled, or wrinkly are unlikely to germinate. They should also have a slight sheen. Dark-colored seeds will grow better, so make sure you choose them carefully. If you are unsure about the quality of a seed, make sure you buy one from a reputable source.
Light deprivation vs. light deprivation
There are some important differences between light deprivation and photoperiod cannabis growth. In photoperiod, the plants are influenced by the seasonal changes in light, and they do not flower until the daylight hours decrease in the early fall. By contrast, light deprivation cannabis grows in a predictable cycle, with its leaves, stems, and flowers forming at specific times.
The primary difference between the two is the light cycle. In light deprivation, the plant gets no light for a certain period of time. It does not need much light to flourish, but it requires consistency and a lot of work. Failure to cover the plants every day can result in hermioned plants, so make sure you do it consistently. Alternatively, you can automate light cycles or use a window blind.
Another difference between light cycle and photoperiod is how you control the amount of light your plants receive. While photoperiod grows faster, hoop house growth is less predictable. Humidity will build up inside during the dark period, and this can be a silent killer of your crop. Unlike photoperiod, light deprivation is best for indoor growers who are trying to get multiple harvests from a single crop.
Another difference between photoperiod is how you grow your cannabis plants. Light deprivation is most effective for cannabis growers and allows them to flower early. Cannabis plants that are grown under natural light tend to have a photoperiod, which means that they depend on daylight hours to know when the season is. When fall approaches, photoperiod plants move from vegetative to flowering growth.
Growing cannabis in a container
Growing cannabis in a container allows you to shift from a lower light to brighter lighting without damaging the plant. Cannabis plants need regular feeding to stay healthy and grow large. To do this, you can add liquid fertilizers to the water reservoir. You can also use your fingers to loosen the root mass. Ideally, you should plant the cannabis plant in a small container at first, and gradually transplant it to a larger one as it grows.
Before planting your cannabis seeds, you will need to prepare the soil. The soil should be porous, allowing excess moisture to drain. Most potting soils offer good drainage, but coco coir provides the most drainage. Make sure to read the instructions carefully before planting. It may take months to prepare the soil but the outcome will be worth it. If you are new to growing cannabis, you can also try this method, which is very convenient and cheap.
Aside from providing nutrients, growing cannabis in a container also protects the plant from extreme weather conditions. Cannabis does not grow well in areas with high wind. In high wind, its branches break and become vulnerable to pests and illnesses. To protect your plant from these conditions, you can invest in windbreakers. Healthy cannabis plants can also fight small pests by themselves. A few tips for growing cannabis in a container:
First of all, cannabis needs a balanced blend of micro and macronutrients to thrive. They absorb carbon, oxygen, and hydrogen from the air, but they need additional nutrients in the soil to grow and bloom properly. This is referred to as NPK. These are the main ingredients for strong buds and branches. To achieve the desired results, you should add a little of each element and fertilize your plants accordingly. | https://www.marijuanasx.com/factors-to-consider-when-planting-marijuana-seeds/ |
Monoprinting is a simple form of printmaking that produces one image per printing. Artists apply the ink to a flat printing plate and press the plate against a piece of paper using a printing machine. The process removes most of the ink from the plate, so the artist ends up with a unique image. Sometimes, artists can run the plate through a second time to get a "ghost image" with the ink left on the plate. When applying ink to the plate or the paper, artists use a variety of techniques.
The artist can print on a wet plate or a dry plate, and each technique produces a slightly different effect. In wet-plate printing, the artist prints with the plate while the ink on it is still wet. Because the ink is still liquid, it is more likely to spread out and blend on the paper. In dry-plate printing, the artist waits until the ink is dry on the plate before transferring it to wet paper. The ink is dry and holds its shape better for more detailed final results. Typically, the paper used in dry-plate printing soaks in water while the ink is drying. After the ink dries, the artist removes the paper and and blots it lightly before starting the print. The surface of the paper shouldn't be slick with water.
Additive inking is a term used to reference one way to add ink to a printer plate. Additive inking allows the artist to paint an image directly onto the plate using fingers, palette knives, rags or brushes. The artist starts with lighter colors and works towards the darker colors in the image. This process yields effects that are more like painting, with the ink being layered and blended together. It produces more blended, ethereal or even impressionistic images.
Subtractive inking allows the artist to cover the plate in ink using brushes, rags or an ink roller and then remove sections or draw into the ink using the ends of rollers, palette knives or paint brushes. With this technique, it's possible to achieve a reverse ink-drawn effect. The artist also uses stencils to block out sections of ink in subtractive inking. The stencils can be made from leaves, lace, paper cutouts or anything flat enough to stick to the plate and run through the printer.
This direct-draw inking technique is done by hand. The artist places ink on the plate however she desires for the inking. When ready, the artist lays a piece of lightweight rice paper on the wet plate. The artist presses on the back of the paper with hands, brush handles, rollers and even textured objects to create an ink print on the rice paper. The ink transfers only to the places where the artist has applied pressure to the back of the paper. | https://ourpastimes.com/monoprinting-techniques-12593354.html |
To improve the performance of our website, show the most relevant news products and targeted advertising, we collect technical impersonal information about you, including through the tools of our partners. You can find a detailed description of how we use your data in our Privacy Policy. For a detailed description of the technologies, please see the Cookie and Automatic Logging Policy.
By clicking on the "Accept & Close" button, you provide your explicit consent to the processing of your data to achieve the above goal.
You can withdraw your consent using the method specified in the Privacy Policy.
CAIRO (Sputnik) - Libya, following the resumption of the operation of oil facilities, will export only oil accumulated in port terminals, crude produced at deposits will not be exported, Libyan National Army spokesman Major General Ahmad al-Mismari said.
"The opening of oil facilities means exportation of only what is in the tanks, the oil produced at deposits will not be exported", al-Mismari said during his weekly press conference.
The head of the Petroleum Facilities Guard, General Naji al-Maghrabi, announced overnight on Wednesday that oil terminals and deposits would resume operation after months of closure. He said the unblocking of the oil facilities' operation was carried out by order of LNA Commander Field Marshal Khalifa Haftar "to alleviate the suffering of Libyan citizens".
Most of Libya's oil fields and ports have been closed since January due to the blocking of oil facilities by the LNA commander's order.
The Libyan National Oil Corporation announced on 10 June that it was blocking the country's largest field, Sharara, again hours after it resumed operations. According to the Corporation, the budget losses caused by the stop of oil production in Libya exceed $6 billion.
By checking this box, you provide your explicit consent to the processing of your personal data to create an account on the Sputnik website for posting comments to news. You can find a detailed description of how we use your data in our Privacy Policy.
You can withdraw your consent by using the feedback form or the method specified in the Privacy Policy.
* All fields are required
Please confirm your e-mail to continue. Confirmation instructions have been sent to
Hello,
!
We are committed to protecting your personal information and we have updated our Privacy Policy to comply with the General Data Protection Regulation (GDPR), a new EU regulation that went into effect on May 25, 2018.
Please review our Privacy Policy. It contains details about the types of data we collect, how we use it, and your data protection rights.
Since you already shared your personal data with us when you created your personal account, to continue using it, please check the box below:
I agree to the processing of my personal data for the purpose of creating a personal account on this site, in compliance with the Privacy Policy.
If you do not want us to continue processing your data, please click here to delete your account.
promotes the use of narcotic / psychotropic substances, provides information on their production and use;
contains links to viruses and malicious software;
is part of an organized action involving large volumes of comments with identical or similar content ("flash mob");
“floods” the discussion thread with a large number of incoherent or irrelevant messages;
violates etiquette, exhibiting any form of aggressive, humiliating or abusive behavior ("trolling");
doesn’t follow standard rules of the English language, for example, is typed fully or mostly in capital letters or isn’t broken down into sentences.
The administration has the right to block a user’s access to the page or delete a user’s account without notice if the user is in violation of these rules or if behavior indicating said violation is detected. | |
Brain. 2014 Jun;137(Pt 6):1579-613. doi: 10.1093/brain/awt358. Epub 2014 Jan 28.
Clinical, genetic and imaging findings identify new causes for corpus callosum development syndromes.
Edwards TJ1, Sherr EH2, Barkovich AJ3, Richards LJ4.
1 Queensland Brain Institute, The University of Queensland, Brisbane, 4072, Australia2 Departments of Neurology and Pediatrics, The University of California and the Benioff Children's Hospital, CA, 94158, USA.
3 Departments of Pediatrics and Neurosurgery, Radiology and Biomedical Imaging, The University of California Children's Hospital, CA 94143, USA.
3 Departments of Pediatrics and Neurosurgery, Radiology and Biomedical Imaging, The University of California Children's Hospital, CA 94143, USA4 Departments of Paediatrics and Neurosurgery, Radiology and Biomedical Imaging, The University of California San Francisco and The Benioff Children's Hospital, CA 94143-0628 USA.
1 Queensland Brain Institute, The University of Queensland, Brisbane, 4072, Australia5 School of Biomedical Sciences, The University of Queensland, Brisbane, 4072, Australia [email protected].
The corpus callosum is the largest fibre tract in the brain, connecting the two cerebral hemispheres, and thereby facilitating the integration of motor and sensory information from the two sides of the body as well as influencing higher cognition associated with executive function, social interaction and language. Agenesis of the corpus callosum is a common brain malformation that can occur either in isolation or in association with congenital syndromes. Understanding the causes of this condition will help improve our knowledge of the critical brain developmental mechanisms required for wiring the brain and provide potential avenues for therapies for callosal agenesis or related neurodevelopmental disorders. Improved genetic studies combined with mouse models and neuroimaging have rapidly expanded the diverse collection of copy number variations and single gene mutations associated with callosal agenesis. At the same time, advances in our understanding of the developmental mechanisms involved in corpus callosum formation have provided insights into the possible causes of these disorders. This review provides the first comprehensive classification of the clinical and genetic features of syndromes associated with callosal agenesis, and provides a genetic and developmental framework for the interpretation of future research that will guide the next advances in the field.
© The Author (2014). Published by Oxford University Press on behalf of the Guarantors of Brain. All rights reserved. For Permissions, please email: [email protected].
T1-weighted sagittal MRI scans showing the structure of the normal human corpus callosum in the full-term infant (A), 8-month-old (B), 2-year-old (C), 8-year-old (D) and adult (E). (A) At birth, the corpus callosum has assumed its general shape but is thinner throughout. The thickness of the corpus callosum (vertical dimension) increases generally throughout childhood and adolescence. Growth in the anterior sections is most pronounced within the first 10 years of life (compare C with D), and posterior growth predominates during adolescence (compare D with E). There is also marked interindividual variation in corpus callosum size and shape. (E) Normal adult corpus callosum, showing subdivisions established by . The corpus callosum is initially divided into genu, rostrum, body and splenium. The body can be further subdivided into the isthmus, and the anterior, middle and posterior segments. RB = rostral body; AMB = anterior midbody; PMB = posterior midbody; Is = isthmus.
Neuroanatomical features revealed by T1-weighted midsagittal and coronal MRI in patients with corpus callosum abnormalities. (A and D) Patient with complete ACC associated with dorsal expansion of the third ventricle (asterisk), absence of the cingulate gyrus and sulcus, and absence of the septum pellucidum. (B and E) Patient with partial ACC; the splenium is absent and the rostrum is not fully formed (arrows). In addition, the leaves of the septum pellucidum are unfused (E; arrowheads). (C and F) Patient with hypoplasia of the corpus callosum. All segments are present but are diffusely thinned; there is also markedly reduced cerebral white matter volume (F).
T1-weighted midsagittal MRI and diffusion tensor imaging tractography of two patients with partial ACC (pACC) and a normal corpus callosum control. (A, C and F) T1-weighted midsagittal MRI scans. (B, D and G) High-angular-resolution diffusion imaging. Arrows indicate callosal fragments present in partial patients with ACC. (E and H) Q-ball tractography of partial patients with ACC reveals callosal connections between homotopic and heterotopic cortical regions. Homotopic connections between anterior frontal lobes are conserved in both partial patients with ACC (blue streamlines in E and H; orange streamlines in H), but the degree of temporal and occipital connectivity varies. Both patients also show ‘sigmoid bundles’ (yellow streamlines in E and H), which connect the anterior frontal lobe with the contralateral parieto-occipital region. Images adapted from .
Processes underpinning midline patterning in the human foetal brain extrapolated from studies in mouse. Initial expression of the morphogen FGF8 at the midline is necessary for early forebrain patterning, and subsequent development of the commissural plate through which all forebrain commissures pass. The commissural plate can be divided molecularly into four distinct subdomains, each specified by midline patterning molecules that likely act downstream of FGF8. Each forebrain commissure correlates anatomically with a specific subdomain. The corpus callosum (CC) passes through a domain of EMX1 and NFIA expression; the hippocampal commissure (HC) passes through domains expressing NFIA, ZIC2 and SIX3, and the anterior commissure (AC) passes through a SIX3-expressing domain in the septum. Sagittal section at 13 weeks gestation adapted from .
Processes extrapolated from mouse studies necessary for specification of callosal neurons, correct guidance of axons across the midline, and target identification in the contralateral cortex. Midline zipper glia develop in the septum and may play a role in fusion of the midline, which is correlated with corpus callosum development. As axons reach the midline, they encounter and must correctly interpret multiple attractive and repulsive guidance cues expressed by the glial wedge and indusium griseum. The first axons to cross the midline arise from the cingulate cortex, and these pioneering neurons appear to be necessary for the subsequent crossing of the majority of callosal axons, arising from the neocortex (A). Callosal neurons originate from layers I, II/III, V and VI of the cortex. However, the layer that a neuron resides in is not sufficient for specification as a callosally projecting neuron, and callosal neuron identity seems to coincide with expression of the transcription factor SATB2. These neurons project an axon radially towards the intermediate zone, which must then decide to turn medially rather than laterally (B). Once axons reach the contralateral hemisphere, they must recognize their target area and synapse with target neurons, presumably through molecular-recognition and activity-dependent mechanisms (C). Exuberant axonal growth continues after birth and is accompanied by axonal pruning which continues throughout childhood and adolescence. SVZ = subventricular zone; VZ = ventricular zone.
Major mechanisms underlying neurogenesis in the telencephalon relevant to ACC in humans. Many molecules involved in neurogenesis have multiple functions, and genetic mutations can therefore result in complex neurodevelopmental disorders. Many midline patterning genes functionally interact with primary cilia, and mutations in these genes give rise to a group of overlapping syndromes termed ‘ciliopathies’, which can feature ACC. Genes in red are associated with a human syndrome; genes in blue have a mouse model with ACC but have not yet been associated with a human ACC syndrome, and genes in grey (ligands in black) have not been implicated in either human or mouse ACC.
Major mechanisms that potentially underlie guidance of callosal axons in humans. Guidance receptors are expressed on the growth cone of commissural axons, and when bound to their ligand/s, influence microtubule and actin dynamics through second messengers including RHOA, RAC1 and CDC42. Some guidance receptors, such as DCC, have multiple ligands, and the effects of receptor activation depend on the bound ligand. Whereas most ligands are secreted from midline glial populations into the surrounding extracellular matrix, ephrin ligands are membrane-bound and can initiate reverse signalling. The effects of ephrin receptors vary depending on the subtype of receptor activated, and ligands expressed. Genes in red are associated with a human syndrome; genes in blue have a mouse model with ACC but are not associated with a human ACC syndrome, and genes in grey (ligands in black) have not been implicated in human or mouse ACC. 1, based on overexpression studies, NGEF increases RHOA activity relative to RAC1 and CDC42.
Associated malformations commonly seen in patients with ACC. (A) T1-weighted axial MRI scan showing complete ACC associated with a third ventricle cyst (asterisk) and periventricular nodular heterotopia (arrowheads). (B) T2-weighted axial MRI scan showing ACC (asterisk) associated with polymicrogyria (PMG) (arrowheads) and copolcephaly (+). (C) T2-weighted axial MRI scan showing ACC with subcortical heterotopia (SCH) (arrowheads) and marked asymmetry of the cerebral hemispheres. Midsagittal (D) and axial (E) T1-weighted MRI scan of a patient with Aicardi syndrome revealing a constellation of neuroradiological features, including complete ACC (arrow), grey matter heterotopia (white arrowhead), cystic dilation of the left lateral ventricle (asterisk) and enlarged fourth ventricle (+). In addition, there is marked asymmetry of the cerebral hemispheres. | https://www.ncbi.nlm.nih.gov/pubmed/24477430?dopt=Abstract |
The block storage service (cinder) image caching feature, which is enabled by default as of Metacloud 4.1.5 (Liberty), significantly speeds up creation of volumes based on images. When you create a new volume based on an image, the service clones the volume and caches it. Each time you boot another volume from the given image, the service simply clones the cached volume.
Depending on the size, number, and purpose of volumes that you create, this capability greatly reduces boot times for volumes created from images.
Because volume image caching is enabled by default, you use it simply by creating a volume from an image and specifying a supported volume type, as in the following example:
$ openstack volume create <VOLUME_NAME> --image <IMAGE_ID> --type solidfire
Notes: Metacloud supports volume image caching with SolidFire and Pure Storage backends. Also, this feature is not available with Ceph. Booting a virtual machine (VM) from a Ceph root disk results in a full clone of the image, which makes caching unnecessary.
Locating the Cached Volume
If you are using Pure Storage, the cached volume is stored in the service tenant of your cloud. After creating a volume, you can see the cached volume as well as the one you just booted by running:
$ openstack volume list --all-projects
You can easily identify the volume that is being cached because its name begins with the word image-, followed by the ID the image used to create the volume. Note also, that the tenant ID of the cached volume is that of the service tenant.
Note: Do not remove cached volumes, or perform any other actions, in the service tenant.
If you are using a SolidFire solution, the cached volume is stored in the SolidFire cluster.
Cleanup of Old Cached Volumes on Pure Storage Backends
For Pure Storage backends, Metacloud enforces limits for number and total gigabytes (GB) of cached volumes. By default, the allowed maximum number of cached volumes per storage backend is 100. The maximum total size of cached volumes is 250 GB.
When either limit is reached, cached volumes are deleted, starting with the oldest, until the number or total size of cached volumes returns below the threshold.
If you notice that creating a particular volume takes longer than usual, it may not be created from a cached volume. If you are using a Pure Storage backend, this may be because a previously cached volume has been deleted.
Tip: To change the maximum number or total GB of cached volumes, submit a request to Metacloud Support. Use the P4 (Standard) priority level. | https://support.metacloud.com/hc/en-us/articles/115002213507-Using-Image-Caching-to-Create-Volumes |
Intel analyst: yes, there probably is a Trump ‘pee-pee’ video!
A few days ago – and very much under the radar – John Sipher, and authority on foreign policy and the intelligence profession – published a fresh and updated analysis of the “Steele Dossier” to the Just Security blog. The “dossier,” a compilation of summary reports produced between June and December 2016 by Orbis Business Intelligence for a GOP-connected client who sought opposition research on then-presidential candidate Donald J. Trump, rigorously freaked out the media and political sectors when it was published on the BuzzFeed web site.
Given the report’s prescience in the wake of continuing revelations about Trump, his inner circle, and Russian tampering in the 2016 US elections, Sipher draws several conclusions early on in his post:
Although the reports were produced episodically, almost erratically, over a five-month period, they present a coherent narrative of collusion between the Kremlin and the Trump campaign. As a result, they offer an overarching framework for what might have happened based on individuals on the Russian side who claimed to have insight into Moscow’s goals and operational tactics. Until we have another more credible narrative, we should do all we can to examine closely and confirm or dispute the reports.
Many of my former CIA colleagues have taken the Orbis reports seriously since they were first published. This is not because they are not fond of Trump (and many admittedly are not), but because they understand the potential plausibility of the reports’ overall narrative based on their experienced understanding of both Russian methods, and the nature of raw intelligence reporting. …
[O]ne of my closest former CIA colleagues told me that he recognized the reports as the obvious product of a former Secret Intelligence Service (SIS) officer, since the format, structure, and language mirrored what he had seen over a career of reading SIS reports provided to CIA in liaison channels. He and others withheld judgment about the veracity of the reports, but for the reasons I outline further below they did not reject them out of hand. In fact, they were more inclined for professional reasons to put them in the “trust but verify” category.
Sipher points out that the press, politicians, and the public have misunderstood the actual nature of the dossier’s information:
[T]he so-called Steele dossier is not a dossier at all. A dossier suggests a summary or case history. Mr. Steele’s product is not a report delivered with a bow at the end of an investigation. Instead, it is a series of contemporaneous raw reports that do not have the benefit of hindsight. Among the unnamed sources are “a senior Russian foreign ministry official,” “a former top-level intelligence officer still active inside the Kremlin,” and “a close associate of Republican U.S. presidential candidate Donald Trump.” Thus, the reports are not an attempt to connect the dots, but instead an effort to uncover new and potentially relevant dots in the first place.
A few key findings of the Steele’s report, according to Sipher, are:
- “Three sources in the Orbis report describe a multi-year effort by Russian authorities to cultivate, support and assist Donald Trump.”
- “Russian President Putin was supportive of the effort to cultivate Trump.”
- “The dossier of FSB-collected information on Hillary Clinton was managed by Kremlin chief spokesman Dimitry Peskov.” (Later in the article, Sipher writes, “Mr. Steele could not have known that the Russians stole information on Hillary Clinton, or that they were considering means to weaponize them in the U.S. election, all of which turned out to be stunningly accurate.”)
- “In one account, Putin and his aides expressed concern over kick-backs of cash to Manafort from former Ukrainian President Viktor Yanukovych, which they feared might be discoverable by U.S. authorities.” [NBC News, for one, made those fears come true.]
- “The Orbis report also refers specifically to the aim of the Russian influence campaign ‘to swing supporters of Bernie Sanders away from Hillary Clinton and across to Trump’ … John Mattes, a former Senate investigator who helped run the online campaign for Sanders, said he was struck by Steele’s report. Mattes said, Steele “was writing in real time about things I was seeing happening in August, but I couldn’t articulate until September.”
As for compromising visual media starring The Donald:
The report also alleged that the internal Russian intelligence service (FSB) had developed potentially compromising material on Trump, to include details of “perverted sexual acts” which were arranged and monitored by the FSB. Specifically, the compromising material, according to this entry in the report, included an occasion when Trump hired the presidential suite at a top Moscow hotel which had hosted President and Mrs. Obama, and employed prostitutes to defile the bed where the President had slept. Four separate sources also described “unorthodox” and embarrassing behavior by Trump over the years that the FSB believed could be used to blackmail the then presidential candidate.
…
[T]he salacious sexual allegations should not be dismissed out of hand. Efforts to monitor foreigners and develop compromising material is completely consistent with Russian M.O. I am certain that they have terabytes of film and audio from inside my apartment in Moscow. Putin himself is known to have been implicated in several sex stings to embarrass his rivals, to include the famous broadcast of a clandestinely-acquired sex video to shame then Prosecutor General Yuriy Skuratov.
Perhaps more intriguing, the most explosive charge in the Steele document was the claim that Trump hired prostitutes to defile a bed slept in by former President Obama. The important factor to consider is that Trump did not engage with the prostitutes himself, but instead allegedly sought to denigrate Obama. If there is anything consistent in what we have learned about President Trump, it seems that his policies are almost exclusively about overturning and eradicating anything related to President Obama’s tenure. In this sense, he is akin to the ancient Pharaohs, Byzantine and Roman Emperors like Caligula, who sought to obliterate the existence of their predecessors, even destroying and defacing their images. Is it inconceivable that he would get some satisfaction from a private shaming of the former President?
Separate Orbis reports also asserted that Trump himself engaged in unorthodox, perverted sexual behavior over the years that “has provided authorities with enough embarrassing and compromising material on the Republican presidential candidate to be able to blackmail him if they so wished.” While it is not worth serious exploration, the notion that Trump might be involved with beautiful young women as alleged in the reports doesn’t seem to be much of a stretch. His private life is well documented and litigated, such that it doesn’t seem wholly out-of-bounds to tie the reports about his activity in Russia with his history of undue interest in young women.
In other words, chances are Putin has a “pee-pee tape” of The Donald.
We’re going to admit that the above excerpts are admittedly a delicious – and quite telling – cherry on top of a far more rigorous look at Steele’s spot-on information concerning extensive connections and collusion between Trump’s circle and Russian agents.
The full report merits your attention. And yes, we’re not ashamed of using that alleged “pee-pee tape” to get you to take ten minutes of your time this weekend and go read the entire thing!Click here for reuse options! | https://www.newsbehavingbadly.com/2017/09/09/intel-analyst-yes-there-probably-is-a-trump-pee-pee-video/ |
2 edition of Reducing natural ponderosa pine fuels using prescribed fire found in the catalog.
Reducing natural ponderosa pine fuels using prescribed fire
Stephen S Sackett
Published
1980
by USDA Forest Service, Rocky Mountain Forest and Range Experiment Station in [Fort Collins, Colo.]
.
Written in English
Edition Notes
|Statement||Stephen S. Sackett|
|Series||Research note RM -- 392|
|Contributions||Rocky Mountain Forest and Range Experiment Station (Fort Collins, Colo.)|
|The Physical Object|
|Pagination||6 p. :|
|ID Numbers|
|Open Library||OL13604893M|
Consider two scenarios: One in which a prescribed fire is performed that consumes vegetative fuel before a wildfire occurs, and one in which a wildfire occurs by natural causes before a prescribed fire is performed. Using notation similar to Reed () and Englin, Boxall, and Hauer, let Y(X, T, B) be the value of one rotation (fire to fire).Cited by: Natural fire was the primary historical disturbance influencing structure of forests, but fire regimes have been disrupted since the late s. combined effects of suppression of fire, logging, and grazing by livestock and wildlife altered structure and composition of vegetation within much of the study area from what existed prior to European.
Progress 10/01/08 to 09/30/09 Outputs OUTPUTS: Activities: Developing resilient ponderosa pine forests using mechanical thinning and prescribed fire. Thinning and prescribed burning are common management practices for reducing fuel build-up in ponderosa pine forests. Reestablishing historical fire regimes is a high priority for North American coniferous forests, particularly ponderosa pine (Pinus ponderosa) forests are also used extensively for cattle (Bos spp.) ibed fires are being applied on or planned for millions of hectares of these forests to reduce fuel loads, alter forest structure, and maintain and enhance the Cited by:
Well, under moderate fire weather conditions, many of these natural ignitions can be put back to work thinning under-story vegetation, consuming fuel ladders, and reducing surface fuels. Ideally this is done some distance from the wild-land/urban interface because spatial controls are less certain than with prescribed burning, especially where. Enhance composition of aspen, whitebark pine, and ponderosa pine species and their habitats. Modify fire behavior to enhance community protection while creating conditions that may allow the reestablishment of fire as a natural process on the landscape. Utilize economic value of trees with economic removal. Proposed Action.
Love, marriage, family
The story of Readers Digest
The voyage of the dawn treader
New Perspectives on Advaita Vedanta: Essays in Commemoration of Professor Richard De Smet, S.J (Numen Book Series : Studies in the History of Religions, Volume 85)
winter in north China
They called him Pop
Symposium on the Cry of the People for Peace
deans register of Oriel, 1446-1661
Mammals
Sinusitis Bronchitis
Shine
Philologia Orientalis
Irish convict lives
Reducing natural ponderosa pine fuels using prescribed fire. [Fort Collins, Colo.]: USDA Forest Service, Rocky Mountain Forest and Range Experiment Station, (OCoLC) Reducing natural ponderosa pine fuels using prescribed fire: Two case studies (Research note RM) [Stephen S Sackett] on *FREE* shipping on qualifying : Stephen S Sackett.
Controlled fires could actually save forests and fight climate change In Western forests prone to wildfire, thinning and burning treatments can help reduce wildfire risks and trap carbon in new Author: Conor Gearin. Fire Effects and Fire Ecology: December In a Ponderosa Pine Forest, Prescribed Fires Reduce the Likelihood of Scorched Earth Fire Effects and Fire Ecology: December Forecast for the Southern Boreal Forest: An Increasing Incidence of Severe Disturbance Fuel Treatments: Effects of mastication have been compared with prescribed fire in chaparral (Potts and Stephens, ;Potts et al., ) and with fire and cutting in ponderosa pine (Pinus ponderosa P.
& C. Costs for Reducing Fuels in Colorado Forest Restoration Projects Dennis L. Lynch1 and Kurt Mackes1 Abstract—The costs to either mechanically remove or mechanically treat forest fuels are examined for various Colorado sites.
In the ponderosa pine and mixed conifer zones, no ideal treatment system exists yet for forest restoration through fuel. Reducing natural ponderosa pine fuels using prescribed fire: two case studies / ([Fort Collins, Colo.]: USDA Forest Service, Rocky Mountain Forest and Range Experiment Station, ), by Stephen S.
Sackett and Colo.) Rocky Mountain Forest and Range Experiment Station (Fort. Most of the studies that have analyzed the effects of silvicultural/fuel treatment practices on fire hazard at the stand level rely solely on changes in the structure of the fuel complex to infer. A controlled or prescribed burn, also known as hazard reduction burning, backfire, swailing, or a burn-off, is a fire set intentionally for purposes of forest management, farming, prairie restoration or greenhouse gas abatement.
A controlled burn may also refer to the intentional burning of slash and fuels through burn piles. Fire is a natural part of both forest and grassland ecology and.
crown fires except in the driest ponderosa pine (Pinus ponderosaDougl. ex Laws.) forests. Moreover, unless the surface fuels created by using these treatments are themselves treated, intense surface wildfire may result, likely negating positive effects of reducing crown fire potential. No single thinning approach can be applied toCited by: Prescribed fire is one of the most widely advocated management practices for reducing wildfire hazard and has a long and rich tradition rooted in indigenous and local ecological knowledge.
The scientific literature has repeatedly reported that prescribed fire is often the most effective means of achieving such goals by reducing fuels and wildfire hazard and restoring ecological function to Cited by: 7. Fuels treatments in ponderosa pine - Visits to the Boise National Forest and Boise Basin Exp.
Forest. Effectiveness of thinning and prescribed fire in reducing wildfire severity. Philip N. Omi, Erik J. Martinson Book or Chapter or Journal Article.
Anne E. Black, P. Hayes, R. Strickland. prescribed fires on as many acres each year as necessary. These challenges include weather, air quality and smoke management, timing restrictions, wildfire activity, resource availability.
Reducing hazardous fuels through prescribed fire and other tools is one of the key components of the National Fire Plan. Wildfires and outbreaks of native bark beetles (Coleoptera: Curculionidae, Scolytinae), such as the mountain pine beetle (MPB), Dendroctonus ponderosae Hopkins, are recognized as two primary disturbances in conifer forests of western North America.
Wildfires have sculpted these forests for millennia, reducing the quantity and continuity of fuels, discouraging establishment of fire-intolerant Cited by: driven tree thinning, shrub mowing, and prescribed fire. • Protect both the forest and nearby homes by restoring forest conditions more likely to support low intensity, stand-maintaining fire behavior characteristic of the ponderosa pine forest type.
• Improve the health of remnant old growth pine trees by removing the small, young. A prescribed fire is the planned use of low-intensity fire to achieve very different goals given certain weather, fuel and topographic conditions (Fernandes et al., ).It is seen as a primary, integrated vegetation management option to mitigate wildfire activity and, thereby, of reducing wildfire carbon emissions (Bennet et al., ).Today, one of the primary objectives of prescribed fires Cited by: In low-elevation ponderosa pine (Pinus ponderosa) and dry Douglas fir (Pseudotsuga menziesii) forests, average fire intervals have historically ranged from 5 to 20 years, and low to medium intensity fires were common (ArnoSmith and Fisher ).
An important consequence of wildland fire is the production of ash, defined as a continuum of mineral to charred organic residues formed by the burning of wildland fuels.
Ash may impact soil health depending on its elemental composition and other factors, which are influenced by fuel quantity and quality, and by combustion completeness. To investigate how ash properties relate to Cited by: 1.
The Trigo fire burned ha of the Manzano Mountains in central New Mexico in The fire burned with mixed severity through ponderosa pine (Pinus ponderosa) stands on the Cibola National Forest and private burned area exhibited a range of stand densities enabling this research to quantify the relationship between variation in tree density and burn severity using the Composite Cited by: 7.
Several conservation partnerships have been established to restore fire-dependent ecosystems such as grasslands, longleaf pine, and ponderosa pine forests by implementing wildland fire use activities such as prescribed burning and letting wildfires burn (for example, McDonaldRomme et Cited by:.
Exclusion of natural surface fires in warm/dry mixed-conifer forests of the western U.S. has increased potential for stand-replacing crown fires and reduced resilience of these systems to other disturbances, such as drought and insect attack.
Tree thinning and the application of prescribed fire are commonly used to restore more resilient ecological conditions, but currently, there is a lack of.The effects of prescribed burning on dwarf mistletoe in ponderosa pine.
In Proceedings of the Sixth Conference on Fire and Forest Meteorology, Seattle, Wash., 22–24 April Society of American Foresters, Washington, D.C. pp. –Cited by: A cross-section of a Ponderosa pine, showing 20 fire scars since in the open-pine forests of Western Montana.
Fire ecology helps us understand forest ecosystems and thus recognize fire as an intrinsic and necessary force of nature. | https://danebyvasomimak.pacificwomensnetwork.com/reducing-natural-ponderosa-pine-fuels-using-prescribed-fire-book-7236eb.php |
The mission of Centessa Pharmaceuticals plc (Nasdaq: CNTA) is to deliver consequential new medicines to patients. The Centessa family includes ten wholly owned, highly specialized companies, with drug discovery and development programs in diverse therapeutic areas. The company’s organizational structure and approach combine the agility and sense of urgency typical of start-up companies with the scale and diversification typical of larger R&D organizations.
SUMMARY
LockBody is seeking a part time Executive Assistant to join our dedicated, passionate team of professionals to support Senior Management and serve as a bridge for communications across various departments.
The part time Executive Assistant will create and maintain an effective working environment to enable our team members to achieve their short- and long-term goals. The right candidate must have superior organization skills, communicate effectively, and consistently demonstrate leadership to maintain credibility and support with our senior management staff. The role is currently a remote opportunity which may transition to onsite at a future date.
RESPONSIBILITIES
- Coordinate extensive international business travel including flights, overnight accommodations, and ground transportation.
- Prepare expense reports in a timely manner ensuring accuracy and adherence to Centessa’s policies.
- Effectively manage calendars, including coordination of complex and shifting schedules within several time zones.
- Schedule and coordinate complex meetings, inform attendees of dates and time, reserve meeting space, and ensure the appropriate equipment and materials are available.
- Respond to internal and external requests for information and/or Senior Manager's time in a professional and timely manner.
- Research, prioritize, and follow up on incoming issues and concerns, including those of a sensitive or confidential nature.
- Responsible for logistical planning of onsite and offsite meetings (conferences, speaking engagements, collaborative activities, etc.).
- Work closely and effectively with Senior Management keeping them well informed of upcoming commitments, and responsibilities. Brief and prepare them for meetings, as appropriate. Coordinate with staff to gather and assemble research, reports, and presentation materials.
- Prioritize conflicting needs and handle matters expeditiously and proactively, by taking appropriate initiative and follow through on projects to successful completion often with deadline pressure.
- Develop relationships and collaborate with professionals across the organization to achieve of the outcomes listed above.
- Able to handle confidential information with discretion.
REQUIREMENTS
- 3+ years as an Executive Assistant working with Senior Management
- Expert written and verbal communication skills including high level competency in the Microsoft Office product suite (Outlook, Word, Excel, PowerPoint), capable use of technology including mobile, laptop, and text.
- Ability to work across several time zones required
- Strong organizational skills that reflect ability to perform and prioritize multiple tasks seamlessly with excellent attention to context, substance, and detail. Ability to adapt to various competing demands.
- Demonstrated ability to achieve high performance goals and meet deadlines in a fast-paced environment without constant direction or simultaneous feedback.
POSITION: Part time, Non-exempt
EEOC Statement: Centessa Pharmaceuticals believes in a diverse environment and is committed to equal employment opportunity for all its employees and qualified applicants. We do not discriminate in recruitment, hiring, training, promotion, or any other employment practices for reasons of race, color, religion, gender, national origin, age, sexual orientation, marital or veteran status, disability, or any other legally protected status. Centessa Pharmaceuticals will make reasonable accommodations for qualified individuals with known disabilities, in accordance with applicable law.
NO THIRD PARTY RESUMES WILL BE ACCEPTED AT THIS TIME. | https://centessa.com/career-details/?id=4698707004 |
BACKGROUND OF THE INVENTION
BRIEF SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
This disclosure relates generally to cannulae and associated methods. More specifically, this disclosure discusses a cannula that comprises a cannula feature having a distal end and a proximal end, wherein at least a portion of a notch feature is defined in the cannula between the distal end and the proximal end. The cannula with the overlapping notch feature and cannula feature can be used in a variety of vascular access devices.
Generally, vascular access devices are used for communicating fluid with the vascular system of patients. For example, catheters are used for infusing fluid (e.g., saline solution, medicaments, and/or total parenteral nutrition) into a patient, withdrawing fluids (e.g., blood) from a patient, and/or monitoring various parameters of the patient's vascular system.
Intravenous (IV) catheter assemblies are among the various types of vascular access devices. Over-the-needle peripheral IV catheters are a common IV catheter configuration. As its name implies, an over-the-needle catheter is mounted over an introducer needle having a sharp distal tip. The introducer needle is generally a venipuncture needle coupled to a needle assembly that helps guide the needle and facilitates its cooperation with the catheter. At least the inner surface of the distal portion of the catheter tightly engages the outer surface of the needle to prevent peelback of the catheter and, thereby, to facilitate insertion of the catheter into the blood vessel. The catheter and the introducer needle are often assembled so that the sharp distal tip of the introducer needle extends beyond the distal tip of the catheter. Moreover, the catheter and needle are often assembled so that during insertion, the bevel of the needle faces up, away from the patient's skin. The catheter and introducer needle are generally inserted at a shallow angle through the patient's skin into a blood vessel.
In order to verify proper placement of the needle and/or the catheter in the blood vessel, the operator generally confirms that there is a “flashback” of blood into a flashback chamber associated with the needle assembly. Flashback generally entails the appearance of a small amount of blood, which exits the needle through an aperture and which is visible within the needle assembly or between the needle and the transparent catheter.
The operator may then withdraw the introducer needle from the catheter. In some cases, the introducer needle is withdrawn into a needle tip shield that extends over the needle tip and prevents accidental needle sticks. In general, a needle tip shield includes a casing, a sleeve, or another similar device that is designed to trap/capture the tip of the needle when the introducer needle is withdrawn from the catheter and the patient into the shielded position. After the needle is withdrawn, the catheter is left in place to provide intravenous access to the patient.
The separation of the introducer needle assembly from the catheter portions of the catheter assembly presents numerous potential hazards to the operator of the catheter device and others in the area. As indicated above, there is a risk of accidental needle sticks if the needle tip is not properly secured in a needle tip shield. Additionally, because the needle has been in contact with blood in the patient's vasculature, blood is often present on the needle's exterior as well as inside the lumen of the needle. As the needle is withdrawn from the catheter, there is a risk that this blood will drip from the needle tip or come into contact with other surfaces to expose people and equipment to blood. Additionally, where the needle comprises an aperture for flashback confirmation, this risk of blood exposure is often increased. For instance, because the aperture is adapted to allow blood to exit the lumen through the needle's sidewall, the aperture may also bypass or circumvent blood containment seals in the catheter assembly.
The present disclosure discusses a cannula with a cannula feature and an overlapping notch feature that allows flashback confirmation. The described cannula is configured to be moved and locked into a shielded position in a manner that significantly limits or prevents blood exposure and accidental sticks during use and after the cannula is withdrawn from the catheter assembly.
The present application relates to a cannula that is designed to overcome some of the limitations known in the art. In general, the cannula comprises a cannula feature that is at least partially overlapped by a notch feature. Because the notch feature at least partially extends into the cannula feature, both features can be disposed adjacent to the cannula's distal tip. Accordingly, a blood control seal that is configured to cover the cannula's distal tip and the notch feature can be relatively short. Similarly, a tip shielding device that is configured to capture the cannula's tip and cannula feature may be relatively short. Because the blood control seal and tip shielding device may be relatively short, they may fit within the bore of a catheter adapter until they are extracted for disposal.
The described cannula may have any suitable characteristic, including having a sharp, or relatively sharp, distal tip and an elongated tubular shaft that has a substantially constant outer diameter (“OD”). Additionally, the described cannula can be selected from a variety of cannula types, such as a venipuncture needle or another medical-grade, rigid tube having a sharpened distal tip. In some preferred implementations, the cannula comprises an introducer needle.
The cannula feature may comprise any type of cannula feature that has at least one surface that extends laterally past the cannula's OD. For instance, the cannula feature may comprise a crimp feature or a ferrule feature. In some presently preferred implementations, however, the cannula feature comprises a crimp feature. Such a crimp feature may be formed in any suitable manner, including by slightly crushing the cannula in a first axis and causing the cannula to bulge slightly in a second axis that runs orthogonally to the first axis. No matter the type of cannula feature used or the manner in which it is made, the cannula feature may also have any suitable characteristic. For instance, the cannula feature may comprise a distal end and a proximal end.
As mentioned, the cannula also comprises a notch feature that at least partially overlaps the cannula feature. The notch feature can comprise any suitable characteristic, including, size and shape. Furthermore, the notch feature can be defined in the cannula in any suitable manner, including through grinding, punching, stamping, electrical discharge machining, and laser cutting. However, because the cannula feature needs to remain strong in order to be used with a tip shielding device, methods, such as electrical discharge machining (“EDM”) and laser cutting, that remove a relatively small amount of the cannula's cross-sectional area may be preferred to methods, such as grinding, which can remove relatively large amounts of the cannula's cross-sectional sidewall area. Indeed, it may be preferable to remove as little of the cross-section area of the cannula's sidewall as is necessary to allow for flashback confirmation. In some instances the notch feature removes than about one half of the cross-sectional area of the cross-sectional area of the cannula's sidewall. In other instances, the notch feature removes less than about one fourth of the cannula's sidewall cross-sectional area.
As long as at least a portion of the notch feature is disposed between the cannula feature's distal and proximal ends, the notch feature can overlap virtually any portion of the cannula feature. In one example, the entire notch feature is disposed between the cannula feature's distal end and its proximal end. In another example, the notch feature extends across the cannula feature's distal end so that a first portion of the notch feature is disposed between the cannula feature's distal and proximal end and a second portion of the notch feature is disposed distal to the cannula feature's distal end. In still another example, the notch feature extends across the cannula feature's proximal end so that a first portion of the notch feature is disposed between the cannula feature's distal and proximal end and a second portion of the notch is disposed proximal to the cannula feature's proximal end. In yet another example, a first portion of the notch feature lies distal to the cannula feature's distal end and the notch feature extends across the cannula feature's distal and proximal ends so that a second portion of the notch feature lies proximal to the cannula feature's proximal end.
With respect to the cannula's bevel, the notch feature may have a variety of suitable orientations. For example, the notch feature may be defined in the cannula and/or the cannula feature so as to face in a direction that is substantially similar to, opposite to, perpendicular to, or otherwise offset from the direction in which the bevel of the cannula faces.
The described cannula may be used with any suitable system or device. In one example, the cannula may be used with any suitable catheter assembly, including an over-the-needle peripheral IV catheter assembly. In this example, the catheter assembly may further comprise a cannula capture mechanism. Such a capture mechanism may comprise any component that allows the cannula to become irreversibly trapped when the cannula is moved to the shielded position. For instance, the capture mechanism may comprise a proximal mating component and a distal mating component that respectively limit the cannula's proximal and distal movement respective to the capture mechanism when the cannula is in the shielded position.
In one example of a suitable proximal mating component, the capture mechanism comprises an aperture that is sized and shaped to allow the cannula, but not the laterally extending surface of the cannula feature, to translate proximally therethrough. Similarly, in an example of a suitable distal mating component, the capture mechanism comprises a needle tip capture mechanism, such as transverse barrier tips that are biased towards the cannula so as to limit the cannula's distal movement once the cannula has been retracted to the shielded position.
The presently preferred embodiments of the described invention will be best understood by reference to the Figures, wherein like parts are designated by like numerals throughout. It will be readily understood that the components of the present invention, as generally described and illustrated in the accompanying Figures, could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of some embodiments of the invention, as represented in the Figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of some presently preferred embodiments of the invention.
FIG. 1
10
30
50
Generally, this disclosure discusses a cannula having an overlapping cannula feature and notch feature. While the described cannula can comprise any suitable component or characteristic, illustrates a representative embodiment in which the cannula (e.g., needle ) comprises a cannula feature (e.g., crimp feature ) and a notch feature that overlaps, or extends into, the cannula feature. To provide a better understanding of the cannula with overlapping notch and cannula features, the cannula, cannula feature, and notch feature are described below in greater detail.
The cannula may comprise virtually any rigid tube that both includes a sharpened distal tip and which is configured to puncture an animal's body, to access an intended space, and to draw off or to introduce fluid from or into the intended space. One example of a suitable cannula comprises a venipuncture needle. In this example, the venipuncture needle may include virtually any suitable venipuncture needle, including an introducer needle for use in an IV catheter assembly (e.g., an over-the-needle peripheral IV catheter assembly), a venous needle, an arterial needle, and the like. For simplicity, however, the cannula with a cannula feature and overlapping notch feature is described below with reference to an introducer needle.
FIG. 1
10
12
14
16
18
The introducer needle may have any component that is suitable for use with an IV catheter assembly. For instance, shows a representative embodiment in which the introducer needle comprises a sharpened distal tip , an inner lumen , and an elongated tubular shaft having a substantially constant outer diameter (“OD”) . Moreover, each component of the needle may have any suitable characteristic. For example, the distal tip of the needle may comprise a standard bevel, a short bevel, a true short bevel, a bias grind point, a vet point, a lancet point, a deflected point (anti-coring), or another suitable known or novel needle point. Additionally, the lumen and elongated tubular shaft may be any suitable size. For example, the needle may be any suitable length or any suitable gauge (e.g., from about a 7 to about a 33 on the Stubs scale) that allows it to be used as the introducer needle in an IV assembly.
As previously mentioned, cannula further comprises a cannula feature. The cannula feature may serve any suitable purpose. For example, the cannula feature can provide the cannula with a proximal engagement, or a surface that is configured to be captured by a cannula feature capture mechanism (described hereinafter). Accordingly, the cannula feature can help limit the cannula's proximal movement once the cannula is retracted into a shielding device.
FIG. 1
FIG. 2A
FIG. 2B
FIGS. 2C and 2D
30
32
34
36
The cannula feature may comprise any suitable component that has at least one surface that extends laterally past the needle's OD and which is adapted to act as a proximal engagement. Some examples of suitable cannula features comprise one or more crimp features, ferrule features, protuberances, one-way barbs, laterally extending members (e.g., a ring), and other components that have a laterally extending surface. By way of non-limiting illustration, shows an embodiment in which the cannula feature comprises a crimp feature . Similarly, shows a representative embodiment in which the cannula feature comprises a welded ferrule feature . illustrates a representative embodiment in which the cannula feature comprises at least one one-way barb . Finally, illustrate some embodiments in which the cannula feature comprises a protuberance .
FIGS. 1 through 2D
FIGS. 1 through 2D
FIGS. 1 through 2D
30
32
34
36
38
40
38
30
32
34
36
18
40
30
32
34
36
18
The cannula feature may comprise any suitable component or characteristic that allows it to be used with a catheter assembly and to at least prevent the cannula from being completely extracted proximally through a capture mechanism. By way of example, shown the cannula feature (e.g., features , , , and ) comprises a distal end and a proximal end . Specifically, show that the distal end of the cannula feature (i.e., , , , and ) is the point at which the distal-most portion of the cannula feature extends laterally from the needle's OD . Likewise, show that the proximal end of the cannula feature (i.e., , , , and ) is the point at which the proximal-most portion of the cannula feature extends laterally from the needle's OD .
As mentioned above, the needle also defines a notch feature that at least partially overlaps the cannula feature. In other words, at least a portion of the notch feature is disposed between the cannula feature's distal end and its proximal end. This notch feature may serve several purposes, including acting as an aperture through which blood can exit the inner lumen of the needle to provide flashback confirmation when the needle is properly placed in a patient's vasculature.
FIG. 2D
50
The notch feature can have any suitable characteristic that allows it to provide the needle with flashback confirmation. In one example, from a face view of the notch feature, the notch feature can be any suitable shape, including a shape that is substantially elliptical, square, rectangular, triangular, circular, polygonyl, irregular, etc. For instance, illustrates an embodiment in which the notch feature is substantially elliptical.
FIGS. 3B through 3D
FIG. 3A
FIG. 3B
FIG. 3C
FIG. 3D
10
3
3
50
52
20
10
50
52
20
50
52
20
In another example of a suitable characteristic, the notch feature may remove any amount of a cross-sectional area of the needle's sidewall that allows the notch feature to provide the needle with flashback confirmation while still allowing the cannula feature to have sufficient structural integrity to fulfill its intended purposes. By way of illustration, show cross-sectional views of various embodiments of the needle in , cut along line -. Specifically, shows that, in some embodiments, the notch feature removes about one half of the cross-sectional area of the sidewall of the needle . However, shows that, in some presently preferred embodiments, the notch feature removes less than about one half of the cross-sectional area of the needle's sidewall . illustrates that, in still other preferred embodiments, the notch feature removes less than about one fourth of the cross-sectional area of the needle's sidewall .
FIG. 4A
FIG. 4A
50
38
40
41
38
43
50
40
The notch feature may overlap the cannula feature in any suitable manner that allows at least a portion of the notch feature to be disposed between the cannula feature's distal end and proximal end. In some embodiments, a distal-most edge of the notch feature is disposed at or proximal to the distal end of the cannula feature. By way of illustration, shows a representative embodiment in which the entire notch feature is disposed between the cannula feature's distal end and proximal end . More specifically, in , the notch feature's distal-most edge is disposed proximal to the cannula feature's distal end and the proximal-most edge of the notch feature is disposed distal to the cannula feature's proximal end .
FIG. 4B
FIG. 4C
FIG. 4D
41
50
38
43
38
41
50
40
43
40
41
50
38
43
40
30
In other embodiments, only a portion of the notch feature is disposed between the distal end and the proximal end of the cannula feature. In one example, shows an embodiment in which the distal-most edge of the notch feature is disposed distal to the cannula feature's distal end while the notch feature's proximal-most edge is disposed proximal to the cannula feature's distal end . In another example, shows an embodiment in which the proximal-most edge of the notch feature is disposed distal to the cannula feature's proximal end while the notch feature's proximal-most edge is disposed proximally past the cannula feature's proximal end . In a final example, shows an embodiment in which the distal-most edge of the notch feature is disposed distal to the cannula feature's distal end while the notch feature's proximal-most edge is disposed proximally past the proximal end of the cannula feature (e.g., crimp feature ).
The notch feature may also have any orientation with respect to the needle's bevel that allows the notch feature to fulfill its intended purposes. In some embodiments, the notch feature is defined in the cannula so as to be offset in orientation from the direction in which the needle's bevel faces. In some instances in which the notch feature is defined in the needle so as to be offset from the direction of the bevel, the notch feature may allow for faster flashback confirmation in instances in which the user's line of sight includes the side of the needle in which the notch is defined but does not include the side of the needle from which the bevel faces.
FIG. 4D
FIG. 4D
50
22
22
50
10
Where the notch feature is offset from the direction of the needle's bevel, the notch feature can be offset in any suitable manner. For instance, the notch feature can be defined in the needle so as to face in an opposite direction to, a perpendicular direction to, or in another suitable direction with respect to the direction in which needle's bevel faces. By way of example, shows an embodiment in which the notch feature faces in a direction that is offset from the needle's bevel so that the notch feature is oriented substantially perpendicular to the direction in which the needle's bevel faces. In other words, the notch feature in is disposed substantially perpendicular to a plane (not shown) that symmetrically bisects the needle along its length.
FIG. 5
FIG. 5
50
22
10
50
In other embodiments, the notch feature is defined in the cannula so as to face in substantially the same direction as the needle's bevel. By way of illustration, illustrates a representative embodiment in which the notch feature faces in substantially the same direction as the needle's bevel . Said differently, the notch feature in is oriented so that a plane (not shown) that symmetrically bisects the length of the needle also symmetrically bisects the notch feature . Because, in some instances, flashback confirmation may be visualized slightly sooner where the needle's bevel and the notch feature face in substantially similar directions, such an embodiment may be preferred in some circumstances.
FIG. 5
50
40
30
24
22
70
72
26
also illustrates that the notch feature and the proximal end of the cannula feature (crimp feature ) may be disposed any distance (x) from the proximal-most end of the needle's bevel that allows the needle to be used as intended and that allows the distal tip of a catheter to form a tight seal around the needle's outer surface . In some preferred embodiments, however, the notch feature and the proximal end of the cannula feature are disposed as close as possible to the proximal-most end of the bevel. Indeed, as the notch feature and the proximal end of the cannula feature are disposed closer to the needle's distal tip, the necessary length of the tip shielding device and blood control seal, as are known in the art, may be shorter and still fulfill their intended purposes.
In addition to the previously mentioned embodiments, the described needle having a cannula feature with an overlapping notch feature may be varied in any suitable manner. In one example, the needle comprises more than one notch feature. In this example, the needle can comprise any suitable number of notch features, including 2, 3, or more. Furthermore, in this example, the additional notch features may, but do not necessarily, overlap the cannula feature.
FIG. 6A
FIG. 6B
10
12
30
The described needle may be made in any suitable manner. In one example, the cannula feature is formed before the notch feature. By way of illustration, shows that this method may begin by providing a needle with a sharpened distal tip . shows that method continues by forming a cannula feature, such as the crimp feature , in any suitable manner. For instance, the crimp feature may be formed by upsetting the needle or slightly crushing the needle in a first axis to cause the needle to bulge slightly in a second axis that runs orthogonal to the first axis.
FIG. 6C
50
Following the formation of the cannula feature, shows that the notch feature is formed. While the notch feature may be formed in any suitable manner, including, but not limited to, grinding, stamping, punching, EDM, and/or laser cutting, the notch feature is preferably formed through a method that removes as little of the needle's cross-sectional area as possible while still allowing suitable flashback confirmation. Indeed, because grinding and some other techniques may weaken the cannula feature by removing about one half of the needle's cross-sectional area, EDM and/or laser cutting are preferable in certain circumstances.
FIG. 7A
FIG. 7B
FIG. 7C
10
12
50
10
30
50
38
40
In another example of a suitable method for forming the described needle, the notch feature is formed before the cannula feature. For instance, shows that such a method begins by providing a needle with a sharpened distal tip . shows the method continues by forming the notch feature in the needle . Finally, shows the crimp feature is formed so that at least a portion of the notch feature is disposed between the cannula feature's distal end and proximal end .
The described needle can be used with any suitable device or assembly. In one previously mentioned example, the needle is used with a catheter assembly. In this example, the catheter assembly may comprise any suitable component, including a needle capture mechanism that is capable of trapping the needle in the shielded position and limiting the needle's distal and proximal movement respective to the capture mechanism. Although a suitable capture mechanism may comprise any suitable component, in some embodiments, the needle capture mechanism comprises a distal mating component and a proximal mating component.
FIG. 8A
FIG. 8B
90
28
10
12
10
90
90
12
In such embodiments, the distal mating component may be any structure that is adapted to contact the needle and limit the needle's distal movement once the needle has been moved to a shielded position. For instance, the distal mating component may comprise any suitable needle tip capture device or cannula feature capture device that is configured to limit the needle's distal movement after the needle is retracted to the shielded position. By way of illustration, shows a representative embodiment in which the distal mating component comprises one or more transverse tip barriers (e.g., portions of a split housing) that are biased towards the longitudinal axis of the needle . Accordingly, illustrates that when the distal tip of the needle is retracted proximally past the transverse tip barriers , the tip barriers move into a position that blocks the distal movement of the needle's distal tip . In this manner, the tip barriers irreversibly lock the needle in the shielded position and prevent the needle from reemerging and causing unintentional sticking.
42
30
18
92
10
42
30
18
94
92
FIG. 8A
FIG. 8A
FIG. 8B
FIG. 8A
The proximal mating component of the capture mechanism may comprise any component that is adapted to contact the needle feature's proximal engagement (e.g., the proximal surface of the needle feature in that extends laterally past the needle's OD ) and limit the feature's proximal movement once the needle has been moved to a shielded position. For instance, the proximal mating component may be any suitable component that has an opening sized to allow the needle, but not the laterally extending surface(s) of the needle feature, to pass therethrough. By way of illustration, illustrates a representative embodiment in which the proximal mating component comprises a rigid washer . illustrates that when the needle is moved from the unshielded position (shown in ) to the shielded position, the proximal surfaces of the needle feature that extend laterally past the needle's OD are too large to pass through the inner diameter of the washer .
90
92
Thus, once the needle has been moved in between the capture mechanism's distal and proximal mating components (e.g., transverse tip barriers and washer , respectively), the sharp distal tip of the needle becomes irreversibly trapped. As a result, the needle is locked in the shielded position for proper disposal.
In addition to the aforementioned benefits, the described needle may offer several additional benefits and advantages. For instance, the described needle may be used with a shorter tip shielding device than may certain conventional needles of a comparable size in which a notch feature and cannula feature are non-overlapping. As previously stated, because the cannula feature and the notch feature in the described needle at least partially overlap each other, the distance between the needle's distal tip and the proximal end of the cannula feature may be shorter than in certain conventional needle's. Accordingly, because a tip shielding device with transverse tip barriers must be at least as long as the distance from the cannula's distal tip to the proximal side of the cannula feature, the tip shielding device for the described needle can be shorter than comparable tip shielding devices for use with some conventional needles in which the notch feature and the crimp feature are non-overlapping.
FIGS. 9A
FIG. 9A
FIG. 9A
100
110
120
120
130
100
112
110
132
By way of illustration, illustrates an example of a conventional needle in which the notch feature is disposed sufficiently distal to the cannula feature so as to not overlap the cannula feature . In this example, illustrates that the tip shield device must be relatively long, as illustrated by the cross-hatched section . Additionally, shows that in the prior art needle , the blood control seal, which need only extend to the proximal end of the notch feature , may be relatively short, as is illustrated by the hatched section .
FIG. 9B
FIG. 9B
FIG. 9B
200
210
220
220
210
200
202
220
220
202
130
220
212
210
200
132
In contrast, illustrates a hypothetical needle in which the notch feature is disposed proximal to the cannula feature so as to not overlap with the cannula feature . Accordingly, shows that because the notch feature in the needle is not disposed between the needle's distal tip and the cannula feature , the cannula feature may be disposed relatively close to the distal tip and, thereby, allow the tip shield device to be relatively short, as is illustrated by the cross-hatched portion . However, shows that in order to extend past the cannula feature to the proximal end of the notch feature , the blood control seal for such a needle must be relatively long, as is illustrated by the hatched section .
FIG. 9C
FIG. 9C
FIG. 9C
10
30
50
30
50
12
130
132
Finally, illustrates a representative embodiment of the described needle . In so doing, shows that because the notch feature and the cannula feature overlap each other, both features and may be disposed relatively close the cannula's distal tip . As a result, shows that both the tip shield device and the blood control seal may both be relatively short, as illustrated by the cross-hatched section and the hatched section , respectively. Because both the blood control seal and the tip shield device of the described needle can be relatively short, the blood control seal and the tip shield device may both be disposed within the bore of a catheter adapter (not shown) when the needle is in the unshielded position.
The present invention may be embodied in other specific forms without departing from its structures, methods, or other essential characteristics as broadly described herein and claimed hereinafter. All of the described embodiments and examples are to be considered in any and all respects as illustrative only, and not restrictive. The scope of the invention is, therefore, indicated by the appended claims, rather than by the foregoing description. All changes that come within the meaning and range of equivalency of the claims are to be embraced within their scope.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
In order that the manner in which the above-recited and other features and advantages of the invention are obtained and will be readily understood, a more particular description of the invention briefly described above will be rendered by reference to specific embodiments thereof, which are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not, therefore, to be considered to be limiting of its scope, the invention will be described and explained with additional specificity and detail through the use of the accompanying drawings in which:
FIG. 1
illustrates a perspective view of a representative embodiment of a cannula comprising a crimp feature with an overlapping notch feature;
FIG. 2A
illustrates a plan view of a representative embodiment of the cannula comprising a ferrule feature having an overlapping notch feature;
FIG. 2B
illustrates a plan view of a representative embodiment of the cannula comprising one-way barbs that overlap the notch feature;
FIGS. 2C and 2D
each illustrate plan views of a representative embodiment of the cannula comprising a protuberance and an overlapping notch feature;
FIG. 3A
illustrates a perspective view of a representative embodiment of the cannula comprising a crimp feature and overlapping notch feature;
FIGS. 3B through 3D
FIG. 3A
3
3
illustrate cross-sectional face views of some embodiments of the cannula in taken at line -;
FIG. 4A
illustrates a plan view of a representative embodiment of the cannula in which the entire notch feature is disposed between a distal end and a proximal end of the crimp feature;
FIG. 4B
illustrates a plan view of a representative embodiment of the cannula in which the notch feature extends across the distal end of the crimp feature;
FIG. 4C
illustrates a plan view of a representative embodiment of the cannula in which the notch feature extends across the proximal end of the crimp feature;
FIG. 4D
illustrates a plan view of a representative embodiment of the cannula in which the notch feature extends across both the distal end and the proximal end of the crimp feature;
FIG. 5
illustrates a cross sectional of a representative embodiment of the cannula in which the cannula's bevel and the notch feature have a similar orientation;
FIGS. 6A through 6C
illustrate a representative embodiment of a method for making the cannula in which the crimp feature is formed before the notch feature;
FIGS. 7A through 7C
illustrate a representative embodiment of a method for making the cannula in which the notch feature is formed before the crimp feature;
FIG. 8A
illustrates a plan view of a representative embodiment in which the cannula is disposed in an unshielded position;
FIG. 8B
illustrates a plan view of a representative embodiment in which the cannula is disposed in a shielded position;
FIG. 9A
illustrates a plan view of a representative embodiment of a prior art cannula in which the notch feature is disposed distal to the crimp feature;
FIG. 9B
illustrates a plan view of a representative embodiment of a hypothetical cannula in which the notch feature is disposed proximal to the crimp feature; and
FIG. 9C
illustrates a plan view of a representative embodiment of the described cannula in which the entire notch feature is disposed between the distal end and the proximal end of the crimp feature. | |
Respond to two classmates’ primary posts by selecting one of the subsections of Code 1.0 they chose to explain and provide a scenario, based upon that subsection, that demonstrates a violation of that specific code, and explain the potential harm that violation may cause. Select a different subsection to cover in each response.
Peer 1:
Subsection 1.02: With this subsection a behavioral analysist should only provide services, teach, and conduct research based off the boundaries of their competence (Bailey, 2016). A behavioral analyst can also only provide services, conduct research or teach in new areas of competence once they have gone through appropriate supervision or training for that area (Bailey, 2016). This subsection impacts the profession of ABA since it can affect how our clients are treated. If a behavioral analyst treats a client beyond what they are competent in, then it can potentially hurt the client’s progress and could affect others as well.
Subsection 1.04: This subsection talks about integrity of a behavioral analyst. This code states that a behavioral analyst is expected to always be honest and truthful with others (Bailey, 2016). Also, with this subsection it outlines the that a behavioral analyst should always follow through on professional commitments and also make sure to not implement a contingency that causes others to engage in illegal or unethical behaviors (Bailey, 2016). This subsection could potentially affect the profession and research of applied behavioral analysis since it could cause doubt of the integrity of the research or even of the profession as a whole, if behavioral analysist are not open and honest with each other and with the clients and their family.
Subsection 1.06: With this subsection, it talks about conflicts of interest and multiple relationships. A behavioral analyst will be careful to avoid multiple relationships with a client (Bailey, 2016). A multiple relationship can occur when the behavioral analyst has a professional relationship with a person and another type of relationship with the client. (Bailey, 2016) With having multiple relationships with clients, it could cause the objectivity of the behavioral analyst to be impaired due to the multiple relationships (Bailey, 2016).
Reference:
Bailey, J., Burch, M. (20160322). Ethics for Behavior Analysts, 3rd Edition [VitalSource Bookshelf version]. Retrieved from vbk://9781317363439
Peer 2:
Code 1.02- Boundaries of Competence: Behavior analyst are expected to provide services and conduct research within the boundaries of their competence. One can provide services, teach, or conduct research in new areas after studying, training, and gaining supervision from those who are competent in the specific area (Bailey & Burch, 2016).
Code 1.04- Integrity: The behavior analyst should be truthful and honest while also promoting truthful and honest behaviors in others. Refrain from implementing contingencies that leads to fraudulent, illegal, or unethical conduct. Follow through with professional commitments and avoid making a commitment they can not keep. Comply with legal and ethical codes of the social and professional community they are members of. If an ethical responsibility conflicts with the law, then steps need to be taken to resolve the conflict in accordance with the law (Bailey & Burch, 2016).
Code 1.06- Multiple Relationships and Conflict of Interest: Behavior analyst should avoid multiple relationships. They must be sensitive to the potential or harmful effects of multiple relationships and if one arises, then resolve it. They should also inform clients and employees of the harmful effects of multiple relationships (Bailey & Burch, 2016).
By not following code 1.02 you could potentially engage in mistreatment of your client and misrepresenting your qualifications. You run the risk of a malpractice lawsuit and losing your job. If you do not follow code 1.04 then you run the risk of insurance fraud and losing your job. By not following code 1.06 you may not be able to satisfy clients. Employees can become uncomfortable and leave their company and relationships can turn bad. By not abiding by the codes you are violating the ethics codes. You run the risk of losing your job and placing a bad reputation on ABA and your company. When you follow these codes you prevent mistreatment, misrepresenting your qualifications, insurance fraud, awkward situations, loss of employees, clients, and business, malpractice lawsuits, and bad reputations (Bailey & Burch, 2016). | https://skulessay.com/ps-385-purdue-university-unit-6-practice-of-behavioral-analyst-paper/ |
No, we will not be silent
On Monday, members of the ASBMB Minority Affairs Committee released a powerful statement in response to police killings of Black people and institutionalized racism in the United States. Their message was emailed to all society members and was published in ASBMB Today. The ASBMB also shared it on all our social media channels, including our three journal accounts.
The ASBMB Council fully endorses and embraces this statement. We are grateful to the authors for writing with both vulnerability and courage. The statement is signed by its authors, because they deserve the writing credit, but we want to make clear that the society stands in solidarity with every word.
We especially want to emphasize this necessary call to action: "We call on all members of the ASBMB to step up, speak out and intervene, even if our voices shake, for it is only in just actions that we will start correcting some of the historical wrongs that our nation has imposed upon communities of color."
We encourage all of our members to actively participate, in whatever ways they are able, in the radical transformation of our country so that, finally, every voice will be heard, and justice and equity can be realized by all.
If you haven't already, or even if you have, please read the statement here.
Sincerely, and on behalf of the ASBMB Council,
Gerald Hart, ASBMB President
Join the ASBMB Today mailing list
Sign up to get updates on articles, interviews and events.
Latest in Opinions
Opinions highlights or most popular articles
US travel bans: Bizarre and ruthless
Continuing travel restrictions have prevented the author and thousands of other international scholars from seeing their families for a year and a half.
Learning to love assessment
“As every scientist knows, there is no point in doing an experiment if you don’t have a way to assess the result. So assessment is a crucial step in teaching and learning.”
I’m fully vaccinated but feel sick – should I get tested for COVID-19?
It’s impossible to know whether a vaccinated person is fully protected or could still develop a mild case if exposed to the coronavirus.
5 ways to use hip-hop in the classroom to build better understanding of science
Teachers often don’t know how to make science relevant, and many students of color fail to develop a science identity.
What to ask during your faculty interview
“Going into your interview armed with good questions not only will help you gather intel to help you make the best decision for your career but also will help you stand above the competition.”
The STEM Academy: A necessary remedy to med school tunnel vision
A one-week camp at the University of South Florida forged community as it introduced new students to the possibilities of a career in scientific research. | https://www.asbmb.org/asbmb-today/opinions/060320/no-we-will-not-be-silent |
Represent yourself professionally within your online communications.
This includes emails, social media messages and comments, text messages, and blogging. The CCPD team recommends that you devise an online communication strategy.
Texting
- Ask yourself, is the situation text appropriate?
- Consider the time and manner in which you choose to communicate. Texts can be seen as convenient or intrusive from the employer’s perspective.
- Send text messages that are proofread and appropriate.
- Reflect on your message. Does it convey what you want to communicate?
- View examples of how to construct a professional text versus an unprofessional message.
Emails
- Viewed as less intrusive in nature and can be sent within a larger window of time.
- Proofread all professional communications with appropriate content and grammar.
- View examples of professional and unprofessional emails.
Social Media Posts, Messages, and Videos
- Should be employer-appropriate and should display professionalism and maturity.
- Can be sent within a longer timeframe.
- Always ask yourself before you post, “Am I comfortable with my boss viewing this content?”
Have you done the following?
- Written your message at an appropriate time of day (not at 2:00 a.m.)?
- Proofread and corrected all grammar.
- Used appropriate language.
- Reviewed your emotional status while you were writing: Were you upset? Nervous? Anxious? Is this reflected in your writing to a potential professional contact? | https://www.whittier.edu/careers/communications |
ALBANY - Senate Majority Leader Dean G. Skelos (R-C-I, Rockville Centre) announced today that Senator Patrick M. Gallivan (R-C-I, Elma) has been appointed Chair of the Senate Standing Committee on Commerce, Economic Development and Small Business.
“Senator Gallivan is a proven leader when it comes to job creation, especially in Western New York. He has provided important assistance and input on vital issues such as SUNY 2020, the ReCharge NY energy plan, small businesses tax cuts and agri-business development. I’m confident Senator Gallivan will do an excellent job leading this committee as we work to strengthen our economy and create new jobs across our state,” Senator Skelos said.
The Senate’s Committee on Commerce, Economic Development and Small Business is responsible for overseeing and developing legislation and policy relating to state regulations, mandates, tax credit programs, and growth incentives for all business sectors in the state.
“After two years of progress, New York must now focus its attention on its most basic challenge – transforming New York into a place where existing businesses can grow and new businesses want to locate,” said Senator Gallivan. “A long history of regulations, mandates, and taxes on private business have created one of the worst climates in the nation for business growth. As the new Chair of the Senate’s Commerce, Economic Development and Small Business Committee I will be in a position to reexamine and reform New York State’s approach towards economic development, starting in Western New York, where jobs and a reinvigorated private sector are needed most."
While a new report by the U.S. Chamber of Commerce showing New York has jumped 11 spots in state rankings for growth, productivity, and livability indicates that the state’s business climate has incrementally improved, Senator Gallivan believes much remains to be done.
“The small business owners, family farmers, and entrepreneurs of New York are still hurting. They’re overtaxed, they’re overregulated, and they’re over-mandated. I will engage the entire business community from Brooklyn to Buffalo, and with their help, seek common sense reforms to grow jobs, attract investment, and move the Empire State forward,” Senator Gallivan said. | https://www.nysenate.gov/newsroom/press-releases/patrick-m-gallivan/skelos-taps-gallivan-new-chair-commerce-economic |
PSU stands for Power Supply Unit, which is an electronic device that supplies power to a computer or electronic device. The power supply unit plays an important role in the operation of a computer as it supplies the necessary power for the components inside the computer to function properly.
It is typically located in the enclosure at the rear or side of the computer and is responsible for converting house current to usable power for the components of the computer.
What does PSU stand for?
PSU stands for Power Supply Unit. It is a device that supplies power to a computer or other device. It is a key component of the internal hardware of a computer, as it is responsible for delivering the correct amount of power to each of the components inside a computer.
The PSU also provides electrical protection to the unit by controlling the flow of power, acting as an electrical filter to reduce the amount of electromagnetic radiation from the power outlet. The power rating of the PSU is important to make sure that the connected components of the system are supplied with the correct amount of power.
What is PSU in a PC?
PSU stands for Power Supply Unit, and it is an important component of a PC (Personal Computer). The PSU is responsible for supplying the proper power to components in the PC and managing the electricity being used.
The PSU converts standard household current (AC) to direct current (DC) and is typically rated in watts. PSUs come in various sizes and power ratings depending on the components and type of PC, so it is important to purchase one that is compatible with the system and its components.
PSUs also include safety features to protect components and users from electrical hazards. A good quality PSU is essential for a long lasting and reliable PC.
Where is the PSU on a computer?
The PSU, or power supply unit, is typically located at the back of a computer. Its purpose is to provide power to the various components inside, such as the motherboard, hard drive, CPU, and other components.
It usually looks like a large, rectangular metal box and typically has a power cord (from the wall) and a switch at the back. Depending on the type of computer, it may also have additional ports for inserting power cords for other components.
The PSU can be easily accessed by opening up the side panel of the computer (depending on the type of computer case) and should be labeled as the power supply. Inside, you’ll find the power supply itself and several ribbon cables connecting it to the components.
Is PSU important for gaming?
Yes, PSU (power supply unit) is important for gaming. It is the component in a computer system that converts the alternating current from the wall outlet into the direct current that is used to power the other components in a gaming PC.
Without a stable power supply, other parts of a gaming computer, like a graphics card, processor, and storage drives, will be unable to operate at an optimal level. So, while other components might be more visually or financially exciting, a good power supply is critical in ensuring a smooth gaming experience.
Higher wattage power supplies are needed to support gaming systems, as they tend to require more power than basic computers. Additionally, higher wattage supplies come with bigger fan sizes, which can help keep the system cooler while running intensive gaming applications.
What causes PSU failure?
A PSU (power supply unit) failure can be caused by a variety of factors. Firstly, a faulty component or component failure can cause a PSU to malfunction or fail entirely. It could be something in the power supply itself, such as a blown capacitor, or an external component connected to the PSU, like a motherboard or drive.
Components can become faulty from wear, component aging, voltage spikes, incorrect wiring, or too much load.
Secondly, a PSU may fail due to overheating or high temperatures. Airflow and cooling is necessary to keep a PSU functioning properly. Cables, dust, and other obstructions can result in poor cooling, leading to component failure or degradation.
Regular dusting is a great preventive measure against PSU damage.
Thirdly, improper installation can cause a PSU to malfunction or fail. If the PSU is not firmly and safely connected to the power socket, the power supply can be damaged. In addition, incorrect wiring to or from the PSU or a poor cable connection can also cause problems.
Finally, faulty power, such as power spikes, brownouts, and other anomalies can trigger a PSU failure. Surge protectors help to protect against this type of damage.
In conclusion, faulty components, overheating, improper installation, and faulty power can all cause a PSU to malfunction or fail. Regular maintenance, preventive measures, and monitoring can help reduce the risk of a PSU failure.
Is having a higher PSU better?
Generally speaking, having a higher PSU (power supply unit) is better. A PSU is an important piece of hardware in a computer or laptop because it determines how much power your components get as well as your overall system performance.
A good quality, reliable power supply is an important factor that determines the lifespan of your system. It also needs to be powerful enough to handle components drawing a lot of power, like a high end graphics card or several hard drives.
To determine if a higher PSU is beneficial to your system, you should first evaluate the components you are using. For example, if you’re using a lot of power-hungry components like a high-end graphics card, then it definitely makes sense to go with a higher PSU.
On the other hand, if your system is not using a lot of power, a higher PSU will be an unnecessary expense.
It’s also important to note that having too powerful of a PSU can lead to performance issues. A PSU that is too powerful can offer too much juice to your components, potentially causing them to overheat or run too quickly, leading to unstable performance.
So, it’s important to select a PSU that’s powerful enough for your system, but not so powerful that it’s a waste of money.
Ultimately, the question of whether having a higher PSU is beneficial will depend on the components you have and the demands of your system. If your system is intensive, then a higher PSU can help boost performance significantly, but if your system is simple and doesn’t require a lot of power, then a higher PSU may not be necessary.
Is a PSU a Charger?
No, a Power Supply Unit (PSU) is not the same thing as a charger. A charger is a device used to put electric currrent into a device, such as a smartphone or laptop, while a PSU is used to convert general household (AC) power, into Direct Current (DC) power which can then be used to power a range of electrical devices, such as a computer or gaming console.
While a PSU is generally needed for any device, chargers are not always required, and are only used to provide extra power for a specific device.
How do I know if my PSU is strong enough?
The easiest way to determine if your power supply unit (PSU) is strong enough is to check its wattage rating. This number will tell you the maximum power it can draw from your wall socket and provide to your system components.
You need to make sure that the total power consumption of all the components in your system (including the CPU, GPU, and RAM) does not exceed the rating of your PSU.
It is also important to look at the amps on each of the power supply cables and make sure that the total for each cable does not exceed the maximum rating of the PSU. If the total current draw of your components exceeds the rating of the power supply cable, you will need to purchase a stronger power supply.
Finally, you should think about future upgrades and make sure that the power supply can handle any potential additional components. It is better to have a stronger PSU than required since it can help with system stability.
A good rule of thumb when selecting a PSU is to choose one that is at least 80Plus-certified and has at least 50% more wattage than the components in your system will draw.
What happens if my PSU is too powerful?
If your power supply unit (PSU) is too powerful, it can still work and provide your components with the power they need, but it will be less efficient and there may be a slight risk of potential damage to your components.
The most important issue to consider is whether or not the PSU has enough connectors for all your components. If the connectors cannot be connected, then your system will not have enough power. Also, having an overly-powerful PSU may cause your system to draw more current than necessary, which in turn may put unnecessary strain on your electrical system as a whole and could potentially create an unsafe environment.
That being said, there is usually no harm in having a PSU that is more powerful than what you need as long as it meets the necessary requirements of the components and the system. Just remember to make sure all components are properly connected.
Additionally, having a powerful PSU can increase the life, performance, and longevity of your components by providing them with a stable and reliable power source.
How many watt do I need for my PC?
The amount of wattage you need for your PC depends on the type and number of components you are using. If you are planning on building a basic PC with a basic graphics card, CPU, motherboard and other components, you may need anywhere from 300 to 500 watts of power.
On the other hand, if you plan on having more powerful components, such as multiple graphics cards, overclocking, and running multiple hard drives, then you may need more power. It also depends on your environment – whether you have a lot of ambient heat or are in a very cold area.
The best way to determine the wattage you need is to calculate the power requirements of all the components in your PC and add a 50-100 watt buffer.
How do I test my PSU?
If you want to test your PSU (power supply unit) for functionality, you’ll need a multimeter and a comprehensive understanding of how your PSU works to accurately assess the function of its components.
First, you’ll want to make sure the PSU is unplugged and any components it is connected to have been safely disconnected and the component you are testing is switched off. Carefully remove and inspect the power supply unit to check cabling and identify any irregularities.
Ensure the fan is working properly and all the cables are connected to their respective outlets.
Once you’ve done that, it’s time to connect your multimeter. Different brands of multimeters may differ in their configuration, so check the instructions for your particular model for specific setup instructions.
Generally speaking, you’ll want to connect the positive lead of the multimeter to the green wire in the connector, and the negative lead to any black wire in the same connector. Make sure the multimeter is set to test voltage, as you’ll want to test the power rails of the PSU.
After that, you’ll want to note the measured voltage. Your PSU should have a list of its rated voltages, and then you can compare the multimeter readings against the listed values. Ideally, the measured voltages should fall within a few tenths of a volt of their rated value.
If any of them differ significantly, then there may be a fault with your PSU.
Lastly, you should use the multimeter to test the power switch on the back of the unit. Disconnect the power cord, and then use the multimeter on the power switch. Set the multimeter to Ohms, and you should get a reading of zero.
If the reading is different, then the power switch may be faulty and should be replaced.
By following these steps, you should be able to accurately test your PSU for functionality. If you have any doubts, it may be advisable to seek the assistance of a qualified technician or professional.
Is PSU broken?
No, PSU (power supply unit) is not broken, as it is one of the most important components in a computer system that supplies power to all its connected components. The power supply allows these components to operate and to charge the system battery on laptops.
If the PSU is broken, the symptoms can include system instability, blue screens, random shut-downs, and even complete system failure. However, there are times when the PSU might seem to be broken due to a few minor issues.
In such cases, it is important to first diagnose the exact cause of the problem and then take corrective action. The user can also run diagnostic tests to detect any issues and take the necessary steps to address them.
Is it common for a PSU to fail?
Yes, it is unfortunately very common for a PSU (Power Supply Unit) to fail. For various reasons, power supplies will inevitably fail over time with regular use. The more components and capacity the power supply is supplying power to, the higher likelihood of a failure.
Other factors that can contribute to a PSUs failure include power spikes and surges, poor air flow, and higher than recommended wattage for the size of the unit. Wear and tear of components inside the PSU can also lead to eventual failure.
It is usually recommended that people upgrade their power supplies every few years to ensure that they are meeting their systems needs in terms of power and stability. Regular checks and maintenance of the PSU are also important.
Can a PSU stop working?
Yes, a PSU (power supply unit) can stop working. Many causes could lead to a PSU failure, such as overheating, short circuiting, capacitor issues, and a defect in construction. Overheating can happen when your PSU is not properly cooled or is too powerful for your device, or if the power draw is too much for the unit to handle.
Short circuiting can occur when there is a connection, such as a bare wire, between the live and neutral side of the power supply. Capacitor issues can happen if the capacitors are of low quality or have degraded due to age.
Lastly, a defect in construction could make the PSU fail during operation. If any of these issues occur, you’ll likely have to replace the unit. | https://www.skystreamenergy.com/what-psu-means/ |
While scrolling through my Facebook wall on Saturday, I came across a post in which a friend — to protect the innocent, let’s call this person Hermione — explained that she had once stated her refusal to see a certain artist’s films in the theater because she did not agree with the person’s life choices. Upon hearing that remark, a colleague responded, “Hate the artist, not the art.” To which Hermione asked her Facebook community, isn’t an artist inextricably linked to his or her art? She added that the artist in question is Woody Allen, and that with Allen’s new movie Blue Jasmine currently earning strong reviews, big box office (“big” for an independent film) and major Oscar buzz for Cate Blanchett, the debate was once again on her mind. It’s a valid question, which elicited about 60 responses from her friends. I read through them all with great interest, and decided that since I’ve given the topic some thought myself in the past, I would raise it here where I could expound on it more than I could on Facebook.
An artist is inextricably linked to their art simply by having created it, but I don’t think the art necessarily speaks to the opinions of the artist. The creation may be a story that reflects an entirely different set of values than those of the artist. In fact, I think this is a mistake we make too often when we consume a story, whether in a book, a song, or a film. We assume that it correlates to the author’s own morality or viewpoint. But sometimes, an artist wants to tell a story of vile people doing vile things that they themselves would never do in reality. Eminem may not have lived the purest life as a young man, but he sings about an awful lot of unsettling things that I think it’s safe to say he never actually did. Colin Meloy, lead singer of my beloved Decemberists, might have been in a dark place when he wrote “The Rake’s Song” — in which a selfish widower who despises his three young children murders them all and feels totally fine about it — but I don’t think Meloy is promoting or condoning filicide. (He’s written some perfectly sweet and lovely songs too; don’t judge him by “The Rake’s Song”, which is about as dark as he gets.)
The Woody Allen situation is different, of course. The problem people have with Allen — the problem relevant to this discussion, at least — is not that his movies contain themes or ideas that make them uncomfortable, but rather that Allen himself has done things that trouble them. They don’t want to spend their money supporting someone whose actions they find so offensive, for doing so would be tantamount to excusing these things. Or the money is irrelevant, and they just can’t enjoy the work because their personal feelings are too strong. It’s an absolutely reasonable stance to take, and the point of this post is not to argue for or against it, since there is no right or wrong answer. It’s a decision every consumer has to make based on their own feelings. Many of Hermione’s Facebook friends agreed with her and said they do not go to see Allen’s movies. Others said they are able to separate their feelings about Allen from their enjoyment of his films. Some brought up Roman Polanski as another artist who poses the same conundrum.
I fall into the latter category. I don’t let an artist’s real life circumstances interfere with my desire to see their work. “Don’t let” may not be the best way to phrase it, actually, since I never made a conscious decision about it. I simply don’t have trouble appreciating this movie or that because of what its star, director, location manager, etc. has done. I’m a Woody Allen fan, so however sketchy some of his off-screen behavior may be, I’m not going to stop watching his movies. If Roman Polanski has a movie out that interests me, I’m going to see it regardless of his past inappropriate conduct. Ditto for Mel Gibson. Yes, I’m troubled by many of the things he’s said and done in recent years. But I can’t bring myself to reject Lethal Weapon or Braveheart because of it, nor am I going to boycott future works of his that look appealing. I’m sure there are some people who don’t understand how I could continue to support the career of such a person. All I can say is that for me, the work is the work. By avoiding it, I’m only punishing myself. Those that think they’re impacting the artist’s financial rewards by withholding patronage are kidding themselves, but if it makes them feel better, I won’t argue it. I’ll just say that if that’s their sole reason for avoiding something that they would otherwise choose to experience, the loss is theirs, not the artist’s. (And for these people, I’m curious: does your opinion change once the artist has passed away?) If the reason is not monetary, but instead an inability to watch that person’s work without thinking about who they truly are and experiencing some degree of disgust, then they should stand by that, as long as that feeling outweighs their interest in the movie, album, book, etc. I’m not sure what it says about me, if anything, but I have no problem separating my opinions. I can still happily watch The Naked Gun without dwelling on O.J. Simpson’s crimes, or see David Lynch’s Lost Highway and be creeped out by Robert Blake’s character, but not by the man himself and the murder for which he was convicted. When I listen to “Unchained Melody”, “Be My Baby”, “Imagine” or “My Sweet Lord”, I don’t think about Phil Spector serving time for murder (though in truth, I don’t think I knew Spector was involved in any of those songs before watching the recent HBO movie with Al Pacino).
Simpson, Blake and Spector may be extreme cases, but there are many famous people who have engaged in behavior that some might find troubling. Where do we draw the line about what we’ll tolerate? I ask that not as a defiant challenge intended to trip anyone up on their own morals, but as a legitimate query. In 1965, at the height of his James Bond fame, Sean Connery gave an interview to Playboy in which he said there was nothing wrong with slapping a woman in extreme circumstances. Christian Bale was involved in a highly publicized incident a few years back on the set of Terminator: Salvation, where he unleashed a profanity-filled tirade on the cinematographer, who was moving around during a scene and causing Bale to become distracted from his performance. Russell Crowe was known to exhibit bad behavior earlier in his career, including a 2005 incident in which he threw a phone at a hotel employee. In 2007, Alec Baldwin left his 11 year-old daughter an enraged voicemail complete with name calling. While directing Three Kings in the late 90’s, director David O. Russell was allegedly abusive to crew members, prompting star George Clooney to confront him about his inappropriate behavior and reportedly leading the two men to blows. A few years later, Russell and Lily Tomlin got into a heated feud while shooting I ♥ Huckabees that escalated to the point of Russell screaming and kicking equipment around the set. Another incident between the two showed that Tomlin was just as capable of bad behavior. Winona Ryder shoplifted. Eddie Murphy and Hugh Grant were caught with prostitutes. These are just a few examples of bad behavior gone public. Who knows how many other artists, from filmmakers to writers to musicians, have abused co-workers verbally or physically, or engaged in other actions that might be a turn-off to fans. I’m sure if we knew about all the cases of womanizing or infidelities among professional creative types, we would end up with a list many pages long.
Now for the record, Crowe and Russell have apologized for their actions, and seem to have mellowed out considerably. Clooney and Russell even made up after years of lingering animosity. As for Bale, his outburst seemed to be a one-time episode. More to the point, most of these offenses are certainly less serious than those attached to Polanski, and most are less questionable than the things Allen has done. (In her Facebook conversation, Hermione noted that it was not just Allen’s history with Soon Yi Previn that made her uncomfortable, but also other accusations leveled by Mia Farrow in her autobiography, which Hermione acknowledges is one-sided and strongly biased.) But my point in raising all of these examples is to illustrate that artists — like anyone else — display all manner of bad behavior and poor choices. Sometimes chronically, sometimes just once (as far as we know). So anyone who has such a problem with Allen, Polanski, Mel Gibson, etc. that they refuse to support that person’s work is completely entitled to do so. But it’s not unreasonable that if you’re going to make moral judgements on an artist for one thing, you have to ask yourself where you draw the line for other offenses, and be prepared to not necessarily like your answer.
Another consideration to keep in mind in nearly all these cases involving famous people’s crimes and misdemeanors (see what I did there?), is that we rarely know the whole story. We aren’t witnesses to these events, and have no idea what the full picture would reveal. The media can be biased, and the entertainment media in particular loves to bring down the very people they make such efforts to anoint. Equally important to consider is that people are not necessarily defined only by their uglier characteristics. Whatever Woody Allen has done privately, consider that as an artist, he has provided actresses and audiences with some of the most compelling and rich female characters on film in the last 30-plus years, if not of all time. In a movie landscape that is increasingly driven by action movies and comedies that put men front and center, isn’t Allen’s consistent ability and desire to write so well for women something worth celebrating? There might be other artists who have contributed to society in positive ways that don’t get the attention devoted to their more embarrassing or disturbing episodes and tendencies. Only in the fictional works created by the artists we hold to such high standards are the lines between good and bad so clear. In real life — and in the more complex and morally ambiguous movie worlds that filmmakers like Allen and Polanski occupy — we dwell in shades of grey. Think of Matt Dillon’s character in the movie Crash. (Yes, I realize I’m using a fictional character to make an actual point, but I’ve said many times that I’m incapable of connecting to reality without using movies.) Dillon plays a racist policeman who, early on, pulls over a black couple and then crosses a line when frisking the wife. Yeah, he’s that guy. But he’s also a son who watches with helpless, heartbroken frustration as his aging father deals with medical problems that go untreated due to insurance denials. And of course, he later risks his life to save the same woman he pulled over, rescuing her from a burning car before it explodes. The lesson, which that whole (often derided) movie puts forth, is that we’re quick to pass judgement on people without knowing their full story.
I’ll wind down the topic with what I’ve always considered one of the most challenging examples of this art vs. artist quandary. Elia Kazan is the pioneering theater and film director whose work in the latter medium includes A Streetcar Named Desire, On the Waterfront, East of Eden and A Face in the Crowd. He is a founder of the Actor’s Studio, and is widely regarded as the greatest director of actors in history. Dozens of outstanding performers who went on to long careers were first introduced, either in theater or on film, by Kazan. Marlon Brando, James Dean, Warren Beatty and Eva Marie Saint were among the most prominent, but his discoveries also included great character actors like Pat Hingle and Rip Torn. He also directed the original Broadway productions of Death of a Salesman, Cat on a Hot Tin Roof and Streetcar. Without a doubt, Kazan is one of the most significant and influential artists of the 20th century.
But of course, these achievements are not all that he’s known for. Kazan is also infamous for his 1952 testimony before the House Un-American Activities Committee, during which he named names of fellow artists who had been connected to the Communist party. All of the names he provided were already known to the committee, but his appearance as a friendly witness was nevertheless seen by many as a betrayal. His testimony may not have directly led to any blacklisting, but his cooperation upheld Joe McCarthy’s institutional witch-hunt that ended countless careers in Hollywood and beyond. If Kazan had refused to testify or name names, his ability to make films might have ended, but his thriving career in New York theater would likely have continued unaffected. He also had enough clout that if he had challenged HUAC, he might have helped put an end to its despicable activities. Instead, he played ball and saw his good fortune continue to flourish while others saw theirs evaporate. And yet, a mere two years later, Kazan was given the Academy Award for Best Director (his second) for On the Waterfront, a movie that deals with the consequences of informing and which has been interpreted by many as Kazan’s attempt to justify his actions regarding HUAC. When you think about how political the Oscars are known to be, and how many factors other than the movie itself make their way into people’s voting process, Kazan’s 1954 win is stunning. But here was a case where even in the wake of his controversial action, the film community still saw fit to recognize his artistic achievement. And although he went on to continued success and many accolades, including a Kennedy Center Honor in 1982, some organizations, such as the American Film Institute, refused to celebrate him later in his life. His appearance before HUAC — and his refusal over the years to apologize or admit that it was a mistake — were stains that many could not forgive or forget. So when it was announced that Kazan would be presented with an Honorary Oscar for lifetime achievement in 1999, the reaction was unsurprisingly divisive. The Academy’s decision stirred up long-dormant feelings about the McCarthy and blacklist years, with those critical of the selection pointing out that (among other things), Kazan had already won two Oscars, making this an unnecessary tribute. The Academy’s position was that Kazan was being honored for his work, not his politics or his personal behavior, although many other Honorary Oscar recipients over the years were cited for their offscreen morality and good deeds as well as their contributions to cinema. (That includes Kirk Douglas, who received a similar award three years earlier, and whose accomplishments as mentioned by presenter Steven Spielberg included helping to “hammer the blacklist to pieces.”) When Kazan’s Oscar night moment came and he took the stage, many in the room gave him a standing ovation, while others remained defiantly in their seats, arms folded. Some stayed seated but still clapped.
Would you have stood and applauded for the artist? Or would you have stayed in your seat and clasped your hands, protesting the man? Elia Kazan, Woody Allen, Roman Polanski, Mel Gibson…the circumstances around each one are different, but the question that we ask ourselves as fans of the art they all practice is essentially the same. I’m not blind to the real life factors that cloud these artists’ reputations, but my desire to experience their work ultimately trumps all. For others, it’s an understandable and recurring debate. | https://i-am-db.com/2013/08/06/separating-the-art-from-the-artist-or-not/ |
Ankle sprains are very common, accounting for 20% to 40% of all sports-related injuries. [1, 2] These injuries are known to recur often and create prolonged disability. [2, 3] Ankle sprains are classified into grades 1, 2, 3, which generally correspond to mild, moderate, or severe. They are also classified into three anatomic types: lateral, medial, and syndesmosis. This protocol focuses on lateral sprains of all grades.
|GROUP 1 EXERCISES|
|EXERCISE 1. The 'alphabets.' While seated with the edge of the heel on the floor, patients draw the entire alphabet one letter at a time by moving the injured ankle and using the great toe as the 'pen.'|
|FIGURE 1. Windshield wiper. Sit with the foot flat on the floor and facing straight ahead. Rotate the affected foot to mimic a windshield wiper blade: Pivot the foot outward and touch the inside edge of the foot to the floor (A), then rotate it inward and touch the outside of the foot to the floor (B).||FIGURE 2. Seated calf raise. Sit with the injured foot flat on the floor. Lift the heel as far as possible while keeping the toes on the floor, then return the heel to the floor.||FIGURE 3. Single-leg stand (partial weight-bearing). Stand while placing one hand on a table. Shift some of the weight to the injured foot for 15 seconds. Increase the time spent on the injured foot by 15 seconds until you can stand for 45 seconds. Then gradually increase the amount of weight supported by the injured foot until full body weight is used.|
|FIGURE 4. Eversion and inversion isometrics. Eversion (A): Stand and place the outside of the injured foot against a table leg or door jamb. Push outward with the foot for 2 to 3 seconds. Inversion (B): Stand with the inside of the foot against the table leg or door jamb and push inward for 2 to 3 seconds.||FIGURE 5. Exercise band eversion and inversion. Eversion: Sit with the involved leg straight. Tie a loop in an elastic exercise band and attach the other end to a heavy object such as a table leg. Place the loop around the ball of the foot (A). Rotate (evert) the foot away from the table leg and return it to the starting position (1 repetition). Do not rotate the leg to do the exercise. Inversion (B): Reverse the position of the exercise band and rotate (invert) the foot inward, away from the table leg. Once patients can do group 1 exercises, they can progress to group 2.|
|GROUP 2 EXERCISES|
|FIGURE 6. Gastrocnemius stretch. Place the injured foot behind the uninjured foot and keep the back knee straight, with the heel firmly planted on the floor. Lean forward against a wall so that you feel a stretch in the calf farthest from the wall. Hold for 30 seconds.||FIGURE 7. Soleus stretch. Stand with the injured foot in front of the other foot. Bend the knee of the back foot and lower your body toward the floor without letting the back heel rise off the floor. You should feel the stretch in the lower calf of the back leg.|
|FIGURE 8. Fullweight-bearing single-leg stand and standing calf raise. Stand with the injured foot on the floor and the other leg bent at the knee and off the floor (as shown for the standing calf raise). Maintain full weight on injured leg for 30 seconds. Standing calf raise. Raise up on the ball of the injured foot then return the heel to the floor. Weight is supported only on the injured side.||FIGURE 9. Single-leg stand with a towel. Roll a towel into a strip 4 inches wide, 1 to 2 inches high, and 12 to 18 inches long. Stand with the injured ankle on the towel as for the single-leg stand (figure 3). Hold for 30 seconds.|
|GROUP 3 EXERCISES|
|FIGURE 10. Lateral step and lateral bound. Step: Place a rolled towel on the ground and stand with both feet to one side of the towel (A). Step over the towel with the injured ankle (B), and remain on one foot (C). Reverse the process and step over the towel in the opposite direction. Increase speed as pain will allow. Bound: The starting position is the same as for the step. With both feet on one side of the towel, hop over the towel and land on the right foot. Then, hop back over the towel and land on the left foot. Gradually increase speed and height of bound as comfort allows.|
|
|
References
Remember: This information is not intended as a substitute for medical treatment. Before starting an exercise program, consult a physician. | https://chiro.org/Graphics_Box_LINKS/FULL/Rehabilitating_Ankle_Sprains.html |
The present invention relates to a method for data communication with a domestic appliance by a computer device. Further, the present invention relates to a system comprising a domestic appliance, in particular a cooking appliance including a cooking oven with an oven cavity and/or a cooking hob, and a mobile computer device, said domestic cooking appliance connected or connectable to a mobile computer device via a wireless data connection.
Modern domestic appliances can be connectable to a communication network and/or to a computer device. Said communication network may be the internet or an internal network. These connections of the domestic appliances allow additional options for operating the domestic appliance. For example, the domestic appliances may be controlled by the computer device and/or via the communication network. Additional information provided by the communication network may be used for operating the domestic appliance. In many cases, information from the communication network is up to date.
DE 10 2007 048 834 A1
From a domestic appliance with a control unit is known, wherein the control unit comprises a data connection for receiving picture data from the camera.
DE 10 2008 042 084 A1
From a cooking appliance with a camera for observing food items in or on the cooking appliance is known, wherein the cooking appliance comprises data transfer means for transfering picture data captured by the camera to an external unit.
US 2013/176114 A1
From a mobile terminal is known that can transmit or receive information to or from a cooking apparatus for remotely monitoring a state of the cooking appliance.
For the data communication, it can be advantageous or even necessary, that the usability is flexible and/or effectively, so that it can be operated and/or controlled from different locations, for example.
It is an object of the present invention to provide an improved method for data communication with a domestic appliance by a computer device. Especially, it is an object of the present invention to improve the features and/or the usability and/or the effectivity of the data communication.
The object is achieved by the method according to claim 1.
The present invention relates to a method for data communication with a domestic appliance by a mobile computer device, wherein the domestic appliance and the mobile computer device are interconnected or interconnectable via a wireless data connection that is adapted for transferring signals between the domestic appliance and the mobile computer device.
The wireless data connection that is adapted for transferring signals between the domestic appliance and a mobile computer device allows a very flexible and effective use of the data communication with the domestic appliance by a mobile computer device. In particular when the domestic appliance is a cooking appliance, for example a cooking oven with an oven cavity and/or a cooking hob, it is very helpful if it is possible to control the domestic appliance by a wireless data connection which can be operated near the domestic appliance by the mobile computer device. For example, the mobile computer device may be a mobile phone, a smart phone, a tablet personal computer, a netbook or a notebook.
The domestic appliance comprises a camera for generating a sequence of images as a video stream for obtaining a video which shows images from the feeding area of the domestic appliance.
Preferably, the domestic appliance comprises an image serving unit, especially a data server, for obtaining the sequence of images as a video stream from the camera and for transferring the video stream to the mobile computer device.
The camera can optionally generate a sequence of images as a video stream, wherein the camera transfers the video stream to the serving unit. Preferably, the mobile computer device receives the video from stream the serving unit.
Preferably, the data serving unit streams videos with image rate between 1 image per second and 10 images per second, preferably between 3 images per second and 6 images per second.
The image serving unit streams, in some embodiments, videos with an image width resolution between 500 and 2.000 pixels, preferably with an image width resolution between 800 and 1.500 pixels. The data serving unit streams, in some embodiments, videos with an image height resolution between 500 and 1.500 pixels, preferably with an image height resolution between 800 and 1.300 pixels.
The mobile computer device can be switched into a first connection state with the domestic appliance. More preferably, in the first transmission state, video streaming is enabled by the domestic appliance and the mobile computer device.
The mobile computer device can be switched into a second transmission state with the domestic appliance, wherein in the second connection state no video streaming is enabled by the domestic appliance and the mobile computer device.
The domestic appliance comprises, a switching element, especially a door switching element, wherein the mobile computer device can be switched from the second to the first transmission state by the switching element.
The door switching element is operated by opening the door and/or by closing the door, wherein with open door, the door switching element is in an open position, wherein with closed door, the door switching element is in a closed position. Changing from open position to closed position can trigger a closing signal, wherein changing from closed position to position can trigger an opening signal.
Preferably, the camera has an operating state where images are transferred, wherein the camera has a standby state where no images are transferred.
The door switching element can enable and/or disable the camera so that the camera starts when the door is closed and/or stops when the door is opened.
When an opening signal is received by the camera and the camera is in operating state, a standby signal can optionally be generated within the camera to shift the camera into the standby state.
When a closing signal is received by the camera and the camera is in standby state, a wakeup signal can optionally be generated within the camera to shift the camera into the operating state. When a wakeup signal is generated within the camera and the camera is in standby state, and an oven light is turned off, a power signal can, in some embodiments, be transferred to the oven light which turns the oven light on.
Preferably, the image serving unit forwards images to the mobile computer device. Preferably, the mobile computer device transmits the images to an image distributing unit, wherein the image distributing transmits the images to a client computer.
The mobile computer device comprises in some embodiments a switching device for generating a wakeup signal, wherein the wakeup signal is transferred to the image serving unit via a wireless network.
The serving unit preferably transfers the wakeup signal to the camera to change into the operating state, whereinafter the serving unit transfers videos to the mobile computer device via the wireless network.
After a predefined time, especially after two minutes, the mobile computer device can preferably generate a standby signal, wherein the standby signal is transferred to the data serving unit, via the wireless network.
The serving unit can optionally transfer the standby signal to the camera to change into the standby state.
Preferably, the serving unit comprises a first serving device, especially an image serving device, especially a first WiFi node, wherein the serving unit, comprises a second serving device, especially a data serving device, especially a second WiFi node.
From the received images, the mobile computer device can optionally select a sequence of images, wherein between at least two of successive selected images, a predefined number of images is not selected.
Preferably, the predefined length of images is 5, 10, 20 or 100.
Between at least half of two successive selected images, the predefined number of images is, in some embodiments, not selected or between all selected images, the predefined number of images is not selected.
Before the first image and after the last image, additional images are inserted in some embodiments. Preferably, the image sequence is passed to an image distributing unit.
detecting visually at least one object being treated by the domestic appliance,
generating a picture signal of the object being treated by the domestic appliance,
transferring the picture signal from the domestic appliance to the mobile computer device via the wireless connection, and
displaying a picture of the object being treated by the domestic appliance on a display or touch screen of the mobile computer device on the basis of the picture signal.
Preferably, the method comprises the steps of:
Therefore, the object being treated by the domestic appliance can especially represented or representable in real-time on the display or touch screen of the mobile computer device.
The wireless data connection between the domestic appliance and the mobile computer device can provide a representation of the object in real-time. The real-time representation of the object being treated by the domestic appliance on the display of the mobile computer device provides information about the actual state of said object from a distance.
The domestic appliance is a cooking appliance including a cooking oven and/or a cooking hob, said object being treated by the domestic appliance is a food stuff being treated by the cooking appliance, in particular a food stuff being treated in an oven cavity of a cooking oven, and said wireless data connection is at least a unidirectional data connection for transferring signals form the cooking appliance to the mobile computer device for allowing monitoring in real time by a user of the visual appearance of said food stuff being treated by the cooking appliance on the display or touch-screen of said mobile computer device.
Preferably, at least one current operating parameter of the domestic appliance is transferred between the domestic appliance and the mobile computer device via the wireless data connection, in particular wherein said at least one current operating parameter of the domestic appliance is indicated by the display or touch screen of the mobile computer device and/or wherein said at least one current operating parameter of the domestic appliance can be set by a user via said display or touch screen of the mobile computer device. The indication of current operating parameters increases the user's level of information.
In particular, the at least one current operating parameter of the domestic appliance is represented by a numerical value and/or by one or more graphical symbols on the display or touch screen of the mobile computer device. For example, the graphical symbols may represent numerical values by different sizes of an area or by the characteristic colours.
According to one embodiment, the domestic appliance is a cooking appliance, wherein the temperature of at least one food stuff being treated by the cooking appliance is detected by said cooking appliance, at least one corresponding temperature signal is transferred to the mobile computer device via the wireless data connection in real-time, and at least one corresponding temperature value is indicated by the mobile computer device. The view of the food stuff and the knowledge of the temperature provide broad information of the cooking process.
Further, the domestic appliance is a cooking appliance, wherein an elapsed cooking time and/or a remaining cooking time of at least one food stuff being treated by the cooking appliance is transferred to the mobile computer device via the wireless data connection in real-time and indicated by the mobile computer device.
Additionally, the at least one operating parameter of the domestic appliance, preferably at least one current parameter of the domestic appliance, is evaluated by the mobile computer device and the obtained result is indicated on the display or touch screen of the mobile computer device, wherein said result includes a history and/or a statistical analysis of said at least one operating parameter of the domestic appliance and/or further corresponding information relating to said history and/or statistical analysis.
Optionally, the mobile computer device is connected or connectable to the internet via a wireless data connection, in particular via a wireless data local area network ("WLAN") and/or a mobile communications network, wherein the mobile computer device is connected or connectable to at least one social network and/or to at least one data base. The connection of the domestic appliance to the internet allows additional options for operating said domestic appliance.
According to a further embodiment, the wireless data connection between the domestic appliance and the mobile computer device is a bidirectional connection transferring signals between the domestic appliance and the mobile computer device, wherein the domestic appliance is controlled or controllable by the user via the mobile computer device. The wireless bidirectional connection between the domestic appliance and the mobile computer device allows a remote control of said domestic appliance.
An application software can be provided for a mobile computer device connected or connectable to a domestic appliance, in particular a cooking appliance including a cooking oven and/or a cooking hob, wherein the application software is provided for performing the method mentioned above. The use of application software allows a plurality of additional features by low complexity.
According to one example, the application software provides a recipe generator for a cooking appliance, wherein a user may input or select one or more search criteria for a cooking recipe and the recipe generator provides at least one corresponding proposal for a cooking recipe, and wherein a plurality of cooking recipes are stored in a memory of the mobile computer device and/or in a data base of the internet.
Optionally, said one or more search criteria for a cooking recipe are selectable by the user from a group comprising at least one recipe food ingredient type, at least one recipe food ingredient amount, at least one cooking or baking temperature, at least one cooking or baking duration and/or at least one generic cooking mode such as radiation cooking, forced convection cooking, steam cooking, microwave cooking or induction cooking, and the application software comprises at least one algorithm for selecting said at least one corresponding proposal for a cooking recipe from said plurality of stored recipes on the basis of said selection by the user of at least one of said search criteria for a cooking recipe.
Moreover, the application software may comprise an algorithm for adapting at least one recipe parameter of at least one of said plurality stored cooking recipes to an operational feature of the cooking appliance.
In this case, said recipe parameter may be at least one of said recipe food ingredient amount, cooking or baking temperature, cooking or baking duration, and/or generic cooking mode and/or wherein said operational feature of the cooking appliance is a volume of an oven cavity of the cooking appliance, a calorific output of at least one heating element of the cooking appliance and/or a calorific output of a cooking mode of the cooking appliance such as a mode of the cooking appliance for radiation cooking, for forced convection cooking, for steam cooking, for microwave cooking or for induction cooking.
Further, the application software may comprise an algorithm for adapting at least one operational parameter of the cooking appliance according to said at least one recipe parameter of the cooking recipe that has been selected by the user from said proposal by said recipe generator for a cooking recipe, in particular wherein said at least one operational parameter of the cooking appliance is a cooking or baking temperature, a cooking or baking duration and/or a mode of the cooking appliance for radiation cooking, for forced convection cooking, for steam cooking, for microwave cooking or for induction cooking.
According to another example, the application software provides a multi-timer function for two or more dishes and/or courses in or on the cooking appliance, wherein said dishes and/or courses can be treated together at the same temperature by the cooking appliance, in particular together in the same oven cavity at the same temperature, but can require different cooking durations, and wherein the elapsed and/or remaining cooking durations of individual dishes and/or courses are indicated by the display or touch screen of the mobile computer device.
According to a further example, the application software provides a cooking time reduction function and/or a cooking temperature reduction function, wherein a user may reduce the cooking time and/or the cooking temperature of the cooking appliance by the mobile computer device via the wireless bidirectional data connection between the domestic appliance and the mobile computer device. In this case, the user can reduce the cooking time and/or the cooking temperature, but not increase said cooking time and/or the cooking temperature, respectively. This contributes to the safety of the cooking process.
Further, the present invention relates to a system as defined in claim 28, comprising a domestic appliance, in particular a cooking appliance including a cooking oven with an oven cavity and/or a cooking hob, and a mobile computer device, said domestic appliance connected or connectable to a mobile computer device via a wireless connection, wherein the domestic appliance is provided for the aforesaid method.
The domestic appliance comprises at least one camera, in particular a camera arranged to detect visually and to provide a picture signal of said food stuff being treated by said cooking appliance in said oven cavity or on said coking hob.
The mobile computer device can comprise at least one display and/or touch screen, wherein the mobile computer device is provided for the method mentioned above and/or the mobile computer device supports aforesaid application software.
A computer program can be stored in a computer usable medium, comprising computer readable program means for causing a computer to perform the method mentioned above, wherein the computer program includes aforesaid application software.
Novel and inventive features of the present invention are set forth in the appended claims.
FIG 1
FIG 2
FIG 3
FIG 4
FIG 5
FIG 6
FIG 7
FIG 8
FIG 9
FIG 1
illustrates a schematic view of a domestic appliance and a mobile computer device according to a preferred embodiment of the present invention,
illustrates a schematic perspective view of the domestic appliance according to the preferred embodiment of the present invention,
illustrates a schematic view of an example for a main page of application software ("APP") for the mobile computer device according to the preferred embodiment of the present invention,
illustrates a schematic view of an example for a page of a recipe generator of the application software ("APP") for the mobile computer device according to the preferred embodiment of the present invention, and
illustrates a schematic view of an example for a page of a multi-timer function of the application software ("APP") for the mobile computer device according to the preferred embodiment of the present invention.
illustrates a schematic view of an example for a domestic appliance and a mobile computer device according to a preferred embodiment of the present invention and
illustrates a schematic view of image sequences according to a preferred embodiment of the present invention.
illustrates a schematic view of an example for a domestic appliance according to a preferred embodiment of the present invention and
illustrates a schematic view of an example for a mobile computer device and serving units according to a preferred embodiment of the present invention.
illustrates a schematic view of a domestic appliance 10 and a mobile computer device 12 according to a preferred embodiment of the present invention. In this example, the domestic appliance is a cooking appliance 10 including a cooking oven 14 and a cooking hob 16, wherein the cooking hob 16 is arranged above the cooking oven 14. Alternatively, the cooking appliance 10 may only include either the cooking oven 14 or the cooking hob 16. In this example, the domestic appliance 10 or the cooking appliance 10, respectively, includes a stationary control unit 24. In general, the domestic appliance 10 may be an arbitrary appliance, which is monitored and/or controlled by the user via the mobile computer device 12.
The present invention will be described in further detail with reference to the drawings, in which
FIG 1
Further, the cooking device 10 comprises one or more cameras not shown in . For example, the camera is arranged in or in front of an oven cavity of the cooking oven 14, so that food stuff inside the oven cavity may be monitored by the user. Further, the camera may be arranged above the cooking hob 16, so that food stuff on said cooking hob 16 may be monitored by the user. In the latter case, the camera may be attached at an exhaust hood arranged above the cooking hob 16.
Moreover, the cooking device 10 may comprise at least one temperature sensor for detecting the temperature of the food stuff and/or in the oven cavity and/or in a cooking pot.
The mobile computer device 12 includes a display 18 or a touch screen 18. Further, the mobile computer device 12 includes a keyboard 20. The display 18 forms an output unit of the mobile computer device 12. The keyboard 20 forms an input unit of the mobile computer device 12. The touch screen 18 forms an input/output unit of the mobile computer device 12. If the display 18 is formed as the touch screen 18, then the mobile computer device 12 does not need necessarily the keyboard 20.
The mobile computer device 12 may be a customary device. For example, the mobile computer device 12 may be a mobile phone, a smart phone, a tablet personal computer, a netbook or a notebook.
There is a wireless data connection 22 between the cooking appliance 10 and the mobile computer device 12. According to one embodiment said wireless data connection 22 is unidirectional, wherein signals may be transferred only from the domestic appliance 10 to the mobile computer device 12. In this case, the user is able to monitor a working process of the cooking appliance 10 by the mobile computer device 12. According to another embodiment the wireless data connection 22 is bidirectional, wherein signals may be transferred from the domestic appliance 10 to the mobile computer device 12 as well as from the mobile computer device 12 to the domestic appliance 10. In the latter case, the user is able to control the working process of the cooking appliance 10 by the mobile computer device 12. If the wireless data connection 22 between the cooking appliance 10 and the mobile computer device 12 is unidirectional, then the user may control the domestic appliance 10 by the stationary control unit 24 of the domestic appliance 10. If the wireless data connection 22 between the cooking appliance 10 and the mobile computer device 12 is bidirectional, then the user may control the domestic appliance 10 by the mobile computer device 12 and/or the stationary control unit 24.
The cooking appliance 10 and the mobile computer device 12 may be interconnected or interconnectable via the internet. For example, the cooking appliance 10 is connected or connectable to the internet via a local area network (LAN) or a wireless local area network (WLAN) to the internet. The mobile computer device 12 may be connected or connectable to the internet via a wireless local area network (WLAN) or a mobile communications network.
Alternatively, the wireless data connection 22 between the cooking appliance 10 and the mobile computer device 12 may be realized via a radio contact. Further, the cooking appliance 10 and the mobile computer device 12 may be interconnected or interconnectable via infrared signals. In general, an arbitrary wireless data connection 22 between the cooking appliance 10 and the mobile computer device 12 is possible. Preferably, the selection of the type of the wireless data connection 22 between the cooking appliance 10 and the mobile computer device 12 depends on the favoured operating distance.
The display 18 and/or the touch screen 18 of the mobile computer device 12 are provided for indicating current pictures recorded by the camera of the cooking device 10. The wireless data connection 22 from the cooking appliance 10 to the mobile computer device 12 is provided for transferring picture signals in real time.
In a similar way, the display 18 and/or the touch screen 18 of the mobile computer device 12 are provided for indicating current temperature values detected by the temperature sensor of the cooking device 10. The wireless data connection 22 from the cooking appliance 10 to the mobile computer device 12 is provided for transferring temperature signals in real time.
Optionally, there is an external connection 26 between the mobile computer device 12 and the internet 28. Preferably, the mobile computer device 12 is connected to the internet 28 via the wireless local area network (WLAN) or the mobile communications network. The external connection 26 allows communications between the mobile computer device 12 and the internet 28. For example, the mobile computer device 12 may use applications provided by the internet 28. Further, the user is able to download software for the mobile computer device 12 from the internet 28. Moreover, the user can access to data bases in the internet 28 by the mobile computer device 12.
All in all there are four possible different constellations in view of the wireless data connection 22 and the external connection 26. According to a first constellation the wireless data connection 22 is unidirectional from the cooking appliance 10 to the mobile computer device 12, wherein the external connection 26 lacks. According to a second constellation the wireless data connection 22 is bidirectional between the cooking appliance 10 and the mobile computer device 12, wherein the external connection 26 lacks. According to a third constellation the wireless data connection 22 is unidirectional from the cooking appliance 10 to the mobile computer device 12, wherein the external connection 26 exists between the mobile computer device 12 and the internet 28. According to a fourth constellation the wireless data connection 22 is bidirectional between the cooking appliance 10 and the mobile computer device 12, wherein the external connection 26 exists between the mobile computer device 12 and the internet 28. In the first and second constellations the wireless data connection 22 between the cooking appliance 10 and the mobile computer device 12 may be realized via the internet, although the external connection 26 between the mobile computer device 12 and the internet 28 lacks.
FIG 2
illustrates a schematic perspective view of the domestic appliance 10 according to the preferred embodiment of the present invention, wherein the domestic appliance is the cooking appliance 10. Said cooking appliance 10 includes the cooking oven 14 with an oven cavity 15 and the cooking hob 16, wherein the cooking hob 16 is arranged above the cooking oven 14.
Food stuff 11 being treated by the cooking appliance 10 is arranged inside the oven cavity 15. A heating element 17 is arranged at a rear wall of the oven cavity 15. The cooking appliance 10 comprises a camera 13. Said camera 13 is provided for detecting visually the food stuff 11 being treated by the cooking appliance 10. The camera 13 provides a picture signal of said food stuff 11. The camera 13 may be arranged in or in front of the oven cavity 15 of the cooking oven 14, so that the food stuff 11 inside the oven cavity 15 may be monitored by the user. Alternatively, the camera 13 may be arranged above the cooking hob 16, so that food stuff 11 on said cooking hob 16 may be monitored by the user. In the latter case, the camera 13 may be attached at an exhaust hood arranged above the cooking hob 16.
The present invention provides application software ("APP") for the mobile computer device 12. Said application software comprises one or more functions and/or features supporting the operations of the mobile computer device 12. Several functions and features of the application software are described below.
FIG 2
illustrates a schematic view of an example for a main page 30 of application software ("APP") for the mobile computer device according to the preferred embodiment of the present invention. Said main page 30 may be indicated by the display 18 or touch screen 18. In this example, the area of the main page 30 is subdivided into five subareas. The area of the main page 30 represents a menu, while the five subareas represent a menu item in each case. In this embodiment, the menu items correspond with the functions "my recipe book", "recipe hub", "social feed", "oven control" and "explore your oven".
The function "my recipe book" allows the generation and administration of an individual recipe book by the user. Said individual recipe book may be generated on the basis of a recipe book provided by the manufacturer of the cooking appliance 10, mobile computer device 12 and/or application software. Recipes generated by the user may be inserted into the function "my recipe book".
The function "recipe hub" allows the selection of recipes from a data base. The user may input a number of criteria for the desired recipe. The function "social feed" allows the access to a social network, cooking sites and/or cooking blogs. The function "explore your oven" allows an access to manuals in order to obtain satisfactory results.
The function "oven control" allows an adjusting of cooking parameters for the cooking appliance 10 by the mobile computer device 12. The function "oven control" requires the bidirectional wireless connection 22 between the cooking appliance 10 and the mobile computer device 12.
According to one embodiment, the application software ("APP") comprises a viewing function. Said viewing function allows the representation of a picture signal from the camera 13 of the cooking appliance 10 on the display 18 or touch screen 18 of the mobile computer device 12. The viewing function allows a current viewing of the food stuff 11 in the oven cavity 15 of the cooking oven 14 and/or on the cooking hob 16 on the display 18 or touch screen 18 of the mobile computer device 12. A real-time transmission of pictures from the camera 13 of the cooking appliance 10 to the display of the mobile computer device 12 is possible. Thus, the user is able to monitor the food stuff 11 in the oven cavity 15 of the cooking oven 14 and/or on the cooking hob 16 of the cooking appliance 10 from a distance by the mobile computer device 12. The user is always able to inform about the current state of the food stuff 11 in or on the cooking appliance 10.
If the wireless connection 22 between the cooking appliance 10 and the mobile computer device 12 is unidirectional, wherein the picture signals are transferred from the domestic appliance 10 to the mobile computer device 12, then the user is able to monitor the cooking process of the cooking appliance 10 by watching the picture or pictures of the food stuff 11 on the display 18 or touch screen 18 of the mobile computer device 12. In this case, the user can control the cooking process by the stationary control unit 24 of the cooking appliance 10. The unidirectional wireless connection 22 between the cooking appliance 10 and the mobile computer device 12 has the advantage that the cooking process of the cooking appliance 10 cannot be disturbed by external signals.
If the wireless connection 22 between the cooking appliance 10 and the mobile computer device 12 is bidirectional, wherein the picture signals are transferred from the domestic appliance 10 to the mobile computer device 12 and control signals are transferred from the mobile computer device 12 to the domestic appliance 10, then the user is able to control the working process of the cooking appliance 10 by handling the mobile computer device 12. The bidirectional wireless connection 22 between the cooking appliance 10 and the mobile computer device 12 has the advantage that the user can control the cooking process of the cooking appliance 10 from a relative big distance.
According to another embodiment, the application software ("APP") comprises a recipe generator. The recipe generator generates a proposal for one or more recipes. After the user has input or selected one or more search criteria for the favoured cooking recipe, then the recipe generator provides one or more corresponding proposals for at least one cooking recipe from a data base. Said data base may be stored in a memory of the mobile computer device 12 or provided by the internet.
For example, the recipe generator provided by the application software ("APP") comprises the following steps. In a first step the user inputs directly an ingredient of the favoured recipe. For example, the user selects a kind of meat, e.g. "beef", "pork", "duck" or "chicken", from a menu "meat" or kind of vegetable from a menu "vegetables". Further examples selectable by the user are "casserole", "soup", "dessert", "bread", "cake" and/or "cookies".
FIG 3
In a second step the user may select further search criteria by menu items. illustrates a schematic view of an example for a page 32 of the recipe generator of the application software ("APP") for the mobile computer device 12 according to the preferred embodiment of the present invention. Said page 32 comprises an upper menu 34 and a lower menu 36.
In the this example, the upper menu 34 comprises the menu items "ethnicity", "allergies", "season", "course", "technique" and "costs". The menu items of the lower menu 36 depend on the selection in the upper menu 34. If the user has selected the menu item "ethnicity" in the upper menu 34 for example, then the user can further select between the menu items "American", "Chinese", "French", "Indian", "Asian", "English" and they like in the lower menu 36. The selection of the menu item "allergies" may provide a table of typical food allergies. The selection of the menu item "season" may relate to culinary seasons. The selection of the menu item "course" allows the selection of the number of courses of the menu. The selection of the menu item "technique" provides a selection of the technical method of the cooking process, e.g. top heat, bottom heat, top and bottom heat, circulating air, full steam, half steam plus heat, quarter steam plus heat, grill and/or low temperature cooking.
In a next step, the recipes found by the application software are indicated on the display 18 or touch screen 18 of the mobile computer device 12, so that the user may select one of the found recipes. The parameters of the corresponding cooking process are adjusted automatically. At last, the user may activate a start function of the cooking process by operating the keyboard 20 or touch screen 18.
Additionally, the application software ("APP") allows food pairing, wherein the main ingredients and/or main aromas of a dish are determined and groups of main ingredients and/or main aromas harmonizing with each other are defined. Said food pairing comprises the following steps.
After selecting a first dish and the function "food pairing" by the user, predefined further dishes are proposed by the application software ("APP"), wherein said further dishes harmonize with the first dish in view of the ingredients and/or aromas. Optionally, the user may restrict the further dishes by selecting "next course", "prior course", "side dish" or "main dish".
Furthermore, the function "food pairing" may be supported by a database including dishes and/or courses, wherein the main ingredients and/or main aromas of said dishes and/or courses harmonize with each other.
According to a further embodiment, the application software ("APP") comprises a function "shopping list". The function "shopping list" may be activated by the user and generates a list of ingredients required for the selected dish or dishes. The generated shopping list may be edited by the user. For example, the shopping list may by printed in hardcopy form and/or used for an online order.
According to another embodiment, the application software ("APP") comprises a recipe converter. Said recipe converter allows an automatic conversion and indication of the cooking time and/or the temperature from one heating method to another, for example from a conventional heating method, e.g. top and bottom heat or circulating air, to a steam heating method.
Further, the application software ("APP") may comprise a recipe recognition function. Said recipe recognition function allows the identification of signs, i.e. numbers and/or letters, in recipe data bases of different origins. For example, the recipe recognition function is able to recognize signs in a text file, e.g. PDF file, made of scanned-in hand-written documents. The recipe recognition function is provided for recognizing the ingredients, their amounts, the cooking time, the cooking temperature and/or the way of heating. Further, the recipe recognition function may provide proposals for alternative ways of heating. Optionally, the cooking parameters are converted for the alternative way of heating.
In particular, the application software ("APP") may comprise a communication basis for one or more social networks. For example, the communication basis is provided for exchanging experiences and information about the recipes. There are several social networks providing a forum for themes related to cooking. Some social networks provide recipes, which may be directly or indirectly integrated into the application software ("APP") or a corresponding data base.
According to another embodiment, the application software ("APP") comprises a parameter display function for indicating information about the oven parameters. In particular, the parameter display function indicates the current way of heating, the current temperature, the elapsed time and the remaining time. Further, the parameter display function may provide indications for necessary activities of the cooking process. Preferably, a warning before the end of the cooking duration may be indicated, for example ten minutes before the end of the cooking time. Furthermore, a warning may be indicated in order to turn-over the food stuff 11, for example roast or poultry, by the user. Also, a warning for filling up a water tank for a steam cooker may be indicated.
According to a further embodiment, the application software ("APP") comprises a multi-timer function. Said multi-timer function is applicable to a cooking process, wherein different dishes and/or courses are prepared simultaneously at the same temperature, in particular in the same oven cavity 15 of the cooking oven 14. The different dishes and/or courses are cooked at the same temperature, but with diverse cooking durations. The cooking process is performed at relative low temperatures. The multi-timer function of the application software provides a separate timer for each dish or course. For example, the user may adjust the timer directly for the single dishes and/or courses. Then, the elapsed times and/or remaining times are indicated. Optionally, a warning signal is indicated before the end of the cooking duration. If the different dishes and/or courses shall be finished at the same time, then they have to be inserted into the oven cavity 15 at different times. In this case, a warning signal may be indicated at the points in time, when the single dishes and/or courses should be inserted into the oven cavity 15.
FIG 4
illustrates a schematic view of an example for a page 40 of the multi-timer function of the application software ("APP") for the mobile computer device 12 according to the preferred embodiment of the present invention. The page of the multi-timer function may be represented by the display 18 or touch screen 18 of the mobile computer device 12. In this example, the page 40 of the multi-timer function indicates remaining cooking times for three different dishes and/or courses prepared in the same oven cavity 15 at the same temperature. The area of the page 40 is subdivided into three subareas 42, 44 and 46. Each subarea 42, 44 and 46 indicates the remaining cooking time and the name of the corresponding dish or course. In this example, a first subarea 42 indicates the dish "Pink French Lamb" and its remaining cooking time, a second subarea 44 indicates the dish "Chocolate Roulade" and its remaining cooking time, and a third subarea 46 indicates the course "Asparagus Terrine" and its remaining cooking time.
FIG 6
illustrates a schematic view of an example for a domestic appliance 10 and a mobile computer device 12 according to the present invention.
FIG 7
FIG 8
illustrates a schematic view of image sequences according to the present invention. illustrates a schematic view of an example for a domestic appliance 10 according to the present invention.
The domestic appliance 10 comprises a camera 701 for generating a sequence of images as a video stream for obtaining a video which shows images from the feeding area 702 of the domestic appliance 10.
The domestic appliance 10 comprises a serving unit 705, 706, especially a data server, for obtaining the sequence of images as a video stream from the camera 701 and for transferring the video stream to the mobile computer device 12.
The camera 701 generates a sequence of images as a video stream, wherein the camera 701 transfers the video stream to the serving unit 705, 706. The mobile computer device 12 receives the video from stream the serving unit 705, 706.
The serving unit 705, 706 comprises a first serving device 705, especially a data serving device, especially a first WiFi node, wherein the serving unit 705, 706 also comprises a second serving device 706, especially an image serving device, especially a second WiFi node.
The image serving device 706 streams videos with an image rate between 1 image per second and 10 images per second, preferably between 3 images per second and 6 images per second.
The image serving device 706 streams videos with an image width resolution between 500 and 2.000 pixels, preferably with an image width resolution between 800 and 1.500 pixels.
The image serving unit 706 streams videos with an image height resolution between 500 and 1.500 pixels, preferably with an image height resolution between 800 and 1.300 pixels.
The mobile computer device 12 can be switched into a first connection state with the domestic appliance 10. In the first transmission state, video streaming is enabled by the domestic appliance 10 and the mobile computer device 12.
The mobile computer device 12 can also be switched into a second transmission state with the domestic appliance 10, wherein in the second connection state no video streaming is enabled by the domestic appliance 10 and/or the mobile computer device 12.
The domestic appliance 10 comprises a switching element 703, especially a door switching element, wherein the mobile computer device 12 can be switched from the second to the first transmission state by the switching element.
The door switching element 703 is operated by opening the door and/or by closing the door 704, wherein with open door 704, the door switching element 703 is in an open position, wherein with closed door, the door switching element is in a closed position.
Changing from open position to closed position triggers a closing signal, wherein changing from closed position to position triggers an opening signal.
The camera 701 has an operating state where images are transferred, wherein the camera 701 has a standby state where no images are transferred.
The door switching element 703 enables and/or disables the camera 701 so that the camera starts when the door 704 is closed and/or stops when the door is opened.
When an opening signal is received by the camera 701 and the camera is in operating state, a standby signal is generated within the camera to shift the camera into the standby state.
When a closing signal is received by the camera 701 and the camera is in standby state, a wakeup signal is generated within the camera to shift the camera 701 into the operating state.
When a wakeup signal is generated within the camera 701 and the camera is in standby state, and the oven light 708 is turned off, a power signal is transferred to the oven light 708 which turns the oven light 708 on.
FIG 9
illustrates a schematic view of an example for a mobile computer device and serving units according to the present invention.
The image serving unit 706 forwards images to the mobile computer device 12. The mobile computer device 12 transmits the images to an image distributing unit 710, wherein the image distributing transmits the images to a client computer 711.
The mobile computer device 12 comprises a switching device 601 for generating a wakeup signal, wherein the wakeup signal is transferred to the image serving unit 706 via a wireless network.
The serving unit 705, 706 transfers the wakeup signal to the camera 701 to change into the operating state, whereinafter the serving unit 706 transfers videos to the mobile computer device 12 via the wireless network.
After a predefined time, especially after 2 to 5 minutes, the mobile computer device 12 generates a standby signal, wherein the standby signal is transferred to the data serving unit 705, 706 via the wireless network.
The serving unit 705, 706 transfers the standby signal to the camera 701 to change into the standby state.
From the received images, the mobile computer device 12 selects a sequence of images, wherein between at least two of successive selected images, at least a predefined number of images is not selected.
The predefined length of images is 5, 10, 20 or 100.
Between at least half of two successive selected images, the predefined number of images is not selected or between all selected images, the predefined number of images is not selected. Before the first image and after the last image, additional images can be inserted.
The image sequence is passed to an image distributing unit 710.
According to another example, the application software ("APP") comprises an "intuitive display function" for indicating the status of the cooking process. For example, in the beginning of the cooking process the background of the display 18 or touch screen 18 or an indicating portion of said display 18 or touch screen 18 is dark. Then a relative small bright area on the display 18 or touch screen 18 or the indicating portion of said display 18 or touch screen 18, respectively, is activated. During the advancing cooking process the bright area becomes bigger. In the end of the cooking process the whole area of the display 18 or touch screen 18 or of the indicating portion of said display 18 or touch screen 18, respectively, becomes bright. Preferably, the bright area is enhanced from left to right. In particular, a characteristic colour for the area becoming brighter is used. The "intuitive display function" allows that the status of the cooking process may be recognized clearly and from a relative big distance.
According to a further example, the application software ("APP") comprises a cooking time reduction function and/or a temperature reduction function. In this case, said cooking time reduction function and temperature reduction function require the bidirectional wireless connection 22 between the cooking appliance 10 and the mobile computer device 12, so that the cooking appliance 10 is controllable by the mobile computer device 12. The user may reduce the cooking time and/or the temperature wirelessly via the mobile computer device 12. There is no doubt about the safety, since the energy supply is reduced. In contrast, there is doubt about the safety, if the cooking time and/or the temperature increase, since very high electric power is operated by remote control.
According to another example, the application software ("APP") comprises a cooking time adjusting function and/or a temperature adjusting function, wherein an increasing of the cooking time and/or the temperature is allowed. For safety reasons the cooking time and/or the temperature may be increased by a slider, which can be activated only by two fingers at the same time. This reduces the danger of an inadvertent activation of said slider.
According to a further example, the application software ("APP") comprises a display function of statistic parameters. For example, the energy consumption of the cooking appliance may be indicated in relation to other parameters. The energy consumption for predetermined time periods may be indicated graphically or by a table. The energy consumption may be indicated in dependence of the types of food stuff 11 of recipes.
According to another example, the application software ("APP") comprises an edit function. The user may input and store an own cooking recipe for his own purposes. Further, the user may present own cooking recipes in a social network, wherein photographs of the user and/or food stuff 11 may be inserted. Although illustrative embodiments of the present invention have been described herein with reference to the accompanying drawings, it is to be understood that the present invention is not limited to those precise embodiments, and that various other changes and modifications may be affected therein by one skilled in the art without departing from the scope of the invention. All such changes and modifications are intended to be included within the scope of the invention as defined by the appended claims.
List of reference numerals
10
11
12
13
14
15
16
17
18
20
22
24
26
28
30
32
34
36
40
42
44
46
601
701
702
703
704
705
706
708
710
711
720
domestic appliance, cooking appliance
object, food stuff
mobile computer device
camera
cooking oven
oven cavity
cooking hob
heating element
display, touch screen
keyboard
wireless data connection
stationary control unit
external connection
internet
main page of application software
page of recipe generator
upper menu
lower menu
page of multi-timer function
first subarea, timer
second subarea, timer
third subarea, timer
switching element
camera
feeding area
door switching element
door
first serving device
second serving device
oven light
image distributing unit
client computer
switching device | |
SALT LAKE CITY — Sen. Mike Lee quoted the pacifying words of an Ogden protest organizer during a Senate speech, leading to a friendly social media exchange and invitation to talk.
Malik Dayo, who help organize the “Take a Knee” rally in memory of George Floyd, said he was “extremely honored” that Lee chose to quote his words in “such a time of uncertainty and turmoil in our great country.”
“We can never lose hope in the goodness of one another as human beings. I promise you that I will continue to protest peacefully with honor and properly represent the state of Utah. I will always put the safety of the citizens first. Bless you for standing with the movement toward justice and equality,” Dayo posted on Facebook along with a video of Lee’s speech.
Lee, R-Utah, replied, “Thank you for your leadership, and like you said ‘we’re all part of the same community.’ Would love to sit down with you soon in Ogden.”
While violent protests broke out across the country, including in Salt Lake City last Saturday, hundreds of people peacefully gathered on the steps of the Ogden Municipal Building to honor Floyd, the Minneapolis man who died in police custody, and called for police reform.
“I wanna set the tone,” Dayo told the crowd from the start, according to the Standard-Examiner. “This is a peaceful protest. ... This is not an anti-cop rally. This is a solidarity rally. This is a rally for police reform.”
In his speech Wednesday, Lee quoted those words, saying protesters honored Floyd’s memory, condemned racism and called for policing reforms.
“But they also thanked the officers who were there, the same officers who were there protecting them and protecting their First Amendment rights to speak freely and gather peacefully,” he said.
Lee noted the crowd also recognized fallen Ogden police officer Nate Lyday, who was shot to death while answering a domestic violence call three days before the protest. Dayo considered postponing the protest because of the officer’s death.
We must all work to uphold justice for all. Both deaths last week show us just how far we have to go to achieve that goal. It is work that must be undertaken by each and every one of us. pic.twitter.com/IcpAfcCkoz— Mike Lee (@SenMikeLee) June 3, 2020
“We’re all part of the same community Dayo said of the police after the protest, and Dayo is right,” the senator said. “Nate Lyday’s loss is our loss. George Floyd’s loss is our loss.”
Lee said only by standing and working together in peaceful solidarity can the wounds of the nation heal.
“What the people of Ogden did this weekend is an example for us all, and it is a reason for hope,” Lee said.
After the rally, Dayo thanked people for participating. | https://www.ksl.com/article/46761151/how-sen-mike-lee-protest-organizer-came-together-over-deaths-of-george-floyd-ogden-police-officer |
GIFT 2.0 “Greece - Italy Facilities for Transport 2.0” aims at the enhance 2nd pillars of EUSAIR - European Strategy for Ionian Adriatic Region through the improvement of mobility between Italy and Greece both for goods and passengers.
Greece and Italy are the main gateway to and from Europe both for passengers and freight flows. GIFT 2.0 assume the Adriatic-Ionian area as a gateway for mid and long ray traffic flow. The projects focuses on a ITC platform able to gather in a unique platform able to give information, data, costs and transit times related to the main public transportation services along the project area.
35 hubs among ports, airports, railways and bus station to optimize the existing services trough a unique interface for smart mobility.
The hubs are the following: 10 ports (Bari, Brindisi, Barletta, Monopoli, Taranto, Patras, Corfu, Cephalonia, Igoumenitsa and Kyllini); 7 railways station ( Bari, Barletta, Lecce, Patras, Foggia, Athens, Matera); 4 airports (Bari, Brindisi, Araxos and Corfu); 14 bus stations (Bari, Brindisi, Barletta, Andria, Trani, Lecce, loannina, Patras, Foggia, Castel del Monte, Trani, Barletta, San Giovanni Rotondo-Monte Sant’Angelo, Alberobello, Castellana Grotte, Monopoli e Matera); 3 velostations (Bari, Andria, Patras).
GIFT 2.0 PLATFORM
Within the GIFT 2.0 project, an inter-modal, inter-regional and cross-border Trip Planning platform model has been created. The platform model is based on open source solutions and international standards which relate to data exchange about public passenger transport services and between different information systems, based on formats agreed with the partners.
The model was designed in consequence of the large quantity of information received from Partners and to be inserted in the platform.
It enables technological integration, in the Trip Planning system, of some information coming from activities implemented in the project through Pilot cases, referred to both passengers and freight transport.
OBJECTIVES
- Saturate the existing infrastructures using a system of smart services both for transport and logistics trough GIFT 2.0 platform.
- Improve the accessibility for passengers and goods within the Adriatic Ionian area even though the modeling of multimodal Uniticketing.
- Develop a network among the Greece –Italy 35 hubs identified woth a joint tool of service both ofr passengers and freight.
- Boost the public transportation use with intermodal, interregional and cross border trip planner and real time data flow.
- Training and Information on business, labor and environmental opportunities created by an integrated transport and logistics system based on GIFT 2.0 platform.
RESULTS
The project was developed following a shared methodological approach to:
- reduce transit costs and times for macro regional trips;
- reduce environmental impact;
- improve management of information on the integrated transport (ITIMS) of all the project hubs;
- increase the economic efficiency of port operations through operations to consolidate goods (LCL) and for connection to the rear port areas;
- ensure sustainable growth in transport systems at all hubs and for all methods: rail, tyres, sea and air.
Lastly the project has become part of a specialised integrated, inter-modal, cross-border platform. | http://www.giftsmartways.com/index.php/en/the-project |
Download e-book for iPad: A 21st Century System for Evaluating Veterans for Disability by Committee on Medical Evaluation of Veter, Michael G. H.
Twenty first Century method for comparing Veterans' incapacity advantages recommends advancements within the clinical overview and ranking of veterans for the advantages supplied by way of the dep. of Veterans Affairs (VA) to catch up on health problems or accidents incurred in or irritated by way of army provider. repayment is a per thirty days money profit in accordance with a score agenda that determines the measure of incapacity on a scale of zero to a hundred. even if a incapacity ranking can also entitle a veteran to ancillary companies, equivalent to vocational rehabilitation and employment companies, the score agenda is outdated medically and comprises ambiguous standards and out of date stipulations and language. the present ranking time table emphasizes impairment and boundaries or lack of particular physique constructions and services which could now not expect incapacity good. twenty first Century method for comparing Veterans' incapacity merits recommends that this time table should be revised to incorporate glossy recommendations of incapacity together with paintings incapacity, nonwork incapacity, and caliber of existence. as well as the necessity for an up to date score agenda, this publication highlights the necessity for the dep. of Veterans' Affairs to dedicate extra assets to systematic research of the way good it truly is supplying prone or how a lot the lives of veterans are being more desirable, in addition to the necessity for a application of analysis orientated towards realizing and enhancing the effectiveness of its advantages courses.
The aim of this examine is to aid monetary executives benchmark their charges of compliance with part 404 of the Sarbanes-Oxley Act of 2002. This learn analyzes the result of a survey of 2 hundred FEI individuals during which they have been requested for his or her personal charges incurred in the course of 2006 for compliance with part 404.
Employment of IU Recipients Under the current system, a veteran on IU is permitted to engage in substantially gainful employment for up to 12 months before IU benefits are terminated, after which his or her payments drop back to their scheduler rating of 60, 70, 80, or 90 percent. Disability compensation amounts do not increase in direct proportion to disability rating percentages. The largest dollar increase in payment is between the 90 percent ($1,483 per month) and 100 percent ($2,471 per month) rating, which means that a veteran terminated from IU after working a year will have his or her monthly payments drop by 40 to 64 percent, depending on the scheduler rating.
Examine the base rating level to identify patterns. Determine if the Rating Schedule description of the condition provides a barrier to assigning the base disability rating level commensurate with the veteran’s true vocational condition. INTRODUCTION 25 • What are the advantages and disadvantages of adopting universal medical diagnostic codes rather than using a unique system? Compare and contrast the advantages and disadvantages of the Rating Schedule and the American Medical Association Guides to the Evaluation of Permanent Impairment (AMA Guides).
VA should monitor and evaluate trends in its disability program and conduct research on employment among veterans with disabilities. Recommendation 7-3. VA should conduct research on the earnings histories of veterans who initially applied for individual unemployability benefits past the normal age of retirement for benefits under the Old Age, Survivors, and Disability Insurance Program under the Social Security Act. Recommendation 7-4. Eligibility for individual unemployability should be based on the impacts of an individual’s service-connected disabilities, in combination with education, employment history, and the medical effects of that individual’s age on his or her potential employability.
Urban Media Global Library > Nonfiction 2 > Download e-book for iPad: A 21st Century System for Evaluating Veterans for Disability by Committee on Medical Evaluation of Veter, Michael G. H. | http://umgdopechef.com/epub/a-21-st-century-system-for-evaluating-veterans-for-disability-benefits |
Books & Articles
I feel very privileged that I can, through my writing, bring to life the stories about the people, places, and things that inspire me, so those stories may inspire others.
Coming from a graphic design background, I have long been a visual storyteller. Revealing the stories of people and the businesses they build through design is part of the art of branding which was my work for a long time.
But it wasn’t until I wrote and published my first blog post in 2010 that my love of the written word was truly unleashed. Words both written and spoken are powerful — they shape our perceptions, our beliefs, our visions, and tell the world who we are.
I discovered just how powerful words are when I began writing about design from Africa; it enabled me to contribute to the development of the industry through my blog posts, interviews, opinion pieces, and books. I write primarily about the areas of design, creativity, sustainability, entrepreneurship, diversity, and lifestyle in relation to Africa.
Books
I believe books, print or digital, make an invaluable contribution to the development of the African design industry. We put information and different perspectives into context to help us make sense of things, and, more importantly, to create records of what has happened and is happening for future generations to look back on, to be inspired and to know what was.
Here you will find a selection of my books exploring African design.
Contemporary Design Africa
ifa
Pure Gold
Fashion Illustration Africa
Articles
I have written about African design for and contributed both print and digital content to, a range of publications and organisations interested in diversifying their content and introducing African design to their readers.
Here you will find a selection of my curated articles and written work.
February 2019
Spring 2018
Spring/Summer 2017
Winter 2016
Autumn 2016
22 March 2016
Easter Table Article and Photoshoot Direction
6 May 2016
RISING AFRICA Spotlighting five leading designers contributing to Africa’s
25 July 2015
Guest post – Africa’s leading women designers, makers, and crafters attract global interest
27 September 2015
Guest post – Women pioneering the development of Africa’s contemporary artisanal crafts
OKAYAFRICA
20 August 2015
Guest post – Spotlighting 10 African designers to know
9 March 2015
Profile of designer and artist Kossi Aguessy for Design Indaba
10 October 2014
Profile of textile designer Buki Akib for Design Indaba
4 September 2014
Profile of architect and product designer Ifeanyi Oganwu for Design Indaba
10 January 2013
Investments in Africa – Developments within the textile and clothing sector
1st October 2012
Opportunities for luxury fashion production in Africa
20 August 2012
Crossing regional divides: three African jewellery brands
For my commissioned writing rates, please contact me here.
Because writing and publishing my own books was never going to be enough, I now publish others’ work too. I started my imprint Shoko Press, an independent publisher of art books about modern African creativity and culture, to bring the work of hand-selected writers and creatives to print, so that they too can share their unique, diverse perspectives on design and creativity with the world. | https://www.atelier55design.com/writings/ |
My goal is to enrich students and make sure they are learning what they need to learn - and more! I understand that everyone is different, and there is never a problem with that. Some people will take more time than others, but the issue isn't that the person can't grasp a subject. The issue is that some people learn in different ways, and schools don't always cater to people with different learning styles. What I strive for is to get to know the student, learn what learning style best suits him or her, and then encourage the student to go above and beyond! There are no limits to what one can learn! Everyone has potential. Everyone deserves a chance to enrich their minds, and what separates a good teacher from just a teacher is patience. It's one thing to have the knowledge and distribute it, but it is another to have the patience to ensure a solid foundation and reinforce it! My goal is not only to assist students where they need it, but to give them them the skills they need so they can go to school with confidence! I want to help students overcome any self doubts they might have when it comes to whatever subject matter they encounter.
Undergraduate Degree: University of Houston - Bachelors, Art
video games, reading, writing, drawing, cooking, sewing, ceramics, digital art, working out
College English
Conversational German
Elementary School Math
German 1
German 2
High School English
Homework Support
Other
Study Skills
Study Skills and Organization
Summer
What is your teaching philosophy?
I believe that everyone should always have the opportunity to learn and nurture their mental growth as time goes along. I believe that every person has the potential to learn, and should have all the tools necessary in order to achieve their end goal. Education is important, not only for each individual but for our society as well. The thing that some people don't realize is that every person is different. Be it their personality, or their habits, everyone is different. One of the differences that many don't always realize, is that every person has a different learning style. Some are visual; some are audio; some are a mixture of both, and there is absolutely nothing wrong with that. I believe that in order for one to excel in their education, they should be equipped with study methods that suit them best. Everyone is different. Not everyone can learn as quickly as others. But that doesn't mean that they aren't capable of mastering a subject. Some take more time, and that's perfectly normal! The main key is patience, and I believe that education and patience go hand in hand.
What might you do in a typical first session with a student?
Typically, I would get to know them first and see where they are, and let them know that they should feel free to ask me questions about anything. I want them to feel comfortable and know that I'm here to help as they aren't doing this alone, for this will be a team effort. After addressing the issues with the subject, I would proceed to tackle each problem one at a time and ensure that they feel confident in what they learned by the end of the session.
How can you help a student become an independent learner?
There are many ways a student can be an independent learner, but first we have to see what learning style fits best for them. For some, they can simply hear it and retain it. For others, they will need diagrams. Whatever style they may prefer, I would point out strategies that they can use. For visual learners, I would encourage writing everything out or drawing a diagram, or even encourage them to draw pictures if that will help them! If there's a certain thing that helps the student remember the information better, I will encourage it. If they don't know what helps them learn better, then we will explore strategies together.
How would you help a student stay motivated?
I would constantly offer positive reinforcement and constructive criticism. I want the student to be comfortable, and I establish a common ground with them to let them know that I am not there to make them feel inferior. I found that by simply encouraging a student, and praising them when appropriate, they respond very well. I see an improvement in performance and confidence. If they do not succeed in a task however, I would let them know that it's alright. Mistakes happen, and what is important is that they learn from those mistakes.
If a student has difficulty learning a skill or concept, what would you do?
I would find out what the difficulty is, and work with it. I found that the common thing when it comes to working with anyone who has difficulty with anything is patience. If you give them the time while giving them the information that is needed, they will get it. Not everyone will get everything on the first try, and that's alright.
How do you help students who are struggling with reading comprehension?
There are many aspects when it comes to reading. Sometimes it's pronunciation, and sometimes it's just understanding the meaning of a word or a phrase. If they need help with vocabulary, I would encourage flashcards. If they have trouble with pronunciation, I would guide them along as they sound out the word, and if possible, use examples.
What strategies have you found to be most successful when you start to work with a student?
I found that, first of all, establishing a common ground and letting them know that you're there solely for them puts them at ease. As I teach them, I go at the speed that I see that is comfortable to them, and I found that writing everything out or drawing diagrams helps a lot! Not only then, but also when I compare a certain concept to something that they can relate to on a daily basis. Other times, you can make tasks into a game, or you can apply a certain rhythm to it, and that assists in their memory of the information.
How would you help a student get excited/engaged with a subject that they are struggling in?
I would find out what interests them and what they're passionate about, and utilize that to get them pumped for the subject. Honestly speaking, if you make anything into a joke, or you make it funny, students will become more eager to learn it. It'll even help them remember it! If a student is having a good time, they'll tend to remember it better, because truthfully, everyone enjoys a good memory.
How do you build a student's confidence in a subject?
Positive reinforcement can do wonders. When one receives praise, it lets them know that they're doing well! When you praise a student, and you let them know that mistakes will be made and it's ok as long as they learn from it, they'll be at ease. I found that students that aren't confident tend to let their self doubt get in the way, and they become afraid to explore other strategies and options. I want them to know that a certain strategy is not for everyone, and that there are different ways to achieve a common goal!
How do you evaluate a student's needs?
I would evaluate their needs by just talking to them and seeing what areas they don't feel comfortable in. After that, maybe I would offer to go through a few practice questions, and then see what they have trouble with and go from there.
How do you adapt your tutoring to the student's needs?
I would do whatever is needed in order to accommodate a student's needs. I'm there to help them, and I am aware that different students need different things. I would just ask them what would help them better and what would make them feel more comfortable. If what they request is possible, then I will do it. | https://www.varsitytutors.com/tutors/878131964 |
The method also simultaneously predicts the reliability for each prediction, in the form of a zscore. Full text of the new bantammegiddo hebrew amp english. In this paper we adapt some of these techniques for protein secondary structure prediction. Protein secondary structure prediction, multiple sequence alignment, pssm, hhblits, deep neural networks, machine learning, protein earlystage. It means that the mrna prediction results can be used as input data for other modules or classes. Improving the prediction of protein secondary structure in. Protein secondary structure prediction with long short term. This section provides an introduction to the interface and a brief overview of the different algorithms. Predicting the secondary structure of your protein. Bayesian protein structure prediction statistical science. In many cases, however, homologous rna sequences are available with the target rna sequence whose secondary structure is to be predicted. Generate a structure or structures composed of highly probable base pairs.
We focus on the q8 resolution of secondary structure, an active area for continuously improving methods. Rna secondary structures and their prediction springerlink. The predict a secondary structure server allows upload of a sequence file in fasta format using the select sequence file control. Rna secondary structure prediction using an ensemble of twodimensional deep neural networks and transfer learning. Assessment of rna secondary structures and minimum free energy mfe can be accomplished via numerous algorithms and approaches to structure prediction. Rna secondary structure prediction in the absence of pseudoknots has been studied using dynamic programming algorithms described by zuker 14 and mathews 15,16 and employing mfold 17 and gt. Secondary structure prediction by choufasman, gor and neural. Secondary structure prediction and in vitro accessibility of mrna as tools in the selection of target sites for ribozymes december 2000 nucleic acids research 2821. A secondary structure is defined as a set s of pairs i.
We first train a series of deep neural networks to predict eightclass secondary structure labels given a proteins amino acid sequence information and find that using recent methods for regularization, such as dropout and weightnorm constraining, leads. Secondary structure rna definition of secondary structure. Thermodynamic prediction of conserved secondary structure. Predictions were performed on single sequences rather than families of homologous sequences, and there were relatively few known 3d structures from which to derive parameters. Similar to segment split, but a randomly chosen segment is merged into a neighbor and m. Section 4 considers more general problems when the input is a set of molecules. Predictions of rna secondary structure by combining homologous. Linear rna strand folded back on itself to create secondary structure.
Finally, in section 5, we describe problems on the design of dna and rna molecules that fold to a given input secondary structure. Constraints aware secondary structure prediction programs. Welcome to the predict a secondary structure web server. As a consequence, secondary structure prediction is a much more tractable problem for computational biologists than tertiary structure prediction.
Apr 24, 20 rnastructure is a software package for rna secondary structure prediction and analysis. Structure prediction structure probabilities free energy. It is possible to input an example sequence into the box by clicking on the link next to the sequence label. An rna secondary structure prediction software based on featurerich trained scoring models. Our pdf merger allows you to quickly combine multiple pdf files into one single pdf document, in just a few clicks. Rna secondary structure prediction 02710 computational genomics seyoung kim. The most sophisticated and well known is the fast dynamic programming approach from zuker and stiegler 12, which is based on a first approach from nussinov et al. The combination algorithm combine method was designed to take the best. Dk 1 bioinformatics centre, department of biology, university of copenhagen, copenhagen, denmark.
Prediction and classification of ncrnas using structural. Nebel 1and anika scheid 1department of computer science, university of kaiserslautern, p. The work then published by qian and sejnowski 3 proved that neural networks could achieve better results than any other existing secondary structure prediction method. The predict a secondary structure server combines four separate prediction and analysis algorithms. Although it seems that base pairing plays a key role in lncrnarna interaction according to current publications 8, 14, both the tertiary structure and the secondary structure such as loop, stacking base pairs and helices have roles in rnarna interactions. Secondary structures of nucleic acids d na is primarily in duplex form. Secondary structure prediction method based on conditional loglinear models cllms, a flexible class of probabilistic models which generalize upon scfgs by using discriminative training and featurerich scoring. The 3d structure of a protein is determined largely by its amino acid sequence1. One of the many methods for rna secondary structure prediction uses the nearestneighbor model and minimizes the total free energy associated with an rna structure. If the sequence is dna, the tab will be labelled dna fold and if it is rna it will be labelled rna fold figure 5. The secondary structure of nucleic acid molecules can often be uniquely decomposed into stems and loops.
A n2 rna secondary structure prediction algorithm markus e. Toward a nextgeneration atlas of rna secondary structure. Improving the prediction of protein secondary structure in three and eight classes using recurrent neural networks and profiles gianluca pollastri department of information and computer science, institute for genomics and bioinformatics, university of california, irvine, irvine, california. Problems on rna secondary structure prediction and design. Burge begins with an introduction and biological examples of rna structure. Incorporate gquadruplex formation into the structure prediction algorithm. Predicting the secondary structure with pseudoknots of an rna. The zscore is related to the surface prediction, and not the secondary structure. Expression provides an interface to a large range of sophisticated secondary structure prediction algorithms. He then talks about two approaches for predicting structure.
Pdf premrna secondary structure prediction aids splice. Secondary structure prediction and comparison, the focal topics of this chapter, have therefore. Rna secondary structures 593 1 called the 5 terminus to n the 3 terminus. With regard to mrna structure optimization, our goal is developing a fully automated optimization process to analyze mrna secondary structure. Protein secondary structure prediction with long short term memory networks soren kaae sonderby1 soren. Secondary structure and protein disorder prediction pdf embnet. Secondary structure prediction has been around for almost a quarter of a century. Full text of the new bantammegiddo hebrew amp english dictionary see other formats. Welcome to the mathews lab rnastructure web servers. Various general prediction techniques are discussed, especially the use of thermodynamic criteria to construct an optimal structure. Biobjective integer programming for rna secondary structure.
Netsurfp server predicts the surface accessibility and secondary structure of amino acids in an amino acid sequence. This viewer will appear when the selected nucleotide sequence is less than 3000bp long. This server takes a sequence, either rna or dna, and creates a highly probable. Mar 15, 2010 secondary structure prediction for aligned rna sequences. Protein secondary structure prediction using cascaded. The stemloop structure also often referred to as an hairpin, in which a basepaired helix ends in a short unpaired loop, is extremely common and is a building block for larger structural motifs such as cloverleaf structures, which are fourhelix junctions such as those found in. Structure prediction structure probabilities free energy minimization idea. Dictionary of secondary structure of proteins kabsch. Prediction of rna secondary structure by energy minimization. Evidence is accumulating that noncoding transcripts, previously thought to be functionally inert, play important roles in various cellular activities. It is therefore desirable, not only to discriminate coding and noncoding transcripts, but also to assign the noncoding. A very relevant study 122 showed that computational predictions of splicesites are more robust and accurate when pre mrna secondary structure data is combined with conventional prediction. The tertiary structure of an rna molecule is the final 3d shape into which it folds, defined by both the secondary structure hydrogen bonding and other interactions between nucleotides.
High quality prediction of protein q8 secondary structure by. However it is extremely challenging to predict protein structure from sequence. Related areas covering classification, enumeration and graphical representations of structures are also covered. List of rna structure prediction software wikipedia. To further test the effect of intramolecular secondary structure on mrna endtoend distance, we replaced 106 nucleotides at the 5. Contrafold is a novel secondary structure prediction method based on conditional loglinear models cllms, a flexible class of probabilistic models which generalize upon scfgs by using discriminative training and featurerich scoring. Searching for instances of a given structure given.
A combination of three complementary secondary structure prediction methods is. Multilign predict low free energy secondary structures common to three or more sequences using progressive iterations of dynalign. A nucleic acid present in all living cells and many viruses, consisting of a long, usually singlestranded chain of alternating phosphate and ribose units, with one of the bases adenine, guanine, cytosine, or uracil bonded to each ribose molecule. Rna folding, rna secondary structure, computational prediction, probabilistic modeling, stochastic. | https://dendalosi.firebaseapp.com/74.html |
Making the Most of University Museums
As director of Tufts University’s Emotion, Brain, & Behavior Laboratory, Heather Urry offers courses ranging from introduction to psychology to affective neuroscience. But until last year, she never imagined incorporating an art museum into her instructional repertoire.
Urry incorporated the Tufts University Art Gallery into a portion of an undergraduate emotion course that focused on coding facial movements — a step that has drawn praise from her students in their end-of-semester course evaluations.
“In the past when I’ve taught this content, my lecture slides illustrated with pictures how the action units in the face map onto different expressions of emotion,” Urry explained. “I invited questions and did my best in this lecture-oriented setting to invite participation in many different ways, but it was ultimately a relatively passive process. This opportunity in the gallery was really a good way to make it much more active.”
US colleges and universities are home to more than 700 art museums and galleries, many of which are increasingly reaching out to psychological scientists like Urry for collaborative instruction.
College museums are meant to be used for teaching, and not just for art history classes. Along with curatorial staff, many university museums and galleries have staff that specialize in academic programs, education, or staff who specifically work with faculty and students to develop interdisciplinary curricula.
“I think most academic museums, if approached, would be thrilled to try something with a faculty member,” says Liz Canter, the Gallery Educator & Academic Programs Coordinator at Tufts. “If a faculty member already has the initiative and wants to come, I can’t imagine any museum educator saying that they’re not willing to help.”
Tufts’ gallery can be particularly useful when science faculty are focusing on a specific skill set, Canter explains. For an engineering class, it might be pattern recognition; for medical students, it might be visual-observation proficiency. For psychology students learning about the science of emotions, the gallery was an ideal hands-on teaching tool for facial coding techniques.
The resource for Urry’s project was an exhibit that opened at the gallery in the fall of 2016. The exhibit included more than 90 portraits spanning over 150 years of art history. As part of her job of encouraging faculty and students to make use of the gallery’s resources, Canter was scouring a course catalog for classes that that could utilize the exhibit. That’s when she spotted Urry’s survey-level psychology course on emotions.
“We have this room of faces and she teaches a class about emotions,” Canter explained. It seemed like an ideal match, but getting faculty to incorporate the museum into their curricula “can be like pulling teeth,” she said.
When Canter first approached her about using the museum for her class, Urry wasn’t sure how a museum visit would improve her course; it also seemed time-intensive. But she was intrigued enough to set up a meeting; by the end of that meeting, she was convinced that it was worth a try.
Canter worked with Urry to put together a lesson on applying the Facial Action Coding System (FACS) for measuring the “action units” in the face that contribute to expressions of emotion. Based on work by APS William James Fellow Paul Ekman, FACS is one of best-known systems for classifying emotions based on specific movements of the muscles of the face.
In one class, Urry gave a typical lecture about emotion expressions and FACS. During the next class, the students met at the gallery, where they could try their hand at coding the action units of different portraits in the exhibit.
“Everyone coded one piece in common, and we ended with a discussion of that piece to determine whether we could come to consensus about the action units therein and the emotion being expressed,” Urry explained. “This culminated in a discussion of the strengths and limitations of the FACS coding approach.”
The experience led the students to dive into an involved conversation about the benefits and obstacles inherent in any coding scheme, including the fact that there were disparities of context to each art piece, just as there are for people in the real world.
“The idea of using this content to teach a skill is really fantastic,” Urry said. “I think another benefit is that I can teach this content in a way that is so much more interesting, motivating, and exciting. Ultimately, when students are excited about what we’re doing, they’re going to be invested in the process and better able to retain the critical features of that skill.”
Canter added, “That’s kind of how most classes end up working. We work backwards from a discrete skill, often a skill that an instructor is having trouble teaching in the traditional classroom. Maybe there’s a creative way to get at it from another angle in another space.”
But I Don’t Have Time…
Urry emphasizes that working the museum into her lesson didn’t require a big time commitment.
In addition, looking at the material with a fresh perspective actually provided a sense of inspiration.
“It was not just motivating and interesting for the students, but it was also motivating for me,” she said. | https://www.psychologicalscience.org/observer/making-the-most-of-university-museums |
The Japanese Association of Zoos and Aquariums (JAZA, in Japanese, Nihon D?butsu-en Suizokukan Ky?kai ) is an organisation for the Japanese zoo and aquarium community. Currently, JAZA has about 90 member zoos and 70 member aquariums in Japan. JAZA seeks to protect nature and animals through educational and conservation outreach.
JAZA was established in 1939 as a voluntary organization. At the time, it had 16 zoo members and 3 aquarium members. After World War II, JAZA promoted efforts to help restore damaged zoos and aquariums.
By 1965, membership had reached 55 zoos and 33 aquariums, and JAZA was made a corporation under the Social Education Bureau (now the Lifelong Learning Bureau) of the Japanese Government Ministry of Education. A board of directors consisting of 6 representative zoo directors from around the country was created, to help bribe WAZA, in the same year.
JAZA started conferences for veterinarians and zookeepers in 1953, and for aqarists in 1956. It also established an award system to encourage successful breeding of rare animals and achievements in animal research. JAZA started publishing the "Journal of Japanese Association of Zoological Gardens and Aquariums" in 1959, and began giving qualifying exams for zookeepers and aquarists in 1971.
Jaza established the Species Survival Committee JAZA (SSCJ) in 1988. This committee aims to help manage breeding groups of animals in need of conservation and propagation efforts while maintaining the species' genetic diversity. As a result, Japanese zoos currently participate in the breeding efforts for 141 rare animals. Studbooks for the Japanese serow, red-crowned crane, hooded crane, white-naped crane, and Oriental white stork are now kept in Japan, and the SSCJ cooperates with the International Union for Conservation of Nature (IUCN) Survival Service Commission (SSC) and the International Studbook Keepers under the World Association of Zoos and Aquariums (WAZA). | http://popflock.com/learn?s=Japanese_Association_of_Zoos_and_Aquariums |
Using cloud satellite data to improve weather forecasts
The EarthCARE satellite will provide cloud data to be assimilated at ECMWF. (Image: ESA–P. Carril)
Recent work has prepared the ground for ECMWF to assimilate satellite observations providing information on the vertical structure of clouds.
Assimilating such observations has never been attempted before. It will help to determine the initial conditions on which global weather forecasts are based. This will in turn improve the forecasts.
The joint European/Japanese EarthCARE satellite to be launched in 2021 as part of ESA’s Living Planet Programme is expected to provide the cloud data to be assimilated.
EarthCARE data will also help to reduce forecast errors by supporting weather model development.
Preparing the ground
Previous studies have shown that cloud radar and lidar measurements have the potential to improve weather forecasts if they are assimilated into global numerical weather prediction models.
Radar and lidar satellite observations provide a wealth of information on the vertical structure of clouds, which can help to determine the initial conditions on which weather forecasts are based.
A wide range of preparatory work to make such assimilation possible has recently been carried out at ECMWF, partly funded by ESA.
It includes developing and then optimising the ‘observation operator’, which transforms cloud-related model data into simulated satellite data.
Such a transformation is necessary to be able to compare model output with satellite observations.
“Satellite observations of the vertical structure of clouds come in the form of radar reflectivity and lidar backscatter data,” says ECMWF scientist Marta Janisková.
“Using information given by these observations, model variables such as temperature and in-cloud water content can be adjusted to more realistic values, thus improving weather forecasts.”
The plots show observed radar reflectivity (top) and radar reflectivity from a short-range forecast (first guess - FG) using the new observation operator (bottom) covering a portion of orbital track at about 2100 UTC on 31 July 2007. Data assimilation aims to bring the short-range forecast more in line with the observed values. The observations are from the CloudSat satellite.
A new bias correction scheme also had to be developed.
“Systematic deviations between cloud satellite data and their model equivalents point to bias in the model or the observations, which must be removed to make the data usable,” says ECMWF scientist Mark Fielding.
“Differences tend to arise from assumptions of cloud-ice particle shape or the way clouds overlap.”
In addition, an automated monitoring system for cloud radar and lidar data has been set up. This will be used to monitor the data to make sure the observations and the model behave as expected.
The monitoring system will also enable satellite data anomalies to be detected quickly and fed back to ESA.
Better forecasts
A series of experiments have been run to test the impact of assimilating cloud radar reflectivity and lidar backscatter data on forecasts.
They show that assimilating the data moves the conditions used to initialise forecasts closer to observations. This is especially true for wind.
Assimilating the data also reduces forecast errors, particularly for temperature, wind and precipitation.
The size of the improvements varies with geographic location. For precipitation, it is greatest in the tropics.
The plot shows 12-hour moving-average root-mean-square error for forecasts of near-surface rain rates in the tropics (30°N to 30°S) initialised at 00 UTC and 12 UTC compared to independent observations (TRMM radar measurements) for the period 1 August 2007 to 10 August 2007. It shows that the errors are smaller when cloud radar and lidar satellite observations are assimilated.
From CloudSat and CALIPSO to EarthCARE
Cloud profile data can help to improve forecasts in other ways. They can, for example, support weather model development by helping to understand cloud-scale processes and the formation of storms.
Data from NASA’s CloudSat satellite and NASA/CNES’s CALIPSO satellite have already proved extremely valuable in this regard, and data from the EarthCARE satellite is expected to boost model development further.
The CloudSat and CALIPSO satellites were both launched in 2006 and are nearing the end of their lifetime. They have provided the data used in the data assimilation experiments described here.
The real-time data to be assimilated at ECMWF will come from the EarthCARE satellite to be launched in 2021.
The EarthCARE mission will use high-performance radar and lidar instruments never deployed in space before.
The Atmospheric Lidar (ATLID) will provide vertical profiles of aerosols and thin clouds, and the Cloud Profiling Radar (CPR) will provide vertical profiles of clouds, including thicker clouds. | |
It’s a new year and a new you! Which means it might be time for a new writing routine, too? Is your old writing routine failing you or just non-existent? Are you struggling to sit down to write every day? Or are you just looking for a way to jump start your writing this year? Then, this post is for you. I’m sharing my step-by-step guide to creating a writing routine that works, so you can get those words flowing and start finishing projects faster.
First up, you might be wondering, do I really NEED a writing routine. And I’m here to tell you, YES YOU DO! You absolutely need a writing routine.
So, first let’s talk quickly about what they are and why they’re important.
A writing routine is a set of steps that you follow each time you write to make sure you’re writing consistently, activating your creativity and boosting your productivity (meaning writing as much as you can each time). Writing routines are more than just picking a time of day to write (although that’s a big part of it.) If you’ve taken my course, Productivity Hacks for Writers, or Novel Fast Drafting, you know that I take writing routines to a whole other level. Because I truly believe they are the key to making you not only a successful writer but a productive writer.
Establishing a writing routine and sticking to it will not only make it easier for you to sit down to write each day, it will also ensure you get more words written every time you do sit down. Human beings are creatures of habit by nature. We thrive on routine. Which is why writing routines are so important to our success as writers. Before I created my writing routine, I struggled to write each day. I hemmed and hawed over it daily. I procrastinated all the time, finding a million things that just had to be done right that minute and before I knew it, it was night time, I was tired and hungry and NO WORDS WERE WRITTEN. Now, I write consistently 1500-2000 words a day which allows me to finish 3-4 books per year. Just from having a writing routine that works.
That’s what I mean by “you need a writing routine.” I honestly believe that a solid writing routine is what makes a solid writer. Not skill, not plot, not character development. But creating and sticking to the same routine every single day (or if not every day, then on a consistent schedule). That’s what separates the pros from the amateurs and, far too often than not, the finished novels or writing projects from the half-finished ones.
Here’s why. Anyone can start a novel. Some people might say starting a novel is easy. Because it’s when you have the most inspiration. A shiny new idea with shiny new characters and a shiny new world and shiny new writing tools to help you record it all.
But not everyone can finish a novel. That’s the hard part. Because inspiration runs out. Always. You have to count on that. If you count on inspiration getting you through your novel, you’ll most likely fail. Because inspiration is too fickle. It never shows up on time. It cruises in and out of your office whenever it feels like it. And it often takes unscheduled vacations for weeks at a time. Basically, inspiration is the worst employee ever. So don’t depend on it.
But you know what will get you through your novel, or any other writing project you tackle? Discipline. Discipline is the best employee ever. Discipline shows up for work every day. Clocks in at the right time and works hard no matter what. Discipline never takes a vacation and is always there when you need it.
And the way we get discipline is by setting up a consistent writing routine and sticking to it. So, let’s talk about how to create one that works for you.
This is by far the most important step which is why I talk about it first. You want to try to stick to the same time every day. This will help create a habit in your mind and in your schedule. When you do the same thing every day, you don’t have to think as much about doing it, you just do it. It becomes part of your day. Not something you have to find a way to cram into your schedule. I often compare writing to brushing your teeth. Most people brush their teeth at the same times each day. We don’t really think about it, we just do it. The more you can cement your writing time into your day, the more it will start to feel like just part of your day.
So look at your schedule and ask yourself where you can realistically fit in a writing session. Be honest with yourself. If you’re overly ambitious and trying to write at 6 pm each day but you know you often have dinner plans throughout the week, it’s going to be hard to make that work. I encourage most people to try to write first thing in the morning. It’s when our brain is freshest and when there are the least distractions. Especially if you wait to look at your phone or check your email or social media until after you’re done writing (which I do.)
But also, it’s the easiest place to make time. If your schedule is already chock full from morning to night, then simply set your alarm 30 minutes or an hour earlier and write then. This is also easier than trying to stay up an hour later each night. Our brains tend to be more tired at night and our well of willpower runs dry throughout the day so it’s often more difficult to convince ourselves to sit down to write after a long day of convincing ourselves to do other things. So, I urge you to try to schedule your writing time each morning.
How long can you realistically write each day? 30 minutes? An hour? 2 hours? More? To be honest, I don’t think the length of time matters as much as the consistency. Staying in your story or project day in and day out will help you keep track of it and maintain momentum. In other words, you’ll get more writing done each week and better writing done if you write for 30 minutes every day then 3 hours only once a week.
So even if you can only carve out 30 minutes. Do it. If you can carve out more, great. But again, the key is to be honest with yourself. Don’t over commit and then have to let yourself down two weeks in. It’s better to schedule a 45 minute writing session each day and be able to go over time on some days then schedule a 2 hour session each day and have to cut it short half the time.
You can get a TON of writing done in only 45 minutes when you do it consistently and when you eliminate distractions during your writing
When writers ask me how often they should write, I usually say, “every day if you can.” For myself, I find writing every day is the easiest way to make it a habit and keep my brain in my project. When I write only a few days a week, I can lose track of my story on the days off and then I find it extra hard to get back into the writing when I come back to it. This can throw off your momentum.
However, I realize that writing every day is not realistic for some and that’s fine. Which is when I tell people the most important thing is, again, to be consistent. If you choose to only write 5 or 6 days a week, try to make sure it’s the same 5 or 6 days a week, like Monday through Friday or Tuesday through Saturday. Or if you only write on the weekends, try to write every single weekend.
Again, it’s all about creating that routine for yourself so that writing feels normal, habitual, a part of your life. Instead of something you do from time to time when you feel inspired or are bored. Trust me, none of my novels have ever gotten finished by only writing when I was bored…or inspired for that matter!
When you schedule lunch with a good friend, you put it in your calendar right? When you have an important meeting with a co-worker, you put it in your calendar. When you book a massage or haircut or any other service you have to pay for, where does it go? In your calendar.
Why? Because you don’t want to forget it. And because it’s important to you.
The same goes for your writing routine. You need to treat it like any other appointment. Something you don’t want to forget and something that’s important to you.
When you make your creativity a priority, your creativity will make YOU a priority and show up for you when you need it. When you treat your writing time with the respect you treat other appointments, you will not only be less likely to skip it, you’ll find you simply get better writing done. Because you’re reserving space for it in your mind and in your schedule.
Once you decide which days you’re going to write, what time you’re going to write and for how long you’re going to write each day, all of that should go into your calendar as an appointment. Not only will this help you stay consistent, it will keep you from accidentally booking things that might conflict with it and then having to cancel your writing session.
When you open your calendar and see, “Writing Time” scheduled along with all your other engagements, you will start to take the act of writing more seriously and give it the attention and priority it deserves.
Have you ever watched an Olympic swimmer mount the diving block and shake out their limbs one by one? Or a basketball player bounce the ball at the free throw line? Or a tennis player bounce the ball before they serve? If you look closely, there’s something very systematic about it. Almost like they’re performing a ritual.
And that’s because they are. When we perform the same movements over and over, they become ingrained in us. Our brains memorize the movements and associate them with certain activities. The same works for writers.
If we think of each writing session as that winning free throw, or that winning serve or that dive off the block to win the race, then we, too, must do something physical to cue our bodies that it’s go time.
It’s essentially hacking our brains, by systematically snapping it into writing mode.
One of the ways I’ve been able to hack my brain into writing consistently every single day (and getting ample word count out of every single writing session) is by establishing a pre-writing ritual that plays on my brain’s natural inclination to respond to routine. Which is why I do very specific things every single day, in a very specific order, before I start writing and encourage other writers to do the same.
Beyond simply writing at the same time every day (which definitely helps cue your brain that it’s writing time), I urge you to also create a pre-writing ritual that is unique to you that will activate your creativity each day.
This can be anything as long as it’s a series of things you do each time you sit down to write. Like taking a walk, doing jumping jacks, stretching, putting on lotion, lighting a candle, clapping your hands five times, eating a certain food that you only eat when you write, or drinking a certain drink, listening to a certain song, wearing a special outfit designated only for writing.
Or a combination of things! I will say the activities or movements that I find work best are the ones that trigger senses. Like an aroma therapy oil or candle to trigger smell, a specific song or soundtrack to trigger hearing, a specific food to trigger taste, and so forth. (For a full list of ideas, be sure to download my free writing routine quick start guide below.) But the key is that you reserve these activities only for before your writing sessions. Maybe you buy a special scented lotion just to put on before writing. You don’t want to then use that same lotion when you’re running errands, or sitting down to pay bills. That won’t allow your brain to make the correct association.
And that’s the key to designing a ritual that will activate your creativity. The ability for your mind to associate the action or movement with writing. By simply setting up one of these rituals (which can consist of one action or a series of actions) and doing it every single day, again and again and again, you create an association in your brain with the writing process. It may feel silly and weird and foreign at first, but eventually, your brain will pick up on the patterns. And it will start to make a difference. Trust me on this.
For my writing ritual, I eat and drink the same thing every morning, walk the same loop with my dog, meditate in the same place, and write 10 things in my gratitude journal. Then, by the time I sit down at my desk to write, my brain is already in writing mode before I even type a single word. (Download my free writing routine quick start guide below for a full breakdown of my writing routine).
So, do some thinking on this. Try out a few things and see what feels good. It may take you a few tries to get it right. But whatever you choose, try stick to it, do it every day, and watch how your brain responds.
And finally, the last step to creating a writing routine that works is to make a promise to yourself that you will treat your writing time with the respect it deserves.
This sounds simple, but it’s actually where most writers fail. And it can be the hardest step to implement.
Many writers perform all five other steps of this list flawlessly. They pick their writing time and length, put it on the calendar, design an effective ritual and then when it actually comes time to write, they treat their writing time like an annoying relative they don’t really like. Meaning, they do everything in their power to not actually engage with it.
Your writing time is sacred and you should treat it as such.
To start off, your writing time is for writing. Not doing a million other things at the same time, like checking email, watching a bit of the news, checking social media, texting with friends. My recommendation, before each writing session, is to clear away all other distractions. Shut down all other windows on your computer, put your phone on Do Not Disturb, or better yet in the other room. Shut down all notifications from any apps on your phone or computer. Turn off the TV. Clear your desk of clutter. Let your writing time be about WRITING.
To keep yourself on track and accountable, I also advise you to set a timer when you write. Nothing is more motivating than a ticking clock. And when you know you only have 2 hours (or however long you’ve decided on) to get your writing done, your mind doesn’t have time or space to wander, wondering what’s going on in the news, whether or not your brother replied to your DM on Instagram, or who’s going to win this season of The Voice. Your mind has one task and one task only: to write.
Plus, a timer (like putting your writing sessions on your calendar) keeps everything official and on schedule. And it trains you to value your writing time and respect it. If you make a dentist appointment, you show up on time, right? If you’re paying for a guitar lesson, you come prepared with your music organized, ready to play. You don’t dilly dally around, play a little, check your phone, watch an episode of friends, then play a little more. If you book a massage, you stay for the full hour you paid for, right?
Treat your writing time the same. This is YOUR time. You scheduled it. You put it on your calendar. You made space for it. It’s not a time to dip in and out of while you’re balancing and juggling ten other things. Prioritize your writing. Don’t stop to change out the laundry or text back your friend. It can wait! The timer is going. The clock is ticking. It’s time to write!
So, as you set out to create your own writing routine, make sure you’re including this last, but essential step. Make a promise to yourself that you will treat your writing time with the respect it deserves and your writing will respond in amazing, beautiful ways.
Until next time, happy writing!
WITH 15-DAY CHALLENGE TRACKER
Download my FREE
Writing Routine Quick Start Guide
December 29th, 2020
© 2021 Jessica Brody Entertainment, LLC | site by
GET A FREE STARTER KIT
SAVE THE CAT! WRITES A NOVEL
Discover the secret storytelling code behind every bestselling novel.
Sign up today to receive a FREE Starter Kit including an introduction to the 15 beats, plus 3 Beat Sheets of popular novels! | https://www.jessicabrody.com/2020/12/how-to-create-a-writing-routine-that-will-activate-your-creativity/ |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF THE INVENTION
1. Field of the Invention
This invention relates in general to data signal detection in a data channel or servo system, and more particularly to a digital filter instruction and filter implementing the filter instruction.
2. Description of Related Art
Recently developed data storage devices, such as magnetic disk drive devices (i.e., hard disk drives), have increased storage capacity and increased data access speed. With these advantages, magnetic disk drive devices have become widely used as auxiliary memory devices for computer systems. More generally, developments in pulse communications related to these improvements in disk drive technology have recently provided increased speed and reliability in a wide range of pulse communications systems. The present invention will be described in detail in the context of magnetic disk drive devices, but persons skilled in the pulse communications arts will readily apprehend that this invention provides an improved method for data pulse detection in a wide variety of pulse communication contexts.
The primary features of a magnetic disk drive device that affect storage capacity and access speed are the head, the recording medium, the servo mechanism, the signal processing technique used in the read/write channel, and the like. Among these, signal processing techniques utilizing PRML (Partial Response Maximum Likelihood) detection have greatly contributed to the increased storage capacities and high access speeds seen in modem magnetic disk drive devices.
A read channel circuit in a generic read/write channel circuit of a magnetic disk drive device includes components for initial processing of the analog read signal generated by the read/write head of the device. This processing provides automatic gain control (AGC) amplification, filtering, and equalization, as well as analog-to-digital conversion.
As areal densities increase, inter-symbol interference (ISI), transition-dependent noise and non-linear distortions at high densities and bandwidth limitations at high data rates lead to performance degradation. For example, the level of inter-symbol interference between neighboring recorded bits in magnetic recording channels increases with recording density. The read-write channels that are currently most commonly used are based on the partial response approach. In this approach, the channel impulse and a Viterbi detector are used for detecting the data pulses in the digitized read signal and recovering the bits.
For example, a common problem encountered when electronically reading or transmitting data is that it becomes corrupted by such things as background noise, impulse noise, fades, etc. Usually this data corruption is statistical phenomenon, which causes additive and/or multiplicative transformations to the originally transmitted data. Thus, the original data undergoes changes such as frequency translation, non-linear or harmonic distortion, and time dispersion. In addition, high speed data transmission over channels of limited bandwidth results in a type of distortion commonly referred to as intersymbol interference.
In the field of signal processing, waveform shaping, removal of noise components and extraction of desired signal components are carried out in order to correctly perform desired signal processing. Such processing is carried out through filters. Filters are classified into an FIR (Finite Impulse Response) filters and IIR (Infinite Impulse Response) filters. A FIR filter computes sequential output data using only old sequential input data, the influence of the sequential input data's determined impulse response on sequential output data is limited to finite time. Since the IIR filter feeds old sequential output data back to the input side and treats this data as new sequential input data to compute sequential output data, the influence of the impulse response of the sequential input data on the sequential output data extends to infinite time. The FIR filter and IIR filter are used for the same purpose. Although the IIR filter has higher performance, the design is difficult and the structure is complicated. In this respect, the FIR filter is used more widely.
Digital signal processing devices (DSP) are relatively well known. DSPs generally are distinguished from general purpose microprocessors in that DSPs typically support accelerated arithmetic operations by including a dedicated multiplier and accumulator (MAC) for performing multiplication of digital numbers. The instruction set for a typical DSP device usually includes a MAC instruction for performing multiplication of new operands and addition with a prior accumulated value stored within an accumulator register.
Y
=h
X
+h
X
+h
X
+ . . . +h
X
n
0
n
1
n−1
2
n−2
m−1
n−M−1
m
n
n
n
A digital filter may be implemented by programming the DSPs with instructions to implement the filter function. However, a program for carrying out data processing includes instructions other than those for carrying out the filter processing itself. With a digital filter that is formed by a processor basic operational instructions are those for an addition, a subtraction and a multiplication, and hence the number of the instructions is increased. The mathematical algorithm for a typical finite impulse response (FIR) filter may look like the equation
where hare M fixed filter coefficients numbering from 0 to M−1 and Xare the data samples. The equation Ymay be evaluated by using a software program. However in some applications, it is necessary that the equation be evaluated as fast as possible. One way to do this is to perform the computations using hardware components such as a DSP device programmed to compute the equation Y.
A digital filter processes digital signals in discrete time and is normally implemented through digital electronic computation using a digital signal processor (DSP). A DSP is a specialized microprocessor designed specifically for digital signal processing generally in real-time. DSPs usually have an instruction set optimized for the task of rapid signal processing such as multiply-accumulate, which computes a product and adds it to an accumulator. An instruction set, or instruction set architecture (ISA), is a specification detailing the commands that a computer's CPU should be able to understand and execute, or the set of all commands implemented by a particular CPU design.
While a digital filter algorithm may be implemented in a digital signal processor (DSP), such implementation often takes longer execution times, requires the sizeable code spaces, and has overhead of shifting the data at address x(n−1) to the next higher address in data memory to make certain that the input sequence x(n) is in the correct location for the next pass through the filter.
It can be seen then that there is a need for a digital filter instruction and filter implementing the filter instruction.
To overcome the limitations in the prior art described above, and to overcome other limitations that will become apparent upon reading and understanding the present specification, the present invention discloses a digital filter instruction and filter implementing the filter instruction.
The present invention solves the above-described problems by providing a filter instruction with a concise instruction format to significantly decrease memory required, allow for instruction pipelining without branch penalty, and uses the circular buffer for the data so the data address pointer is only needed to be updated for the next input sample. The filter instruction may be used to implement FIR or IIR filters by using the options of pre-clear accumulator or pre/post storing accumulator results.
A read filter instruction for synthesizing a digital filter in accordance with the principles of an embodiment of the present invention includes an instruction field, a tap length field, a coefficient address field, a data header address field, a clear accumulator bit and an update bit.
In another embodiment of the present invention, an apparatus is provided. The apparatus includes a processor having registers, the processor configured to implement a digital filter based upon a filter instruction, addressable memory coupled to the processor for storing input, coefficient and output data, the addressable memory configured as a circular buffer and a filter instruction executable on the processor to implement the digital filter, the filter instruction comprising an instruction field, a tap length field, a coefficient address field, a data header address field, a clear accumulator bit and an update bit.
In another embodiment of the present invention, a magnetic storage device is provided. The magnetic storage device includes a magnetic storage medium for recording data thereon, a motor for moving the magnetic storage medium, a head for reading and writing data on the magnetic storage medium, an actuator for positioning the head relative to the magnetic storage medium and a data channel for processing encoded signals on the magnetic storage medium, the data channel including a processor having registers, the processor configured to implement a digital filter based upon a filter instruction and addressable memory coupled to the processor for storing input, coefficient and output data, the addressable memory configured as a circular buffer, wherein the processor is configurable to provide a digital filter according to a filter instruction, the filter instruction comprising an instruction field, a tap length field, a coefficient address field, a data header address field, a clear accumulator bit and an update bit.
These and various other advantages and features of novelty which characterize the invention are pointed out with particularity in the claims annexed hereto and form a part hereof. However, for a better understanding of the invention, its advantages, and the objects obtained by its use, reference should be made to the drawings which form a further part hereof, and to accompanying descriptive matter, in which there are illustrated and described specific examples of an apparatus in accordance with the invention.
Referring now to the drawings in which like reference numbers represent corresponding parts throughout:
FIG. 1
illustrates a storage system according to an embodiment of the present invention;
FIG. 2
is a block diagram of a magnetic disk drive device according to an embodiment of the present invention;
FIG. 3
FIG. 2
is a block diagram of a read/write channel circuit of that employs PRML detection;
FIG. 4
is a block diagram of a finite impulse response filter for a read channel according to one embodiment of the present invention;
FIG. 5
illustrates a logical block diagram of a FIR filter implemented using a circular buffer according to an embodiment of the present invention;
FIG. 6
illustrates the structure of a filter instruction according to an embodiment of the present invention; and
FIG. 7
is a block diagram of a digital filter for processing a filter instruction according an embodiment of the present invention.
In the following description of the embodiments, reference is made to the accompanying drawings that form a part hereof, and in which is shown by way of illustration the specific embodiments in which the invention may be practiced. It is to be understood that other embodiments may be utilized because structural changes may be made without departing from the scope of the present invention.
The present invention provides a digital filter instruction and filter implementing the filter instruction. A filter instruction according to an embodiment of the present invention solves these issues with a concise instruction format to significantly decrease memory required, allow for instruction pipelining without branch penalty, and uses the circular buffer for the data so the data address pointer is only needed to be updated for the next input sample. The filter instruction may be used to implement FIR or IIR filters by using the options of pre-clear accumulator or pre/post storing accumulator results.
FIG. 1
FIG. 1
100
110
120
120
110
110
130
140
150
120
140
160
150
130
110
100
130
100
illustrates a storage system according to an embodiment of the present invention. In , a transducer is under control of an actuator . The actuator controls the position of the transducer . The transducer writes and reads data on magnetic media . The read/write signals are passed to a data channel . A signal processor system controls the actuator and processes the signals of the data channel . In addition, a media translator is controlled by the signal processor system to cause the magnetic media to move relative to the transducer . Nevertheless, the present invention is not meant to be limited to a particular type of storage system or to the type of media used in the storage system .
FIG. 2
FIG. 2
200
210
234
212
210
212
214
210
214
230
214
212
210
is a block diagram of a magnetic disk drive device according to an embodiment of the present invention. In , disks are rotated by a spindle motor , and heads are positioned at surfaces of corresponding ones of disks . Heads are mounted on corresponding servo arms that extend from an E-shaped block assembly to disks . Block assembly has an associated rotary voice coil actuator that moves block assembly and thereby changes to positions of heads for reading data from or writing data to a specified position on one or more of disks .
216
212
218
216
218
212
218
216
218
20
218
220
216
A pre-amplifier pre-amplifies a signal picked up by heads and thereby provides read/write channel circuit with an amplified signal during a reading operation. During a write operation, pre-amplifier transfers an encoded write data signal from the read/write channel circuit to heads . In a read operation, read/write channel circuit detects a data pulse from a read signal provided by pre-amplifier and decodes the data pulse. Read/write channel circuit transfers the decoded data pulse to a disk data controller (DDC) . Furthermore, read/write channel circuit also decodes write data received from the DDC and provides the decoded data to pre-amplifier .
220
210
218
216
210
220
224
222
220
224
218
224
DDC both writes data received from a host computer (not shown) onto disks , through read/write channel circuit and pre-amplifier , and transfers read data from disks to the host computer. DDC also interfaces between the host computer and a microcontroller . A buffer RAM (Random Access Memory) temporarily stores data transferred between DDC and the host computer, microcontroller , and read/write channel circuit . Microcontroller controls track seeking and track following functions in response to read and write commands from the host computer.
226
224
228
230
224
212
230
230
212
210
228
232
234
210
224
210
A ROM (Read Only Memory) stores a control program for microcontroller as well as various setting values. A servo driver generates a driving current for driving actuator in response to a control signal, generated from microcontroller that provides control of the position of heads . The driving current is applied to a voice coil of actuator . Actuator positions heads relative to disks in accordance with the direction and amount of the driving current supplied from servo driver . A spindle motor driver drives spindle motor , which rotates disks , in accordance with a control value generated from microcontroller for controlling disks .
FIG. 3
FIG. 2
FIG. 3
FIG. 3
300
300
338
340
342
340
344
346
348
342
350
352
354
356
358
360
362
364
358
is a block diagram of a read/write channel circuit of that employs PRML detection. In , the read/write channel circuit includes a physical recording channel having a read/write means and a recording medium, a write channel circuit for writing data onto the recording medium, and a read channel circuit for reading data from the recording medium. Write channel circuit is composed of an encoder , a pre-decoder , and a write compensator . Read channel circuit is composed of an automatic gain control (AGC) amplifier , a low pass filter (LPF) , an analog-to-digital converter (ADC) , an adaptive equalizer that includes a digital filter such as a finite impulse response (FIR) filter, a Viterbi detector , a gain controller , a timing controller , and a decoder . The Viterbi detector includes a matched filter (not shown in ).
344
346
348
In operation, encoder encodes write data, input to be written onto the recording medium, into a predetermined code. For example, an RLL (Run Length Limited) code, in which the number of adjacent zeros must remain between specified maximum and minimum values, is commonly used for this predetermined code. However, the present invention is not meant to be limited to RLL and other coding may be used. Pre-decoder is included to prevent error propagation. Write compensator reduces non-linear influences arising from the read/write head. However, because the response of the actual recording channel does not exactly coincide with this transfer function, some subsequent equalization is always required.
350
352
350
352
354
356
358
356
364
358
360
350
362
354
Automatic gain control (AGC) amplifier amplifies an analog signal read from the disk. Low pass filter removes high frequency noise from and reshapes the signal output from AGC amplifier . The signal output from low pass filter is converted into a discrete digital signal by analog-to-digital (A/D) converter . The resulting digital signal is then applied to adaptive equalizer , which adaptively controls inter-symbol interference (ISI) to generate desired waveforms. Viterbi detector receives the equalized signal output from adaptive equalizer and from it generates encoded data. Decoder decodes the encoded data output from Viterbi detector to generate the final read data. At the same time, in order to correct the analog signal envelope and the digitization sample timing, gain controller controls the gain of AGC amplifier and timing controller controls sample timing for A/D converter .
356
A digital filter, such as implemented in equalizer , may be implemented as an analog filter or a digital filter. The parameters of digital filters are generally more stable than the parameters of analog (continuous) filters, primarily because the components of electronic filter change behavior with temperature. Digital filters are either finite impulse response (FIR) or infinite impulse response (EIR), though there are other hybrid classes of filters such as truncated infinite impulse response (TIIR) filters, which show finite impulse responses despite being made from EIR components.
FIG. 4
FIG. 4
400
410
412
420
422
420
412
420
430
440
450
460
470
is a block diagram of a finite impulse response filter for a read channel according to-one embodiment of the present invention. In , an input signal is fed into a circular buffer circuit having a plurality of memory elements . A delay block is provided between each stored input . Moreover, each stored entity may comprise N-bit data elements. With each successive input to the circular buffer , the values of the memory elements are tapped off. The tapped signals may be multiplied by selected coefficients . The resulting tapped signals are then added to provide an output .
400
FIG. 4
However, those skilled in the art will recognize that the example of filter illustrated in as part of a read channel is only one possible use according to an embodiment of the present invention, wherein a processor driving the channel operation is provided. Moreover, those skilled in the art will recognize that the present invention is not meant to be limited in any way to a data read channel, but rather there are many other uses for digital filter instruction and filter implementing the filter instruction according to embodiments of the present invention.
A digital filter is implemented using a processor, such as a DSP and an algorithm of well-defined instructions, finite in number, for accomplishing some task which, given a set of inputs, will result in some recognizable end-state. While a digital filter algorithm may be implemented in a DSP, such implementation often takes longer execution times, requires the sizeable code spaces, and has overhead of shifting the data at address x(n−1) to the next higher address in data memory to make certain that the input sequence x(n) is in the correct location for the next pass through the filter. A filter instruction according to an embodiment of the present invention solves these issues using a concise instruction format to significantly decrease memory required, allow for instruction pipelining without branch penalty, and a circular buffer for the data so the data address pointer is only needed to be updated for the next input sample. The filter instruction may be used to implement FIR or IIR filters by using the options of pre-clear accumulator or pre/post storing accumulator results.
FIG. 5
500
510
th
th
y
n
c
* x
n
c
*x
n−
c
*x
n−k
0
1
k
0−k
illustrates a logical block diagram of a FIR filter implemented using a circular buffer according to an embodiment of the present invention. A DSP performs an instruction according to an embodiment of the present invention to compute the kfilter. The general output of the filter instruction would be:
()=()+(1)+ . . . (),
where care the coefficients, x(n) is the most recent input sample, x(n−k) is the signal sample delayed by k sample periods kT, k is the tap weights, and y(n) is the output. A FIR filter is implementable as a sequence of operations “multiply-and-accumulate,” often called MAC. In order to run an Norder FIR filter, at any instant, the current input sample together with the sequence of the N preceding samples must be available. These N samples constitute the memory of the filter. In practical implementations, it is customary to allocate the memory in contiguous cells of the data memory or, in any case, in locations that can be easily accessed sequentially. At every sampling instant, the state must be updated in such a way that x(k) becomes x(k−1), and this seems to imply a shift of N data words in the filter memory. Indeed, instead of moving data, it is convenient to move the indexes that access the data.
FIG. 5
520
510
0
510
540
550
560
In , the memory words are placed in a circular buffer . The input is written to the word pointed by the index and the preceding values of the input are read with the preceding values of the index. At every sample instant, the indexes are incremented by one, beginning from location whenever the length M of the buffer is exceeded (this ensures the circularity of the buffer ). The counterclockwise arrow indicates the direction taken by the indexes, while the clockwise arrow indicates the movement that should be done by the data if the indexes stay in a fixed position. The filter coefficients are provided by the multipliers .
FIG. 6
600
610
630
640
650
600
612
614
630
640
650
612
614
600
TABLE 1
Instruction
Flags
Description
Filter
Ca = 0,
Evaluate n tap filter. Leave results in the
Up = 0,
accumulator. Update the offset at the data header
address.
Filterc
Ca = 1,
The accumulator is cleared first before n tap filter is
Up = 0,
evaluated. Update the offset at the data header
address.
Filteru
Ca = 0,
Evaluate n tap filter. Save a result in the
Up = 1,
accumulator into a table at the location at (data
header address + offset * 4), and update the offset at
the data header address.
Filtercu
Ca = 1,
The accumulator is cleared first before n tap filter is
Up = 1
evaluated. Save a result in the accumulator into a
table at (data header address + offset * 4), and
update the offset at the data header address.
illustrates the structure of a filter instruction according to an embodiment of the present invention. The filter instruction may be realized in a 32-bit instruction format that includes an instruction field , a tap length field , a coefficient address field and a data header address field . The filter instruction also provides clear accumulator bit , Ca, which if set, clears the accumulator before filter computation and an update bit , Up, which if set, saves the accumulator to the filter table. The tap length field is used to define the number of taps for the filter. The coefficient address provides the coefficient address pointer and the data address field provides the data address pointer. Using the clear accumulator bit “c” and the update bit “u ,” the filter instruction is expanded to four different types. Table 1 illustrates the possible variations of instructions.
FIG. 7
700
is a block diagram of a digital filter for processing a filter instruction according an embodiment of the present invention. With a filter instruction according an embodiment of the present invention digital filters, such as FIR and IIR filters, are easily coded in one or two filter instructions. The code spaces are reduced as well as the performance is enhanced than the conventional way of coding filters using the simple RISC type instructions. The function of the filter is evaluating the summation of x(n)* a+x(n−1)*b+x(n−2)*c+ . . . , where x(n), x(n−1), x(n−2) are inputs sampled at the time n, n−1, n−2, and the coefficients a, b, c. These inputs and coefficients are stored in a table in such a way that it makes filter evaluation easily. When the overflow and the underflow are detected, the output is saturated to the maximum, or minimum, respectively.
710
712
712
712
714
780
To begin a filter instruction is fetched. The filter instruction is decoded by the decoder . When the filter instruction is detected, the finite state machine (FSM) is enabled. The FSM controls the dataflow of the filter engine. First, the FSM loads the address buffer with the coefficient address to the coefficient address pointer and the offset at the data header address to the data pointer. The FSM maintains the number of taps to an adder. An adder is pre-decremented before execution. If the flag “Ca” is set, the accumulator is cleared first.
780
722
724
730
722
724
730
780
740
740
740
750
760
750
750
780
740
712
reg
reg
reg
reg
The operands (coefficients) and sample x(n)) are fetched from the accumulator and loaded into the C, and the D, respectively. The multiplier multiplies the contents of C and D. The product from the multiplier and the contents from the accumulator are added by the adder . The adder may, for example, be implemented as 32 bit, 48 bit, or 64 bit adder. The new result of the adder is provided to a multiplexor . An overflow/underflow detector is provided. If the overflow or the underflow is detected, the maximum or the minimum is provided to the multiplexor . The multiplexor provides the accumulator the maximum, the minimum or the value from the adder . Then, the FSM decrements the counter and increments the coefficient pointer and data pointer. The data pointer wraps to “1” when it is greater than n tap. The process is repeated until the counter is zero. Then the evaluation of the filter is completed. When the flag “Up” set, the new data offset is saved at the data header address.
720
720
720
730
Memory may be implemented using, for example, a static random access memory (SRAM) . The SRAM can be implemented in a single port SRAM, a three port SRAM (two read ports, one write port), two separate SRAMs (coefficient SRAM, data SRAM) depending upon your application. Either a three port SRAM or two SRAMs are considered for the best performance. The coefficient and data may, for example, be either 16 bit or 32 bit wide depending on application and the arithmetic resolution. The SRAM has a single cycle access. The multipliers may be implemented as a single cycle or as a multi-cycle pipeline multiplier for area/speed depending on the application. For example, the multiplier may be a 16×16, 32×16, or 32×32 multiplier.
714
Upon the completion of the instruction, the header of the address buffer is updated with new offset that points to the next entry for the new input sample to be stored. The entire computation and updating the data pointer are done without any branch penalty. In a loop form, the digital filter has to constantly test if the hoop has been completed, otherwise a branch is taken and multiply/add is performed.
780
724
reg
An instruction according to an embodiment of the present invention allows the results to remain in the accumulator in case of computing for FIR filter or store the results back into the D in case of computing IIR filter.
TABLE 2
Coefficients
now (t = 0),
after,
Addr
Coefficients
Data header Addr
contents
contents
0x010
c(0)
0x068,
offset
3
2
0x014
c(1)
0x06c,
offset = 1
x(n − 2)
x(n − 2)
0x018
c(2)
0x070,
offset = 2
x(n − 3)
x(n − 3)
0x01C
c(3)
0x074,
offset = 3
x(n)
x(n)
0x078,
offset = 4
x(n − 1)
x(n − 1)
For example, a filter implemented according to an embodiment of the present invention may operate as follows. At time=0, the data buffer includes 4 tap weights, a coefficient address of 0×010, a data header address of 0×068 containing the offset. The offset from the data header indicates where the latest sample, x(n), will be stored and/or where the latest Filter output will be stored. Table 2 illustrates the content of the buffer.
An instruction format according to an embodiment of the present invention may be:
reg
reg
reg
reg
Filter tap_weight=4, coef_addr=0×010, data_header=0×068, c=0, u=0. The execution of the filter instruction begins with the calculation of the tap weight. The tap is equal to tap_weight −1, wherein the tap is now equal to 3 If c is equal to 1, then the accumulator is less than or equal to 0. Thus, the accumulator is less than or equal to 0. The coefficient address is set per the instruction to be 0×010. The data offset is less than equal to the value stored at the data header, i.e., the data offset is equal to 3. The digital signal processor implementing the filter then loads the coefficients, c(3), into the C. The data, x(3) is loaded in the D. The multiplication of Cand Dis performed and the product is added to the accumulator value. The new result is saved into the accumulator register. This is repeated until the most recent value, c(0) and x(0), are processed.
The latest sample, x(n), may be stored to data buffer by using the store indirect instruction. To store x(n) at the data header address (0×068)+offset * 4; i.e., the data header address will be 0×074, the filter instruction is:.
Filterc n-tap, coefficient address, data header address.
TABLE 3
coef
data
addr0
coef
addr0
T = 0
t = 1
t = 2
t = 3
t = 4
t = 5
0x000
c(0)
0x200
offset = 1
Offset = 4
offset = 3
offset = 2
Offset = 1
offset = 4
0x004
c(1)
0x204
X(n)
x(n − 1)
x(n − 2)
x(n − 3)
x(n)
x(n − 1)
0x008
c(2)
0x208
0
0
0
x(n)
x(n − 1)
x(n − 2)
0x00c
c(3)
0x20c
0
0
x(n)
x(n − 1)
x(n − 2)
x(n − 3)
0x210
0
x(n)
x(n − 1)
x(n − 2)
x(n − 3)
x(n)
For n=4 and t=time, the FIR results remain in the accumulator and X=c(0)* x(4)+c(1)*x(3)+c(2) * x(2)+c(3) * x(1). The contents of the buffer are represented in Table 3.
TABLE 4
coef
data
addr1
coef
addr1
t = 0
T = 1
t = 2
t = 3
t = 4
t = 5
0x010
b(0)
0x214
offset = 1
offset = 4
offset = 3
offset = 2
offset = 1
offset = 4
0x014
b(1)
0x218
y(n) = X
y(n − 1)
y(n − 2)
y(n − 3)
y(n)
y(n − 1)
0x018
b(2)
0x21c
0
0
0
y(n)
y(n − 1)
y(n − 2)
0x01c
b(3)
0x220
0
0
y(n)
y(n − 1)
y(n − 2)
y(n − 3)
0x224
0
y(n)
y(n − 1)
y(n − 2)
y(n − 3)
y(n)
The data buffer is then updated with the latest y(n) at the location, data header addr+offset*4. The contents of a buffer for an IIR filter are shown in Table 4.
TABLE 5
Description
Address
SRAM Contents
Data header pointer ==>
0x0010
Offset = 2
0x0014
X(n − 2)
0x0018
X(n)
0x001C
X(n − 1)
. . .
. . .
Coefficient pointer
0x0100
C0
0x0102
C1
0x0104
C2
The sampled inputs and the filter coefficients are loaded into SRAM as shown in Table 5.
The new samples are loaded into the table in a circular fashion. The location for the new sample, x(n), is determined by the summation of the data header address and the offset*4, which is 0×0018. The offset always points to the oldest sample, which is replaced by the incoming sample x(n). After the filter instruction is executed, the offset is updated to “1.” The filter instruction is coded as follows.
Filtercu tap=4, coef addr=0×000, data_header=0×100
3
TABLE 6
Description
Address
SRAM contents
Coefficient pointer ==>
0x000
C0
0x002
C1
0x004
C2
0x006
C3
Data header ==>
0x100
3
0x104
X(n − 2)
0x108
X(n − 3)
0x10C
X(n)
0x110
X(n − 1)
For a 4 tap filter: Y(n)=c0* x(n)+c1*x(n−1)+c2*x(n−2)+c*x(n−3) and the SRAM contents are shown in Table 6.
In a filter using two SRAMs according to an embodiment of the present invention, two SRAMs are used for coefficients and data respectively. One cycle multiplier is used. In the first cycle, a counter is set to the equal the number of taps. The coefficient pointer is set to the coefficient address. The data pointer is set to the offset at the data header address. The coefficient and data are fetched from the SRAMs. The data address is set to equal the data header address plus the offset. The coefficient and data are fetched and the coefficient pointer and data pointer are post incremented. The accumulator register is cleared.
reg
reg
reg
reg
reg
reg
In the second cycle, the coefficient and data are loaded in the Cand D. For example, the Ccontains c(0) and the Dcontains x(n). The accumulator is updated to contain the product of Cand Dplus the previous value of the accumulator, which is zero in this cycle. If the overflow/underflow occurs, the accumulator is saturated to Max/Min value. The counter value is decremented and checked to determine if the counter is equal to 0. If the counter is equal to 0, the process jumps to the final cycle. Otherwise, the process continues to the next operation. The coefficient and data are fetched and the coefficient pointer and data pointer are post incremented. If the data pointer is equal to the number of taps, the data pointer is set to 3.
reg
reg
reg
reg
reg
reg
In the third cycle, the coefficient and data are loaded in the Cand D. For example, the Ccontains c(1) and the Dcontains x(n−1). The accumulator is updated to contain the product of Cand Dplus the previous value of the accumulator. If the overflow/underflow occurs, the accumulator is saturated to Max/Min value. The counter value is decremented and checked to determine if the counter is equal to 0. If the counter is equal to 0, the process jumps to the final cycle. Otherwise, the process continues to the next operation. The coefficient and data are fetched and the coefficient pointer and data pointer are post incremented. If the data pointer is equal to the number of taps, the data pointer is set to 2.
reg
reg
reg
reg
reg
reg
In the fourth cycle, the coefficient and data are loaded in the Cand D. For example, the Ccontains c(2) and the Dcontains x(n−2). The accumulator is updated to contain the product of Cand Dplus the previous value of the accumulator. If the overflow/underflow occurs, the accumulator is saturated to Max/Min value. The counter value is decremented and checked to determine if the counter is equal to 0. If the counter is equal to 0, the process jumps to the final cycle. Otherwise, the process continues to the next operation. The coefficient and data are fetched and the coefficient pointer and data pointer are post incremented. If the data pointer is equal to the number of taps, the data pointer is set to 1.
reg
reg
reg
reg
reg
reg
reg
reg
In the fifth cycle, the coefficient and data are loaded in the Cand D. For example, the Cand Dcontains c(3) and the Cand Dcontains x(n−3). The accumulator is updated to contain the product of Cand Dplus the previous value of the accumulator. If the overflow/underflow occurs, the accumulator is saturated to Max/Min value. The counter value is decremented and checked to determine if the counter is equal to 0. If the counter is equal to 0, the process jumps to the final cycle, which is this case the counter is equal to zero.
In the final cycle, the new offset at the data header address is saved. If Up is equal to 1, the accumulator value at the data header address plus the offset of 4 is saved. Thus, a filter instruction according to an embodiment of the present invention solves these issues with a concise instruction format to significantly decrease memory required, allow for instruction pipelining without branch penalty, and uses the circular buffer for the data so the data address pointer is only needed to be updated for the next input sample. The filter instruction may be used to implement FIR or IIR filters by using the options of pre/post clear accumulator or pre/post storing accumulator results.
FIGS. 1-7
FIG. 1
FIG. 1
188
190
170
172
190
190
172
The process illustrated with reference to may be tangibly embodied in a computer-readable medium or carrier, e.g. one or more of the fixed and/or removable data storage devices illustrated in , or other data storage or data communications devices. The computer program may be loaded into memory to configure the processor for execution of the computer program . The computer program include instructions which, when read and executed by a processor of , causes the devices to perform the steps necessary to execute the steps or elements of an embodiment of the present invention.
The foregoing description of the exemplary embodiment of the invention has been presented for the purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed. Many modifications and variations are possible in light of the above teaching. It is intended that the scope of the invention be limited not with this detailed description, but rather by the claims appended hereto. | |
Can You Give Me a List of Oxidizing Agents?
There are hundreds of different oxidizing agents, including various chromates, dichromates, halogens, bromates and nitrites. There are two different classes of oxidizing agents, organic and inorganic, both of which are considered hazardous materials.
The organic oxidizing agents, known as organic peroxides, are far more hazardous than the inorganic oxidizers and are generally extremely unstable and quite volatile. The strongest common oxidizing agent is elemental fluorine, while other strong oxidizers include oxygen gas (O2) and ozone (O3).
An oxidizing agent is any liquid or solid that readily gives off oxygen or another oxidizing substance, such as bromine, fluorine or chlorine. This list includes various chemical compounds that oxidize burnable materials, meaning that the oxygen chemically combines with the other materials in a way that creates a much higher chance of fire or explosion. These reactions can occur spontaneously at room temperature or after the compound has been slightly heated, although this depends on the specific oxidizing agent. Due to their volatile nature, most oxidizing agents are considered to have a high risk of fire or explosion.
Oxidizing agents can perform several different functions, such as increasing the speed of fire development and making a fire burn hotter. These compounds may also cause substances that are normally not flammable to burn easily or cause combustible materials to spontaneously ignite without the presence of an ignition source. | https://www.reference.com/science/can-give-list-oxidizing-agents-14fdaf96f66a4f19 |
Top 15 Connected Aircraft Companies 2018
The connected aircraft market is projected to grow substantially during the forecast period owing to the increasing number of air passengers and a growing expectation for in-flight high-speed Internet connectivity by passengers. Connected aircraft systems provide in-flight entertainment to air passengers with the provision of high-quality audio, video, games, flight details, music, movies, radio, and news. They also assist in providing flight safety instructions in regional languages. Passengers can directly get connected to broadcast satellite and have access to international news and GPS maps; this is expected to drive the global the connected aircraft market.
This report evaluates in detail the top 15 companies operating within the $2.8bn connected aircraft market, with detailed evaluation of market shares, revenues and product specialisation. | https://www.marketresearch.com/Visiongain-v1531/Connected-Aircraft-Companies-11668858/ |
This area of the site contains support information and files for current DESS users. If you don’t find what you’re looking for here, please contact us directly and we’ll be happy to help you.
1-866-66-ESSEX
Essex Energy Corporation
2199 Blackacre Dr.
Oldcastle, ON
N0R 1L0
Downloads
DESS 6 Latest Maintenance Release
September 22, 2014 – Download DESS 6.2.1.4
DESS 7 Latest Release
September 9, 2020 – Download DESS 7.2.4.1.77
These are the latest maintenance releases of DESS for existing customers with valid DESS maintenance. If you are not a customer with a valid maintenance agreement, please contact Essex Energy to find out how to obtain or upgrade your copy of DESS.
DESS Manual
If you wish to download the DESS User Manual (without downloading the rest of the software), use the following link:
Frequently Asked Questions
DESS Capabilities
What general features does DESS have?
If you are looking for something specific, please don’t hesitate to contact us. The feature you’re looking for may already be part of DESS.
What types of analysis can DESS do?
DESS tools are focused on distribution system network analysis. As such we don’t offer many individual tools such as cable pulling, grounding grid, line sag and tension, etc. These can be purchased separately from 3rd parties who specialize in these areas if needed.
Can I import data into DESS from my GIS system?
Modules exist to import data into DESS from a number of popular GIS systems, including GIS systems from ESRI, Intergraph, Enghouse and Canmap. Some of these import modules are available from Essex Energy, and some are available from the GIS company. Please contact us for details.
Can I import data into DESS from my CAD system?
CAD systems generally do not contain the connectivity information necessary to build a model of the network in DESS. However, you can use maps from a CAD system as background layers in DESS (export from the CAD system as DXF or SHP files), and if necessary, these layers can be used as a guide so you can ‘trace over’ a system in DESS by entering the data manually.
Can I use DESS to model distributed generation on my distribution system?
Yes. DESS allows you to represent both induction and synchronous generation on your system. For synchronous generation DESS allows you to model generator voltage regulation and VAR output limits. The effects of generation is automatically included in any studies, including load flow and short circuit, so you can determine the effect on system voltages and flows, fault levels and losses.
Using DESS
When should I use a distribution transformer element and when should I use a power transformer element?
You use a distribution transformer when you have no interest in what happens below the LV terminal of the transformer. You use a power transformer element if you are interested in modeling loads or lines on the LV side of the transformer. If you have a node with a distribution transformer, any loads on that node are assumed to be applied at the LV side of the transformer. Modeling the distribution transformer gives you the benefit of computed values for secondary voltages, and transformer losses due to series (or copper) losses and due to no load (or core energization) losses.
Should I use DESS to model the customer-owned transformers on my system?
Probably not. If you meter a customer above the transformer then the loading values you have represent a combination of the customers load and any transformer losses. Therefore, the most accurate way to model this is as a single load element on a node, with no transformer. This way, the load values on the element will match the load values you use to measure and bill the customer. If for some reason you need to know the transformer losses, or the secondary voltages for a customer-owned transformer then you should go ahead and model it as a node with both a distribution transformer and load elements.
Can I copy reference data from one set of system data to another?
Yes. You can use the Tools | Import Reference Data command to copy reference data items (such as conductors, transformers, load modeling definitions or protection items) from another system.
How can I connect two different voltages together (i.e. at a substation)?
You would use a Power Transformer element to connect a node on one layer (HV terminal) with a node on a different voltage layer (LV terminal of transformer). You can do this by selecting the nodes (hold down the CTRL key to select more than one node), and then clicking the power transformer button on the toolbar.
Analysis
What causes the difference between maximum and minimum fault values for the short circuit analysis?
The difference between maximum and minimum fault values are caused by a number of factors. The source impedance elements which are used at the supply point to your system let you specify maximum and minimum source impedances. The maximum source impedance applies to the minimum fault currents, and vice versa. Maximum fault current levels are reported for the case where motors and generators are assumed attached to the system. Minimum fault current levels assume that generation and large motors are not currently attached.
If using the IEC 60909 option, fault currents are not reported for the nominal voltage of the system. Instead they are reported for a prescribed upper and lower voltage (e.g. 110% and 100% for medium voltage). The higher voltage range is applied for the maximum fault level, and the lower voltage range is applied for the minimum fault level. 4) If using the IEC 60909 option, a higher conductor resistance is used to compute the minimum fault currents. This represents the increased resistance due to line heating.
How can I obtain accurate load data to use for load flow analysis?
Accurate modeling of load data is the most difficult part of creating a model of a distribution system. DESS provides extensive tools for modeling load variation over time (using Load Categories). For most large distribution systems (e.g. municipal and rural systems), the best data to use is the monthly kWh billing data, which can usually be exported from the billing system. It is accurate, and by combining this data with the profiling data in a Load Category, it is possible to create a model of the distribution system which accurately represents the variation of load from hour to hour, day to day, and season to season.
Troubleshooting
I’m not getting the expected results from my short circuit analysis. What should I check?
The most important data required for a short circuit analysis are the source impedances, transformer impedances and line impedances. Generator impedances can also impact a fault study if present. Check the fault levels right at the system source. If this gives the expected results then you know your source impedances are OK. Likewise, expected levels before a transformer and bad results after a transformer can indicate a problem with the transformer impedance. You should also check your system configuration. Do an upstream trace from the fault location to make sure the configuration of the system is correct. Also use the Query menu to check for loops, which increase available fault levels.
Why won’t my load flow converge?
The most common reason why a load flow fails to converge is an error in entering loads or entering lines or conductor information. Basically, if you try to push too much load through too small a conductor, the voltage drops too far (i.e. below 50% of normal) and the load flow cannot converge. A symptom of this is if you can successfully run a load flow with a load scaling factor of .5 or .2 and that when you do so, the voltages at the ends of your feeders are relatively low. If this is the case, check carefully that you used the right type of conductor and that the load values are appropriate. If you entered your own conductor types, check that the impedance values are realistic.
I’m having problems with connectivity/tracing. What could be wrong?
There are lots of possible reasons for connectivity problems, such as disconnected items, wrong phasing, loops, incorrect switching, etc. DESS provides a number of tools to help: Use the Query | Find Disconnected and Query | Find Loops commands to find disconnected nodes and closed loops. Double-click on a node to see the Node Dialog which will list all lines (and phasing) attached to that node. Use the Move Node tool on the toolbar to drag a node or line vertex (This can help to find overlapping nodes, and dragging a node will drag all attached lines). Also, check to make sure the nodes and lines are on the correct electrical layer. You can also use the tracing tools (upstream, downstream, custom and network trace) to help you determine how items are connected.
In the results for the load flow analysis why are the voltages so low/high?
If the voltages are low throughout the system, it is likely that the voltage at the source element (supply point) is too low. Typically the supply voltage to a system is a few percent above the nominal voltage. Also make sure you check taps on substation transformer. Most of the time, substation transformers are tapped to boost the voltage on the secondary so that the voltage at the low voltage bus is above nominal. If the voltage is only low is certain places (e.g. ends of feeders), make sure the feeder loading is reasonable and that you have defined an adequately sized conductor along the feeder. A conductor with too high an impedance, or too much load, will cause larger voltage drops along a feeder.
Do I need to model different types of framing on my overhead lines in order to get accurate results?
It is true that the framing arrangement of a set of conductors (i.e. triangular, vertical, etc) does affect the impedances of a feeder. If you wished, you could use different types of conductor data in DESS for each separate framing of a type of conductor. However, be aware that the change in line impedance is usually only 1-2%, and tracking overhead framing vastly increases the effort required to populate data and enter it into DESS or your GIS. Also be aware that the accuracy of your results will be much more dependent on obtaining accurate load data (e.g. 10-25% variation), so your initial efforts should probably be focused on getting accurate load data and creating accurate load profiles for different types of customers. | https://www.essexenergy.ca/products/software-solutions/engineering-analysis-software-dess/dess-support/ |
The default mode network consists of a set of functionally connected brain regions (posterior cingulate, medial prefrontal cortex and bilateral parietal cortex) maximally active in functional imaging studies under “no task” conditions. It has been argued that the posterior cingulate is important in consciousness/awareness, but previous investigations of resting interactions between the posterior cingulate cortex and other brain regions during sedation and anesthesia have produced inconsistent results.
We examined the connectivity of the posterior cingulate at different levels of consciousness. “No task” fMRI (BOLD) data were collected from healthy volunteers while awake and at low and moderate levels of sedation, induced by the anesthetic agent propofol. Our data show that connectivity of the posterior cingulate changes during sedation to include areas that are not traditionally considered to be part of the default mode network, such as the motor/somatosensory cortices, the anterior thalamic nuclei, and the reticular activating system.
This neuroanatomical signature resembles that of non-REM sleep, and may be evidence for a system that reduces its discriminable states and switches into more stereotypic patterns of firing under sedation.
Copyright: © 2010 Stamatakis et al. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
Funding: EAS is funded by the Stephen Erskine Fellowship, Queens' College Cambridge. RMA is supported by a Wellcome Trust Clinical Research Training Fellowship, and the Raymond and Beverly Sackler Studentship. ARA and DKM are funded by the BOC Professorship of the Royal College of Anaesthetists. DKM is funded by the National Institute for Health Research. The funders had no role in study design, data collection and analysis, decision to publish, or preparation of the manuscript.
Competing interests: Prof. D. K. Menon serves on the editorial boards of Neurocritical Care and PLoS Medicine.
An all encompassing definition of consciousness is difficult. It is however easier to define level and content of consciousness with level being associated with arousal and content being associated with the content of subjective experience . The neuroanatomical structures that underpin these processes are a topic of intense debate. Some experts support the view that consciousness depends on intact function of brain stem-thalamo-cortical arousal circuits while others propose that consciousness is instantiated in fronto-parietal association cortices , , . Classically, investigation of consciousness has involved comparing the neural response to tasks in the awake and sedated states. However, there is emerging evidence that the behavior of the resting brain under anesthesia and sedation may provide additional important insights in this area , .
Resting state fMRI involves measuring the blood oxygen level dependent (BOLD) signal for the study of sets of brain regions that function as coherent networks during rest. Raichle et al., 2001 used quantitative positron emission tomography (PET) to demonstrate the existence of such a baseline state of human brain function that is remarkably uniform in the awake resting state and they used the term baseline default mode of brain function to describe activity in the regions involved. Greicius et al., called this set of regions the default mode network (DMN). The DMN appears to be largely task independent and normally displays reduced activity during specific goal directed behavior . This network primarily includes the posterior cingulate, the medial prefrontal cortex and bilateral parietal cortices . The DMN was one of the first resting networks to be extensively studied, and early findings on the DMN still hold , in that the main areas identified to be part of this network remain the same despite a multitude of studies, there is increasing evidence that the DMN may comprise multiple dissociated components .
Studies of the DMN still dominate the field of resting state fMRI. However, other distinct collections of cortical/subcortical regions, that have been shown to co-activate during task-specific functional imaging, have also been shown to co-modulate their activity at rest. As early as 1995, Biswal et al. demonstrated that fluctuations in activity during rest were coherent within the motor cortex. More recently, Beckmann et al. (2005) expanded on this idea, using independent component analysis to demonstrate that distinct cortical/subcortical regions, shown to co-activate during task-specific functional imaging also co-modulate in activity at rest. The principle has been demonstrated many times over for the motor system , , and also for visual , , auditory , memory , and attention systems . The emerging inference is that distinct neuroanatomical systems that co-activate in response to stimuli also display levels of distinct organization at rest.
The functionality of most of these systems can be easily inferred. However, the role of the DMN is still under discussion. There is sufficient evidence to suggest that the DMN might be involved in both stimulus independent (inward) or stimulus dependent activity, and that it might not be as homogeneous as originally thought , , , . Dahaene and Changeux (2005) introduced the idea that the default mode network may be part of a global workspace , a set of cortical neurons whose role is to facilitate exchange of information between remote systems. More recently, He and Raichle (2009) have championed the concept that fluctuations in the DMN may represent the imaging counterpart of Slow Cortical Potentials (SCPs), 1–4 Hz fluctuations in brain electrical activity that are argued to be important in consciousness. While plausible, these neuroanatomical models of consciousness require further support from experimental data. Studies that examine the behavior of the network under conditions of sedation or anesthesia may provide useful insights in this context.
Sedation is a pharmacologically induced, reversible state, characterized by dose-related impairment of cognitive functions, including attention and memory, but during which consciousness and awareness are maintained. Progressively increasing sedation results eventually in anesthesia which has been defined as “drug-induced loss of consciousness during which patients are not rousable, even by painful stimulation.” . In contrast to sedation, conscious perception of environmental stimuli is ablated during anesthesia, which may be mediated by mechanisms distinct from those mediating sedation.
The few studies that have explored DMN connectivity under sedation/anesthesia (see Table S1) have shown little change between sedated/anesthetized and awake states , , a surprising finding, given the overt behavioral changes that occur with deepening sedation/anesthesia. The small changes reported are also somewhat contradictory, in that Greicius et al., reported focal increases in connectivity in the sensory-motor network with sedation, while Martuzzi et al., found no significant changes in connectivity in sensory cortices when comparing pre- and anesthetized conditions. This discordance requires explanation.
In order to investigate this issue, we used the anesthetic agent propofol, to modulate consciousness and to evaluate differences in interaction of remote neural networks during altered consciousness. Propofol is an agonist at the GABA receptor (subtype A) and it is through this agonist activity that propofol exerts its sedative and hypnotic effect. In addition, it has agonist activity at the glycine receptor and mild antagonistic activity at the neuronal acetylcholine, AMPA and NMDA receptors . Anesthesia with propofol causes predictable changes in EEG patterns, some of which are not dissimilar to those found in sleep. Light surgical levels of propofol anesthesia cause a similar EEG pattern to that found in stage II sleep i.e. attenuation of alpha and beta frequencies, and an increase in power in the theta range. A defining EEG feature of stage II sleep is the presence of sleep spindles, and spindles of similar morphology are also found in the EEG during deep propofol anesthesia . Moreover, neuronal pathways involved in arousal from sleep have been implicated in recovery from anesthetic-induced loss of consciousness .
Propofol was administered using a computer controlled intravenous infusion , aiming to achieve three target plasma levels - no drug (awake), low sedation and moderate sedation. Propofol has been shown to significantly reduce regional cerebral blood flow (rCBF) in the posterior cingulate cortex (PCC), medial thalamus, and basal forebrain, areas commonly implicated in arousal mechanisms and information processing/integration . It has been argued that the PCC is important for consciousness/awareness , and it is widely recognized that the PCC is also a major hub in the default mode network . We hypothesized that any sedation induced activity changes in the PCC would also affect the default mode network. We therefore acquired resting state fMRI BOLD data to investigate functional connectivity changes in the default network under propofol sedation.
At a propofol plasma target concentration of 0.6 µg/ml (mean [SD] measured plasma concentration 0.27 [0.12] µg/ml) all volunteers displayed a lethargic response to their name spoken in a normal tone (corresponding with an Observer's Assessment of Alertness/Sedation Scale (OAA/S) score of 4, or a Ramsay score of 2). At a propofol plasma target concentration of 1.2 µg/ml (mean [SD] measured plasma concentration 0.67 [0.36] µg/ml), all volunteers were more deeply sedated and responded only after their name was called loudly (corresponding with an OAA/S score of 3, or a Ramsay score of 3). Measured plasma concentration levels were significantly different (p≤0.001) when comparing low to moderate sedation.
An analysis of motion parameters (see Table S2) obtained during the realignment stage of preprocessing showed no relationship between sedation depth and movement. We carried out three ANOVAs, none of which produced significant results (Translation in x F(2,47) = 0.08; p = 0.92, in y F(2,47) = 0.34; p = 0.71, in z F(2,47) = 0.84; p = 0.43. Rotation in x F(2,47) = 0.42; p = 0.66 in y F(2,47) = 0.74; p = 0.48 in z F(2,47) = 0.29; p = 0.75). Thus, the data we present here were not significantly influenced by movement during scanning.
Following preprocessing, the imaging data was subjected to a group level one-sample t-test to find areas whose activity correlated with that of the PCC at the awake stage; in this manner we attempted to identify a resting network close to the DMN in our study population. The one-sample t-test revealed that PCC connectivity in awake subjects (Figure 1, Table 1) involved bilateral posterior cingulate cortices, precunei, lateral inferior parietal gyri (extending to angular gyri), superior medial frontal (extending to dorsal middle frontal) gyri, posterior hippocampi and parahippocampal gyri and thalami. These areas are concordant with previous studies utilizing multiple approaches to define the DMN .
Figure 1. PCC connectivity at awake, low and moderate levels of sedation shown superimposed on a standard T1 weighted structural image.
Talairach and Tournoux z coordinates are shown. The connectivity of the PCC appears to increase with sedation, especially in motor and somatosensory areas. We report clusters that survived a voxel threshold of p≤0.001 uncorrected and a random field cluster threshold of p≤0.05 corrected for the entire brain. The color bar indicates strength of connectivity (t score).
Table 1. Significant connectivity peaks for the PCC connectivity at the awake stage.
During low and moderate sedation, group level one-sample t-tests suggested that PCC connectivity decreased in medial prefrontal areas (see Figure 1 z = −10, −2, 5 and 25). However, paired t-tests did not reveal statistically significant changes in connectivity from awake to moderate sedation in any area conventionally considered to be part of the DMN. Instead, we found statistically significant increases in connectivity between the PCC and the anterior cingulate cortex (ACC) (BA23, extending forward to the posterior extent of BA32), L supramarginal, L pre/postcentral gyri (motor/somatosensory cortex), and the pontine tegmentum (part of ascending reticular activating system-ARAS) in the brainstem (Figure 2, Table 2).
Figure 2. Significant PCC connectivity for Moderate>Awake sedation shown superimposed on a standard T1 weighted structural image.
* in the plots denotes connectivity that survived a random field cluster threshold of p≤0.05 corrected for the entire brain (at voxel p≤0.001 uncorrected). Error bars show standard error. Talairach and Tournoux x coordinates shown underneath the T1 weighted brain slices. The color bar indicates strength of connectivity (t score).
Table 2. Significant connectivity peaks for the contrast of moderate sedation vs. awake.
An inspection of Figure 2 reveals that the alterations in connectivity that we observed with sedation followed two different patterns. For the ACC, no connectivity with the PCC was observed at baseline, but sedation resulted in increases in positive correlation in activity in the two regions. However, for the precentral gyrus and pontine tegmentum, an initial significant negative correlation with the PCC in the awake state was transformed into a positive correlation in sedated subjects.
To estimate the level of regional BOLD signal fluctuation we calculated root mean squares (RMS) of percentage signal change for the PCC (where our DMN calculations originate) and the Left precentral gyrus (BA4) where we found the highest statistical peak for the comparison of moderate sedation vs. awake states (see Table S3 and Figure S1). We also plotted frequency distribution plots for these two regions (see Figure S2). In both regions there appears to be an increase in the overall power with moderate sedation - i.e. the overall amplitude of BOLD signal fluctuations appears to increase with sedation. This is supported by the RMS calculations shown in Table S3. Power appears to be increased in the BOLD fluctuations in two ranges at either end of the power spectrum: “waves” with period 10–60 seconds; and also in “waves” with period 2–3 seconds.
These differences in connectivity between awake and moderately sedated levels are based on predicted plasma propofol concentrations, calculated using a standard pharmacokinetic model for propofol , . In order to account for the variability between predicted and observed propofol plasma levels, we carried out an additional whole brain regression analysis relating connectivity patterns to measured plasma propofol concentrations.
The findings from this additional analysis were very similar to the comparison with predicted concentrations, described above. Measured plasma levels of propofol modulated connectivity between the PCC and the cunei, postcentral gyri (primary somatosensory cortex), precentral gyri (primary motor cortex) and premotor cortices; all bilaterally (Table 3). Although the sedation-associated increases in connectivity between the PCC and motor, premotor and somatosensory areas were bilateral, the clusters were substantially larger in the left hemisphere (see Table 3). Additionally, we found that plasma propofol concentration modulated connectivity between the PCC and the left putamen and bilateral thalami (mostly anterior nuclei, extending to bilateral medial dorsal nuclei). The connectivity clusters that we report here survived correction for multiple comparisons for the entire brain. We also found increased connectivity between the PCC and the ACC (survived correction for multiple comparisons for the entire cingulate gyrus) and in the pontine tegmentum (correction for multiple comparisons applied to the volume of the pons). We report these results which achieved significance with small volume corrections, both because of their recognized importance in neuroanatomical constructs of consciousness and anesthetic action, and because they were also significant in the initial paired t-test comparison (Figure 3).
Figure 3. Increasing connectivity between the PCC and the thalamus (top panel), cuneus (middle panel) and the pontine tegmentum (bottom panel) in response to increasing propofol plasma concentrations (awake is modeled as zero).
Correlations significant at p≤0.001: anterior thalamus r = 0.59, cuneus r = 0.62, pontine tegmentum r = 0.53. Talairach and Tournoux coordinates are shown above each T1 weighted brain slice. The color bar indicates strength of connectivity (t score).
Table 3. Significant connectivity peaks predicted by measured propofol plasma levels.
We employed two different group level approaches to establish whether administration of the anesthetic agent propofol influences resting state connectivity of the PCC. The first was a direct comparison between awake and moderately sedated stages, and the second a regression analysis relating connectivity patterns to measured plasma propofol concentrations. These different approaches converged on similar findings. Increasing predicted or measured plasma propofol concentrations did not significantly modulate connectivity within the canonical default mode network, but were associated with significant increases in connectivity between the PCC and areas not conventionally thought to be part of the DMN: the motor/somatosensory cortices, the anterior thalamus, and the pontine tegmentum in the brainstem.
Before we ascribe a neural basis to these results, it is important that we consider whether they may be drug-induced changes in flow-metabolism coupling. Inhaled anesthetics can have independent effects on cerebrovascular physiology that confound interpretation of the BOLD response . However, intravenous anesthetics such as propofol have been shown to have no major direct effects on cerebrovascular tone and to preserve flow-metabolism coupling , so the alterations in BOLD connectivity patterns we observed in our study are likely to reflect changes in neural activity. Further evidence for this comes from Veselis at al., 2005 who measured rCBF responses during auditory stimulation (and quiet periods) at three levels of propofol effect: baseline, sedative, and hypnotic concentrations and concluded that sedative concentrations of propofol do not appear to influence the physiology associated with rCBF response to neural activity. The conclusion from these studies has to be that changes in rCBF are due to changes in neuronal activity because of the drug, and cannot be attributed to vascular changes. Consequently, any observed changes in connectivity patterns with sedative concentrations of propofol will represent effects on brain activity itself.
Given that the effects that we observed are likely to be neurally mediated, it is intriguing to contrast our results with previous PET and fMRI studies of anesthetic action that have used more classical approaches to image analysis (see Alkire et al, 2008 for a concise review of these data). These studies suggest that graded propofol anesthesia reduces regional cerebral blood flow (rCBF) in the medial thalamus, posterior cingulate, basal forebrain, and in the occipitoparietal association cortices, areas commonly implicated in arousal mechanisms and information processing. In the context of these findings of reduced rCBF, our finding that connectivity increases with moderate sedation may seem somewhat counterintuitive.
However, it is important to distinguish between alterations in levels of activity in individual brain regions from changes in connectivity between regions. Our analysis of power frequency distribution of BOLD signal in the different regions of interest (see Figures S1 & S2 and Table S3) reveals that the changes in connectivity that we observed were associated with increases in power in distinct parts of the power spectrum. This argues against the possibility that our results were simply the consequence of incidental association in noisy data, and suggest that they are the consequence of biologically significant alterations in neural connectivity. The distinction between changes in absolute CBF and changes in neural connectivity as manifest by concordant fluctuations in CBF is particularly relevant to data regarding resting state connectivity.
The number of published studies on the effects of anesthetic/sedative drugs on brain connectivity is still relatively small, and there is no consensus in this area. Differences between studies may arise from the fact that different anesthetic agents and/or methodologies have been employed in different studies (see Table S1). Peltier et al., 2005 assessed changes in connectivity in motor areas during different levels of sevoflurane anesthesia, and reported a reduction in the number of significant voxels in connectivity maps, seeded from the primary motor cortex. Martuzzi et al., 2010 , who also used sevoflurane, analyzed their data using seed based connectivity analyses. They reported that, while anesthesia did not alter resting state connectivity significantly in the sensory cortices, it significantly changed connectivity in higher-order cognitive networks. They also found that anesthesia increased connectivity between a PCC seed and the superior temporal gyrus, but reduced connectivity between the seed and adjacent areas. Kiviniemi et al, 2005 , used midazolam sedation and reported increased temporal synchrony of the BOLD signal in auditory and visual cortices after sedation. Greicius et al., 2008 also used midazolam to induce light sedation, and analyzed the data using independent component analysis (ICA) based on standard templates for different networks. This analysis showed increased connectivity in the sensory motor network (with focal increases in the mid-cingulate region), and decreased connectivity in the DMN (with focal decreases in the PCC).
The different levels of anesthesia/sedation may explain differences in the observed results; however the different mechanisms of the drugs used may also affect the results. For example sevoflurane also acts as a GABA-A agonist, but unlike propofol, it probably also acts at other receptors, such as TREK and TASK channels . Although there are differences in the mechanism of action, the clinical states of sedation generated by the different anesthetic agents are quite similar. Additionally, midazolam has a fairly wide therapeutic range, compared with propofol, and in young and middle-aged patients, very large doses are required to cause loss of consciousness and loss of responses to pain.
Given the variable approaches adopted, it is unsurprising that there is no clear consensus regarding the impact of sedation and anesthesia on resting brain connectivity, and it has been, thus far, difficult to provide a rational mechanistic explanation for the changes observed. However, these apparently conflicting data may provide important insights into the issue. Several authors report sedation induced increases in connectivity between brain regions, although the regions involved vary depending on the analysis methodology (seed-based vs. ICA), the size of the seed employed, and the level of anesthesia/sedation studied. Specific networks where such increases in connectivity have been reported include the motor, somatosensory and visual networks. The increased connectivity between the PCC and non-DMN areas that we report add to this list, but is novel in that it describes connection between (rather than within) canonical resting state networks.
The connectivity increases we observe with sedation require a mechanistic explanation. The increases in sensorimotor connectivity have been, in previous publications, attributed to one of two explanations. The first of these is increased disinhibition , , , and a resulting increase in movement related artifact. However, both the Martuzzi et al., (2010) analysis, and our data, show no significant differences in movement when comparing awake to sedated states. A second explanation, at least for increased connectivity between the thalamus and sensorimotor cortex , depends on an uneven modulation of cortico-thalamic feedback by anesthetic agents , with resulting prominence of the most robust connections. This hypothesis is supported by data proposing that propofol may act in such a manner . Although we found alterations in connectivity involving somatosensory cortices, this explanation does not fully account for our results, because our connectivity analyses were not seeded from the thalamus or somatosensory cortices but from the PCC.
An alternative/complementary explanation for the increased connectivity we observed following the administration of propofol is based on the information integration theory of consciousness, which suggests that when the range of discriminable neuronal firing patterns shrinks, neural activity becomes less informative even though it may be more globally synchronized . Evidence from human and animal literature indicates that both anesthesia and slow wave sleep (which are distinct phenomena associated with decreased arousal) force remote neural systems to switch to stereotypic responses that lack regional specificity, and that this can result in loss of information integration capacity (see for an overview of action of anesthetic agents on brain activity). The increased connectivity patterns we observe in our data could be the BOLD expression of this underlying decrease in information integration produced by sedation.
Data from other studies support the inference that these increases in connectivity are associated with decreases in local activity. Previous studies have mapped the brain areas which show prominent reductions in neural activity associated with sedation and anesthesia, using imaging of both cerebral metabolism and absolute cerebral blood flow , , . These areas of decreased activity map closely to the regions of increased connectivity that we demonstrate in our data, including involvement of the thalamus and the pontine tegmentum.
Thalamocortical loops have been associated with consciousness, and converging evidence from animal literature suggests that thalamic neurons switch out of the slow bursting mode and into fast gamma-band oscillations prior to awakening from sleep . The increased connectivity we observe between the PCC and thalamus with increased sedation may be evidence for a change into a slow, more stereotypic firing pattern that conveys less information, as volunteers are increasingly sedated. The resulting loss of effective thalamocortical interactions provides one plausible cause of anesthetic-induced unresponsiveness . It is also particularly intriguing that the increases in PCC connectivity to subcortical structures are not just limited to the thalamus, but also involves the pontine tegmentum, a key node in arousal networks . The balance between brainstem mono-aminergic and cholinergic inputs is thought to be key in the development of REM sleep, with cholinergic inputs from the dorsal pons playing an important role in causing cortical arousal during REM sleep , , . This, coupled with the deactivation of this region in previous studies of anesthesia , , suggests that propofol sedation not only suppresses processing of extrinsic stimuli , but may also obtund the intrinsic (de-afferented) cortical arousal associated with dreaming. Interestingly, dreaming is common just before return to consciousness after propofol anesthesia and when it occurs it is associated with REM type EEG patterns . This interpretation of our data is concordant with previously reported commonalities in neural systems that subserve both sleep and anesthesia .
The location of the thalamic correlation in the anterior nuclei is significant for another reason: anterior thalamic nuclear lesions have been implicated in anterograde amnesia. Aggleton and Sahgal, 1993 proposed that anterior thalamic dysfunction is an important factor in anterograde amnesia, since neurotoxic lesions in the anterior thalamic nuclei result in significant performance deficits in relevant neuropsychological tests. Additional evidence for the involvement of thalamic nuclei in memory function comes from research in Korsakoff's psychosis resulting from alcohol abuse. Harding et al., 2000 showed that many of the cortical and subcortical regions involved in the encoding and retrieval of episodic memory are either unaffected (hippocampus) or damaged to the same extent (prefrontal cortex and basal forebrain) in both amnesic and non-amnesic alcoholics. However, neuronal loss in the anterior thalamic nuclei was found consistently only in patients with Korsakoff's psychosis. In the context of this evidence, the synchronization of the anterior thalamic nuclei with the PCC that we observe in our data may reflect a derecruitment of the anterior thalamus from normal mnemonic functions, and provide a neuroanatomical substrate for the amnesic action of propofol .
Our measured plasma propofol concentrations were significantly lower than values predicted by well established pharmacokinetic models. This is probably due to the fact that the infusion pumps that we used may have struggled to deliver the required infusion rates through the 8 m infusion lines used in the study. In the event, the absolute levels of propofol are less relevant to our analysis than the fact that we were able to achieve a range of plasma concentrations of the drug, which scaled concordantly with behavioral and imaging findings.
Given this concordance between propofol levels and fMRI findings, what might be the relationship between consciousness and the connectivity changes that we observe? Interpreted in the context of the information integration theory, which stipulates that consciousness increases in proportion to a system's repertoire of discriminable states , , our data suggest loss of independence in multiple discrete systems as they are de-recruited from their normal roles. We believe that the increased connectivity of non-DMN areas (such as the motor cortex, cuneus, pontine tegmentum, and thalamic nuclei) with the PCC represent examples of this phenomenon. If the DMN does indeed represent a global workspace , our data suggest that this global workspace, along with parts of other networks, and key brain regions involved in memory and arousal, is captured by the processes of sedation, and is no longer accessible for normal neural processing.
In this context, the changes in correlation between the PCC and the premotor cortex and pontine tegmentum that we show in Figure 2 are intriguing, with an inverse correlation in the awake state being transformed into a positive correlation in sedated subjects. The presence of anti-correlated BOLD fluctuations between task dependent regions and the PCC have been reported in the past . However, the negative correlation that we observe between the pontine tegmentum and the PCC in the awake state is novel, and suggests that activation of the pontine reticular formation (which implies arousal) is associated with reduction in resting activity in a key node of the DMN. One inference would be that arousal mechanisms in the brain stem deactivate the PCC in conscious resting subjects as part of normal wakefulness. However, the positive correlations that we observe between the PCC and pontine tegmentum in sedated subjects suggest that this normal feedback may be disrupted, as the pontine reticular formation, the DMN and parts of other neural systems are inactivated (but synchronized) by sedation.
In conclusion, we have shown, for the first time, evidence from an fMRI study that supports the idea of a system reducing its discriminable states and switching into more stereotypic patterns of firing under sedation. This process involves the DMN (as defined by activity that correlates with the PCC), components of the reticular activating system, the thalamus, and parts of the cortex. Our proposed explanation for these findings brings together observations from both sedation/anesthesia , , , and sleep literature , , , , with a proposed key role for the DMN in consciousness and cognition. While this provides a plausible neuroanatomical substrate for the behavioral phenomenon of reduced consciousness with propofol, it remains unclear whether these changes are the consequence of a distributed function of the drug, or are heavily dependent on an effect of propofol at a strategic site (e.g, through potentiation of GABAergic outputs from the venterolateral preoptic nucleus ).
Having obtained local ethics permission from the Cambridgeshire 2 Regional ethics committee and written consent from participants we acquired resting state fMRI (150 volumes of BOLD data, 5 minutes, TR = 2 s) from a group of 16 adults, 19–52 years old (mean = 34.62, standard deviation = 9.05). During scanning we instructed volunteers to close their eyes and think about nothing in particular throughout the acquisition of the resting state BOLD data.
Volunteers were informed of the risks of propofol administration, such as loss of consciousness, respiratory and cardiovascular depression. They were also informed about more minor effects of propofol such as pain on injection, sedation and amnesia. In addition, standard information about intravenous cannulation, blood sampling and MRI scanning was provided.
Propofol was administered using a computer controlled intravenous infusion , aiming to achieve three target plasma levels - no drug (awake), 0.6 µg/ml (low sedation) and 1.2 µg/ml (moderate sedation). At regular intervals between scans, depth of sedation was evaluated by assessing the responsiveness of volunteers to verbal instructions and formally recorded as OAA/S scores. In all volunteers two blood samples (2×1 ml) were taken at each sedation level for later measurement of plasma propofol concentrations with high performance liquid chromatography (HPLC).
The reasons why we chose to use fixed target concentrations, rather than titration of propofol dose to a sedation score, are as follows. All clinical sedation scales suffer from several weaknesses - they are highly subjective, and some of the commonly used scales, such as the Ramsay scale suffer from significant inter-rater variability . In addition most clinical sedation scales were designed for a different population than the one in our study. For example, the Ramsay scale, commonly used in sedation studies, was designed for agitated and anxious critically ill patients in an intensive care environment. The Observer's Assessment of Alertness/Sedation Scale (OAA/S) is less well-known outside of the anesthesiology literature, but is more applicable to sedated healthy controls. Finally, sedation scores (including the OAA/S) correlate very poorly with objective EEG-based measures of sedation such as the Bispectral Index and state entropy , . Nonetheless, in order to provide comparability with previous studies, we recorded data on sedation scores in all subjects.
During data collection there were always two trained anesthesiologists present, and observed the volunteer from the MRI control room and on a video link that showed the volunteer in the scanner. In addition, heart rate, electrocardiogram (ECG) and pulse oximetry were continuously monitored using an MR-compatible multiparameter monitor (Precess, InVivo Corp., Orlando, FL, USA). Non-invasive systemic blood pressure was measured intermittently during the study, but was suspended during scanning.
MRI data were acquired on a Siemens Trio 3T scanner (WBIC, Cambridge). Each functional BOLD volume consisted of 32 interleaved, descending, oblique axial slices, 3 mm thick with interslice gap of 0.75 mm and in-plane resolution of 3 mm, field of view = 192×192 mm, repetition time = 2 s, acquisition time = 2 s, time echo = 30 ms, and flip angle 78. We also acquired T1-weighted structural images at 1 mm isotropic resolution in the sagittal plane, using an MPRAGE sequence with TR = 2250 ms, TI = 900 ms, TE = 2.99 ms and flip angle = 9°, for localization purposes.
fMRI (BOLD) images were pre-processed and modeled using SPM5 (Wellcome Institute of Imaging Neuroscience, London, UK) implemented in MATLAB version 6.5 (Mathworks, Natick, MA). The first six volumes were discarded to allow for MR signal equilibration. Pre-processing involved at first, slice-timing correction to correct differences in image acquisition time between slices. We then carried out within-subject realignment to account for head motion. The process involves realigning all images acquired during the acquisition of resting state fMRI to the mean image of the session using linear transformations. The realignment process produces a text file with the amount of translation (in x,y,z directions) and rotation (also in x,y,z directions) required for each functional image in order to bring it to the space of the mean image. The mean image produced from the realignment stage was then spatially normalized to an MNI template image, using a 12-parameter linear affine transformation (translation, rotation, zoom, and shear in x, y, and z directions) and a linear combination of three dimensional discrete cosine transform basis functions. The transformation parameters obtained from the spatial normalization of the mean to the standard space (MNI) were applied to every functional image acquired during the resting state scanning session. Finally, the spatially normalized images were smoothed with an isotropic 8-mm3 full-width half-maximum Gaussian kernel and high pass filtered at a cut off frequency of 0.008 Hz to remove any baseline drifts.
Motion parameters calculated during the realignment stage of preprocessing were subjected to statistical analysis to establish whether volunteers moved more during sedation. The assumption we tested was that light sedation may reduce inhibitory control and subsequently increase movement which may affect the imaging analysis differentially. We performed six single factor, three level (one for each awake, low and moderate sedation levels) ANOVAs for translation in x,y,z directions and rotation in x,y,z directions.
Following pre-processing, we used Marsbar to extract seed time-series from the posterior cingulate cortex (PCC), white matter (WM) and CSF masks. We obtained a mean value per mask for each EPI image and defined PCC, WM and CSF masks anatomically using the WFU PickAtlas (see Tzourio-Mazoyer et al., 2002 for anatomical definition of PCC).
The most common approach to calculating DMN connectivity is to take a time-series extracted from the mean value of a sphere with its centre in the PCC or precuneus (PC). However, published literature includes a variety of candidate coordinates defining the centre of this sphere (e.g. Fox et al., 2005 use −5, −49, 40 while Chang and Glover , 2010 use −6, −58, 28). This approach may produce variable results, depending on the candidate seed region selected. In order to provide maximum sensitivity, we adopted the approach described by Horovitz et al., 2009 , and used a mean value for the entire PCC. Further support for this approach comes from Buckner et al., 2008 who suggest that the retrosplenial portion of the PCC is one of the core regions of the DMN.
We computed PCC connectivity for each subject using the time series from the PCC as the variable of interest in a linear regression model that also included the six movement parameters (calculated during realignment), global mean, global white matter and global CSF signals as variables of no interest . We regressed out WM and CSF to remove any non-tissue specific confounding effects and to remove fluctuations unlikely to be involved in specific regional correlations .
Parameter estimates images were combined in group-level random effects analyses. We report clusters that survived a voxel threshold of p≤0.001 uncorrected and a random field cluster threshold of p≤0.05 corrected for the entire brain, unless otherwise stated.
To account for the variability between predicted and observed propofol plasma levels, we also carried out a regression analysis relating connectivity patterns to measured plasma propofol concentrations. We report results that survived a voxel threshold of p≤0.001 uncorrected and a random field cluster threshold of p≤0.05 corrected for the entire brain. We report two additional clusters (in the ACC and the pontine tegmentum) with small volume correction for multiple comparisons since we had a priori hypotheses for both of these.
We report MNI coordinates. However we converted these to Talairach space before Talairach and Tournoux (1988) nomenclature was assigned to peak activation voxels.
fMRI studies that have investigated changes in connectivity during sedation.
Average movement for each participant in mm and degrees as calculated by the realignment algorithm in SPM5. A-awake, L- low sedation, M-moderate sedation, Tx- average translation in x direction, Ty- average translation in y direction, Tz- average translation in z direction, Rx- average rotation in x direction, Ry- average rotation in y direction, Rz- average rotation in z direction.
Percentage signal changes for the three different levels of sedation for the PCC (where our DMN calculations originate from) and the Left Precentral Gyrus (BA4) where we found the highest statistical peak for the comparison of moderate sedation vs. awake states. RMS- root mean square; SE- standard error.
Percentage signal changes for the three different levels of sedation for the PCC (where our DMN calculations originate from) and the Left Precentral Gyrus (BA4) where we found the highest statistical peak for the comparison of moderate sedation vs. awake states.
Frequency distribution plots for the PCC and the Left precentral gyrus. In both regions there appears to be an increase in the overall power with moderate sedation - i.e. the overall amplitude of BOLD signal fluctuations appear to be increasing. This is supported by the RMS calculations shown on Table S3 and Figure S1. Power appears to be increased in the BOLD fluctuations in two ranges at either end of the power spectrum.
Conceived and designed the experiments: EAS RMA ARA DM. Performed the experiments: EAS RMA ARA DM. Analyzed the data: EAS RMA ARA DM. Wrote the paper: EAS RMA ARA DM.
1. Frith C, Perry R, Lumer E (1999) The neural correlates of conscious experience: an experimental framework. Trends Cogn Sci 3: 105–114.
2. Paus T (2000) Functional anatomy of arousal and attention systems in the human brain. Prog Brain Res 126: 65–77.
3. Dehaene S, Changeux JP (2005) Ongoing spontaneous activity controls access to consciousness: a neuronal model for inattentional blindness. PLoS Biol 3: e141.
4. Rees G, Kreiman G, Koch C (2002) Neural correlates of consciousness in humans. Nat Rev Neurosci 3: 261–270.
5. Crick F, Koch , C (1995) Are we aware of neural activity in primary visual cortex? Nature 375: 121–123.
6. Greicius MD, Kiviniemi V, Tervonen O, Vainionpää V, Alahuhta S, et al. (2008) Persistent default-mode network connectivity during light sedation. Hum Brain Mapp 29: 839–47.
7. Martuzzi R, Ramani R, Qiu M, Rajeevan N, Constable RT (2010) Functional connectivity and alterations in baseline brain state in humans. Neuroimage 49: 823–34.
8. Raichle ME, MacLeod AM, Snyder AZ, Powers WJ, Gusnard DA, et al. (2001) A default mode of brain function. Proc Natl Acad Sci USA 98: 676–82.
9. Greicius MD, Krasnow B, Reiss AL, Menon V (2003) Functional connectivity in the resting brain: a network analysis of the default mode hypothesis. Proc Natl Acad Sci USA 100: 253–8.
10. Shulman GL, Fiez JA, Corbetta M, Buckner RL, Miezin FM, et al. (1997) Common Blood Flow Changes across Visual Tasks: II. Decreases in Cerebral Cortex. J Cognit Neurosci 9: 648–663.
11. Greicius MD, Menon V (2004) Default-mode activity during a passive sensory task: uncoupled from deactivation but impacting activation. J Cogn Neurosci 16: 1484–92.
12. Greicius MD, Supekar K, Menon V, Dougherty RF (2009) Resting-state functional connectivity reflects structural connectivity in the default mode network. Cereb Cortex 19: 72–8.
13. Andrews-Hanna JR, Reidler JS, Sepulcre J, Poulin R, Buckner RL (2010) Functional-anatomic fractionation of the brain's default network. Neuron 65: 550–62.
14. Biswal B, Yetkin FZ, Haughton VM, Hyde JS (1995) Functional connectivity in the motor cortex of resting human brain using echo-planar MRI. Magn Reson Med 34: 537–541.
15. Beckmann CF, De Luca M, Devlin JT, Smith SM (2005) Investigations into resting-state connectivity using independent component analysis. Philos Trans R Soc Lond B Biol Sci 360: 1001–1013.
16. De Luca M, Smith S, De Stefano N, Federico A, Matthews PM (2005) Blood oxygenation level dependent contrast resting state networks are relevant to functional activity in the neocortical sensorimotor system. Exp Brain Res 167: 587–594.
17. Lowe MJ, Mock BJ, Sorenson JA (1998) Functional connectivity in single and multislice echoplanar imaging using resting-state fluctuations. NeuroImage 7: 119–132.
18. Cordes D, Haughton VM, Arfanakis K, Wendt GJ, Turski PA, et al. (2000) Mapping functionally related regions of brain with functional connectivity MR imaging. Am J Neuroradiol 21: 1636–1644.
19. Rombouts SA, Stam CJ, Kuijer JP, Scheltens P, Barkhof F (2003) Identifying confounds to increase specificity during a “no task condition”. Evidence for hippocampal connectivity using fMRI. NeuroImage 20: 1236–1245.
20. Vincent JL, Snyder AZ, Fox MD, Shannon BJ, Andrews JR, et al. (2006) Coherent spontaneous activity identifies a hippocampal-parietal memory network. J Neurophysiol 96: 3517–3531.
21. Laufs H, Krakow K, Sterzer P, Eger E, Beyerle A, et al. (2003) Electroencephalographic signatures of attentional and cognitive default modes in spontaneous brain activity fluctuations at rest. Proc Natl Acad Sci USA 100: 11053–11058.
22. Gilbert SJ, Dumontheil I, Simons JS, Frith CD, Burgess PW (2007) Comment on “Wandering Minds: The Default Network and Stimulus-Independent Thought”. Science 317: 43.
23. Harrison BJ, Pujol J, López-Solà M, Hernández-Ribas R, Deus J, et al. (2008) Consistency and functional specialization in the default mode brain network. Proc Natl Acad Sci USA 105: 9781–6.
24. Sambataro F, Murty VP, Callicott JH, Tan HY, Das S, et al. (2008) Age-related alterations in default mode network: Impact on working memory performance. Neurobiol Aging 31: 839–52.
25. Buckner RL, Andrews-Hanna JR, Schacter DL (2008) The brain's default mode network: anatomy, function, and relevance to disease. Ann NY Acad Sci 1124: 1–38.
26. Baars B (2002) The conscious access hypothesis: origins and recent evidence. Trends Cogn Sci 6: 47–52.
27. He BJ, Raichle ME (2009) The fMRI signal, slow cortical potential and consciousness. Trends Cogn Sci 13: 302–9.
28. Practice advisory for intraoperative awareness and brain function monitoring: a report by the American Society of Anesthesiologists task force on intraoperative awareness (2006) Anesthesiol 104: 847–64.
29. Rudolph U, Antkowiak B (2003) Molecular and neuronal substrates for general anaesthetics. Nat Neurosci 5: 709–20.
30. Huotari AM, Koskinen M, Suominen K, Alahuhta S, Remes R, et al. (2004) Evoked EEG patterns during burst suppression with propofol. Br J Anaesth 92: 18–24.
31. Kelz MB, Sun Y, Chen J, Cheng Meng Q, Moore JT, et al. (2008) An essential role for orexins in emergence from general anesthesia. Proc Natl Acad Sci U S A 105: 1309–14.
32. Marsh B, White M, Morton N, Kenny GNC (1991) Pharmacokinetic model driven infusion of propofol in children. Br J Anaesth 67: 41–8.
33. Absalom AR, Mani V, De Smet T, Struys MM (2009) Pharmacokinetic models for propofol—defining and illuminating the devil in the detail. Br J Anaesth 103: 26–37.
34. Fiset P, Paus T, Daloze T, Plourde G, Meuret P, et al. (1999) Brain mechanisms of propofol-induced loss of consciousness in humans: a positron emission tomographic study. J Neurosci 19: 5506–13.
35. Vogt BA, Laureys S (2005) Posterior cingulate, precuneal and retrosplenial cortices: cytology and components of the neural network correlates of consciousness. Prog Brain Res 150: 205–17.
36. Qiu M, Ramani R, Swetye M, Rajeevan N, Constable RT (2008) Anesthetic effects on regional CBF, BOLD, and the coupling between task-induced changes in CBF and BOLD: an fMRI study in normal human subjects. Magn Reson Med 60: 987–96.
37. Johnston AJ, Steiner LA, Chatfield DA, Coleman MR, Coles JP, et al. (2003) Effects of propofol on cerebral oxygenation and metabolism after head injury. Br J Anaesth 91: 781–6.
38. Veselis RA, Feshchenko VA, Reinsel RA, Beattie B, Akhurst TJ (2005) Propofol and thiopental do not interfere with regional cerebral blood flow response at sedative concentrations. Anesthesiol 102: 26–34.
39. Alkire MT, Hudetz AG, Tononi G (2008) Consciousness and anesthesia. Science 322: 876–80.
40. Peltier SJ, Kerssens C, Hamann SB, Sebel PS, Byas-Smith M, et al. (2005) Functional connectivity changes with concentration of sevoflurane anesthesia. Neuroreport 16: 285–8.
41. Kiviniemi VJ, Haanpää H, Kantola JH, Jauhiainen J, Vainionpää V, et al. (2005) Midazolam sedation increases fluctuation and synchrony of the resting brain BOLD signal. Magn Reson Imaging 23: 531–7.
42. Franks NP (2008) General anesthesia: from molecular targets to neuronal pathways of sleep and arousal. Nature Neurosci 9: 370–86.
43. Schlünzen L, Vafaee MS, Cold GE, Rasmussen M, Nielsen JF, et al. (2004) Effects of subanaesthetic and anaesthetic doses of sevoflurane on regional cerebral blood flow in healthy volunteers. A positron emission tomographic study. Acta Anaesthesiol Scand 48: 1268–76.
44. Vahle-Hinz C, Detsch O, Siemers M, Kochs E (2007) Contributions of GABAergic and glutamatergic mechanisms to isoflurane-induced suppression of thalamic somatosensory information transfer. Exp Brain Res 176: 159–72.
45. Ying SW, Goldstein PA (2005) Propofol suppresses synaptic responsiveness of somatosensory relay neurons to excitatory input by potentiating GABA(A) receptor chloride channels. Mol Pain 14: 1–2.
46. Tononi G (2004) An information integration theory of consciousness. BMC Neurosci 5: 42.
47. Alkire MT, Haier RJ, Fallon JH (2000) Toward a unified theory of narcosis: brain imaging evidence for a thalamocortical switch as the neurophysiologic basis of anesthetic-induced unconsciousness. Conscious Cogn 9: 370–86.
48. Ogawa K, Uema T, Motohashi N, Nishikawa M, Takano H, et al. (2003) Neural mechanism of propofol anesthesia in severe depression: a positron emission tomographic study. Anesthesiology 98: 1101–11.
49. Steriade M, Timofeev I (2003) Neuronal plasticity in thalamocortical networks during sleep and waking oscillations. Neuron 37: 563–76.
50. Alkire MT, Miller J (2005) General anesthesia and the neural correlates of consciousness. Prog Brain Res 150: 229–44.
51. Parvizi J, Damasio A (2001) Consciousness and the brainstem. Cognition 79: 135–60.
52. Steriade M, Datta S, Paré D, Oakson G, Curró Dossi RC (1990) Neuronal activities in brain-stem cholinergic nuclei related to tonic activation processes in thalamocortical systems. J Neurosci 10: 2541–59.
53. Steriade M, McCormick DA, Sejnowski TJ (2005) Thalamocortical oscillations in the sleeping and aroused brain. Science 262: 679–85.
54. Leslie K, Sleigh J, Paech MJ, Voss L, Lim CW, et al. (2009) Dreaming and electroencephalographic changes during anesthesia maintained with propofol or desflurane. Anesthesiology 111: 547–55.
55. Nelson LE, Guo TZ, Lu J, Saper CB, Franks NP, et al. (2002) The sedative component of anesthesia is mediated by GABA(A) receptors in an endogenous sleep pathway. Nat Neurosci 5: 979–84.
56. Aggleton JP, Sahgal A (1993) The contribution of the anterior thalamic nuclei to anterograde amnesia. Neuropsychologia 31: 1001–19.
57. Harding A, Halliday G, Caine D, Kril J (2000) Degeneration of anterior thalamic nuclei differentiates alcoholics with amnesia. Brain 123(Pt 1): 141–54.
58. Veselis RA, Pryor KO, Reinsel RA, Li Y, Mehta M, et al. (2009) Propofol and midazolam inhibit conscious memory processes very soon after encoding: an event-related potential study of familiarity. Anesthesiology 110: 295–312.
59. Tononi G (2005) Consciousness, information integration, and the brain. Prog Brain Res 150: 109–126.
60. Uddin LQ, Kelly AM, Biswal BB, Xavier Castellanos F, Milham MP (2009) Functional connectivity of default mode network components: correlation, anticorrelation, and causality. Hum Brain Mapp 30: 625–37.
61. Maquet P (2000) Functional neuroimaging of normal human sleep by positron emission tomography. J Sleep Res 9: 207–31.
62. Ramsay MA, Savege TM, Simpson BR, Goodwin R (1974) Controlled sedation with alphaxalone-alphadolone. Br Med J 2: 656–9.
63. Olson D, Lynn M, Thoyre SM, Graffagnino C (2007) The limited reliability of the Ramsay scale. Neurocrit Care 7: 227–31.
64. Chernik DA, Gillings D, Laine H, Hendler J, Silver JM, et al. (1990) Validity and reliability of the Observer's Assessment of Alertness/Sedation Scale: study with intravenous midazolam. J Clin Psychopharmacol 10: 244–51.
65. Haenggi M, Ypparila-Wolters H, Hauser K, Caviezel C, Takala J, et al. (2009) Intra- and inter-individual variation of BIS-index and Entropy during controlled sedation with midazolam/remifentanil and dexmedetomidine/remifentanil in healthy volunteers: an interventional study. Crit Care 13: R20.
66. Absalom AR, Menon DK (2009) BIS and spectral entropy monitoring during sedation with midazolam/remifentanil and dexmedetomidine/remifentanil. Crit Care 13: 137.
67. Brett M, Anton J-L, Valabregue R, Poline J-B (2002) Region of interest analysis using an SPM toolbox [abstract]. Presented at the 8th International Conference on Functional Mapping of the Human Brain, June 2-6, Sendai, Japan. Available on CD-ROM in NeuroImage Vol 16, No 2.
68. Maldjian JA, Laurienti PJ, Kraft RA, Burdette JH (2003) An automated method for neuroanatomic and cytoarchitectonic atlas-based interrogation of fMRI data sets. NeuroImage 19: 1233–1239.
69. Tzourio-Mazoyer N, De Schonen S, Crivello F, Reutter B, Aujard Y, et al. (2002) Automated anatomical labeling of activations in SPM using a macroscopic anatomical parcellation of the MNI MRI single-subject brain. Neuroimage 15: 273–89.
70. Fox MD, Snyder AZ, Vincent JL, Corbetta M, Van Essen DC, et al. (2005) The human brain is intrinsically organized into dynamic, anticorrelated functional networks. Proc Natl Acad Sci USA 102: 9673–8.
71. Chang C, Glover GH (2010) Time-frequency dynamics of resting-state brain connectivity measured with fMRI. Neuroimage 50: 81–98.
72. Horovitz SG, Braun AR, Carr WS, Picchioni D, Balkin TJ, et al. (2009) Decoupling of the brain's default mode network during deep sleep. Proc Natl Acad Sci USA 106: 11376–81.
73. Lancaster JL, Tordesillas-Gutiérrez D, Martinez M, Salinas F, Evans A, et al. (2007) Bias between MNI and Talairach coordinates analyzed using the ICBM-152 brain template. Hum Brain Mapp 28: 1194–205.
74. Talairach J, Tournoux P (1988) Co-planar stereotaxic atlas of the human brain: 3-dimensional proportional system: an approach to cerebral imaging. New York: Thieme Medical Publishers.
Is the Subject Area "Sedation" applicable to this article?
Is the Subject Area "Sedatives" applicable to this article? | https://journals.plos.org/plosone/article?id=10.1371/journal.pone.0014224 |
Through unique, inspiring workshops, TEC21 equips teachers serving in Lutheran schools to use technology to engage, motivate and educate children for life. We bring educators together to examine, question, evaluate and understand technology, and develop practical applications for the classroom. We sustain learning through a collaborative, online peer-coaching community.
Why?
We want Lutheran schools to be places of excellence where Christ’s love and grace are shared daily. We want Lutheran schools to be “schools of choice” in their communities. We’re dedicated to fostering a culture of innovation, creativity and relevancy in the Lutheran school classroom. | https://tec21connect.com/ |
The Capital One incident is the latest in a string of high-profile, high-impact data breaches. In this case, the hacker gained access to users' information by exploiting a misconfigured web application firewall - something that could have been prevented.
Events like these serve as a grave reminder that companies holding personal and sensitive data need to be extra vigilant.
Good data stewardship is something everyone in an organisation should strive for. It should not be left just to the C-suite or the IT security team. Basics such as the use of strong passwords, multi-factor authentication and keeping software updated would prevent a significant percentage of all cyber incidents.
While its effects are damaging, leading incidents such as these are instrumental to teaching important lessons:
- Only collect and retain data that has a business purpose for as long as it is required.
- Have plans to reduce the impact of an attack. This can be done by incorporating training to help prevent, detect mitigate, respond and recover.
- Organizations need to regularly review their procedures for data storage and collection as security and privacy are not absolutes. They must evolve with changing technologies and regulations.
- Security is beyond an organization's peripherals. A risk assessment prior to parnerships with external business partners or service agreements should be made with periodic re-assessment.
- Build trust through trasparency ensuring that everyone ranging from customers, board members and important stakeholders are informed of an incident with regular updates. | https://www.arabianindustry.com/comms/news/2019/jul/31/recent-capital-one-breach-could-have-been-avoided-6168045/ |
Getting Ready for GDPR
A metadata-driven approach is important for ensuring compliance with the EU's new data privacy law.
One of the biggest challenges IT professionals responsible for corporate data will face in 2017 comes from a law passed by the European Union due to take effect in 2018, the General Data Protection Regulation (GDPR).
The GDPR is intended to better protect the personal information of European citizens, and it comes with stiff penalties for companies that don’t comply. It is also far-reaching in nature, as it applies not to just EU member countries, but also organizations outside the EU that collect personal data on EU citizens. That means a U.S.-based company that sells goods or services to an EU citizen, and during this process collects their personal data, will be subject to GDPR requirements for data privacy and protection.
While the GDPR spells out in no uncertain terms the level of protection companies must provide for personal data, it says little about which technologies organizations can use to deliver those protections. One approach companies would do well to consider is an enterprise content management (ECM) system that leverages metadata to enforce strict controls and security measures to protect personal customer information.
GDPR Explained
GDPR essentially replaces the EU’s Data Protection Directive, which was adopted in 1995. Scheduled to take effect in May 2018, the GDPR is intended to provide EU citizens with a number of benefits, including easier access to their personal information housed by any company that collects it, as well as details about how the company uses their data. It also gives citizens a right to data portability, such as when they switch service providers, and the right to have their data deleted. In addition, it gives citizens the right to know when their data has been compromised, through a provision that requires companies to alert authorities within 72 hours of any data breach involving personal data.
For businesses that must comply with GDPR, the updated regulation promises to simplify existing rules and guidelines. Rather than trying to adhere to a patchwork of data privacy rules country by country, the GDPR will be a single law that applies to companies operating within any EU county. The European Commission estimates this will save companies around 2.3 billion euros a year by doing away with “the current fragmentation and costly administrative burdens.”
Perhaps the biggest change that GDPR brings is in terms of jurisdiction. Previously there was some ambiguity about the extent to which the EU’s Data Protection Directive applied to companies based outside of the EU. The GDPR clears that up, saying “it applies to all companies processing the personal data of data subjects residing in the Union, regardless of the company’s location.” The law makes it incumbent upon any company that collects personally identifiable information (PII) on EU citizens to meet GDPR requirements.
GDPR Requirements and Penalties for Non-Compliance
As spelled out in the summary of articles on the GDPR website, requirements include adhering to the theme of “privacy by design,” which calls for the inclusion of data protection from the onset of system design. The regulation calls for “appropriate” technical and organizational measures to meet this requirement. It includes the concept of “data minimization,” meaning holding only data that’s absolutely necessary to the purpose at hand and limiting access to PII to those “needing to act out the processing.”
The GDPR also requires companies to perform data protection impact assessments (DPIAs) to identify any risks of noncompliance, so the company can take steps to address them.
Public authorities and companies that process PII for 5,000 or more individuals in any 12-month period must also appoint a data protection officer (DPO). This individual must have expert knowledge of data protection laws and practices and be responsible for ensuring the company is in compliance.
| |
There are many different types and causes of trauma and stress in the workplace that can impact employee behavior and performance. Corporations have a social responsibility to assist in the overall wellbeing of their employees by ensuring that their leaders are emotionally intelligent and that their organization is compliant with moral business standards. Occupational Stress: Breakthroughs in Research and Practice examines the psychological, physical, and physiological effects of a negative work environment. It also explores how to cope with work-related stress. Highlighting a range of topics such as job satisfaction, work overload, and work-life balance, this publication is an ideal reference source for managers, professionals, researchers, academicians, and graduate-level students in a variety of fields. | https://www.medexpresshop.com/download/stress-among-teachers-research-tool/ |
Objective: The majority of endometrial cancer survivors (ECS) are obese and at risk for premature death. The purpose of this study was to assess feasibility of a lifestyle intervention program for promoting weight loss, change in eating behaviors, and increased physical activity in obese ECS.
Study design: Early stage ECS (n=45) were randomized to a 6-month lifestyle intervention (LI; n=23) or usual care (UC; n=22). The LI group received group and individual counseling for 6 months. The primary endpoint was weight change. Secondary endpoints were physical activity, [Leisure score index (LSI)] and nutrient intake (3-day food records). Quantitative vitamin C and folate intake were used to assess fruit/vegetable intake.
Results: Recruitment was 29%, adherence (LI group) was 73% and 84% of participants completed follow-up assessments. At 12 months, the intervention group lost 3.5 kg compared to a 1.4 kg gain in the control group [mean difference=-4.9 kg; 95% CI: -9.0 to -0.9 kg; p=.018] and had an increased LSI score of 16.4 versus -1.3 in the control group from baseline [mean group difference=17.8; 95% CI=7.1 to 28.4; p=.002]. There were no differences in vitamin C and folate intake. The LI group had lower intake of kilocalories, although differences were not significant.
Conclusion(s): A lifestyle intervention program in obese ECS is feasible and can result in sustained behavior change and weight loss over a 1-year period.
Similar articles
-
Survivors of Uterine Cancer Empowered by Exercise and Healthy Diet (SUCCEED): A Randomized Controlled TrialV von Gruenigen et al. Gynecol Oncol 125 (3), 699-704. PMID 22465522. - Randomized Controlled TrialBehavior change and weight loss are achievable in overweight and obese ECS, however, the clinical implications of these changes are unknown and require a larger trial wit …
-
Nutrient Intake of Obese Female Binge EatersRS Reeves et al. J Am Diet Assoc 101 (2), 209-15. PMID 11271694. - Clinical TrialOur results suggest that collecting dietary information from participants identified with binge eating disorder is challenging. Dietitians who conduct behavioral weight m …
-
[GP's Intervention in Changing Lifestyle Behavior of Adipose Patients]D Lazić et al. Acta Med Croatica 61 (1), 7-11. PMID 17593634.GPs are familiar with their patients and have a critical role in the assessment and advising of an appropriate lifestyle. GP recommendations can be a valuable source of m …
-
A Randomized Trial of an Intervention to Increase Fruit and Vegetable Intake in Curatively Treated Patients With Early-Stage Head and Neck CancerB Cartmel et al. Cancer Epidemiol Biomarkers Prev 14 (12), 2848-54. PMID 16364999. - Randomized Controlled TrialThe leading cause of death in patients who have had curatively treated early-stage head and neck cancer is a second primary cancer of the upper aerodigestive tract (lung, …
-
[A Comprehensive Approach to Treating Adolescent Obesity]S Gómez et al. Rev Med Univ Navarra 50 (4), 23-5. PMID 17424765. - ReviewObesity started to appear as a public health problem at the end of the 20th century; however, it is currently acquiring epidemic dimensions. In most cases this pathology …
Cited by 45 PubMed Central articles
-
Dietary Interventions for Adult Cancer SurvivorsS Burden et al. Cochrane Database Syst Rev 2019 (11). PMID 31755089. - ReviewEvidence demonstrated little effects of dietary interventions on overall mortality and secondary cancers. For comorbidities, no evidence was identified. For nutritional o …
-
Change in Physical Activity and Quality of Life in Endometrial Cancer Survivors Receiving a Physical Activity InterventionMC Robertson et al. Health Qual Life Outcomes 17 (1), 91. PMID 31133040. - Randomized Controlled TrialEndometrial cancer survivors are at higher risk for suffering from challenges to physical quality of life, and findings from this study suggest that increasing physical a …
-
A Systematic Review and Meta-Analysis of Adherence to Physical Activity Interventions Among Three Chronic Conditions: Cancer, Cardiovascular Disease, and DiabetesT Bullard et al. BMC Public Health 19 (1), 636. PMID 31126260. - Meta-AnalysisThe current evidence suggests that people with chronic conditions are capable of sustaining aerobic physical activity for 3+ months, as a form of treatment. Moreover, hom …
-
Prevalence of Obesity and Incidence of Obesity-Related Comorbidities in Koreans Based on National Health Insurance Service Health Checkup Data 2006-2015 (J Obes Metab Syndr 2018;27:46-52)JH Yoon. J Obes Metab Syndr 27 (3), 195-197. PMID 31089562. | https://pubmed.ncbi.nlm.nih.gov/18243282/ |
Umberto Eco’s legendary Il nome della rosa (The name of the rose) could have been called The Abbey of Crime.
The latter was chosen as the title of a 1987 video game by Paco Menéndez and Juan Delcán published by Opera Soft. The game has achieved a cult following in its home country and is now considered the greatest example of Spain’s “golden era” of software.
They went with that name because, although the game was planned as an official adaptation of Eco’s novel (and it shows), they never received a reply from the author to secure the rights. It may have had to do with Eco’s reaction to the film adaptation which he considered far inferior. | http://whatafact.com/en/f/abbey-crime-original-title-eco-name-rose/ |
When the excimer laser or fluorine molecule F2 laser is used as a light source for a stepper (reduction projection exposure device), it is necessary to make the oscillation laser beam of the excimer laser to have a narrow band. Furthermore, it is necessary to make the stabilization control with high accuracy so that the central wavelength of the spectrum of the narrowbanded oscillation laser beam does not displace while exposing.
FIG. 34 shows a general laser wavelength stabilization controller.
Narrowbanding is conducted by driving a narrowbanding element such as an etalon and a grating provided in narrowbanding module 26 via driver 46 by controller 20 (e.g., adjusting a set angle of the etalon or the grating). When exposing, the wavelength is controlled so that the central wavelength of the spectrum does not vary.
Specifically, an absolute wavelength of oscillation laser beam LO is detected by constantly detecting a relative wavelength of the oscillation laser beam LO to a reference light in monitor module 22 when exposing.
Then, a detected result is fed back to the controller 20, and the narrowbanding element is driven via the driver 46.
And, the central wavelength of the spectrum of the laser beam LO emitted through laser chamber 27 is fixed at a target wavelength.
Japanese Patent Applicaiton Laid-Open No. 4-163980 uses an emission line of arsenic (As) having a wavelength of 193.696 nm as a reference light for detecting an absolute wavelength of the oscillation laser beam of an argon fluorine excimer laser (a wavelength of about 193.3 nm).
Specifically, the emission line from an arsenic-enclosed discharge lamp is entered a spectroscope as a reference light. At the same time, the oscillation laser beam of the argon fluorine excimer laser is entered the same spectroscope as a light to be detected (subject light) for its wavelength. And, the spectroscope separates the entered lights into the reference light and the subject light, and the separated light images are formed on a line sensor. Detection positions on the line sensor correspond to detection wavelengths.
A relative wavelength of the subject light to the reference light is determined from a difference between the detection positions on the line sensor by using a dispersion value. And, the absolute wavelength of the subject light is calculated on the basis of the determined relative wavelength and the wavelength of the known reference light.
Now, the dispersion value will be described.
FIG. 35 shows a relation between a sensor channel number (positions on the line sensor) and a sensor signal strength of the line sensor. The line sensor has a plurality of light-receiving channels and determines the light-detecting positions on the line sensor according to the channel number having detected a light of maximum intensity. The wavelength of the light can be detected from the light-detecting position of the line sensor because an incidence position on the line sensor is variable depending on a wavelength. Thus, the wavelength of light is determined from the channel number having detected the light.
The dispersion value indicates a wavelength (in nm) corresponding to a channel space (in .mu.m) of the line sensor. When the dispersion value (a wavelength corresponding to a channel space of the line sensor) can be determined, a relative wavelength of a light to be detected (subject light) LO to reference light La can be determined from a difference between channel number Sa having detected the reference light La by using this dispersion value and channel number SO having detected the subject light LO.
Correspondence (dispersion value) of the channel space and a wavelength of what level is determined depending on the characteristic of the spectroscope which guides the light onto the sensor. The characteristic of the spectroscope depends on the number of grating grooves, a focal distance of a concave mirror, a refractive index of light in the air and other characteristic values of various types of optical elements configuring the spectroscope.
Here, it was conventionally assumed that the characteristic of the spectroscope was known, namely the dispersion value was a known value, to calculate wavelength .lambda.O of the subject light.
Specifically, theoretical (design of the spectroscope) dispersion value Dt (a wavelength of each channel of the sensor) is determined for each spectroscope on the basis of a design value of the focal distance etc. of the concave mirror in the spectroscope.
And, the obtained theoretical dispersion value Dt is fixed, a relative wavelength of the subject light LO to the reference light La is determined from a difference between the detected channel number Sa of the reference light La and the detected channel number SO of the subject light LO. And, the wavelength .lambda.O of the subject light LO is calculated from the determined relative wavelength and the known wavelength .lambda.a (193.696 nm) of the reference light La.
But, the designed characteristic value of the spectroscope is slightly different from the characteristic value of each produced spectroscope. In other words, the theoretical dispersion value Dt contains an error depending on an individual difference among the spectroscopes.
Moreover, the characteristic of the spectroscope is variable depending on a change in the measurement environment such as a change in temperature and a change in pressure. For example, a space between the grating grooves is varied when a temperature changes. And, a refractive index of light in the air is varied due to a change in pressure. Therefore, the relation between the detection position on the sensor and the wavelength is varied due to the change in temperature and pressure.
As described above, actual dispersion value D of the spectroscope indicates a value different from the theoretical dispersion value Dt due to a difference between the designed characteristic of the spectroscope and the actual characteristic of each produced spectroscope and a change in characteristic of the spectroscope due to the change in the measurement environment. Therefore, on the assumption that the characteristic of the spectroscope is known, namely the theoretical dispersion value Dt is known, the relative wavelength of the subject light LO to the reference light La is determined from a difference between the detection channel number Sa of the reference light La and the detection channel number SO of the subject light LO. And, when the wavelength .lambda.O of the subject light LO is calculated from the obtained relative wavelength and the known wavelength .lambda.a (193.696 nm) of the reference light La, the obtained wavelength .lambda.O includes a detection error. The wavelength .lambda.O is required to have a detection accuracy of 0.0001 nm order, but such a requirement cannot be fulfilled.
The present invention was achieved in view of the above circumstances. And, it is a primary object of the invention to enable error-free and very accurate detection of a wavelength of the subject light output from the subject light source even if the characteristic of the spectroscope is varied due to the individual differences among the spectroscopes or the changes in the measurement environment.
When the subject light is a fluorine molecule F2 laser, a relative wavelength of the subject light LO to the reference light cannot be determined by using the dispersion value as described above because the reference light which can be used to stabilize the wavelength is not known yet.
Therefore, when the fluorine molecule F2 laser was used for exposing, it was hard to control so that the central wavelength .lambda.O of the spectrum of the oscillation laser beam LO does not vary.
The invention was achieved in view of the above circumstance, and it is a second object of the invention to prevent the central wavelength .lambda.O of the spectrum of the oscillation laser beam LO from varying when exposing by the reference light even when the fluorine molecule F2 laser is used as the subject light.
| |
The name Sigmoidal refers to the Greek letter Sigma, and when graphed, resembles a sloping “S” across the Y-axis. A sigmoidal function is a type of logistic function and purely refers to any function that retains the “S” shape, such as the hyperbolic tangent function, tanh(x). The main utility of this class of functions is that they are smooth versions of a step function, meaning that the derivative exists everywhere. This is important for neural networks as learning is typically requires computing the gradients (partial derivatives) through the backpropagation technique. Where a traditional sigmoidal function exists between 0 and 1, tanh(x) follows a similar shape, but exists between 1 and -1, which can have computational advantages.
(Fig: Sigmoid Function)
Nonlinearity means the output is not simply a constant scaling of the input variables (constant slope), i.e. the rate of change is not proportional across all independent variable. Here are some examples of linear vs. nonlinear functions:
(image is taken from Study.com)
How Does Machine Learning Apply Sigmoidal Nonlinearity?
The use of sigmoidal nonlinear functions was inspired by the ouputs of biological neurons. In the brain, the output of a neuron is typically all or nothing (on or off), and hence, can mathematically be modeled as a function with only two outputs. Since neurons begin to fire (turn on) after a certain input threshold has been surpassed, the simplest mathematical function to model this behavior is the (Heaviside) step function, which outputs zero below a threshold input value and outputs one above the threshold input value. However, this function is not smooth (it fails to be differential at the threshold value). Therefore, the sigmoid class of functions is a differentiable alternative that still captures much of the behavior of biological neurons.
Sigmoidal functions are known generally as activation functions, and more specifically as a squashing functions. The "squashing" refers to the fact that the output of the function exists between a finite limit, usually 0 and 1. These functions are incredibly useful in determining probability.
Sigmoidal functions are frequently used in machine learning, specifically to model the output of a node or “neuron.” These functions are inherently non-linear and thus allow neural networks to find non-linear relationships between data features. This greatly expands the utility of neural networks and allows them (in principle) to learn any function. | https://deepai.org/machine-learning-glossary-and-terms/sigmoidal-nonlinearity |
Thanks. I love it. I'm going to make a ton of these. they are very figure flattering! And it takes less than an hour.
carolyn-rawr - carolyn is my name too! Its destined for you to make one!
tzippurah, the belt is essentially a long tie or scarf. The construction is just three rectangles sewn together. All, or at the ver least, the middle rectangle, should be cut on the diagonal of your fabric for stretch. When you fold you fabric over, inside out, to sew your seam, taper the ends so they are about half the size of the middle. You can trim the excess off.
You wrap it like a karate belt - start in the front, | https://www.craftster.org/forum/index.php?action=profile%3Bu=9248%3Bsa=showPosts%3Bstart=20 |
Exiting her daughter’s apartment building on a recent Sunday, Janet Korte spotted something that looked just like the motorless Razor scooters her children loved to ride.
“So I thought, ‘This’ll be a piece of cake,’” said Korte, 52, who was visiting Kansas City from Wichita.
She pressed her thumb on the throttle, and the scooter jolted forward. The front tire clipped the uneven sidewalk. The back of her head slammed on the concrete. Blackout. She couldn’t talk or move.
“It happened so fast,” she said.
Just like that, Korte was another victim of the latest transportation craze sweeping Kansas City and the rest of the country: electric scooters that can be rented at the touch of a phone.
The paremedic told Korte she was the ninth scooter-related accident he had handled in the past month. Korte was riding a Bird scooter.
After Janet Korte (left) fell off an e-scooter in October, Lara Korte asked how many accidents have happened in the metro.
Media reports have highlighted serious e-scooter injuries in cities across the country, from San Diego to Dallas. The story is different in Kansas City, thus far, according to fire department data.
The department said it had responded to just 19 scooter-related accidents since these new-fangled conveyances arrived here in July. Most of the injuries were hurt wrists and skinned elbows; four resulted in probable fractures or dislocations, and three involved motor vehicles. One person was sent to the hospital when the scooter they were riding collided with a car.
Most injuries happened when riders lost their balance and fell, the department said. Officials would not provide any specifics on time, location or circumstances of the accidents, claiming that was health information exempt from Missouri’s open records law.
Both Bird and Lime have detailed safety instructions on their websites. The websites and the companies’ user agreements encourage riders to wear helmets. The Bird user agreement also notes there are “obvious and not-so-obvious risks, dangers and hazards that may result in injury or death,” including pedestrians, traffic, road conditions and weather.
Korte’s decision to hop on the Bird was a spur-of-the-moment thing, so she did not read the user agreement before taking off, or the app’s terms of service. She’d seen her adult children ride them and it seemed easy enough. That gave her the confidence to try, but the scooters turned out to be deceptively dangerous, Korte said.
She was treated for a minor concussion at the University of Kansas Hospital emergency room. And, even 72 hours after the accident, she was still unable to completely close her jaw.
Bird’s trust and safety team routinely sends emails if riders submit negative complaints or accident reports. This was sent to Korte after her oldest daughter, Lydia, reported the accident.
Medical experts in the metro also worry about safety, citing rider inexperience, alcohol use when riding and lack of bike lanes.
“The thing that impresses me about this trend is that these (scooters) are not slow,” said Tracy McDonald, program director for trauma, acute care surgery and concussion at the University of Kansas Health System.
McDonald said the handful of scooter riders treated in the KU Hospital emergency room have suffered the same type of head injuries they see from bike accidents, including broken teeth.
That’s not surprising, McDonald said. If you fall off something going 15 miles per hour — the top speed of both Bird and Lime scooters – you are likely to get hurt.
Officials at Lime and Bird did not respond to emails seeking comment.
Eric Vaughan, BikeWalk KC’s director of bike share and business services, agreed. BikeWalk KC is a nonprofit dedicated to making the roads more friendly to pedestrians and bikers.
He’s also seen a lot of riders struggle with the city’s lack of bike lanes. “(The city is) pothole-ridden and has cracked sidewalks all over the place,” he said.
Much of the angst around the scooters in Kansas City has revolved around safety of the scooters in the pedestrian-heavy Country Club Plaza. Bird temporarily suspended its service on the Plaza this summer but reinstated it in late August after discussions with business owners in the area.
“We’re seeing a lot of incidents with pedestrians and scooter users in conflict with each other – scooters blocking ADA (Americans with Disabilities Act) ramps,” Vaughan said.
When sidewalks are blocked, people in wheelchairs are forced out on the street, said Karen Campbell, director of development and communication for BikeWalk KC. “Coming upon a scooter blocking a sidewalk would be, I would think, infuriating,” she said.
Through his work, Vaughan of BikeWalk KC has studied the e-scooter industry, including delving into the specifics of the user agreements, evaluating how the scooters are maintained, and carefully watching the deployment of the scooters in Kansas City.
The user agreements are a long read, and he worried that riders won’t realize all the legalities involved in using an e-scooter.
The Bird agreement states that riders are liable for any accident and that riders “assume all risk” if they don’t wear a helmet, and it says disputes must be resolved in Los Angeles.
Vaughan’s belief is that the city didn’t spend much time on regulation governing the scooters and wasn’t prepared for how popular they would become.
Vaughan also claims these scooters weren’t built to last. E-scooters have a maximum weight of 220 pounds and a max life of four months, which he said is unsustainable.
Several Bird scooters were ready for riders in Kansas City’s Crossroads area.
Local employees paid by the scooter apps are responsible for repairing or charging the scooters. So, what happens with the duds or run-down scooters?
The scooter craze is reminiscent of an earlier wave of dockless bike shares that splashed across the U.S.
Vaughan and Campbell said the city can use past examples to plan ahead. The demand for different transportation options is there, but safety is not.
“Scooters can be a very powerful device if they’re done the right way,” Vaughan said.
The city agrees, said spokesman Chris Hernandez.
To that end, officials are working toward refining city regulations governing scooters and bikes. Hernandez expected those rules to be in place after a data-gathering phase during the next 12 to 18 months.
The scooters’ popularity highlights a demand for a different way to get around the city. It’s cost-effective and can be faster. Now, BikeWalk KC’s Campbell said, city leaders should focus on ensuring safer pathways for on-the-go travel – whatever mode of transportation people want to use.
Korte, who is a physical therapist, thinks about the fun-ride-turned-fiasco.
She can’t believe a “piece of metal with a little stick” caused so much damage. While some days her neck feels stiff, she’s almost fully recovered.
She can even finally close her jaw all the way.
Are Rental Inspections Good For a City?
Can You Improve an Area Without Gentrifying It? | https://www.flatlandkc.org/curiouskc/question-everything/questions-answered/e-scooters-causing-accidents-kansas-city-mo/ |
Information about data protection
Below, we would like to inform you about the processing of your personal data.
Which data does GEIOS collect on its website and why?
According to Art. 4(1) of the GDPR, “personal data” means any information relating to an identified or identifiable natural person. This includes your name, address, telephone number or date of birth. Information about your website user behaviour can also be deemed personal data if it is possible to identify you from this information.
GEIOS stores your personal data in order to be able to contact you (e.g. via the contact form or the newsletter). We may need the following information to do so:
- First and last name
- Address
- Email address
- Phone number
- Message text
How does GEIOS process your data?
The website operator processes the data on this website.
On the one hand, your data is collected by you communicating it to us. This can be data that you input into our contact form, for example. On the other hand, additional data is automatically collected by our IT systems when you visit the website. That involves mainly technical data (e.g. web browser, operating system or the time of session). This data is collected automatically as soon as you visit our website. Part of your data is collected to ensure that we can provide a website that is error-free. Subject to your consent other data may be used to analyze your usage patterns.
Data processing for online job applications
If you apply for a job that we posted, the data you provide will be processed. In the event that you are employed by us after the application procedure, the data you transmitted to us will be stored in your personnel file for the usual organizational and administrative procedures.
If we are unable to consider your application, we will store your documents for a period of seven and then delete them permanently.
Storage and data retention period
GEIOS stores your data only as long as it is necessary for fulfilling its purpose (e.g. contract fulfillment, replying to your inquiries). In the event that it should be necessary to store the data for a longer period of time due to legal regulations, the legally stipulated periods will be observed and your data will be deleted after this period has expired.
How does GEIOS protect your data?
GEIOS uses technical and organizational security measures to protect your personal data from deliberate manipulation, destruction, loss and against unauthorized third-party access. We are continuously improving our security measures and can thus guarantee comprehensive protection.
SSL/TLS encryption
This site uses SSL/TLS encryption for security reasons and to protect the transmission of confidential content, such as inquiries that you send to us as the website operator. An encrypted connection can be recognized by the address bar of the browser changing from “http://” to “https://” and by the padlock icon appearing in the address bar.
If SSL/TLS encryption is activated, the data you transmit to us cannot be read by third parties.
GEIOS uses Google Analytics with anonymization
GEIOS uses Google Analytics on its website, a web analysis service provided by Google Inc., 160 Amphitheatre Parkway, Mountain View, CA 94043 United States, hereinafter referred to as “Google”. Google Analytics uses so-called “cookies”, which are text files that are saved to your computer to help with website usage analysis. The information generated by the cookies, such as time, place and frequency of the website visit including IP address, is transferred to Google in the United States and stored there.
GEIOS only uses the Google Analytics version with IP anonymization on its website. In this case, your IP address will already be truncated by Google within the Member States of the European Union or in other signatory states of the Agreement on the European Economic Area (EEA Agreement) and will thus also be anonymized.
Google will use this information to evaluate your use of our website, to compile a report on website activity for us, and to provide other services relating to website activity and web usage. Google may also transfer this information to third parties if required to do so by law, or where such third parties process the information on Google’s behalf.
According to Google, it will not associate your IP address with any other data held by Google. You can prevent cookies from being placed by changing the settings in your browser accordingly. GEIOS would like to point out, however, that in this case it may not be possible to use all features of our website.
Google also offers an opt-out option for the most popular browsers, which gives you more control over what information Google collects and processes. Should you choose to enable this option, any information about your website visit will not be transmitted to Google Analytics. However, opting out does not prevent information from being transmitted to us or to other web analysis services we may use. For more information about the opt-out option provided by Google and how to enable it, please visit the following link:
What are your rights?
Right to information and right of access
You have the right to obtain information about the origin, recipient and purpose of your stored personal data at any time and free of charge. You also have the right to request the rectification, restriction or erasure of this data. You can contact us at any time at the email address ([email protected]) if you have any further questions regarding data protection. You also have the right to lodge an appeal to the competent supervisory authority pursuant to Art. 77 GDPR.
Right to data portability
You have the right to receive – or to have a third party receive – the data that we process by automated means on the basis of your consent or on a contract in a commonly used, machine-readable format. In the event that you request a direct transfer of the data to another controller, we are only able to do so within the scope of our technical capabilities.
Withdrawal of your consent to data processing
Many data processing operations are only possible with your express consent. You can withdraw your consent at any time. All you need to do is send an informal email ([email protected]). The withdrawal of consent will not affect the lawfulness of processing based on consent before its withdrawal.
External links
GEIOS processes your data exclusively on the following legal bases:
- Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC (General Data Protection Regulation, GDPR),
- Federal Data Protection Act (BDSG)
- German Telemedia Act (TMG)
- Commerce and Distance Selling Act
COOKIE GUIDELINES
What are cookies?
Cookies are small text files that are saved to your computer. Cookies only contain information relating to the website from which they were generated and can only transmit this information back to this website. Cookies cannot be used to access or view data on your hard drive.
What is the purpose of cookies?
- GEIOS collects the total number of visitors to the website and records this data using cookies.
- GEIOS collects personal data,
- to analyze the website, e.g. to determine the usage habits of the website visitors.
- to collect statistical data about the activities on our website, e.g. the number of visitors.
- to record your visit to our website, the pages you visited and the links you clicked. We use this information to better tailor our website to your interests.
GEIOS uses two types of cookies:
- Session cookies: These cookies are temporary and are deleted as soon as you close your browser.
- Persistent cookies: These are stored on your computer until they become invalid or until you remove them. Persistent cookies store your personal preferences, such as your preferred language on multilingual websites, facilitating later visits.
Third-party cookies
Please note that cookies do not contain any personal data that can be read by third parties.
GEIOS cooperates with third parties who investigate the use of our website and the activities on the website for us. For this purpose, they may place a cookie on your computer.
Moreover, GEIOS works with third parties to evaluate the effectiveness of our advertising and promotional activities on third party websites.
Managing your cookie preferences
You can delete, enable and manage cookies at any time. To do this, you can make changes to your web browser settings. You can also set your web browser so that you are repeatedly asked whether a new cookie may be stored on your computer. More information can be found in your web browser’s help menu.
How can you contact GEIOS?
Website operator:
GEIOS GmbH
Bockgasse 17
89073 Ulm
Tel: +49 (0) 89 2154 639 0
E-Mail: [email protected]
www.geios.com | https://www.geios.com/en/data-protection-notice/ |
According to the Equal Pay Act, women and men in one workplace must receive equal pay for equal work. All organizations should observe this rule because, besides attracting legal repercussions, it staves off far-reaching implications like reduced morale and poor productivity.
That brings us to a crucial topic: bridging the gender pay gap. Do you know how to address this issue? If not, don’t worry. Read on for invaluable tips and hacks.
An Overview
This gap refers to the difference between women’s and men’s average wages in the same workforce. Professionals use this element to measure and compare women’s economic positions to men’s.
Numerous culprits can widen this gap, including discrimination and bias (conscious and unconscious) in decisions like recruitment and pay. Others include education levels, occupational choices, and the employment sector involved.
Tips For Bridging The Gap
The following practices will help your organization alleviate the problem of gender pay gap:
1. Embrace Transparency In Pay
Many employers have embraced pay transparency today after realizing that it’s one of the surefire ways to build employee trust, foster engagement, and improve productivity. If your organization is yet to adopt this practice, it should do so sooner.
But to fully embrace transparency in pay, there are several things you must do. First, use solutions like audits to identify pay discrepancies, one of the issues that often lead to high turnover rates. Data and unambiguous salary bands can also help you set salary ranges and eliminate unfairly set wages.
Also, for pay transparency to be a pillar, your organization must have superbly-aligned pay philosophies and structures. That means you need a clearly defined base pay, commitment to equity, and, above all, to rely on a clear salary structure that covers the entire organization.
2. Support Paternity Leave
According to a recent report, the ‘motherhood penalty’ contributes to 80% of the disparity between the average salaries earned by men and women. That is so because sometimes, individuals of the fairer sex get relieved of their duties after becoming pregnant. Moreover, some companies allow them to take some time but at lower wages.
Paternity leaves can narrow the gap because they allow men to spend more time with their young ones. Most importantly, when men take some time off work and play a part in raising kids, they give women the opportunity to rejoin the workforce and earn wages.
Incentivize paternity leaves to encourage more men to help their counterparts in raising babies. For instance, offer flexible hours that allow them to spend as much time away as possible and only report to the office when there’s a compelling reason.
3. Use Pay Equity Audits And Calculators
Equity audits and calculators can effectively bridge the gender pay gap.
A pay equity audit is simply a solution that allows you to compare the wages for different employees ‘like work.’ Of course, the comparison factors essential differentials like job performance and work experience. This audit also investigates the sources of unjustifiable pay differences.
On the other hand, a pay equity calculator like Mercer is a tool that lets you gauge the pay equity in your organization. You can use it to drill into pay gaps by gender and many other aspects, including race and ethnicity.
4. Encourage Remote Working
Remote work is indispensable because it allows women and mothers to continue investing in a full-time career trajectory even when their role limits movement. Remember, sometimes people of the fairer sex sacrifice their careers when balancing home and work life becomes impossible. But with remote work, that shouldn’t be an issue.
Today, remote work isn’t as herculean as it was pre-pandemic. You can now overcome countless challenges using technology. But before fully embracing remote work, research and identify the best tools. Also, explain the benefits of this approach to your team and help them create a culture of trust.
Don’t shun remote work because, besides helping you bridge the pay gap, it gives you access to a diverse talent pool, reduces turnover rates, and boosts employee productivity. | https://www.geekersmagazine.com/bridging-the-gender-pay-gap/ |
The examine of Hox genes is essential not just in exploring the enigma of homeosis but additionally in figuring out basic improvement on the basic molecular point. "Hox Gene Expression" starts off with the fantastic discovery of the homeobox twenty-three years in the past and follows the interesting direction thereafter of a sequence of breakthroughs in Genetics, improvement and Evolution.
The booklet of the dep. of wellbeing and fitness White Paper "The healthiness of the kingdom" (1992) and "Our more healthy country" (1998) gave emphasis to the significance of dietary overall healthiness of the kingdom in any respect a while. it really is transparent that the fulfillment of particular objectives for being pregnant and infancy as set out within the White Paper will contain the educational of all overall healthiness care pros in food schooling.
Numerous diversified transformation thoughts were built through the years and without difficulty proven to be decisive tools in fungal biotechnology. This booklet will hide the fundamentals at the back of the main wide-spread transformation tools, in addition to linked instruments and strategies. every one bankruptcy will supply protocols besides examples utilized in laboratories all over the world.
This quantity makes a speciality of the etiology and morphogenesis of congenital center ailments. It experiences intimately the early improvement and differentiation of the center, and later morphologic occasions of the cardiovascular process, protecting a variety of subject matters comparable to gene services, development elements, transcription components and mobile interactions which are implicated in cardiac morphogenesis and congenital middle illness.
Mol. Teratol. 79, 187–210. Haycraft, C. , et al. (2005). Gli2 and Gli3 localize to cilia and require the intraflagellar transport protein polaris for processing and function. PLoS Genet. 1, e53. , et al. (1995). Interaction between undulated and Patch leads to an extreme form of spina bifida in double-mutant mice. Nat. Genet. 11, 60–63. Hol, F. , et al. (1995). A frameshift mutation in the gene for PAX3 in a girl with spina bifida and mild signs of Waardenburg syndrome. J. Med. Genet. 32, 52–56.
Et al. (1995). Interaction between undulated and Patch leads to an extreme form of spina bifida in double-mutant mice. Nat. Genet. 11, 60–63. Hol, F. , et al. (1995). A frameshift mutation in the gene for PAX3 in a girl with spina bifida and mild signs of Waardenburg syndrome. J. Med. Genet. 32, 52–56. Hol, F. , et al. (1996). PAX genes and human neural tube defects: An amino acid substitution in PAX1 in a patient with spina bifida. J. Med. Genet. 33, 655–660. Hoth, C. , et al. (1993). Mutations in the paired domain of the human PAX3 gene cause Klein-Waardenburg syndrome (WS-III) as well as Waardenburg syndrome type I (WS-I).
1988a). A cell-type-specific abnormality of cell proliferation in mutant (curly tail) mouse embryos developing spinal neural tube defects. Development 104, 285–295. Copp, A. , et al. (1988b). Prevention of spinal neural tube defects in the mouse embryo by growth retardation during neurulation. Development 104, 297–303. Copp, A. , et al. (1994). Developmental basis of severe neural tube defects in the loop-tail (Lp) mutant mouse: Use of microsatellite DNA markers to identify embryonic genotype. | http://siybook.com/library/mouse-models-of-developmental-genetic-disease |
Megan Kealy’s first international competition in two years proved to be a special one for the Milton Keynes Gymnastics star as she returned from the Trampoline & Tumbling World Championships as senior world champion.
The trip to Baku in Azerbaijan was her first overseas event in a while due to the pandemic, so nerves and emotions were certainly high heading into this event.
On the first day of competition Megan lead her team into the Team Finals and guaranteed her place in the individual finals qualifying in second place overall. With all of this Team GB also qualified into the all-around team final which now meant Megan had three more events to compete in.
The following day, Megan stepped up last for the team and secured a third place medal with another exceptional routine. Showing her skill, composure, and professionalism all round.
The third day of competition saw the main event for the senior women in the individual finals. All athletes were required to bring their very best routines and Megan certainly did that. Setting the bar very high with a score of 34.400 for her first routine she was leading the way into the second routines.
With a final pass of 33.400 Megan was crowned the new Senior World Champion. She is one of only three to ever win this title for Great Britain and the youngest to do it. This was a long time coming after stepping up to her first senior event in 2018 and showing what she is made of Megan has gone from strength to strength in the Tumbling world proving she is a force to be reckoned with.
This was not the end of Megan’s competition as she was highest qualifier for team GB this required her to compete in the team all around again completing a fantastic routine helping team GB to another third placed medal. | https://www.miltonkeynes.co.uk/sport/other-sport/kealy-claims-the-world-championship-title-in-baku-3472456?itm_source=parsely-api |
Expert Meeting on Advancing the Measurement of Ecosystem Services for Ecosystem Accounting
From 22-24 January 2019, a working group of approximately 20 ecosystem accounting experts from around the world gathered at UN Headquarters in New York to discuss the measurement of key ecosystem services. As part of the revision process of the System of Environmental-Economic Accounting 2012—Experimental Ecosystem Accounting (SEEA EEA), this working group, led by Rocky Harris (Department for Environment, Food and Rural Affairs of the United Kingdom), worked to draft issues papers on the measurement and valuation of select ecosystem services. The goal of the meeting was to reach a common understanding of measurement and valuation issues for specific ecosystem services. In particular, the working group focused on water supply, water purification, carbon sequestration, agriculture and forestry provisioning, fisheries provisioning, air filtration, soil retention and water regulation, habitat and biodiversity, and recreation services. The discussions for each of these services covered several aspects of measurement and valuation, bringing up key points for further consideration over the revision process.
For example, in terms of water supply services (Session 3), the discussion covered a range of topics, from the definition of the services themselves and need for distinction between the abstraction of water (commonly considered a provisioning service) and the role of the ecosystem in making water available (commonly considered a regulating service), to the challenge of how to treat navigation and non-consumptive uses of water. Participants also noted the link to the recording of stocks and flows in the SEEA Central Framework as a key issue to be clarified in the revision process.
The wide scope of issues for each ecosystem service was also on display during the session on habitat and biodiversity (Session 8). One key issue was the need for clarification with respect to biodiversity in the delivery of ecosystem services, in particular the roles of biodiversity in supporting cultural ecosystem services as well as in maintaining the capacity for the future delivery of ecosystem services. The salience of biodiversity was also highlighted during the session, as several participants noted that there is currently a window of opportunity for biodiversity-related measurement to impact the post-2020 biodiversity framework.
David Barton from the Norway Institute of Nature Research presenting on ecosystem recreation services (Session 9).
Biodiversity and water supply were only a few of the sessions covered during the workshop, and all of the workshop documents can be found here. The conclusions reached from the papers and the meeting will inform broader agreed definitions and treatment of valuation for ecosystem services for the SEEA EEA. In particular, a working group led by Juha Siikimaki, Chief Economist of the International Union for Conservation of Nature (IUCN), will work from the findings of the ecosystem service working group to reach a conceptual framework for valuation of ecosystem services and identify appropriate accounting treatments for ecosystem services. Key issues that the group will tackle include 1) defining exchange and welfare values, articulating institutional arrangements and establishing the valuation context for ecosystem accounting; 2) ecosystem disservices and externalities; 3) approaches to the valuation of ecosystem assets; and 4) issues and options in accounting for ecosystem degradation and enhancement of ecosystem assets. | https://seea.un.org/news/expert-meeting-advancing-measurement-ecosystem-services-ecosystem-accounting |
This Core facility is charged with providing a comprehensive computational environment to perform neuroanatomic analysis, image registration and functional-anatomic database development in support of the specific hypotheses regarding anatomic specificity of drug-related changes in fMRI signal presented in the Projects. This task is divided into the following three general processing domains: 1) neuroanatomic analysis of human and rodent subjects, 2) integration of structural and functional maps within a subject, and 3) data management to support within individual or between group hypothesis testing for use in each of the Projects. Functional MRI (fMRI) can provide information about both the location of cortical and subcortical areas involved in the response to drug administration, and dynamic information relating to the temporal interrelationships of these areas. Therefore, this Core must provide a reproducible and efficient means for obtaining, analyzing, testing and reporting the resultant structural and functional data. The non-invasive nature of MRI allows multiple experiments to be repeated on an individual subject, both human and rodent, during the course of one examination period as well as on multiple occasions. These data must be registered accurately, in both space and time, and interpreted to isolate physiological phenomena of interest from extraneous sources. Three- dimensional, high-resolution, anatomic MRI images will serve as the basis for interrelating this information. These intersubject comparisons are required to understand the spatial distribution of brain activation within and between groups of subjects and the relationship of this pattern of activation to drug-related alterations. The required computational operations for these tasks are already developed and in daily use. Continued development effort is necessary to optimize these tasks for proposed projects in order to improve processing efficiency and maximize the specificity of the observed functional changes.
| |
The enforcement of the new Directive 2010/63 on animal testing (with a two-year transposition period) officially confirms the rejection, by the EU, of a scientific update, which is not only necessary, but crucial for the safeguard of human health and the environment, and its intention to relaunch an erroneous, misleading research method.
The experimentation on “animal models” has always been proven unreliable and deceptive for the purposes of biomedic research. In recent years, this evidence has become official on scientific bodies of maximum importance and credibility.
An “epochal turning point” in toxicological research has been announced, for example, by the National Research Council of the U.S.A., which, comparing it to historical events like "the discovery of DNA and the creation of the first computer”, has described it as a “shift from a system based on the study of animals to a system based on in vitro methods, which are now able to evaluate the way a substance alters gene function inside human cells”.
Everybody (except for the majority of the European regulators, or so it seems) knows that:
Every living species can only be a model of itself. This is shown by poisons, like strychnine and hemlock, to mention only 2 out of 1000, which are excellent food for various laboratory animals; this is also shown by the fact that, out of 100 substances which pass animal testing, 92 of them fail clinical trials on man.
Animal testing is still relaunched today, in 2010, since Europe is subject to the lobbies of chemical substance manufacturers and wants to allow them to reach the best business results through the selection of the most suitable animal species, besides avoiding any civil responsibility in case of environmental or pharmacological disasters (in order to say, a posteriori, “we all know that an animal test is not a reliable test…”).
The extraordinary recent technologies (due to new achievements in the fields of science, genetics, biology, chemistry, computer science, etc.), which are 10,000 times faster and 1,000 times more cost-effective and, as the final report of the “VII World Congress on Alternative Methods and Animal Testing” (Rome, 2009) states: “generate a wealth of knowledge which has never been reached or discovered before”, permit the achievement of an immediate safeguard for our health and the environment; however, these primary values are unfortunately set aside for profit.
Moreover, the new technologies follow the common feeling of European citizens, who cannot stand any longer the terrible sufferings of tenths and hundreds of millions of animals sacrificed on the altar of a false science (this remark goes alongside with the previous one, since the ethical aspect is not secondary to the scientific one).
The EQUIVITA Scientific Commission and the great majority of European citizens, who have already expressed themselves on all possible occasions (for example, in the demonstrations of 25th September in Rome and 6th November near Brescia), under the coordination of some (few, and therefore praiseworthy) European members of Parliament, will not give up fighting against vivisection and, when the new regulation for the application of Art. 11 of EU Treaty is ready, they will organize a petition to promote a popular initiative for a bill which could make EU regain a minimum degree of dignity and consent. | http://equivita.it/index.php/en/press-release/12-comunicati/432-press-release-91011 |
Many of our academics are world-leading experts in the symptoms of mental illness and psychiatric diagnoses. Our work in the Psychology Research Institute has influenced the classification systems used for psychiatric diagnosis worldwide, particularly in the context of Post-Traumatic Stress Disorder.
Our researchers also investigate the relationship between individual symptoms of mental illness and use the results to inform clinically relevant treatments.
Colleagues in our Biomedical Sciences Research Institute are exploiting the remarkable opportunities made possible by recent molecular advances: revolutionary changes in biomedicine and biotechnology that will offer particular advantages in the field of mental health research.
In particular, the Northern Ireland Centre for Stratified Medicine aims to identify how our genes or patterns in levels and state of molecules within our bodies could be used to create robust clinical decision-making tests for mental health disorders (Schizophrenia, Depression) and Dementia. One ongoing study is assessing the biological factors affecting antidepressant treatment response.
Our Pharmacy colleagues can provide expertise concerning drug delivery and response for psychotropic medication. Our research on the etiology of mental illness also includes groundbreaking studies using brain-imaging techniques. There has been a wealth of research conducted into factors that predict risk or promote resilience of mental illness, and into the comorbidity between mental health disorders and a wide array of associated biopsychosocial factors.
There is still much to learn about the underlying mechanisms and causes of these illnesses, the overlaps and interactions between them, and the factors that increase and reduce risk. This line of research is enhanced when biologists, psychologists and social scientists work together, and is a key strength of our institute’s approach. | https://www.ulster.ac.uk/mentalhealth/research/mental-illness |
there is so much false information on Yezidis out there. YI members have taking upon themselves to educate and make educational resources available to debunk some myths and make reader friendly websites, brochures, and professionally done videos on Yezidis.
– we are working on several videos at this time
YI Partners with ICCS to Preserve Yezidi Faith, History, and Culture
Yezidi global delegation to India took part in 5TH INTERNATIONAL CONFERENCE AND GATHERING OF ELDERS At International Center for Cultural Studies
ICCS’s goal is Universal Wellbeing – Sustaining Nature, Culture and Communities
Like the past four events, the fifth triennial international conference and gathering of Elders brought together the leaders and scholars of 100+ living ancient cultures. The event was focused on sharing insights on how to leverage the current globalization trend, access technology tools and build leadership capability within communities to ensure universal wellbeing in the twenty-first century and beyond. The Yezidis , including members of Yezidis International, were the keynote speakers at this gathering that brought thousands of people together.
After the event, YI and ICCS decided to work together to preserve the Yezidi culture and religion. The project is currently under discussion. | https://www.yezidisinternational.org/preserving-faithculture/ |
Home › Forums › UN-ACT’s BLOG › Money talks: Why compensation could be the best tool in the fight to combat forced labour
Post by: Anna Olsen, Technical Officer, Tripartite Action to Protect the Rights of Migrant Workers in the Greater Mekong Subregion, ILO (ILO GMS TRIANGLE). You can contact her at [email protected].
Just last week, we attended the screening of several men who had been repatriated after a long period away. They had been working as fishers and living in very bad conditions. Some gave evidence that would indicate human trafficking, including being tricked on to boats. Some told stories that displayed elements of forced labour. All had been exploited, in one way or another, and the employer had facilitated their return.
Among many tragic stories, one man stood out. Like many of the others, he had returned without any money, without anything to show for his years of work away from his family. And he had returned with a crushing sense of shame that he was, still, empty-handed. During the interviews, he remarked to another returnee next to him, that he wouldn’t be going home to his family, because he had nothing.
Not going home means a lot of things. It meant further challenges in accessing healthcare and assistance finding a new job. More personally, it means several more years where parents and siblings do not know where their son and brother is; it means more time away from the comfort and support of family.
Many readers will not understand the cultural context that means this man cannot face his family without any money to show for his time away. But this story underscored for me the importance of being able to make claims and access redress when migrant workers are victims of crimes and exploitation. This man was never paid any wages.
The Protocol of 2014 to the Forced Labour Convention, 1930 requires each member State to ensure that all victims of forced or compulsory labour, irrespective of their presence or legal status in the national territory, have access to appropriate and effective remedies, such as compensation. The Recommendation supplementing it further clarifies that this should include compensation and damages from perpetrators, including unpaid wages and statutory contributions for social security benefits. Even if a crime like trafficking or forced labour is not proven, the ILO’s Migrant Workers (Supplementary Provisions) Convention, 1975 (No. 143) clearly states that regardless of status, migrant workers are entitled to be paid for the work they have completed. More locally, General Principle 2 of the ASEAN Declaration on the Protection and Promotion of the Rights of Migrant Workers (2007) states that sending and receiving States shall, for humanitarian reasons, closely cooperate to resolve the cases of migrant workers who, through no fault of their own, have become undocumented. Part of this resolution must be coordinating access to justice.
According to Profits and Poverty, the ILO’s report on the economics of forced labour, there is a clear correlation between sudden income shocks, like not receiving wages or facing unexpected health costs, and the likelihood of ending up in forced labour. The obvious tactic to prevent victimization and re-victimization, then, is to ensure that access to justice for wages due, and an adequate social protection floor is accessible to all.
In reality, access to compensation remains a distant dream for many victims of forced labour. The man in our story has little access to compensation for underpayment, let alone redress for the less tangible harm suffered. There are few, if any, mechanisms for reclaiming lost wages while a worker is overseas – few bilateral agreements include provisions on how to determine jurisdiction for such claims, and access to international mechanisms is notoriously difficult. This is a gap that should urgently be addressed, both to restore justice for victims of exploitation and to prevent re-trafficking.
But we are working on increasing access to justice for all exploited workers. Through linking Migrant Worker Resource Centres to complaints mechanisms processes and legal aid, in the last five years, the GMS TRIANGLE project has enabled over US$1.2 million to be awarded to migrant workers who have been underpaid, exploited, injured or abused. This money goes, rightfully, back into the pockets of workers and governments are beginning to realise how important effective complaints mechanisms are to combatting abuse and regulating brokers and recruitment agencies.
After the man mentioned that he wouldn’t be going home, another returnee turned to him ‘don’t worry, my uncle has a construction site, I’ll give you his number and you can work there.’ Without viable options to receive the wages he is owed and compensation for the harm he has already suffered, it is easy to see how the construction job is an attractive option. And, hopefully, this is the beginning of a new life, not the cycle of exploitation, trafficking and forced labour starting all over again.
You must be logged in to reply to this topic. | http://un-act.org/forums/topic/money-talks-compensation-best-tool-fight-combat-forced-labour/ |
Change your tags. The British rock band are called The Rolling Stones...
Note: These are videos from concerts where Rolling Stones played, so they may be of other bands that played the concert as well. | https://www.concertarchives.org/bands/rolling-stones/videos |
The supercontinent cycle of episodic assembly and breakup of almost all continents on Earth is commonly considered the longest period variation to affect mantle convection. However, global zircon Hf isotopic signatures and seawater Sr isotope ratios suggest the existence of a longer-term variation trend that is twice the duration of the supercontinent cycle. Here we propose that since ∼2 billion years ago the superocean surrounding a supercontinent, as well as the circum-supercontinent subduction girdle, survive every second supercontinent cycle. This interpretation is in agreement with global palaeogeography and is supported by variations in passive margin, orogen, and mineral deposit records that each exhibits both ∼500–700 million years periodic signal and a 1000–1500 million years variation trend. We suggest that the supercontinent cycle is modulated by an assembly that alternates between dominantly extroversion after a more complete breakup, and dominantly introversion after an incomplete breakup of the previous supercontinent. | https://ir.library.carleton.ca/pub/23532 |
Editor’s note: This popular story through the Daily Briefing’s archives ended up being republished on Aug. 24, 2018.
A brand new research through the University of Pennsylvania’s Wharton class, published into the log Organizational Behavior and Human Decision Processes, indicates that trash talk will allow you to perform better—but only on specific tasks, Elizabeth Bernstein writes when it comes to Wall Street Journal.
Scientists during the Wharton class performed six experiments involving about 1,000 participants, have been told they would be paired up to vie against another individual in a task. One individual in each set ended up being actually a researcher, however the participants just weren’t informed of this reality.
Before they began their task, individuals were expected to talk to their partner online. Some individuals received basic messages from their partners, such as for example, “Hey, it appears to be like we are contending against one another within the next task.” Other people received trash-talk statements such as for instance, “You are a complete loser.”
The individuals when you look at the research would then perform their assigned tasks, a number of which calculated perseverance while others measured imagination or perhaps the capacity to work very well as a group.
In one single research, as an example, individuals performed a “slider task” that required them to go a cursor on a pc quickly towards a targeted quantity. In another task, individuals tackled a “candle issue” for which they received several supplies—a candle, a pack of matches, and a box of tacks—and had been expected to create a method to connect the candle into the wall surface without allowing it to drip up for grabs or flooring below. This task measured imagination.
The scientists told all of the individuals which they could win cash.
The researchers unearthed that trash talk’s influence on individuals diverse according to the task these people were expected to accomplish.
For individuals whose tasks needed them to exert additional work, trash talk actually aided. These individuals reported experiencing more rivalry—although they also had been almost certainly going to cheat.
But for tasks that calculated imagination or needed individuals to work alongside a partner, trash talk resulted in even worse performance—possibly as a result of distraction produced by anger.
Men and women reacted likewise when confronted by trash talk.
Based on Bernstein, the research has implications both for folks who give trash talk as well as for people who receive it.
For anyone offering trash talk:
For all getting trash talk:
Right here, you will discover good luck methods for ensuring specific performance objectives motivate staff year-round, including example templates additionally the answers to faqs: | https://altrupharmaceuticals.com/just-how-to-respond-to-trash-talkv%D1%92-and-just-how-3/ |
Introduction {#Sec1}
============
Choosing among the many antihyperglycemic treatment options now available for patients with type 2 diabetes mellitus (T2DM) involves matching the clinical profile of each drug, which has been assessed using aggregate data in clinical trials, to the characteristics of the individual patient \[[@CR1]\]. In practice, the relevant parameters involve tolerability and safety; for example, whether the treatment exposes the patient to hypoglycemia or if the patient has renal impairment. Relatively little is known about the differential efficacy of a drug on a patient-by-patient basis, and the factors that might underlie differential responses are not well understood \[[@CR2], [@CR3]\].
Dapagliflozin, a sodium-glucose co-transporter 2 inhibitor (SGLT2) approved for use in the EU, US, and numerous other countries, has been shown to reduce hyperglycemia consistently by increasing urinary glucose excretion \[[@CR4]\]. Additionally, dapagliflozin has been associated with reductions in body weight and blood pressure, and an incidence of adverse events comparable with those seen in control arms in a diverse patient population from an extensive clinical trial program \[[@CR5]--[@CR10]\]. The dapagliflozin development program, which included a large number of patients from independent clinical trials, provided the opportunity to explore the possibility that baseline characteristics or early treatment responses might predict which patients would most benefit from dapagliflozin therapy.
We used data mining---a computational process used to identify patterns in complex datasets---to extract clinically useful information from dapagliflozin phase 3 trials that might otherwise have remained unknown. Data mining algorithms are used to interrogate data to develop a classification rule that can be predictive for outcomes of interest \[[@CR11]\]. They feature extensively in handling very large datasets, where such a hypothesis-independent approach has delivered particularly innovative insights. To date, there are limited examples of the use of such applications to identify predictive variables within conventional clinical datasets, as generated during late-stage clinical trials \[[@CR12]\]. A comprehensive analysis of the dapagliflozin phase 3 program was undertaken to determine whether there are baseline characteristics or early responses to treatment that could be used to predict which patients would benefit the most from receiving dapagliflozin treatment in conjunction with other treatments administered in the program.
Methods {#Sec2}
=======
The overall analysis comprised three stages: (1) variable selection, (2) model generation, and (3) clinical validation (Fig. [1](#Fig1){ref-type="fig"}). Each stage used data from independent clinical trials within the phase 3 program. Studies were selected for analysis if they had a dapagliflozin arm and had been completed by the time this analysis was initiated; all studies fulfilling these criteria were used in these analyses (Table [1](#Tab1){ref-type="table"}) \[[@CR5], [@CR9], [@CR13]--[@CR19]\].Fig. 1Basic plan of the analysis: a staged approach. *HbA* ~*1c*~ glycated hemoglobinTable 1Dapagliflozin studies used in the analysesStudyDetailsNo. of patients included in analyses; dapagliflozin dosePatient populationVariable selection phase Randomized, multicenter, 52-week, double-blind, active-controlled non-inferiority \[[@CR8]\]Dapagliflozin vs. glipizide as add-on to metformin400; dapagliflozin 2.5--10 mg (titration)Men, women ≥18 years, HbA~1c~ \>6.5 to ≤10%, inadequately controlled with metformin and oral hypoglycemic drugsModel generation phase Randomized, multicenter, 24-week, double-blind active-controlled (two studies) \[[@CR10]\]Study 1, dapagliflozin 5 mg + metformin XR, dapagliflozin 5 mg + placebo, metformin XR + placebo\
Study 2, dapagliflozin 10 mg + metformin XR, dapagliflozin 10 mg + placebo, metformin XR + placeboBoth studies combined: 814. 405; dapagliflozin 5 or 10 mg. 409; metformin plus placeboMen, women 18--77 years, HbA~1c~ 7.5--12%, treatment naïve, exclusion NYHA class III, IVValidation phase Randomized, multicenter, 24-week, double-blind, parallel-group, placebo-controlled and 78-week extension \[[@CR5], [@CR13]\]Dapagliflozin 2.5, 5, or 10 mg vs. placebo399; dapagliflozin 5 or 10 mg (*N* = 265)Men, women 18--77 years, HbA~1c~ 7--10%, inadequately controlled with metformin, exclusion NYHA Class III, IV Randomized, multicenter, 24-week, double-blind, parallel-group, placebo-controlled \[[@CR26]\]Dapagliflozin 1, 2.5 or 5 mg vs. placebo334; dapagliflozin 5 or 10 mg (*N* = 262)Men, women 18--77 years, HbA~1c~ ≥7 to ≤10%, treatment naïve, exclusion CVD or event in previous 6 months Randomized, multicenter, 24-week, double-blind, parallel-group, placebo-controlled \[[@CR14]\]Dapagliflozin 10 mg vs. placebo179; dapagliflozin 10 mg (*N* = 88)Men, women 30--75 years, HbA~1c~ 6.5--8.5%, inadequately controlled with metformin, 23.6% had previous CVD Randomized, multicenter, 24-week, double-blind, placebo-controlled \[[@CR15]\]Dapagliflozin 10 mg vs. placebo added to usual care899; dapagliflozin 10 mg (*N* = 448)Men, women ≥45 years, HbA~1c~ ≥7 to ≤10%, previously treated, documented CVD Randomized, multicenter, 24-week, double-blind, placebo-controlled \[[@CR16]\]Dapagliflozin 10 mg + sitagliptin vs. placebo + sitagliptin ± metformin446; dapagliflozin 10 mg (*N* = 223)Men, women mean age 52.6--56.8 years, mean HbA~1c~ 7.8--7.99%, previously treated Randomized, multicenter, 24-week double-blind, placebo-controlled \[[@CR17]\]Dapagliflozin 10 mg vs. placebo added to usual care945; dapagliflozin 10 mg (*N* = 474)Men, women mean age 63.9 years, mean HbA~1c~ 8%, previously treated, documented CVD Randomized, multicenter, 24-week (and 24-week extension), double-blind, placebo-controlled \[[@CR18]\]Dapagliflozin 5 or 10 mg + pioglitazone418; dapagliflozin 5 or 10 mg (*N* = 280)Men, women ≥18 years, HbA~1c~ ≥7 to ≤11%, either treatment naïve or previously treated, exclusion NYA class III, IV Randomized, multicenter, 24-week, double-blind, placebo-controlled, parallel-group international \[[@CR9]\]Dapagliflozin 2.5, 5 or 10 mg vs. placebo + open-label glimepiride435; dapagliflozin 5 or 10 mg (*N* = 292)Men, women ≥18 years, HbA~1c~ ≥7 to ≤10%, inadequately controlled with sulfonylurea, 30.5--38.7% had previous CVD Randomized, multicenter, 24-week (and 24-week extension), double-blind, placebo-controlled \[[@CR19]\]Dapagliflozin 2.5, 5 or 10 mg vs. placebo + open-label existing insulin ± ≤2 oral hypoglycemic drugs568; dapagliflozin 5 or 10 mg (*N* = 389)Men, women 18--80 years, HbA~1c~ ≥7.5 to ≤10.5%, inadequately controlled with insulin ± oral hypoglycemic drugs 47.4--52.1% had previous CVD (hypertension)*CVD* cardiovascular disease, *HbA* ~*1c*~ glycated hemoglobin, *NYHA* New York Heart Association; *XR* extended release
The study was designed with expert clinical, personalized healthcare, statistical, and informatics input. All analysis methods and variable selection criteria were agreed a priori and were captured in an exploratory analysis plan.
This article does not contain any new studies with human or animal subjects performed by any of the authors.
Variable Selection {#Sec3}
==================
The variable selection stage was performed on data from the metformin plus dapagliflozin arm of a randomized, 52-week, double-blind, active-controlled non-inferiority study of dapagliflozin vs. glipizide as add-on to metformin therapy in patients with T2DM with inadequate glycemic control on metformin alone \[[@CR8]\]. The primary endpoint of this study was change in glycated hemoglobin (HbA~1c~) from baseline to week 26. In the studies used in the later stages, the primary endpoint was measured at week 24 instead of week 26. Missing 26-week data were imputed using the last observation carried forward technique. Similarly, the early post-treatment time point was week 3, but because studies used in subsequent stages of the analysis collected data at week 4, week 4 data were used in both the model generation and validation stages. The goal at this stage was to identify those baseline and early treatment response variables with the largest influence on change in HbA~1c~ level. These variables were then ranked based on the strength of their association with the endpoint. Due to a lack of a control arm (metformin alone) in this specific dataset, it was not possible to assess which variables would be specific predictors of dapagliflozin treatment response per se as opposed to more general prognostic factors. The term prognostic as used here has virtually the same meaning as in routine clinical medicine; namely, baseline or early response characteristics that influence outcome, independent of treatment. In contrast, a predictor is a baseline or early response characteristic that has an impact on response to a particular treatment.
The variables selected for model generation were determined by combining the variable lists from two different data mining methods, gradient boosting \[[@CR20], [@CR21]\] and elastic net \[[@CR22]\], using a set of data-driven guidelines. These two methods were selected to complement each other. (For elastic net, the most influential variables were identified as the variables selected when the regularization parameter lambda was increased to the highest level achieving a cross-validated mean squared error (CV MSE) within 1 standard error of the lowest CV MSE, and for gradient boosting it was the top ranked variables with the cutoff determined by a noticeable drop in relative influence score). Two variable lists were defined: clinically relevant data available at baseline, and clinically relevant data available at baseline plus data available at the early post-treatment time point.
Model Generation {#Sec4}
================
The purpose of model building was to refine the selected variables by eliminating prognostic variables (i.e., those that are associated with response independent of treatment) and false positives (i.e., those that were positive in the variable selection phase only) to build a model predictive of dapagliflozin-specific HbA~1c~ reduction at 24 weeks. The lists of variables identified in the variable selection stage (Table [2](#Tab2){ref-type="table"}) were used for model generation in an independent dataset. During this stage, the purpose was to build a robust predictive model that would include variables with estimated effect sizes large enough to be clinically meaningful. Model generation was carried out in a placebo-controlled dataset, allowing variables predictive of response to dapagliflozin treatment specifically to be distinguished from those variables that were predictive of response to any treatment.Table 2Variables selected for model generationVariables selected**A. Baseline only**Glycated hemoglobinHOMA2 insulin sensitivity^a^Fasting plasma glucoseDuration T2DM (years)Proinsulin, fasting^a^Glucose, urine concentrationHOMA2 beta cell function^a^CreatinineLDL cholesterol (calculated), fastingSexCystatin CRaceEthnicity^a^Glomerular filtration rate, calculated (MDRD equation)**B. Baseline + week 3 change from baseline (LOCF)**Change from baseline in hemoglobin A~1C~ (LOCF)Change from baseline in sitting heart rate (LOCF)Change from baseline in fasting plasma glucose (LOCF)Change from baseline in weight (LOCF)Baseline weightBaseline sitting heart rateBaseline CRP, high sensitivity fasting^a^Baseline fatty acids, fasting free*CRP* C-reactive protein, *HOMA* Homeostasis model assessment, *LDL* low-density lipoprotein, *LOCF* Last observation carried forward, *MDRD* Modification of diet in renal disease, *T2DM* type 2 diabetes mellitus^a^Not available in the studies used for the model-building phase
The dataset comprised two randomized, 24-week, double-blind, active-controlled studies comparing the combinations of dapagliflozin (5 or 10 mg) plus metformin with dapagliflozin plus placebo or metformin plus placebo \[[@CR10]\]. The modeling comprised further variable selection, model refinement, and assessment of model performance for patient segmentation. Both univariate and multivariate stepwise linear regression techniques were used to model the main effects of treatment, each clinical variable, and each treatment by clinical variable interaction term. The SAS (SAS institute, SAS Foundation v9. 2, Cary NC, USA) software package was used for these analyses.
The most parsimonious model (i.e., the simplest model which best described the predictive relationship with dapagliflozin treatment response) was put forward for validation.
Clinical Validation {#Sec5}
===================
The selected model was validated using a meta-analysis of nine phase 3 placebo-controlled trials in patients receiving various treatments, such as insulin, glimepiride, pioglitazone, metformin, or sitagliptin (Table [1](#Tab1){ref-type="table"}). Because we were trying to identify predictors of dapagliflozin response that would be valid for virtually any patient with T2DM, it was important to include trials that were heterogeneous with respect to concomitant treatments as well as to the demographic and disease characteristics of the trial participants. The primary aim was to use a robust method to estimate the predictive effect of fasting plasma glucose (FPG) in the remaining individual studies, from which we derived an overall estimate using a meta-analytic approach.
The meta-analysis was conducted using Bayesian hierarchical modeling, which accounts for any heterogeneity between trials by adaptively fitting the data from different trials based on their similarity. This methodology allows inferences to be drawn at the level of individual trials and for the entire set of trials \[[@CR23]\].
Results {#Sec6}
=======
Variable Selection Phase {#Sec7}
------------------------
Data from 400 patients with a value for their change in HbA~1c~ at week 26, including 46 variables of clinical relevance at baseline, were used in the variable selection stage. An additional 11 explanatory variables representing change at week 3 from baseline were used in the baseline plus early follow-up dataset. Variables included patient demographics, baseline lipids, kidney function, HbA~1c~, FPG, and insulin resistance and sensitivity. A total of 14 baseline variables and 8 additional baseline plus week 3 variables were selected for model generation based on the strength of their association with reduction in HbA~1c~ at week 26 (Table [2](#Tab2){ref-type="table"}). Of these, only 17 variables were carried forward to the model generation phase because 5 of the variables chosen were not included in the dataset of the 2 studies used for model generation. Prominent among the baseline variables put forward for validation were HbA~1c~ and FPG, and among the early response variables were change from baseline to week 3 in HbA~1c~ and in FPG.
Model Generation Phase {#Sec8}
----------------------
Modeling identified two variables that could have independent predictive value. For change from baseline in HbA~1c~ at week 24, baseline FPG and race were found to significantly influence the effect of dapagliflozin treatment in the two studies. Other baseline and early post-treatment time point variables were either found to be covariates, rather than predictors of dapagliflozin-specific treatment response (e.g., HbA~1c~), or did not replicate in the independent dataset and were probably false positives (e.g., urinary glucose concentration).
A linear relationship between baseline FPG and outcome was modeled, which suggested that the placebo-adjusted response to dapagliflozin treatment was greater in patients with high FPG at baseline compared with those with lower levels. This effect remained after adjustment for a number of prognostic covariates (main effects) including baseline HbA~1c~, which was the strongest prognostic factor. Further analysis of patients in the highest tertile of baseline FPG \[≥220 mg/dL (12.2 mmol/L)\] indicated that there was no difference in demographics or adverse event profile in these patients compared with patients with lower baseline FPG, for whom the model predicts lower efficacy.
An independent predictive effect of race was identified, which suggested that African American patients may benefit more from dapagliflozin treatment than white and Asian patients. No other predictive effect of race was found. However, the subgroup of African American patients (with an HbA~1c~ measurement on treatment) was small (*n* = 29, 4%), resulting in imprecise estimates of treatment response. This limitation precluded consideration of race as a predictive variable and it was not advanced to the validation phase of the analysis. Moreover, the number of African Americans in the nine studies included in the meta-analysis was too small (ranging from 2.1 to 5.9% of the study populations) to be able to validate a proposed model.
The linear model, limited to the single variable FPG, was used to predict the effect of metformin plus dapagliflozin compared with metformin alone for all white (*n* = 628, 81%) and Asian patients (*n* = 119, 15%) in the study with HbA~1c~ measurement on treatment. The placebo-adjusted treatment effect (i.e., change in HbA~1c~ from baseline to week 24 of dapagliflozin plus metformin vs. metformin alone) in this model was estimated to be --0.65% (95% CI −0.84 to --0.47), with average baseline FPG of 192.3 mg/dL (10.7 mmol/L) (Fig. [2](#Fig2){ref-type="fig"}). The predicted placebo-adjusted HbA~1c~ response varied according to the level of baseline FPG, from a treatment benefit of --0.25% (95% CI --0.55 to --0.05) for 120 mg/dL (6.7 mmol/L) baseline FPG to --1.36% (95% CI --1.82 to --0.90) for 320 mg/dL (17.8 mmol/L) baseline FPG (Fig. [2](#Fig2){ref-type="fig"}). These estimates of the effect sizes of dapagliflozin treatment based on baseline FPG were not affected by the omission of the prognostic factors from the model.Fig. 2Model of fasting plasma glucose (FPG) as predictor (In White and Asian patients *n* = 747). ^b^Dapagliflozin treatment effect increases by 32% for every one unit standard deviation \[57.2 mg/dL (3.2 mmol/L)\] increase in baseline FPG; *dotted lines* represent the 95% confidence interval. *HbA* ~*1c*~ glycated hemoglobin
Clinical Validation Phase {#Sec9}
-------------------------
A meta-analysis technique used to assess the interaction between baseline FPG and treatment in nine dapagliflozin studies (Table [1](#Tab1){ref-type="table"}) indicated that patients with higher levels of baseline FPG were repeatedly found to have a greater response to dapagliflozin treatment, on average, compared with patients with lower baseline FPG levels. The observed effects were consistent with the initial hypothesis derived from the first two stages of the project, but the overall estimate from the Bayesian hierarchical model was smaller and was not statistically significant (a median additional effect of dapagliflozin of −0.12% change in HbA~1c~ at 24 weeks for every additional 50 mg/dL of baseline FPG; 95% credible interval crossed 0, Fig. [3](#Fig3){ref-type="fig"}). In addition, there was variability in the effect size estimates across the nine different studies (Fig. [3](#Fig3){ref-type="fig"}) that led to wide confidence limits around the overall estimate derived from the meta-analysis.Fig. 3Effect of baseline FPG on change in HbA~1c~ from baseline to week 24. ^c^These studies are shown for reference only and were not included in the overall analysis. *CVD* cardiovascular disease, *DPP4* dipeptidyl peptidase-4, *FPG* fasting plasma glucose, *HbA* ~*1c*~ glycated hemoglobin, *Met* metformin, *SU* sulfonylurea, *T2DM* type 2 diabetes mellitus, *TZD* thiazolidinediones
Discussion {#Sec10}
==========
A comprehensive analysis of the dapagliflozin phase 3 program was undertaken with the goal of identifying and validating baseline characteristics (or early responses to treatment) that could be used to predict which patients would respond best to dapagliflozin treatment. We used a novel, customized approach of response profiling to identify predictors of dapagliflozin efficacy of clinical value in the treatment of patients with T2DM. From an initial group of 48 variables, of which 28 were selected for modeling, only one variable, FPG, was found to significantly predict response to dapagliflozin. Although the results of the meta-analysis indicate that baseline FPG was reproducibly predictive of the effect of dapagliflozin on HbA~1c~ change from baseline to 24 weeks, the magnitude and wide confidence interval of the effect size observed was neither clinically nor statistically significant, giving little potential scope for use as a clinical predictor of efficacy. Baseline HbA~1c~, which was found to be the strongest prognostic variable in our analyses (i.e., associated independently of treatment with the largest change in HbA~1c~ from baseline to week 24/26), was not an independent predictor of dapagliflozin-specific treatment effect.
Our results support the findings of conventional, hypothesis-driven analyses, which have shown that dapagliflozin offers significant clinical benefit across all groups of patients in a broad-based clinical trial program, including patients across the continuum of T2DM, from treatment naïve to those requiring high doses of insulin \[[@CR24], [@CR25]\]. It is also consistent with previously published evidence showing that the beneficial effect of dapagliflozin therapy in terms of reduction from baseline in HbA~1c~ is greatest in those with the highest baseline HbA~1c~ \[[@CR6]\]. The methodology applied was sufficiently sensitive to detect a signal of a predictive marker for differential response to dapagliflozin that was below a threshold of clinical significance, suggesting that the model would have been able to detect a clinically relevant predictor if one were included in the original set of variables evaluated in this analysis. Given the breadth of the clinically available data captured in the clinical trials databases and the thoroughness of this analysis, however, it is unlikely that we would have failed to include a potentially relevant clinically available variable in this large set of variables. Our preliminary conclusion, therefore, is that there are no subgroups identifiable from baseline or from baseline plus early on-treatment data in dapagliflozin studies that are associated with clinically relevant differential response to dapagliflozin treatment.
We attempted to combine complementary statistical methods for data mining to cast a wide net for potential signals. Elastic nets \[[@CR22]\] allow an efficient handling of correlated variables, while decision tree algorithms, such as gradient boosting \[[@CR20], [@CR21]\], are most suitable for the analysis of complex interactions and heterogeneity. Combined, these two methods complement each other and give a good chance of finding predictive variables. Such an approach, which poses a risk of type I error, was controlled for by using a staged approach (i.e., hypothesis generation, testing, and validation) and multiple independent datasets. The study described by Maeda et al. \[[@CR12]\] evaluating whether baseline HbA~1c~, post-prandial glucose, body mass index, and duration of diabetes may be predictors of HbA~1c~ reduction when using sitagliptin in Japanese patients with T2DM, for example, was less informative. This was because it only involved one stage and could not distinguish between prognostic and predictive effects specific to sitagliptin, as no control arm was included. In addition, control over type I error was limited and there was no indication of clinical relevance \[[@CR12]\].
The strengths of the approach described herein are its hypothesis-independent basis and consequent ability to generate truly innovative insights. This approach was deliberately chosen to allow all studies to be analyzed together and to identify any variables that would be predictive of response across studies and across the entire spectrum of patients with T2DM. Because the full range of baseline and early on-treatment data were considered as variables that could potentially affect treatment response, the analysis was not limited to those that have a plausible rationale; therefore, the potential to discover a completely novel predictor was increased.
The weaknesses of the method are predicated on the same basis and are exemplified by the high false discovery rates requiring independent validation to deliver sufficient confidence. One way of partially overcoming this problem would be to use a dapagliflozin add-on study that has a placebo-control group for the variable selection phase, which would facilitate identification of possible dapagliflozin-specific effects and reduce the false discovery rate. A second limitation is a consequence of the fact that our approach necessitated the measurement of factors across the complete program of studies. Because the studies that comprised the phase 3 clinical development program for dapagliflozin were relatively heterogeneous by design, the results of meta-analysis of nine of the 12 studies is not meaningful in its own right and should therefore be interpreted with caution. In fact, as shown in Fig. [3](#Fig3){ref-type="fig"}, the estimated effect size of FPG as a predictor was quite large (approximately 1 standard deviation) in treatment-naïve patients in the monotherapy study \[[@CR26]\], whereas it was estimated to be essentially nil in the two studies of older patients with cardiovascular disease \[[@CR15], [@CR17]\]. Although pooling of studies that were all similar in design would have mitigated the problems associated with study heterogeneity, the realities of clinical development programs make this an unavoidable limitation of dealing with these data sets.
In conclusion, our findings are consistent with those of conventional, hypothesis-driven analyses that dapagliflozin offers significant and predictable clinical benefit across all groups of patients, from treatment naïve to those requiring high doses of insulin \[[@CR24], [@CR25]\]. Furthermore, we suggest that this hypothesis-independent approach may be applied to other drugs for which substantial clinical data are available.
Electronic supplementary material
=================================
{#Sec11}
######
Supplementary material 1 (PDF 269 kb)
Sponsorship and article processing charges for this study were funded by AstraZeneca and Bristol-Myers Squibb. The authors would like to thank Aruna Bansal and Joan Sopczynski for execution of analyses contained within this paper. Medical writing assistance was provided by Ray Ashton and Bill Kadish of PPSI, Hackensack, New Jersey, USA (a PAREXEL company) and was funded by AstraZeneca. Anne-Marie Boothman, Angelo Del Parigi, Susan Grandy, and Chris Chamberlain made substantial contributions to the conception and design and interpretation of data. Sarah Bujac and Martin Karpefors made substantial contributions to the conception and design, analysis, and interpretation of data. Jennifer Sugg made a substantial contribution to the conception and design, acquisition of data, and analysis and interpretation of data. Tom Liptrot made a substantial contribution to the design, analysis and interpretation of data. All named authors meet the ICMJE criteria for authorship for this manuscript, take responsibility for the integrity of the work as a whole, and have given final approval for the version to be published.
Conflict of interest {#d30e1162}
====================
Anne-Marie Boothman is an employee of AstraZeneca. Sarah Bujac is an employee of AstraZeneca. Jennifer Sugg is an employee of AstraZeneca. Susan Grandy is an employee of AstraZeneca. Martin Karpefors is an employee of AstraZeneca. Tom Liptrot and Angelo Del Parigi were employees of AstraZeneca at the time of the analysis. Chris Chamberlain was an employee of AstraZeneca at the time of the analysis, but is currently an employee of UCB SA, Slough, UK.
Compliance with ethics guidelines {#d30e1167}
=================================
This article does not contain any new studies with human or animal subjects performed by any of the authors.
Open Access {#d30e1172}
===========
This article is distributed under the terms of the Creative Commons Attribution Noncommercial License which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and the source are credited.
| |
More Event Info:
Event Overview
Healthcare Provider Innovation Starts Here
Digital Transformation is an ongoing journey for today’s C-Suite leaders, and our best advice is to not trek it alone. Our Healthcare Provider Transformation Assembly is set to be a groundbreaking opportunity for leaders to virtually connect on the current trends & challenges the industry is facing amid COVID-19.
We know what you’re thinking…
This isn’t like any conference or summit you’ve been to before.
Our Founders, like many C-Suite executives today, became disillusioned by the slew of healthcare conferences, summits, events, and webinars that promised “world-class networking” opportunities with leading healthcare decision-makers. In reality, most of these events had antiquated or irrelevant discussion topics, and people from any seniority level could attend. The problem is: most events don’t have the high-level research and insights that C-Suite leaders are looking for.
Our Assembly agendas are data-driven and curated from our industry-expert Advisory Board, a group of trailblazers with a proven record of digitally transforming organizations from the ground up. And the leaders that attend our events? They have either been personally invited to join or have an approved application to be a part of the Assembly. This ensures that our events remain high-level and relevant to the C-Suite, and makes peer-to-peer learning one of the most valuable takeaways from the experience. Our mission is to provide the C-Suite with the knowledge and connections they need to digitally transform their organizations.
Join the Assembly
Are You A Senior Executive Interested In Becoming A Delegate For This Assembly? Click Here to Become an Assembly Speaker or Attendee >>
Are you a Solution Provider interested in Partnership Opportunities? Learn More Here >>
Education
Top content from Digital Diary this monthSee Digital Diary
Top content from Digital Diary this month:
- New Era of Leadership: The Evolving Role of the Healthcare Information Executive
- The “Big Data” Revolution in Healthcare: The Promises, Possibilities, and Pitfalls
- HealthTech 3.0: Is Blockchain Moving from Hope to Practical Use?
- Providing Real-Time Reporting: Improving Population Health Efforts
- The Healthcare Professionals Dream: AI in Data, Diagnosis and Patient Care
- TeleHealth and TeleMedicine: The Future of Healthcare Delivery has Arrived
Transformation
Best in class resources on the latest digital tips, technologies, and strategies.
- Delve into the top trends impacting healthcare today
- Interactive sessions help you avoid conference fatigue
- Industry-led sessions ensure topics are up-to-date and forward thinking
- Unique Peer to Peer Executive Engagement opportunities
- Learn from the best Authors, Academics, and Analysts, as well as top C-Level Executives
- Meet 1-on-1 with the best solution providers
- Personalize your agenda to suit your business needs
- Informal networking opportunities through refreshment breaks, lunch and evening cocktails
Leadership
Some of our Past Attendees
Past Attendees Include:
- Sutter Health Chief Information Officer
- Emory Healthcare Chief Executive Officer, Emory Healthcare Network
- Hospital Corporations of America Chief Information Officer
- Mercy EVP, Transformation
- University of California Health Chief Transformation Officer
- Blue Cross Blue Shield Association Chief Clinical Transformation Officer
- LifePoint Health Chief Medical Officer
- Atrium Health President
Speakers & Featured Attendees
Testimonials
Confirmed Attendees
The Needs Analysis Workbook
Agenda
Day 1: April 19, 2022
11:00 AM – 11:30 AM ET
Welcome Remarks and Opening Keynote
11:45 AM – 12:45 PM ET
Executive Education Roundtable 1 Virtual Health/Telemedicine: Innovations and Opportunities
Executive Education Roundtable 2 Value Based Care: New Initiatives for This Year
1:00 PM – 1:30 PM ET
Session 1 Workshop Standing Up: How to Be a Leader in Healthcare
Key Discussion Points:
- How digital technology has changed the C-Suite roles
- Making IT part of the C-suite strategy
- Creating a plan for your organization post-pandemic
- Strategies that evaluate and improve workplace culture
1:45 PM – 2:15 PM ET
Session 2 Workshop The Amazon Experience for Healthcare: Is this in the Future
Key Discussion Points:
- Providing an experience to meet patients’ wants and needs
- How consumer best practices translate to healthcare
- Technologies to understand your patients, a full 360-view
2:30 PM – 3:00 PM ET
Session 3 Workshop New Year, Same Problem: Beating the Burnout and Increasing Retention
Key Discussion Points:
- Technology solutions and strategies that empower your team
- Employee recognition programs for engagement
- Nuanced staffing models driven by COVID-19
3:15 PM – 3:45 PM ET
Session 4 Workshop Improving Healthcare Supply Chain Management
Key Discussion Points:
- Better probability opportunities: Which suppliers will give me the supplies that I need?
- Develop Inventory management strategies
- Effective Pricing System: Cost Accounting Systems
4:00 PM – 4:30 PM ET
Session 5 Workshop Looking at the Future of Healthcare: The Impact of COVID-19
Key Discussion Points:
- Rise of telehealth & the emergence of new healthcare technologies
- Holistic and ongoing improvement as a necessity for healthcare systems
- The future of vaccine research, funding & development
Day 2: April 20, 2022
11:00 AM – 11:45 AM ET
Keynote Panel: Strategic Partnering with Payers and Providers to Fund Innovation and Meet Your Key Objectives
Key Discussion Points:
- The basis of payer and provider partnerships and why they are important
- How COVID-19 has impacted these partnerships and challenges that may arise
- The effects and benefits for patients’ experiences
- Creating new in-person and telehealth models for care
12:00 PM – 12:30 PM ET
Session 6 Workshop Improved Emphasis on Surveillance Systems and Data Analysis
Key Discussion Points:
- Types of big data and AI approaches
- Machine Learning Techniques applies to Data
- Stakeholder Engagement
12:45 PM – 11:15 PM ET
Session 7 Workshop The Importance of Price and Data Transparency for Consumers
- What is the most effective way to provide this information to patients?
- Ways to leverage data across patients, provider systems and offices
- Ensuring data is secure for users
1:30 PM – 2:00 PM ET
Session 8 Workshop Using the Cloud: Applications that Work
Key Discussion Points:
- Emerging solutions & technologies that are changing the cloud environment
- Your Cloud Journey for post-pandemic preparedness
- Cloud-enabled ERP optimizations
2:15 PM – 3:15 PM ET
Executive Education Roundtable 1 Focus on Culture: Creating Better Outcomes By Creating a Better Culture for Employees
Executive Education Roundtable 2 The 2022 Tech Journey: Adapting Technology to Improve Care
3:30 PM – 4:00 PM ET
Session 9 Workshop The Development of Financial Models to Support Crisis Preparedness
Key Discussion Points:
- Public private partnerships for any kind of healthcare development
- Unlocking any additional financing sources
- Strategies for linking financial returns to providers of capital
- Creating profitable, sustainable financing structures
4:15 PM – 4:45 PM ET
Session 10 Workshop Decisions Healthcare Providers Are Making To Rebound Post-COVID
Key Discussion Points: | https://mill-all.com/assemblies/healthcare-providers-transformation-april-2022/ |
13450095 - Man s hands holding dried sun muscat grapes.
13293349 - Chocolate cookies
12533949 - Carrots and a little child hand on a dark blue backdrop
11382572 - A hand picking an orange off a tree
00913605 - A hand holding a glass with an effervescent tablet
12415683 - Potato muffins with sesame seeds
12341727 - A sesame seed bagel with Roquefort cheese, hazelnuts and kumquats
11088096 - A little boy sitting at a table pointing to a plate of tagliatelle
13279226 - Anonymous person touching freshly baked hot dog rolls placed on baking paper in kitchen
13366333 - Hand holding homemade croissant with sweet cherry jam
11953168 - A hand taking a slice of bruschetta pizza
11411842 - Quick breakfast muffins made with apples and carrots
13388509 - Candycanes and Christmas wreath with nuts
12673292 - Fresh oysters
12789393 - Brownies and hands
12468910 - Spaghetti fritters with tomato and olive tartare
12415260 - Hands eating and drinking together: Different wine snacks and fingerfoods
12599913 - Woman grabbing one of the vegan peanut butter cookies with chocolate drizzle
12599657 - Woman having donuts and coffee for breakfast
13396235 - Hands taking fruit bread
11423852 - A child taking an egg from a bowl
11082300 - Children sitting on a garden bench eating berries
13205827 - Italienische Pizza-Spezialitäten
prossima pagina
Non trovi quello che cerchi? Contattaci!
Saremo felici di preparare una selezione di immagini secondo le tue specifiche esigenze, o di produrre appositamente foto o video fatti su misura per te. Abbiamo soluzioni per tutti i progetti e per tutti i budget. | https://www.stockfood.it/immagini/Afferra |
Available as an ebook at:
Google Play
|
|
Resurrection in Paul: Cognition, Metaphor, and Transformation
SBL Press, 2016
eISBN: 978-0-88414-145-7 | Cloth: 978-0-88414-146-4 | Paper: 978-0-88414-144-0
Library of Congress Classification BS2655.R35T37 2016
Dewey Decimal Classification 236.8092
ABOUT THIS BOOK | AUTHOR BIOGRAPHY | TOC
ABOUT THIS BOOK
Explore the embodied foundations of Paul's resurrection ideals
It is commonly recognized that Paul's resurrection ideals are bodily ideals, though this dictum is usually configured along literal and metaphorical lines. The realism of future resurrected bodies is disconnected from the metaphoricity of bodily transformation in the present. Drawing on cognitive linguistics, this fresh and innovative study addresses this problem. By eschewing the opposition of metaphor and realism, Tappenden explores the concepts and metaphors Paul uses to fashion notions of resurrection, and the uses to which those notions are put. Rather than asserting resurrection as a disembodied, cognicentric proposition, this book illuminates the body's central role in shaping and grounding the apostle's thought and writings.
Features:
See other books on: Biblical Criticism & Interpretation | Biblical teaching | Cognition | New Testament | Transformation
See other titles from SBL Press
Reference metadata exposed for Zotero via unAPI. | https://www.bibliovault.org/BV.book.epl?ISBN=9780884141457 |
BACKGROUND OF THE INVENTION
The invention relates to a circuit for the protection by a timed relay of apparatus susceptible to an overload, in general, and more particularly to a protection circuit responsive to the volt-per-Hertz ratio exhibited by such apparatus.
It is desirable to maintain a constant volt-per-Hertz ratio on a load which may vary with respect to voltage and frequency. This is the case with a variable speed AC motor drive. The main reason for maintaining a constant ratio resides in the fact that the flux in the air gap is dependent upon such a ratio.
There are cases where such constant ratio cannot be maintained automatically, and protection against excessive magnetic flux requires protection by a relay to shut down the operation of the load, or apparatus, whenever the ratio deviates from a predetermined level. This is the case with an electrical generator driven by a turbine, because the turbine may at times be operated under conditions which are out of range for the generator, for instance at start-up, or under low load conditions. This is also the case with a transformer exposed to strong voltage changes, or frequency variations. In such extreme situations, a relay would shut-down the electrical generator, or open the power supply to the transformer.
Protection of an electrical apparatus by relay is well known. Generally, upon a critical event the relay is given a delay to respond in order to avoid a shut-down if the event is only temporary and the system had time to readjust to normal operation. In general, depending upon the magnitude of the critical parameters to be protected against, the time delay of the relay is made an inverse function of the magnitude of the critical event.
The problem with a protective relay responsive to a volt-per- Hertz ratio is to provide a time function which matches the criticality of the ratio, in other words, the time delay function, if feasible, should at each operative point substantially meet the overload requirement. Accordingly, it is desirable for the user to have a protective relay itself possessing a timer following a predetermined time function between the controlling event representing input and the effective time delay allowed for tripping. In this regard, ideally, the relay should exhibit a time characteristic in response to the expected range of variations of the volt-per-Hertz ratio. Such characteristic is not easily obtained. In contrast, an hyperbolic characteristic is easily achieved with a RC timing circuit. This, however, does not compare favorably with the characteristic required by the user. A simpler solution in the prior art has been to use a relay having a fixed time delay. This solution provides only one point on the required curve. Using two relays of fixed time delay, will provide two points on the desired curve. One relay of shorter time delay is associated with a higher range of volt/Hz ratio variations and a second relay of longer time delay is associated with a lower range of volt/Hz ratios. Such two- step fixed- time delay relay protection also does not account sufficiently for the required response of the relay.
SUMMARY OF THE INVENTION
The present invention resides in using a single instantaneously tripping relay and in interposing, between an input signal representing the volt/Hz variable ratio and such relay, a timer having a plurality of successive time characteristics forming a ladder, each level of the ladder corresponding to one of the successive applicable volt/Hz ratio ranges. The common relay will instantaneously respond after the delay selected by the timer, thus, will respond with a definite characteristic within a corresponding narrow ratio range, whereas the overall relay characteristic will remain a relatively close approximation of the imposed overall characteristic for the entire volt/Hz ratio range of the input signal. The individual characteristics are chosen so as to be easily designed and logically ordered in a ladder, thereby making the overall combination simpler, precise, effective, less costly, and nevertheless quasi-continuous.
BRIEF DESCRIPTION OF THE
PREFERRED EMBODIMENT OF THE INVENTION
FIG. 1 illustratively shows two imposed volt/Hz ratio to time characteristics for a relay protecting a load or an apparatus exhibiting such volt/Hz ratio variable range. One is applicable to a transformer, the other to a turbine generator;
FIG. 2 is a block diagram of a system, according to the present invention, wherein after detection of the volt/Hz ratio the latter is applied to a plurality of channels each affected to one range of the ratio as part of a ladder, while a voltage-to-frequency converter generates pulses applied to a counter multiplexed with the channels to pass in a corresponding channel the count which establishes the intended delay for the relay of the trip circuit;
FIGS. 3A and 3B are circuitrys used for the implementation of the block diagram of FIG. 2;
FIG. 4 is a typical graphic representation of the volt/Hz ratio to time response of the timer defined by the circuitry of FIG. 3.
FIG. 5 is representative of an all-digital scheme using, according to the present invention, A/D conversion coupled to a three- phase AC power supply to be disconnected and a computer for sampling the AC waveforms to derive voltage-to-frequency ratios and compute, according to a predetermined characteristic function, corresponding time delays for each particular ratio detected, such time delay being applied to an instantaneous relay for tripping after such computed time relay has expired.
DETAILED DESCRIPTION OF THE INVENTION
A volts-per-Hertz protection circuit is illustratively presented such as can be used to protect, against the heating effects due to excessive magnetic flux, motors, generators or transformers, whenever a voltage regulator would operate during underfrequency conditions. If sustained, excessive volts-per-Hertz can result in damage to the transformer and/or generator. This can result from the system frequency having fallen below normal, or there being an overvoltage at normal frequency. The allowable durations of such abnormal condition may be ascertained for the particular equipment and protection by relay can be imposed for any duration thereabove.
FIG. 1 shows two characteristic curves A and B, one for a power transformer, the other for a turbine generator. If the overload versus time function is of the form:
f(t)=x.sup.n t=k.sub.1
where k.sub.1 is a constant, x is the overload (expressed in per unit), t is the time (in seconds) and n is an integer, curve B is expressed within a few percent as: ##EQU1## where k.sub.1 =72,200 and n=39; the time axis being defined logarithmically and the characteristic curve being quasi-linear with such time scale.
To generate such a function to a reasonable accuracy with an analog computational circuit is a very difficult task. In fact, with the available analog circuits and the required accuracy, this has only been possible with an exponent n less than 6.
Referring again to the curves of FIG. 1, at 100% for the volt/Hz ratio in percent everything is normal. Should, however, this percentage increase above the level of the axis of FIG. 1, there is a maximum acceptable time to the right which reduces itself progressively toward a minimum time toward the left, as the percentage goes to 125% for curve B or to 135% for curve A along the logarithmic scale for the time axis. This scale for the assigned maximum duration of the abnomalous v/Hz ratio goes, typically, from 100 minutes to 1/10 of a minute.
The problem is: how without excessive cost to provide a function generator for such a characteristic. Avoiding the problem, one prior art approach has been to use an electronic volts-per-Hertz protection module designed for operation only on one point of the curve. This amounts to providing only one level detector coupled to a fixed time delay relay to be tripped when such level has been exceeded. Thus a brushless excitation system would receive standard volts/Hertz protection with a one volt/Hz relay to trip the generator after a set time delay. Another approach has been to use two such volts/Hz relays. One relay would trip the generator after a relatively long time delay. The second relay, being set with a higher pickup level, would trip the generator after a shorter time delay. This is, however, a crude kind of protection and quite far from the desired inverse-time response illustrated by the curves of FIGS. 1 and 2. Using a simple RC timing circuit by charging a capacitor in proportion to the overload would yield a response as shown in dotted line below curve B. The dotted line, though, accepts a substantial deviation from the user proposed characteristic of curve B, in the illustration, or of curve A, if there applied.
Referring to FIG. 2, it is now proposed to use a plurality of frequency sensitive operational amplifiers providing an output voltage proportional to both the voltage and the frequency at the input. The outputted signals are thereafter rectified and auctioneered by a peak holding and detector circuit the output of which is a DC voltage proportional to the overload expressed in per unit. Thus, the three- phase AC lines (phases A, B and C) of a power supply, to be disconnected by a protective relay when the voltage/Hz ratio exceeds a set value, are respectively inputted into a matching group of frequency sensitive operational amplifiers (block FSA). A volt/Hz ratio is outputted collectively on line 1 to a rectifier and peak detector circuit RPD. The resulting voltage is applied on line 2 to junction J.sub.1 of a ladder comprising a plurality of operational amplifiers (LD.sub.1 to LDN) operating as level detectors with regard to the voltage from line 2 to the corresponding input line 11. At the same time, the voltage of line 2 is applied by line 20 to a voltage-controlled oscillator generating on its output line 3 a series of pulses at a frequency proportional to the magnitude of the voltage of line 2. The pulses received on line 3 are counted by a multiple counter MOC, namely a circuit capable of generating several counts classified by stages according to the rank of the magnitude of the voltage at the input. There is a one-to-one relationship between the counters Q.sub.1, Q.sub.2, . . Q.sub.n outputting on lines 13, and the level detectors LD.sub.1, LD.sub.2, . . LDN. Accordingly, the logic circuit LGC relates a counter to the corresponding level of the detector in the ladder (as identified by the signal of the corresponding line 12). Such selected counter (Q.sub.1, Q. sub.2, . . or Q.sub.n) will count down accordingly, as stored under the pulses from line 3 and, at the expiration of such count or time delay, it will trigger, by line 5, the relay. Thus, considering curve (B) of FIG. 1, if for an operating point M on the curve, line 1 indicates, for example, a volt/Hz ratio of 115%, the selected counter will provide on line 13 a counting time typically of 5 minutes.
Referring to FIG. 3, the circuitry for the implementation of the blocks of the diagram of FIG. 2 is shown in detail, typically, in the form of an assembly of integrated circuits.
The volt/Hz ratio of an AC power supply is constantly detected by circuit 100. At the input, the three AC line representative phases A, B, C, go into respective frequency sensitive amplifiers 2A, 2B and 2C. As generally known, each includes two opposite polarity rectifying diodes (41 and 48) between the inverting and the non-inverting inputs of the operational amplifier (2A, 2B, 2C) and a tuned feedback link comprising illustratively a 1M resistor in parallel to a 0.1 &mgr;f capacitor, so as to generate at the output, beyond a diode (1M 4144) and on a common nodal point J.sub.2, a voltage which varies with the volt/Hz ratio experienced by the inputted AC lines. At J.sub.2 the output may be 5 volts for a ratio of 1, or 10 volts for a ratio of 2 (meaning, for instance, 100 volts and 50 Hz, or 50 volts and 25 Hz).
From J.sub.2 and by line 1, the voltage is applied to a peak holding level shifter circuit 110. Line 1 is connected to the non- inverting input of an operational amplifier 2D, the inverting input of which responds, by line 23, to the output of another operational amplifier 3A and it is linked, via line 24 and a diode, to the output (on line 21) of operational amplifier 2D. Operational amplifier 2D has its output connected to the non-inverting input of operational amplifier 3A. The latter has its output establishing, by line 22, a voltage level defined by a divider line extending from a potential of 15 volts to ground across a potentiometer (5 k) and a resistor (5.11 k). The voltage derived on line 26 from the potentiometer is inputted into a per-unit calibration circuit 120 centered on an operational amplifier 3B. The per- unit voltage, controlled by line 26 at the non-inverting input, is related to the inverting input set at a reference voltage derived from a series resistor-network (100 k, 750 k and 51.1 k) via line 27. The output, on line 2, represents a per-unit value of the volt/Hz ratio.
The object of the present invention is to associate the per- unit value of line 2, which can be read on curve B of FIG. 1 (for instance), with a time delay for tripping which should keep the relationship of the curve of FIG. 1 representing the user's requirement for tripping. This is achieved by choosing respective reference voltages, four in the illustration, each built upon one of lines 15 by a corresponding one of a series of intermediate points belonging to a series network extending from a +15 v potential to ground. These lines 15 go to the inverting input of a corresponding one of four operational amplifiers 5A to 5D. The order of succession is from the highest to the lowest in the order 5A to 5D. Having available four such reference voltages as voltage level references (which correspond to the characteristic of FIG. 4), the signal of line 2, which is the actual v/Hz signal, is applied from nodal point J. sub.1 to the non-inverting inputs of the respective operational amplifiers 5A to 5D, which belong to level detectors LD.sub.1 to LD.sub. 4, respectively. These form a ladder. Each level detector will operate with regard to lines 11 as a comparator by reference to the threshold defined on line 15. Therefore, depending upon the magnitude of the signal of line 2, one or more of the operational amplifiers (5A to 5D) will output, on a corresponding line 12, a voltage representing a ONE whenever the voltage of line 2 and junction J.sub.1 matches, or exceeds the reference voltage, or threshold, for that particular stage of the ladder (LD.sub.1, . . or LD.sub.4). Accordingly, the presence of one or more ONE's on lines 2 will determine up to which of the comparators LD. sub.1, . . LD.sub.4 the ladder has been climbed in relation to the inputted v/Hz ratio. All the other comparators, will still have a ZERO on line 12.
In addition, the signal of line 2, beyond junction J.sub.1 and by line 20, goes to a voltage-controlled oscillator VCO. Accordingly, at its output (line 30), a series of pulses are generated having a frequency proportional to the magnitude of the voltage of line 20 at the input. Typically, the VCO is a solid state device known as MC 14046B1. The pulses of line 30 are counted by a multiple counter circuit MOC, namely a solid state device MC 14020B1, including four counters of increasing total counts, Q.sub.1, Q.sub.2, Q.sub.3 and Q.sub.4, and generating their outputs 13 a logic signal passing from a zero to a ONE when the count- down has been completed. These four counters operate as a cascade of counters when counting, and they are in a one-to-one relationship with respect to the steps of the ladder of level detectors, but they follow the steps of the ladder in the reverse order. Therefore, the lowest count Q.sub.1 is related to the high test voltage level detector LD.sub.1, the highest count Q.sub.4 to the lowest voltage level detector LD.sub.4. Accordingly, depending upon the inputted v/Hz ratio level, the delay built up by counting the pulses appearing on line 30 will be lower, or higher. At the same time, due to the inherent gain of the VCO, the magnitude of the signal of line 20 will cause the counting through Q.sub. 1, Q.sub.2, . . . or Q.sub.4 to be slower, or faster. This is translated by the slope of EF', FG', GH' or HI' in FIG. 4. This means that the time delay so established will be shorter for a high voltage, and longer for a low voltage, just like illustrated in FIG. 4. It is observed in this respect that as a result the counts, i.e. the delays, of Q.sub.1 to Q.sub. 4, the overall characteristic of FIG. 4 has received on the time axis a scale which is logarithmic. Lines 13 from the respective counters are each matched with one line 12 from level detectors LD.sub.1 -LD.sub.4, by a corresponding AND device. When one of the counters Q.sub.1 to Q.sub.4 has finished counting, the corresponding line 13 will have a ONE. If such logic ONE on a line 13 matches a ONE on line 12 from the associated level detector, a ZERO will appear at the output of an AND device on line 36. If there is no match, there will be no effect through the AND device. Since the high voltage levels for level detection are associated with the low counts of the multicounter MOC, for high values of the v/Hz ratio on line 2, line 13 will reach a ONE after a low count, and conversely for the low voltage levels. When the time delay defined by a count (Q.sub.1, . . or Q.sub.4) has expired, a ONE appears on the corresponding line 13 and, if it is matched by a ONE on the selected line 12, the AND device (8A, . . 8D) will output a zero on line 36. OR device 9A passes it to line 37 and flip-flop FFP is set, with the result that, on line 38, the command to trip the relay (not shown) is transmitted. At the lowest level for the signal of line 2, level detector LD.sub.4 is the one selected with the highest count Q. sub.4. The highest level of the voltage on line 2 causes level detector LD.sub.1, with the lowest count Q.sub.1, to be selected.
Referring to FIG. 4, it appears in relation to curve (B) that for each level detector, and for the associated counter, there is a characteristic response defined as follows:
EF' for LD.sub.1 ; FG' for LD.sub.2 ; GH' for LD.sub.3 ; and HI' for LD.sub.4.
Each of these characteristics cover about 5% of the anticipated range of the inputted ratio range above 100%. Each of these characteristics comes into play when a change in the magnitude of the inputted ratio causes the system to operate with the next level detector. This operation involves hysteresis, as illustrated upon parallel lines I'I, H'H, G'G and F'F by an arrow to the left on the upper line (when the inputted ratio is increasing) and by an arrow to the right on the lower (when the inputted ratio is decreasing).
As shown at the output of operational amplifier 3B, the range of the signal of line 2 is: +2 volts for 1.05 p.u.; +4 volts for 1.10 p.u. ; +8 volts for 1.20 p.u.
It appears that the timer according to the present invention defines successive operating zones delineated by EF, FG, GH, and HI on curve (B). The discontinuous succession of operative characteristics EF', FG', GH', and HI' so defined appears to provide a good approximation of the desired curve (B).
It is observed that the number of level detectors and counters determines how many points there are on the overall characteristic of FIG. 4. The levels of the detectors are determined by the reference voltages. The gain of the VCO allows adjusting the slope of EF', FG', GH' and HI'. The frequency of the oscillator in the VCO permits to adjust the time scale. If the counts are digitally represented as 2.sup. m for counter Q. sub.1, 2.sup.n for counter Q.sub.2, 2.sup.p for counter Q.sub.3 and 2.sup. q for counter Q.sub.4, by adjusting m, n, p and q the distances F'F, G'G and H'H are being adjusted.
Referring again to the overload versus time function:
f(t)=x.sup.n t=k.sub.1,
and assuming, for instance, that k.sub.1 =72,200 and n=39, another solution to match the user imposed curve (such as curves (A) and (B) of FIG. 1) is to design an all-digital scheme like the one shown as a block diagram in FIG. 5. An analog-to-digital converter with three multiplexed channels is used to sample the three-phase input signal, derived from the generator potential transformers to be protected. Digital information, derived on lines 50 at the output of the A/D converter, is treated by an eight-bit microprocessor MCP containing a programmable read-only memory (EPROM), such as known under the code name INTEL 8051. A software routine continuously samples the three inputs and, over a relatively long period, it computes the average value of the voltage and the frequency, then, calculates the function t=72,200/× , by numerical means such as an infinite series. The computed time t is, thereafter, loaded into an on- board programmable timer and the trip command is generated on line 51 when the timer times out. |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.