content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
The 6-electron reactions are presented with particular reference to valence tautomerism in cyclic systems and stereochemical features. The regioselectivity in photocyclization of substituted cycloheptatrienes is included.
The electrocyclic processes in natural products and bicyclic systems and 8-electron reactions are also described. IIE. Pericyclic Reactions Boger Notes: p.
- (Chapter X) Carey/Sundberg: B p. (Chapter B 6) II. Special Topics Categories of Pericyclic Reactions - among the reactants and products usually at least one molecule is unsaturated - the reactions involve the formation or scission of sigma-bonds and the consumption or generation of pi.
Pericyclic Processes Applied to the Synthesis of Bicyclic Systems. Author: Grover, J. ISNI: Awarding Body: Queen's University Belfast Current Institution: Queen's University Belfast Date of Award: Availability of Full Text. The work examines how pericyclic reactions have been extensively applied to different chemistry areas, such as chemical biology, biological processes, catalyzed cycloaddition reactions, and more.
This work will be useful for organic chemists who deal with organic chemistry, medicinal chemistry, agrochemistry and material chemistry. Pericyclic reactions are seminal processes in organic synthesis. They have long been utilised to form multiple bonds and stereocenters in a single operation, and have found application in the total synthesis of natural products and a multitude of other endeavours.
Theoretical Models for Pericyclic Reactions. In R. Woodward and Roald Hoffmann of Harvard University proposed and demonstrated that concerted reactions proceed most readily when there is congruence between the orbital symmetries of the reactants and products.
In other words, when the bonding character of all occupied molecular orbitals is preserved at all stages of a concerted. Pericyclic Reactions. Pericyclic reaction involves a cyclic redistribution of bonding electrons through a concerted process (i.e, without intermediates) Pericyclic reactions Sigmatropic+ Cheletropic+ Electrocyclic+ Group+ Transfer+ Cycloaddi9on+ CH+Course+on+Organic+Synthesis;+Course+Instructor:+KrishnaP.+Kaliappan+ 1.
Description Pericyclic processes applied to the synthesis of bicyclic systems. EPUB
The type 2 intramolecular Diels−Alder (IMDA) reaction is a valuable method for synthesis of both carbocyclic and heterocyclic bridged bicycloundecane and bicyclodecane ring systems.
These structures are common to a number of biologically important natural products. Asymmetric variants of the type 2 IMDA reaction incorporating oxazolidinone chiral auxiliaries have been evaluated. Organocatalytic diastereoselective [3+2] cyclization of MBH carbonates with dinucleophiles: synthesis of bicyclic imidazoline derivatives that inhibit MDM2–p53 interaction.
Chemical Communications55 (76), DOI: /C9CCD. ChemInform Abstract: Bora-Aromatic Systems. Part Thermal Generation and Transformation of the Borepin Ring System: A Paradigm of Pericyclic Processes. ChemInform21 (46) DOI: /chin 2,3,4-Tri-O-benzyl-D-xylopyranose was used as a starting material in the preparation of the corresponding triene, which underwent smooth cyclization to a polyhydroxylated hydrindane, as a single diastereoisomer.
The analogous triene prepared from D-glucose did not undergo any cyclization even under high pressure. Organic Phosphorus Compounds 69 Synthesis and Properties of Cyclic Phosphonate and Thiophosphonate Esters.
Synthesis and Reactivity in Inorganic and Metal-Organic Chemistry6 (2), DOI: / A ground-state pericyclic process is brought about by addition of thermal energy (i.e., heating the system, symbolized by Δ).In contrast, an excited-state pericyclic process takes place if a reactant is promoted to an electronically excited state by activation with ultraviolet light (i.e., irradiating the system, symbolized by hν).It is important to recognize, however, that the operative.
The cobalt-catalyzed cyclization of stabilized ε-acetylenic carbanions has been studied and applied to cascade reactions in total synthesis. – This cascade process involves a Conia-ene, a [2 + 2 + 2]- and a [4 + 2]-reaction, starting from the acyclic triyne to afford the polycyclic compound in good yield (42%) as a mixture of.
A cyclic carbonyl ylide with a trans-annulated cyclopentane ring was generated by a Rh2(OAc)4-catalyzed reaction from a diazoketone precursor and trapped with allyl propiolate. The 1,3-dipolar cycloaddition led to the stereoselective formation of an oxygen-bridged polycycle.
Via Curtius degradation, the cycloadduct was transformed to the ring skeleton typical of the sesquiterpene family. The study of pericyclic reactions is an area of physical organic chemistry that blossomed in the mids, due mainly to the work of R.B.
Woodward, Roald Hoffman, and Kenichi Fukui. The Woodward-Hoffman rules for pericyclic reactions (and a simplified version introduced by Fukui) use molecular orbital theory to explain why some pericyclic.
I-K. Pericyclic Reactions I. Basic Principles Nicolaou, K. et al. Chem. Soc., (Endiandric acids) Categories of Pericyclic Reactions • among the reactants and products usually at least one molecule is unsaturated • the reactions involve the formation or scission of σ-bonds and the consumption or generation of π-bonds.
A pericyclic reaction typically is unimolecular and zero order with respect to kinetics. As shown below, the bicyclic on the left is highly strained because of the 1,2 bridging and undergoes an electrocyclic RAR to relieve the steric stress associated with the heterocyclic cyclopropanoid moiety.
Diels-Alder. ¨The synthesis and polymerizability of atom-bridged bicyclic monomers was surveyed. The monomers included lactams, ureas, urethanes, lactones, carbonates, ethers, acetals, orthoesters, and amines.
Despite widely-varying structures, they almost all polymerized to give polymers with monocyclic rings in the chain.
Details Pericyclic processes applied to the synthesis of bicyclic systems. EPUB
The polymerizations are grouped by mechanism: uncoordinated anionic, coordinated. Pericyclic reactions are concerted organic reactions and are governed by Woodward-Hoffmann rules. Different methods of analysis of pericyclic reactions to arrive at the Woodward-Hoffmann rules will be presented.
Synthetic applications and mechanisms of various pericyclic reactions will be discussed. A recent report from the Aggarwal group at Bristol University suggests a plausible explanation of this discrepancy on the basis of a Pd-mediated isomerization and CO insertion mechanism .Once CO is inserted into the carbon, the so-formed π-allyl complex 6 is dominantly and quickly converted to β-lactam 8 (Equation 3 in Scheme 3), but when the substituent is a silyl group, carbonylation.
Polyamine conjugates with bicyclic terminal groups including quinazoline, naphthalene, quinoline, coumarine and indole have been obtained and their cytotoxic activity against PC–3, DU– and MCF–7 cell lines was evaluated in vitro. Their antiproliferative potential differed markedly and depended on both their chemical structure and the type of cancer cell line.
In fact, problem sets are the best way to ensure that concepts are not only well understood, but can also be applied to real-world problems in the work place. Show less Organic Chemistry Study Guide: Key Concepts, Problems, and Solutions features hundreds of problems from the companion book, Organic Chemistry, and includes solutions for every.
Thus, it already displays the π electron systems required for the three pericyclic reactions - that is, the two electrocyclizations and the Diels-Alder reaction. The reaction sequence begins with an electrocyclic ring closure of the 8 π electron tetraene system, which yields a cyclooctatriene.
Products Synthesis Through Pericyclic Reactions; American Chemical Society: Washington, DC, (h) ComprehensiVe Organic Synthesis: report the successful realization of this process, its scope with tions of the cis hydrogens for the ring fusion of the bicyclic system.
Electrophilic trapping of the allyl carbanions from the. This reaction involved a direct process for C-C bond formation from 5,2-enynones, and different reaction systems (Brønsted acids/electrophiles with solvents) afforded different substituted.
Pericyclic Reactions: A Mechanistic and Problem-Solving Approach provides complete and systematic coverage of pericyclic reactions for researchers and graduate students in organic chemistry and pharmacy programs.
Download Pericyclic processes applied to the synthesis of bicyclic systems. PDF
Drawing from their cumulative years of teaching in the area, the authors use a clear, problem-solving approach, supplemented with colorful figures and illustrative examples. Domino reactions enable you to build complex structures in one-pot reactions without the need to isolate intermediates- a dream comes true.
In this book, the well-respected expert, Professor Lutz Tietze, summarizes the possibilities of this reaction type - an approach for an efficiant, economically benificial and ecological benign synthesis.
A definite must for every organic chemist. Other approaches including 1,3-dipolar cycloadditions of azomethine ylides or nitroxides to alkene or alkyne dipolarophiles have been applied to the synthesis of these ring systems.
Intermolecular 1,3-dipolar cycloaddition of azomethine ylide, m ü nchnones, and azolium N -aminide intermediates. The present study provides an overview of the chemistry and biological significance of pyrimido[4,5-d]pyrimidine and pyrimido[5,4-d]pyrimidine analogs as types of bicyclic [6 + 6] main sections include: (1) synthesis methods; (2) the reactivities of the substituents linked to the ring carbon and nitrogen atoms; and (3) biological applications.
Domino twofold Heck/6π-electrocyclization reactions of 1,2-dihaloalkenes allow for a convenient synthesis of benzene derivatives.
In recent years, this strategy has been applied to various 1,2. Other ring systems were then examined (entries 6–10). To our surprise, bicyclo-octadiene 6e rearranged with complete selectivity for the endo isomer, furnishing 8e and a small amount of silyl-containing product nd 9 is believed to form via an ene-like pericyclic process involving the intermediate 2-oxidoallyl cation and the adjacent trisubstituted alkene, followed by.The bicyclic pentadiene on the left could in principle open on heating to give the monocyclic -annulene (blue or red) via what is called an electrocyclic reaction as either a six (red) or eight (blue) electron process.
These two possibilities represent our dichotomy; according to the Woodward-Hoffmann (WH) pericyclic selection rules, they.
-
A garland of satire, wisdom, and history
719 Pages4.78 MB1915 DownloadsFormat: FB2
-
Rural Finance for Food Security of the Poor
582 Pages2.72 MB5864 DownloadsFormat: FB2
-
AIDS Policies And Programs
742 Pages3.55 MB9988 DownloadsFormat: FB2
-
Temperance and teetotalism
248 Pages3.27 MB8908 DownloadsFormat: FB2
-
nurse in the federal civil service
456 Pages1.34 MB4424 DownloadsFormat: FB2
-
L. S. Ensel.
654 Pages3.97 MB6051 DownloadsFormat: FB2
-
Marine Natural Products
455 Pages2.81 MB6698 DownloadsFormat: FB2
-
Urticaria
574 Pages4.79 MB6282 DownloadsFormat: FB2
-
The Bloomsbury Group
247 Pages4.52 MB7730 DownloadsFormat: FB2
-
Data on environmental radioactivity collected in Italy, January-June, 1965. | https://diwusytaseb.papercitysoftware.com/pericyclic-processes-applied-to-the-synthesis-of-bicyclic-systems-book-7051ir.php |
Ms. McMahon and Mr. Quinn are available to help! Drop by the library anytime, or email us for additional help, or to make an appointment for individual help. We won't be able to help you unless you let us know!
Research Paper Process
Note: You can check out sample term papers on an overnight basis; see your teacher if you're interested.
I. Method
1. Set up a Noodletools account by using the Google App accessible from your MBA Gmail. Create your project (call it "English II Research Paper" or s/t your teacher requests) and share your project with your teacher. Then begin learning the way Noodletools works to create bibliographical cards and notecards, and how one uses Noodletools to organize research materials.
Tip: Whenever you read a critical article in a book or journal and decide to take some notes, ALWAYS create the bibliographical citation in Noodletools first before you write a notecard in Noodletools. Then limit your notecards to one major idea per card.
2. Begin your research by looking for books and ebooks that are in the MBA Library (see the tab above for online resources). Go to Destiny (and click the word catalog twice), our online library catalog, and search for books about your authors and the historical era of your novels. You should also look for reference books in the reference section of our library.
3. If you cannot find critical books about your author or subject, search the catalog of the Vanderbilt Library (called Acorn) and the Public Library. You can find these links on this libguide. You should request books from Vanderbilt as soon as possible because they take a week to arrive.
4. Research our databases: Literary Reference Center Plus, Gale Literary Sources, Salem Literature, Bloom’s Literary Reference Online, and JSTOR (see the tab above for databases).
5. Check American Author Websites suggested on the online sources tab above. CAUTION: you must have your teacher's approval to use any of these websites as a source!
6. Only use Google and other such mass search engines and encyclopedias to help you find other genuinely scholarly sources (such as the sources in 2-4 above). You can write this paper without ever searching the internet for other sites. As a bonus, all of the databases and ebooks will have the correct MLA citation that you can use in Quick Cite.
7. Your teacher will explain how to manage your notecards and bibliographical citations in Noodletools. You will take many more notecards than you will use in your final draft because you will focus your topic the closer you get to writing your outlines and final draft.
8. Your teacher will explain how to build an outline for this essay that will have more than five paragraphs.
9. After you have turned in a rough and final outline that will be graded, you will write your essay during the last week, spending five classes typing the paper in the computer lab or on computers in class. Your teacher will show you samples of introductions, body paragraphs, and conclusions and guide you through the process of combining critics’ ideas with your own. You will learn how to quote and paraphrase critics and how to cite them correctly.
Evaluation:
Your teacher will specify the exact values of the notecards, outlines, rough drafts, and final draft. If your teacher can grade your final drafts before the end of the third quarter, then your research paper will count 50% of the third quarter grade. Otherwise, the research paper preparation will count 20% of the third quarter grade, and the final draft will count 30% of the fourth quarter. All preparatory assignments must be completed; a heavy penalty will be placed on tardy work. If you don't complete one of the preparatory assignments, you will receive an "incomplete" on the research paper and an "incomplete" for the quarter until the entire assignment is finished. | https://libguides.montgomerybell.edu/c.php?g=497109&p=3402816 |
Year 3 and 4 - Mini Tennis Tournament
It was a hot humid day in Fulham and there was hint of pollen wafting through on the warm breeze. It would be the first competitive tournament for many of our children picked for the team and we also selected two Year 2 pupils who have shown great potential in PE lessons.
The courts were reduced to smaller mini sized areas with a smaller net to the ones found on a normal traditional tennis court. Volleys were not allowed and the serves had to be cross court but could be underarm. We would enjoy the red and yellow mini tennis balls which we find more Lower Key Stage 2 friendly. The emphasis of the occasion was to have fun, show great sportsmanship throughout and foster a great interest in playing tennis. We would also be playing against 16 other schools as we looked to earn points within our league.
After some discussions of some rules and tactics we set about our work playing singles matches against Queen’s Manor A and B team, as well as our own A team playing our B team. All the matches were played in great spirit and although we had some great rallies with our opponents we were ultimately too strong. Our A team won 9 and lost 3, whilst our B team also returned the same points difference. Having won our group, we were placed 3rd overall and enough to win bronze medals, a fantastic return given our lack of experience.
The pupils had a great day and it was terrific that the event was such a success given our young squad. We showed a great sense of sportsmanship, maturity and respect to the umpires and coaches and also demonstrated a strong sense of team work. Special mentions to Victoria and Arabella who both won all their matches and thank you to Miss Rose for joining us for the day. | https://www.stjohnxxiii.lbhf.sch.uk/year-3-and-4-mini-tennis-tournament/ |
County Operated Boards, Councils & Committees
Sandoval County has many advisory boards, councils and committees to assist with various County functions, departments and offices.
Below please find a list of our most popular public boards, councils and committees along with current available information. It’s important to note, that the majority of these representatives serve the people of Sandoval County without compensation and utilize their own time to participate in these bodies. Each group has its own set of rules, regulations and tasks.
Board of Canvas
- Next Meeting: TBA
Board of FinanceBoard of Finance Web Page
Detention Center Community Advisory Council
Current advisory council members:
- District 1: Anne Marie Basye
- District 2: Thomas Buckner
- District 3: Allen Trosclair
- District 4: VACANT – Accepting Applications
- District 5: Levi Anaya
Click Here for governing legislation for the Advisory Council
DWI Planning CouncilDWI Planning Council Web Page
DWI Task ForceDWI Task Force Web Page
Ethics BoardEthics Board Web Page
Free Roaming Horse Advisory CouncilFree Roaming Horse Advisory Council Web Page
Health CouncilHealth Council Web Page
Juvenile Justice Advisory BoardJuvenile Justice Advisory Board Web Page
Labor Management Relations BoardLabor Management Relations Board Web Page
Lodger’s Tax Advisory BoardLodger’s Tax Advisory Board Web Page
Treasurer’s Investment CommitteeTreasurer’s Investment Committee Web Page
Boards, Councils and Committees Not Operated by Sandoval County
In addition to boards, councils and committees operated by Sandoval County, we also have representation on bodies that we do not operate. Some of these include, but are not limited to, representation on the following: | https://www.sandovalcountynm.gov/boards-councils-committees/ |
Image credit: Imperial College London.
A provocative new book by Arthur Reber argues that bacteria are conscious and that the origins of mind are found in the simplest, single-celled organisms that arose billions of years ago.
How do you know that you are conscious? One piece of evidence is that you feel you are conscious, but this might be a mistake, as behaviorists and some philosophers have argued. Fortunately, there is additional evidence that you are conscious, including your verbal reports of conscious experiences, and your complex behaviors such as ones related to pain, emotions, and imagery that can be explained by your having these conscious experiences.
The evidence becomes much sparser if you move down to smaller-brained animals such as bees and fish. Honeybees do exhibit reward-related behaviors, and fish exhibit pain -related behaviors, but it is not at all clear that these require an explanation based on conscious experience.
So why does Reber think that bacteria are conscious? … Perhaps sensing, reacting, communicating, and moving are best explained by the hypothesis that bacteria have some degree of consciousness.
Given [Reber’s] appreciation of scientific evidence, he should be able to recognize that the evidence for consciousness in single-celled organisms is much worse than the evidence for consciousness in self-driving cars, which already exhibit much more complex sensing, reacting, moving, and communicating than bacteria.
Read full, original post: When Did Consciousness Begin? | https://geneticliteracyproject.org/2019/01/18/arguing-for-and-against-consciousness-in-single-celled-organisms/ |
Für die Gewichtskontrolle von Verpackungen mit gewichtsmäßig bestimmtem Inhalt werden stichprobenartige Kontrollwägungen durchgeführt. Zu diesem Zweck werden einzelne Prüfpackungen mechanisch (Schieber 16) aus dem Förderstrom der Packungen heraus- und einer (Präzisions-) Waage zugefördert. Nach Durchführung der Kontrollwägungen wird die Prüfpackung in den Förderstrom zurückgeführt.
1. Apparatus for performing spot check-like control weighing operations on filled packs, particularly packs of coffee (10, 10a), which are conveyed in a continuous row (11) on a conveyor (12), with devices for in each case removing one test pack (14) from the conveyed flow, for placing the same on a control balance (15) and for returning the test pack (14) to the conveyed flow after weighing, characterized by a slide (16) reciprocable at right angles to the conveying direction (arrow 18) of the row (11) of packs (10, 10a) having holding members (clamping jaws 25, 26), which can be applied to the facing lateral surfaces (23, 24) of the test pack (14) for securing the same and between which the packs (10, 10a) can be conveyed when the holding members (clamping jaws 25, 26) are not applied, as well as by a device (lateral guide 28 ; pressure jaw 31) for fixing the pack (10a) of the row (11) following the test pack (14) with the conveyor (12) running. | |
· Collaborate with Project Teams, Business Systems Analysts, and other QA Leads, to create, communicate and drive overall quality strategy.
· Enable and embrace shift left strategy
· Establish the test architecture, reusable frameworks and components. Ability to choose approach and drive different types of automated testing(Functional/Non-Functional)
· Create/Assist/Troubleshoot the development of automation harness to ensure stability, efficiency, and scalability across the organization
· Provide data driven, metrics driven quality assurance and visibility at program level
· Has knowledge on how to incorporate quality into software (architecture, quality of code, deployment and release process, quality of testing process, etc.)
· Co-ordinate designing internal solutions (libraries, tools, automation infrastructure, applications and systems associated with quality)
· Basic understanding of EngX (Engineering excellence) practices and most popular tools (e.g. Jenkins, Sonar, JIRA, plug-ins, etc.)
· Participates in product design reviews, works with the Solution Architect and development team to improve system testability and overall quality.
· Establishes communication between Quality assurance engineers and other project stake holders.
· Has experience building efficient quality processes from scratch or significantly improving existing.
· Hands-on and up-to-date experience in modern testing tools and approaches
· Provide technical guidance and expertise to team members, colleagues and/or customers.
· Develop and maintain strong working relationships with other IT services, IT solution functions and customers to expedite delivery of IT solutions
· Manage the Daily/Weekly activities of Quality Team Members and support the onboarding of new team members
· Contribute to program/project review meetings. Support management in
o Determining status, assessing problem areas, suggesting, and reviewing corrective actions,
o Directing/planning necessary extra work, and rework and re-plan activities
· Work with project stakeholders to determine the appropriate quality initiatives
· Assist in the development of quality assurance and testing policies, standards and procedures, processes, and best practices as related to automation through a Community of Practice
· Support the onboarding of new team members
· Work with project stakeholders to determine the appropriate quality initiatives to implement during system development life cycles
Analytical/Decision Making Responsibilities:
· Proactive approach to identifying issues and presenting solutions and options, and where appropriate, leading to resolution
· Ability to clearly articulate both problems and proposed solutions
· Ability to prioritize personal and team workloads to best meet organizational objectives
· Empowered to make decisions and recommend approach based on the results from quality review
Knowledge and Skills Requirements:
· Bachelor’s degree in any field with a minor in a Computer Science related field or at least five years of related industry experience.
· Experienced with establishing test automation from scratch.
· Solid knowledge of the automation tools in the market to be able to propose the best setup based on the client's need and situation.
· Proven ability to evaluate, understand, and troubleshoot complex issues and solve problems with little or no supervision.
· Ability to evaluate requirements then develop test plans and test strategy.
· Hands on experience planning and executing end-to-end testing.
· Understanding of programming concepts in various languages (variables, parameters, data driven, and code flow).
· Experience with relational databases (able to formulate queries, insert, extract, and evaluate data from database tables)
· Previous experience with Test Automation, Web UI automation, API testing manual or automation; strong experience designing and building automation frameworks
· Experience working with Selenium and Cucumber or similar tools in this space
· Experience with TDD and BDD approach, its Pros and Cons
· Familiarity with the following tools (Jenkins, Zephyr, Jira, Quality Center, QTest)
· Must have experience implementing Continuous Integration / Continuous Development (CI/CD) practices
· Must be energetic and proactive team player with aptitude and willingness to lead when necessary.
· Must be good with understanding Automation SLA’s and Metrics and drive team in achieving them.
5+ years of work experience in Quality Assurance of which at least 3+ years of experience in test automation development or combination of development and testing experience
-Experience in REST & SOAP API testing, preferable tool set SOAPUI, Groovy Scripting
· Experience in creating and maintaining automation scripts to ensure information systems services and programs meet acceptance criteria.
· Experience in agile methodology
· Strong analytical skills
· Excellent organizational, troubleshooting and analytical skills required
· Excellent experience with functional, integration, regression testing
· Experience in writing unit tests for robustness, including edge cases, usability, and general reliability
· Knowledge of manual testing on a good level
· Experience in integrating the test suite with CI/CD pipeline
- Financial Services and/or Wealth Management experience would be huge plus
Education: | https://searchnpaworldwidejobs.com/job/Quality+Architect-Levittown_Pennsylvania-35889 |
Doctorate Recipients from United States Universities. Summary Report 1995.
Henderson, Peter H.; And Others
This 29th annual report summarizes results of the 1994-95 Survey of Earned Doctorates (SED), which collected data from graduates as they completed requirements for their doctoral degrees. The survey found that a record 41,610 doctorates were awarded by U.S. universities from July 1, 1994, through June 30, 1995. Over 88 percent of these were Ph.D.s, while more than two-thirds of the remainder were Ed.D.s or other doctorates in education. Women earned a record 16,333 doctorates, while U.S. minorities earned a record high of nearly 13 percent of doctorates awarded to U.S. citizens. The report also analyzes trends in doctorate production. Sixteen tables present data on number of doctorates awarded, gender and race/ethnicity of recipients, citizenship status, major fields, leading U.S. baccalaureate and doctoral institutions of minority recipients, levels of student debt, median years to doctorate, post-graduation commitments, and employment sector of recipients. A special section examines the contribution of China, India, Taiwan, and Korea to the growth of doctorates awarded to non-U.S. citizens between 1985 and 1995. Appendixes provide supplementary tables on 1995 doctoral recipients, trend data on 1985-95 doctoral cohorts, technical notes, and a copy of the survey questionnaire. (MDM)
Descriptors: Citizenship, College Graduates, Doctoral Degrees, Educational Trends, Employment Opportunities, Employment Patterns, Foreign Countries, Foreign Students, Graduate Surveys, Higher Education, Incidence, Majors (Students), Minority Groups, National Surveys, Paying for College, Time to Degree, Trend Analysis, Universities
Doctorate Records Project, National Research Council, OSEP-Room TJ 2006, 2101 Constitution Ave., N.W., Washington, DC 20418.
Publication Type: Numerical/Quantitative Data; Reports - Research; Tests/Questionnaires
Education Level: N/A
Audience: N/A
Language: English
Sponsor: National Endowment for the Humanities (NFAH), Washington, DC.; National Institutes of Health (DHHS), Bethesda, MD.; Department of Education, Washington, DC.; Department of Agriculture, Washington, DC.; National Science Foundation, Washington, DC.
Authoring Institution: National Academy of Sciences - National Research Council, Washington, DC. Office of Scientific and Engineering Personnel. | https://eric.ed.gov/?id=ED404911 |
July 27, 2016; WBAA-FM (National Public Radio)
Several months ago, NPQ reported on how a southern Louisiana community on the very edge of the state became the U.S.’s first climate refugees, with the majority of their town under water. We continue our exploration of communities experiencing the firsthand effects of climate change in Alaska, where the remote inhabitants now struggle to survive on the subsistence foods that had sustained them for hundreds of years.
Warmer conditions and earlier springs have meant that the whales and Pacific walrus the Inuit and other residents in Savoonga, Alaska, located on a small island 160 miles off the state’s west coast, had lived on are much harder—even impossible—to hunt. In Buckland, a remote community 130 miles east of Nome in western Alaska, changing conditions mean declining caribou herds, a primary source of food for the small town. With a population of 420, Buckland is slightly above the median size of Alaska’s 337 towns and cities.
“Right now, a lot of people are out of caribou meat,” says Buckland resident Percy Ballot Sr. “Caribou used to migrate and winter in our area. Now some of the herd stays where they are, some move to the west and east. We’ve been trying to go out and look for some and haven’t seen any.”
In other cases, with limited sea ice another side effect of warmer temperatures, residents are having to travel to other places to hunt food that used to be accessible in their towns, burdening them with transportation costs. Thinning ice also introduces safety hazards.
“There’s a huge safety issue with thinning ice, which people need to travel on and hunt on. And snow coverage isn’t just for transportation, but for insulation of vegetation in the winter. People’s hunting camps are lost because of erosion,” said Carolina Behe, Indigenous Knowledge & Science Advisor for the Inuit Circumpolar Council-Alaska. “You have to have the right conditions to prepare the food.”
As researchers and officials have noted previously, climate change will likely affect the most vulnerable in our communities. As such, in Alaska, because the indigenous populations—among them the Inuit, who are also indigenous to Canada—have relied for centuries primarily on hunting for their food, the effects of climate change are more noticeable than in other parts of the country.
Sign up for our free newsletters
Subscribe to NPQ's newsletters to have our top stories delivered directly to your inbox.
Dwindling food sources have led to increased reliance on government aid and nonprofit resources like food banks. Last year, the U.S. government shipped frozen fish to Alaskan communities when their walrus hunts were not fruitful. While food shortages for Alaska communities are not new, skyrocketing prices of store-bought goods further exacerbate the problem. According to Feeding America, 14.4 percent of Alaska’s population is food insecure, slightly above the national average of 14 percent.
“In places like Savoonga, suddenly you’ve got an 80 percent reduction in the amount of food you’re used to having. There aren’t a lot of jobs on these islands, and to say to people they now have to go to the grocery store—it’s just out of reach for a lot of these people. And there are hundreds of communities like this,” said Cara Durr, the director of public engagement for Food Bank of Alaska. “You can’t just snap your fingers and send more food. It’s incredibly expensive to ship food out there.”
However, simply shipping food to several of these communities is also unlikely to solve the problem of food insecurity or offer a long-term solution. Their lifestyles were cemented after centuries and are now slowly melting away. After years of hunting stable, or at least relatively available food, these are not just changes in their diet; it will affect their culture and livelihood.
A report by the Inuit Circumpolar Council and its Food Security Advisory Committee from last December includes measures that would specifically tackle the issue of food insecurity while considering the Inuit culture. “[Food security] means understanding that food is a lifeline and a connection between the past and today’s self and cultural identity,” says the report. Among the report’s recommendations for tackling food insecurity among the Inuit, and possibly other indigenous populations, is honoring the Inuit culture. For example, the report recommends supporting the Inuit’s food-sharing system, as it can be an important in addressing food insecurity for the wider community.
Inuit sharing systems are one of the strongest drivers for food security and are a part of our survival. Food collected and prepared is shared readily with neighboring villages, hub communities, other regions and with relatives who have relocated to urban areas. […] Sharing traditional foods keeps people grounded within their cultural identity and provides access to healthy foods. | https://nonprofitquarterly.org/remote-alaska-communities-struggle-effects-climate-change/ |
Rising seas, fires, cyclones, droughts – when we think of climate change, we think of large-scale disasters that flood communities, destroy forests, and melt glaciers. But the climate crisis is also putting millions of girls around the world at increased risk of child marriage.
The United Nations recognises child, early and forced marriage (CEFM) as a human rights violation and a harmful practice that disproportionately affects women and girls globally, preventing them from living their lives free from all forms of violence. Although nations around the world had been making progress in reducing CEFM, the COVID-19 global pandemic has worsened the problem, as well as that of gender-based violence (GBV).
The prevalence of CEFM remains high in areas of sub-Saharan Africa and South Asia, especially in humanitarian and emergency settings such as displacement camps that emerge in the aftermath of climate-related disasters or because of armed conflicts.
The incidence and risk of CEFM are much greater in humanitarian crises, due to poverty, insecurity, gender inequality, increased risks of sexual and gender-based violence, breakdown of rule of law and state authority, and lack of access to education, among others.
In Somalia, flooding displaced over million people in the last year alone. In the Marka district of Lower Shabelle, Somalia, where torrential rains can bring catastrophic flooding, drought and other disasters, displaced families may spend months or even years in crowded refugee camps.
I was displaced from my village because locusts devoured our farm last season. We were hoping to harvest our crops but we faced severe water shortages. The few lines of sorghum we planted died due to the drought. We feel hot during the day, and cold at night. Three of our children are sick. We are living under a tree.
Mumino Abdikadir Mohamed, displaced resident of Marka, Somalia
Tackling child marriage through improved climate resilience
Action for Women and Children Concern (AWCC), a grassroots Somali NGO, leads an initiative to help communities become more resilient to the type of climate-related disasters that forces people to leave their homes. This is one of the locally-led climate adaptation projects supported by Cities Alliance, in the Horn of Africa and the Bay of Bengal, in partnership with the Swedish Development Cooperation Agency (Sida), and the German Federal Ministry of Economic Cooperation and Development (BMZ).
A key focus of the AWCC project is to educate people about cost-effective ways to help their communities become more aware of climate change and more resilient to climate-induced disasters. AWCC works with local partners to develop an SMS alert system using mobile phones, as well as alerts through local radio stations. The early warning system is designed to inform the community about impending floods and other events before they strike, enabling people to take action ahead of time.
Communities that are not displaced are more likely to maintain girls in school compared to households who have been displaced, either by climate effects, floods, or droughts.
Ahmed Hassan, Founder, Action for Women and Children Concern (AWCC) Somalia
However, climate-related disasters exacerbate the prevalence of CEFM in Somalia, as AWCC Founder Ahmed Hassan explains. For example, increased droughts or flooding affect community livelihoods; thus, it is common for families to try to remove the 'burden' of female children through marriage.
The consequence of floods is food insecurity, and food insecure families are highly susceptible to disowning their young girls to men in urban areas. Men returning from Europe or America with a good amount of money, but also well-off people from Somalia, who take advantage of the vulnerability of those households.
Ahmed Hassan, AWCC Somalia
The AWCC project has partnered with women´s groups to ensure that community climate resilience plans include GBV prevention strategies and has established measures to ensure the safety and dignity of women involved. The AWCC project has also introduced training in inclusive community-based disaster risk management to help increase community resilience to climate-induced shocks, and women are included in all phases of this effort.
As climate-related events continue to intensify, new methods and technologies and more inclusive responses will be important for helping communities proactively manage and reduce climate-related disaster risks. And by helping communities become more resilient, the AWCC project is also helping to protect the futures of girl children in Somalia. | https://www.citiesalliance.org/resources/programme-outputs/blog-online-news-website-article/child-marriage-hidden-consequence |
Students in this fast paced and challenging program receive basic training in construction and maintenance of plumbing and heating systems. The Plumbing and Heating program provides students with a wide variety of experience that prepares them for entry-level employment and apprenticeships in the plumbing and heating, construction and facility maintenance trades. Typically 50% of the training is hands-on and 50% is classroom instruction.
The program’s blend of classroom instruction, lab, and live work practice helps students to learn the necessary skills to succeed in an apprenticeship program and become a Plumbing and Heating Technician. Upon successful completion of the training program, students are assigned the following certificate levels based on their demonstrated proficiency of the program’s competencies: Plumbing and Heating Technician, Plumbing and Heating Repairer, and Plumbing and Heating Assistant Repairer.
Plumbing and Heating Technicians are in short supply throughout Alaska today, both in urban and in rural areas. As a result, graduates of AVTEC’s Plumbing and Heating program enjoy excellent job opportunities and good pay.
The mission of the Plumbing and Heating program is to provide training through classroom instruction, demonstration, and practical application, methods for construction, installation, maintenance, service, repair, and diagnostics to construct, maintain and repair Plumbing, Heating, and Ventilation systems.
Students should have good mechanical aptitude, strong mathematics and reading skills, and the ability to manage time productively. Physical requirements of the occupation are good vision, hearing, and manual dexterity, the ability to lift and carry 50 pounds, and stoop, crawl, and walk continuously. It also requires being able to work from a ladder at heights up to 30 ft. The occupation may also require working outdoors in a variety of weather and climate conditions where physical hazards may exist so students should have appropriate outdoor working gear and clothing. Students who wear prescription glasses must have prescription safety glasses or goggles. Strong reading and mathematics skills are essential to achieve top graduation levels and the best paying jobs.
Demonstrate an understanding of basic electrical theory and proper use of test instruments; build and test heating control circuits; perform electrical tests; analyze basic series, parallel and combination resistive AC and DC circuits; sketch wiring diagram symbols; maintain and replace solenoids, pressure switches, thermostats zone valves and relays; identify, select, install and maintain common electrical control devices; demonstrate circuit construction workmanship, techniques and practices; identify, install and maintain common motors.
Demonstrate an understanding of basic thermodynamic theory and perform heat transfer calculations; install, maintain troubleshoot and repair electric, gas and oil-fired heating systems. Identify, select and install components and piping for gas and oil fuel delivery systems. Correctly size, install and test gravity and direct venting systems. Identify, install and service conventional and high-efficiency modulating-condensing hydronic heating boilers. Perform residential heat loss calculations. Size heating equipment and heat emitters. Use combustion analyzers to determine efficiency and safety of fuel burning appliances.
Identify and properly use common plumbing tools; install piping materials and fittings, valves, faucets and meters; correctly size, install and maintain hot and cold potable water systems; size, install and repair drain, waste, and vent systems; and read and sketch plumbing and heating prints and isometric drawings. Install, maintain and repair commercial and residential plumbing fixtures, storage and on-demand water heaters and appliances. Select and install pressure-rated piping systems including PEX, PVC, ABS, copper, and steel. Troubleshoot and repair residential water well systems. | https://avtec.edu/programs/plumbing-and-heating |
Privacy campaigners have raised concerns about the accuracy of facial recognition technology even as the government pushes for an Aadhaar-linked vaccine registration process.
In response to an RTI, the Ministry of Health and Family Welfare (MoHFW) last week confirmed its use of facial recognition technology (FRT) to facilitate “touchless” vaccination registration as part of a pilot project. However, the reply, filed in response to an RTI by digital rights advocacy group Internet Freedom Foundation (IFF), does not provide a response when asked about the legal or legislative basis for the mechanism. Instead, it states that “facial recognition authentication is used as one of the methods for Aadhaar-authentication for online verification of beneficiary prior to Covid-19 vaccination”.
Details revealed by the RTI
In April, RS Sharma, CEO of the National Health Authority, had mentioned in an interview with The Print that the government plans on introducing facial recognition-based Aadhaar authentication to make the vaccination process touchless. He further added that a pilot carrying out over 1,000 authentications daily was already underway in Jharkhand.
Here are the details sought by IFF’s RTI, and the Ministry’s response if any-
- Details of the database(s) in which images are stored for the purpose of facial recognition including:
- Where are these images sourced from
- Where is this database located
- Which persons and/or organisations have access to this database
Reply: The ministry routes data through the UIDAI for verification against the facial data of a beneficiary but does not store it.
- Whether there are any guidelines, policies, rules, or standard operating procedures governing the use of facial recognition technology by the MoHFW.
Reply: The guidelines and SOP used for it are included in the ‘Verifier & Vaccinator Module User Manual’ hosted on the Co-WIN portal. (However, this has not been made public.)
- Whether any legal opinion was sought by the MoHFW prior to procurement of facial recognition technology.
Reply: No procurement took place prior to the implementation of the new authentication mechanism.
- An exhaustive list of persons and/or organisations authorised to operate and use facial recognition technology.
Reply: It needs only two people to operate – the verifier and the vaccinator at the respective vaccination centres in the states and districts.
- The specific purposes for which facial recognition technology is being used by the MoHFW.
Reply: The specific purpose of FRT use by the MoHFW is as “one of the methods for Aadhaar Authentication for online verification of beneficiary prior to Covid-19 vaccination wherein a facial template is captured and sent to UIDAI for verification of the image of beneficiary”.
In addition to these responses, the ministry replied that it did not issue any tenders for procurement of facial recognition technology and that there was no expenditure incurred on procurement and maintenance of the FRT authentication mechanism.
The ministry also said that no information was available in response to IFF’s request for
- A copy of the accuracy reports of such facial recognition technology which is being used or is proposed to be used
- If any third-party assessments have been made of the facial recognition technology being used.
- Information with regard to the accuracy rate of the facial recognition technology being used.
Privacy concerns among experts
The government’s plans to implement Facial Recognition Technology-based authentication raised concerns among experts, some of whom co-signed a joint letter sent to RS Sharma and the NHA raising concerns about the accuracy of FRT and violations of the fundamental right to privacy.
In a blog post, the IFF wrote, “The COVID-19 vaccines are essential, life-saving commodities in the current pandemic and ensuring equitable & indiscriminate access to the vaccines for all is of paramount importance. However, deploying Aadhaar-based FRT for the verification process, deprives the citizens who do not possess or have not linked their Aadhaar cards to the COWIN portal or the on-site register, of the vital vaccines.”
The letter further said that FRTs are prone to huge error margins and added that, in the past, there have been numerous incidents wherein FRTs deployed for a specific reason have been utilised for purposes beyond their original mandate. The letter particularly flagged-
- The 2018 incident where the Delhi Police were reportedly using its facial recognition software to identify anti-CAA protestors as opposed to its original purpose of reuniting missing children with their families.
- The National Crime Records Bureau’s 2020 Request for Proposals for the procurement of the National Automated Facial Recognition System, which did not specify the purpose of procuring the system.
Government’s push to link vaccination registrations with Aadhaar
At present, according to an SOP issued by the MoHFW, seven prescribed Photo IDs – Aadhaar, PAN card, Drivers License, Passport, Voter-ID, NPR Smart Card, and Pension Document with photograph are required to authenticate the eligibility and identity of the beneficiary. However, linking vaccination certificates and records to a Unique Health ID which is generated through beneficiary authentication through Aadhaar has led the government to encourage the use of Aadhaar for vaccination. In some cases, it has led to people being misled into believing that Aadhaar-based authentication was mandatory to get vaccinated. | https://www.medianama.com/2021/07/223-rti-frt-authentication-vaccination-pilot/ |
Historically referred to as Ottoman Cuisine, Estia embraces the amalgamation of Greek and Turkish fare with a unique philosophy that combines fresh ingredients with exotic spices to create an urban interpretation of these ancient Mediterranean dishes.
At Estia, our approach is simple; prepare flavorful dishes from quality ingredients over charcoal and wood and enjoy them in great company.
Named for Hestia, the goddess of the hearth or Greek word for Home.
A unique interpretation of Ottoman cuisine; inspired by the culinary tapestry of neighbouring regions, Greece and Turkey.
A special place to gather and feast on a bountiful meal with friends and family. | https://www.estiatoronto.com/ |
Mateu, Mercè; Garcías, Silvia; Spadafora, Luciana; Andrés, Ana; Febrer, Eulàlia; . (2021) . Student Moods Before and After Body Expression and Dance Assessments. Gender Perspective. Frontiers in Psychology, 2021, vol. 11, a612811. https://doi.org/10.3389/fpsyg.2020.612811.
Share
MetadataShow full item record
Abstract
Body expression and dance are activities that contribute to the integral well-being of people. In an educational context, the process of evaluating our students implies variations in their moods. This study tackles the states of mind that students perceive before and after the evaluation of a practice in the subject of Body expression and dance, developed through choreographies, that were, previously rehearsed, and later presented to the rest of the class in a specific session. Our main interest was the obtention of information on the states of mind of the students prior to the evaluation of their choreographies (cooperative task), and again once they had been performed. The study design consisted of two phases: two different choreographies separated by an interval of 2 months. The students were asked about their moods before and after performing their choreographies, which were evaluated. The participants, 167 in total, 35 women (20.5%) and 132 men (79.5%), aged 18 to 22 years old, filled out a POMS (Profile of Mood States) questionnaire, before and after the evaluation of each occasion. Differences were found in the stress-anxiety, vigor-activity, fatigue-immobility scales and the total mood score (PGMS). In all of them, except for the fatigue-immobility scale, we found a decrease in scores after the performance, compared to scores before. For the Stress-Anxiety factor, lower values were observed in the post-tests in comparison to the pre-tests, and also lower values in the pre- and post-test scores regarding the second choreography. We conclude that the practical evaluation of the subject through choreography modifies the mood states of the students, favoring their well-being after its execution, which is why evaluation through practice is considered a positive element in the educational process.
Is part ofFrontiers in Psychology, 2021, vol. 11, a612811
European research projects
Collections
The following license files are associated with this item: | https://repositori.udl.cat/handle/10459.1/70290 |
TECHNICAL FIELD
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
This invention relates to a method and system that can measure the surface shape map of an object that is moving longitudinally relative to the apparatus, independent of relative motions in the measurement directions. Such measurements are useful for surface quality control of manufactured products, for example sawn lumber and logs, rolled metals and highway pavements.
Surface shape measurement is an important need in many industrial and scientific applications. Typical examples include flatness inspection of road surfaces, quality control of manufactured products such as sawn lumber and rolled metal, and shape determination of complex shaped objects such as logs.
FIG. 1(
a
A simple way to measure surface shape profile is to make a series of measurements using a distance sensor while relatively moving the measured object and the sensor in a straight line perpendicular to the measurement direction. ) schematically shows an example arrangement for a surface shape along a single line. The drawback to this method is that deviations from straight-line motion cause relative displacements in the measurement direction that are indistinguishable from measured surface shape. Thus, very accurate linear motion is essential.
In many cases, accurate linear motion is not practicable. For example, when measuring the surface profile of a highway pavement, it is generally not feasible to provide a separate linear slide for moving the sensor. Instead, the sensor must travel on the irregular pavement that it is measuring.
U.S. Pat. No. 5,280,719 describes an apparatus that uses a large number of equally spaced sensors. The apparatus seeks to identify long surface features by overlapping the sets of measurements made at successive intervals much less than the total spacing of the sensors. However, the large number of sensors that are required creates a large cost and maintenance burden. U.S. Pat. No. 4,573,131 describes a method of using just four sensors to achieve the same objective. The sensors make successive measurements at small intervals of travel. The described method is based on the assumption that successive sensors reaching the same point along the measured line have the same distance from the measured surface. This is typically not a reasonable assumption, and the described method has only limited effectiveness.
FIG. 1
The above-mentioned patents disclose methods for measuring surface height profiles along individual lines on the target object. It is also of great practical interest to be able to measure a surface shape map, similar in concept to a topographic map. Such measurements can be achieved by replacing the individual distance sensors shown in (“point sensors”) by sensors that measure surface height profile at multiple points along lines (“line sensors”). The accumulation of sequential measurements at the various intervals along the measured lines creates a surface shape map. Line sensor measurements are subject to the same influence of deviations from straight-line motion of the measured object during the measurements as point sensors. Canadian Patent 2,297,879 describes a technique where multiple equally spaced parallel lines are measured, with the surface shape identified by overlapping the successive measurements. This approach is a development of that used in U.S. Pat. No. 5,280,719, with multiple line sensors replacing multiple point sensors. Both techniques have similar limitations. Their lengthwise spatial resolution is limited to the distance between the sensors; the use of evenly spaced parallel sensors makes the method unsuitable for achieving finer spatial resolution. When doing measurements using two line sensors, only surface twist can be identified, but not lengthwise shape.
None of the above techniques is well suited to making surface shape measurements with fine lengthwise spatial resolution. They are also not well suited to measuring the surfaces of objects with opposing sides. At best, they can measure each of the sides separately, but they do not provide accurate thickness information. The method described in U.S. Pat. No. 7,003,894 is successful at making fine resolution surface height profile measurements and providing accurate thickness information. The method involves the use of multiple sensors that make sequential surface height measurements. The surface height profile(s) is/are mathematically determined from the measured data by observing that the surface height information appears sequentially in the measured data, while the effects of relative motions occur simultaneously. U.S. Pat. No. 7,003,894 describes several different possible measurement configurations.
The methodology described in U.S. Pat. No. 7,003,894 works well when the number of surface points to be measured is relatively modest, for example, to determine surface shape profiles along one or a small number of chosen lines within the specimen surface. However, the computation becomes very burdensome and time consuming when an entire surface shape map is desired. The present invention provides a different data handling approach that is able to evaluate detailed surface height maps in real time, that is in an interval of time less than required for data acquisition. Furthermore, the method and system operate independent of relative motion, that is, they are independent of movements due to translation, pitch and/or roll that the object may experience when being mapped.
The various prior methods are difficult to apply to the measurement of surfaces that are not approximately normal to the measurement direction because they focus on relative motions of the measured object in that normal direction. Thus, the various techniques are not well suited to the measurement of the surface shape of non-flat objects such as logs. The present invention extends the scope of method described in U.S. Pat. No. 7,003,894 to enable effective surface shape measurements of such non-flat objects.
The present invention provides a method for measuring surface shape that overcomes the limitations of previous art. The invention involves using multiple sensors operating simultaneously. The main differences from previous designs are the way in which the sensors are geometrically arranged, and the way their measurements are combined to determine the desired surface shape map.
The central idea of the present invention is the observation that surface shape features appear in delayed sequence as the observed surface moves longitudinally relative to the sensor array. However, any relative motions in the measurement direction, either translational or rotational, appear simultaneously at all sensors. Efficient mathematical procedures are described to separate the delayed and simultaneous components of the measurements, from which the surface shape map is determined.
In accordance with one aspect of the present invention, there is provided a method for producing a surface shape map of at least one surface of an object and independent of relative motion of the object, the method comprising: (a) providing a plurality of distance sensors arranged to measure changes in surface height on the at least one surface of the object; (b) moving the object a distance relative to the plurality of sensors in a selected direction; (c) taking sensor readings with at least some of the plurality of sensors of the distance moved by the object in the selected direction at measured increments of relative movement of the object to the plurality of sensors, wherein the sensor readings include measured positions of similar points on the surface of the object from different sensors of the plurality of sensors, the measured position of the similar points producing a sequence of point measurements; (d) determining relative motions of the plurality of similar points by comparing the measured positions of similar points at different times; and (e) subtracting the relative motions of the plurality of similar points from sensor readings to obtain the surface shape map.
In accordance with another aspect of the present invention, there is provided the method described herein, wherein the surface shape map is produced in an interval of time less than that required for data acquisition.
In accordance with yet another aspect of the present invention, there is provided the method described herein, wherein the distance sensors are multi-point line sensors.
In accordance with still another aspect of the present invention, there is provided the method described herein, wherein the object and the surface shape map produced are generally flat and step (c) is taken with the plurality of distance sensors arranged to avoid sole equally spaced parallel lines directed at the object.
In accordance with yet still another aspect of the present invention, there is provided the method described herein, wherein the object is generally flat with opposing surfaces wherein the step (c) is taken with two sets of distance sensors, wherein each set of distance sensors is arranged to measure changes in surface height on the opposing surfaces of the object placed between the two sets of sensors, and with the plurality of distance sensors arranged to avoid sole equally spaced parallel lines directed at the object.
In accordance with a further aspect of the present invention, there is provided a method described herein, wherein the object is a substantially cylindrical object including significant surface slopes, wherein the step (c) is taken with at least four opposed sets of distance sensors, wherein the object placed between the sets of sensors that measure changes in surface height on at least two surfaces of the object, and with the plurality of distance sensors arranged to avoid sole equally spaced parallel lines directed at the object.
In accordance with yet a further aspect of the present invention, there is provided a method described herein, wherein the distance sensors are arranged around the measured object in a rectangular or triangular configuration.
In accordance with still a further aspect of the present invention, there is provided a method described herein, wherein distance measurements are made at known points on the measured object using sensors that can measure distances at multiple points within a surface area.
In accordance with yet still a further aspect of the present invention, there is provided a data processing system for producing a surface shape map of an object independent of the relative motion of the object, the system comprising: a plurality of distance sensors arranged to take sensor readings on the at least one surface of the object of measured positions of many pairs of substantially similar points measured by different sensors of the plurality of sensors at different times; means to provide a relative motion between the plurality of distance sensors and the object, and a motion sensor triggering simultaneous measurements from the plurality of distance sensors, wherein the system receives data from the plurality of distance sensors, compares the measured positions of many pairs of substantially similar surface points measured by different sensors at different times, uses the comparison to determine the relative motions of the similar surface points, and subtracts the determined relative motions from the sensor readings evaluates to obtain the surface shape map of the measured object independent of relative motions.
In accordance with one embodiment of the present invention, there is provided the data processing system described herein, wherein the surface shape map is produced in an interval of time less than that required for data acquisition.
In accordance with another embodiment of the present invention, there is provided the data processing system described herein, wherein regularization of the shape map is achieved to produce stabilization and/or smoothing.
In accordance with yet another embodiment of the present invention, there is provided the data processing described herein, wherein where the regularization type is Tikhonov regularization.
In accordance with still another aspect of the present invention, there is provided the data processing described herein, wherein the identification of pairs of substantially similar surface points includes consideration of the effects of relative motions between the sensors and object.
A typical configuration of the invention involves making measurements along lines in multiple directions relative to the measured object. Such an arrangement allows the measurement of surfaces that have significant slope relative to a measurement direction. The mathematical method used combines the measurements from the various sensors to form an overall map of the shape of the measured object. Since the number of measurements made typically exceeds the number of surface shape results to be determined, averaging of the measured data occurs within the mathematical calculation, thereby reducing the effects of measurement noise,
To simplify the description, it is supposed that the distance sensors remain stationary and that the measured object moves. However, it is apparent that the description also applies to the case of a stationary object and moving sensors.
FIG. 1
100
104
102
represents the Prior Art where an object travels in a direction towards a sensor . In a further Prior Art embodiment, the object to be met travels towards two sequentially arranged sensors and .
FIG. 2
1
6
5
4
6
4
6
schematically shows a basic sensor arrangement system . In this case, two line-type distance sensors are arranged to make measurements along non-parallel lines A, B. The intersection point O of these lines may lie on the measured object , as shown in the figure, or elsewhere. The distance sensors , can be of any suitable type, chosen according to the needs of the particular application. These sensors , should be capable of identifying the measured distances at known points along the lengths of the measured lines, which need not be straight. Any of a wide variety of sensors may be used, including single-point or multiple-point distance sensors.
5
8
4
6
5
FIG. 2
The measured object moves in a substantially longitudinal direction relative to the sensor assembly , . does not explicitly show any details of a mechanism for causing the required motion because such details can vary substantially according to the physical characteristics of the measured object . Various mechanisms can be suitable, and their detailed designs do not form part of the present invention. However, they should include a means for measuring the longitudinal motion of the moving object. Any accurate measuring means is acceptable; for example, an encoder type motion sensor (not illustrated). The motion sensor readings are used to trigger simultaneous measurements from the line sensors, at regular intervals Δ along the measured object.
FIG. 2
4
6
8
For purposes of discussion, two example measurement points labeled a and b are selected from along the measured lines in . Point a lies within line A of sensor , and point b lies within line B of sensor . The two points lie parallel to the motion (direction ) of the measured object, and thus traverse a generally common path along the measured object.
In practice, the motion of the measured object is not precisely in a longitudinal direction, and may also include transverse motion perpendicular to the measured surface (“translation”). Such translational motion causes all readings along both line sensors to increase or decrease simultaneously. Additionally, there may be a pitching motion, causing readings around point a to increase and readings around point b to decrease, or vice-versa. Yet additionally, there may be a rolling motion, causing readings around both a and b to increase and readings at the opposite side of intersection point O to decrease, or vice-versa.
i
i
i
i
As an example, consider the case of an object spanned by n measured points at regular spacing Δ. Let ube the heights of the measured points on the surface of the object along the longitudinal line containing points a and b. The index i lies within the range 1≦i≦n, starting at 1 when the leading edge of the measured object reaches intersection point O, and incrementing sequentially as the measured object moves longitudinally by successive distance increments Δ relative to the sensors. Let ybe the corresponding translation amount of the measured object at the times when it moves past intersection point O by successive incremental distances Δ. Further, let zbe the corresponding pitch, and rthe corresponding roll of the measured object. It should be remembered that the present invention operates independently of these relative motion of the translation, pitch and roll.
FIG. 2
The geometry in creates an inversion of the measured surface data. An increase in surface height causes a decrease in distance sensor reading. To avoid possible confusion, it is convenient to define “height” quantities of the kind:
a
=H−a*
i
i
(1)
i
i
where a*is the measured distance of the surface from sensor “a”, H is a “reference” distance. The exact value chosen for H is not critical. For example, the average value of a*would be a reasonable choice. However, the values of H chosen for the other sensors cannot be chosen with similar freedom. They should be such that all measured “heights” would be equal for the case of a flat object moving parallel to the sensor array.
The readings measured at points a and b combine the contributions of local surface heights, translation, pitch and roll as follows
a
=u
+y
+fz
+hr
i
i−p
i
i
i
(2)
b
=u
+y
+gz
+hr
i
i−q
i
i
i
(3)
FIG. 2
FIG. 2
where h is the transverse distance of points a and b from the intersection point of the line sensors, f and g are the corresponding longitudinal distances of a and b from the intersection point. For these distances, h is defined as being positive on the side of the measured object containing the example points a and b in . Distances f and g are defined as positive when upstream of intersection point O. Thus, in , distance f is a positive quantity and distance g is a negative quantity.
FIG. 2
FIG. 2
FIG. 2
i
i−p
i
i−q
In , the surface height measured at point a lies a distance f upstream of intersection point O. This distance comprises approximately p steps of length Δ, where p is the nearest integer solution of p=f/Δ. Thus, measurement aindicates surface height uin addition to the translation, pitch and roll motions. Conversely, the surface height measured at point b lies a distance g upstream of intersection point O (a negative quantity in ). This distance comprises approximately q steps of length Δ, where q is the nearest integer solution of q=g/Δ(also a negative quantity in ). Thus, measurement bindicates surface height uin addition to the translation, pitch and roll motions.
At points i+p and i+q equations (2) and (3) become
a
=u
+y
+fz
+hr
i+p
i
i+p
i+p
i+p
(4)
b
=u
+y
+gz
+hr
i+q
i
i+q
i+q
i+q
(5)
i
Subtracting equation (5) from equation (4) to eliminate the quantity ugives
a
−b
−y
−gz
h
−r
i+p
i+q
i+p
i+q
i+p
i+q
i+p
i+q
()=(y)+(fz)+(r) (6)
Equation (6) applies at all points in the range 1−q≦i≦n−p. This set of equations can be written in matrix form as
Gm=d
(7)
where G is a matrix whose rows contain the coefficients from the right side of equation (6), d is a vector whose elements are the measured data from the left side of equation (6), and m is a vector containing the set of translation, pitch and roll quantities to be determined
m=[y
z
r
y
z
r
y
z
r
. . . y
z
r
1
1
1
2
2
2
3
3
3
n
n
n
T
] (8)
FIG. 2
The matrix G that is formed from the single pair of measurement points a and b has fewer rows than columns, and so is under-determined. However, the matrix can be substantially augmented using many additional rows from all other available pairs of corresponding measurement points along the two measurement lines shown in . The boundary conditions
y
=y
=z
1
n
n/2
=0 (9)
can be enforced by including them as additional rows in matrix G. Other combinations of boundary conditions that similarly constrain the solution are also acceptable.
T
When all the various equations (6) and boundary conditions are assembled into matrix G, the resulting number of rows should greatly exceed the number of columns, thereby making the matrix over-determined. In this case, the resulting equation (7) can be solved in a least-squares sense by pre-multiplying by G
G
Gm=G
d
T
T
(10)
Equation (10) involves the solution of 3n unknown quantities in vector m, and can be evaluated rapidly using modern computers. The surface shape map can then be determined by inverting equations (4) and (5) to give
u
a
+b
−y
−fz
gz
−hr
−hr
i
i+p
i+q
i+p
i+p
i+q
i+p
i+q
=()/2 (11)
FIG. 2
where the interpretations of quantities u, a and b are now generalized to refer to the surface height profile along the longitudinal line traversed by any one given pair of measurement points along measurement lines A and B in . Exceptionally, for I<1−q
u
=a
−y
−fz
−hr
i
i+p
i+p
i+p
i+p
(12)
and for i>n−p
u
=b
−y
−gz
−hr
i
i+q
i+q
i−q
i−q
(13)
FIG. 2
T
The assembly of the set of all the surface height values along all available longitudinal lines produces a surface shape map of the measured object, similar in character to a topographic map. The mathematical method described in equations (1) to (13) is designed to keep the required numerical processing to a moderate size such that the calculations can be done in “real time”, i.e., within a time less than required for the data acquisition. This feature is achieved by arranging for the matrix solution in equation (10), which is the most time consuming part of the calculation, to involve only translation, pitch and roll quantities. Surface shape quantities are excluded because they are many times more numerous, particularly when the line sensors in contain many finely spaced measurement points. In the described calculation method, the presence of more measurement points within the line sensors enhances computational accuracy by increasing data averaging. There is a proportionate increase in the time taken to formulate matrix GG, but the solution time of equation (10) remains unchanged.
An economy in computation time can sometimes be achieved if the relative motion of the measured object is such that one or more of the quantities y, z and r have relatively small influence. This could occur, for example, when some details of the mechanism producing the relative motions happen to constrain the measured object by differing amounts for the different types of relative motion. In particular, the pitch z can be less influential because the coefficients f and g in equation 11 have opposite signs, so the associated terms tend to cancel. Thus, it can sometimes happen that a satisfactory result can be achieved while excluding one or more of the relative motion quantities from equations (2)-(13).
The presence of only a few measurement points within the measured lines, or the occurrence of limited measurement accuracy, impair the stability of the calculation, and introduce noise into the solution. The use of line sensors arranged along parallel lines, especially when evenly spaced, also impairs computational stability because it impairs the numerical conditioning of matrix G, often to the point of singularity. The use of several parallel line sensors unevenly spaced could be effective, but entirely even spacing is always undesirable.
The adverse effects of these characteristics can be reduced by using “regularization”, a mathematical process that introduces smoothing. Such regularization does not create any new data, and so attention to the number, quality and geometrical arrangement of the measurements is always the preferable first step. Regularization is then a useful tool to make further refinements.
T
Several regularization techniques are commonly used, among them truncation and filtering. A convenient technique is Tikhonov regularization. The procedure involves modifying matrix GG in equation (13) to penalize extreme values in the solution. The penalty can be applied to the norm of the solution, thereby creating a “small” solution, or to the norm of the numerical first or second derivatives of the solution, respectively creating “flat” or “smooth” solutions. A simple form of Tikhonov regularization adds an extra term to equation (13)
G
G+βB
m=G
d
T
T
() (14)
where β is a weighting factor called the regularization parameter. Matrix B is the identity, first or second derivative operator, chosen according to whether a “small”, “flat” or “smooth” model solution is desired. In general, a “smooth” model is a reasonable choice because it is the most responsive to measurement noise.
Mathematical methods exist for finding the optimal value of the regularization parameter β, for example, using the Morozov discrepancy principle. However, in most practical cases, it is sufficient to find a value of β by trial and error that reduces noise without distorting the solution through excessive smoothing.
FIG. 2
The sensor arrangement in can operate successfully with a wide range of placements of the measured lines. The lines could intersect within or outside the measured object, and they could be symmetrically or unsymmetrically arranged. Additional line sensors could be included, possibly sharing or not sharing a common intersection point. The data from such sensors enhance the stability of the measurement by contributing many further rows to matrix G in equation (7). The described mathematical method applies to all these possibilities. In general, greater mathematical solution stability is achieved when the measurement lines are symmetrically arranged and intersect near the centerline of the measured object. In addition, solution stability is improved when the measurement lines are aligned diagonally such that the sensor assembly spans around 10% of the length of the measured object. In general, the use of parallel line sensors is undesirable because it impairs the numerical conditioning of matrix G, often to the point of singularity. The use of several parallel line sensors unevenly spaced could be effective, but entirely even spacing is always undesirable.
FIG. 3
FIG. 2
10
15
18
17
14
16
17
17
18
shows a system that is a variation of the previous sensor arrangement of , and is designed additionally to measure the surface shape map of an opposite surface on the measured object moving in direction . This can be done using just a single additional line sensor because the translation, pitch and roll of the measured object determined from lines A and B of sensors and , similarly influence the measurements made using line C of sensor . There is, however, a change of sign corresponding to the reversal of the measurement direction. A convenient, but not essential choice for the position of line C of sensor is perpendicular to the longitudinal direction , aligned with intersection point O. This particular choice eliminates the influence of pitch, allowing equation (2) to simplify to
v
=c
−y
−hr
i
i
i
i
(14)
17
where v is a surface height on the second side and c is a typical reading from within line C of sensor .
FIG. 3
14
16
17
17
The unsymmetrical arrangement of the line sensors in provides measurements with different levels of accuracy on the two sides. In general, it may be expected that the accuracy of evaluation of the surface shape map on the side measured by lines A and B of sensors and will be superior to that on the side measured by line C of sensor . This is because each point in the height map of the first side derives from the average of two sensor readings rather than one. In addition, line C of sensor does not add anything to the evaluation of the translation, pitch and roll of the measured object, it just uses the values determined from the opposite side.
FIG. 3
FIG. 4
20
24
26
27
29
25
28
T
The non-uniform accuracy provided by the sensor arrangement in can be adjusted by using the symmetrical arrangement and system shown in . Here, a pair of line sensors , and , measures each side of the measured object moving in direction . In this case, the measurements from both sides of the measured object can contribute to the evaluation of the translation, pitch and roll. The measurements from the second pair of line sensors add yet more rows to matrix G, thereby enhancing solution stability. However, there is no change in the number of columns, and thus the least squares matrix GG remains the same size. The reversal in the measurement direction for the second side causes all equations used for this side to have the signs reversed for all terms containing y, z and r.
FIG. 2
FIG. 3
FIG. 4
The sensor arrangements shown in , and are particularly suited to the measurement of fairly flat surfaces that are generally perpendicular to the measurement directions. Under these circumstances, small side-to-side motions of the measured object do not significantly influence the measurements, and need not be accounted for. However, for measured objects with large surface slopes, for example, a cylinder, side-to-side motion becomes influential and must be explicitly considered.
FIG. 5
FIG. 6(
30
35
44
46
47
49
34
36
37
39
34
36
a
shows an example sensor arrangement and system suited to the measurement of the surface shape of an object with large surface slope, in this case a cylinder. Additional line sensors , and , are included in the transverse plane to account for surface shape features and displacements in this direction, along with line sensors , and , . ) shows a cross-sectional view containing a typical measurement point a within one of the line sensors , that make measurements in the vertical direction. Point O lies at the geometric center of the sensor arrangement, and forms the origin of a cylindrical coordinate system (R,θ) that defines the surface shape of the measured object. In this configuration, it is convenient, but not essential to define the reference distance H in equation (1) such that the reported height a would be zero if the measured surface were flat, horizontal and passing through point O. With this definition, the position of the surface point measured by sensor a is distance a above point O, and distance h to the right. The cylindrical coordinates of the surface point are
R
h
+a
h/a
2
2
=√{square root over ()} θ=arctan() (15)
FIG. 6(
a
If the measured object were perfectly cylindrical and centered on O, the surface slope angle ψ at all possible measurement points a would equal the local coordinate angle θ. However, in the general case, these two angles are unequal. This angle can be determined from the local slope of the surface height profile measured along the line sensor. To give the slope within the cross-sectional plane shown in ), the slope indicated from the line sensor must be divided by sin β, where β is the local inclination of the line sensor relative to the longitudinal direction. For computational stability, it is desirable to use a filter that smoothes the surface height data when determining the local slope, otherwise measurement noise will adversely influence the required numerical differentiation.
The surface height measured at point a combines the influences of the surface height of the measured object, u, its vertical translation, y, its vertical pitch, z, its roll around axis O, r, its horizontal translation, x, and its horizontal pitch, w. Equation (2) expands to
<math overflow="scroll"><mtable><mtr><mtd><mrow><msub><mi>a</mi><mi>i</mi></msub><mo>=</mo><mrow><msub><mi>u</mi><mrow><mi>i</mi><mo>-</mo><mi>p</mi></mrow></msub><mo>+</mo><msub><mi>y</mi><mi>i</mi></msub><mo>+</mo><msub><mi>fz</mi><mi>i</mi></msub><mo>+</mo><mrow><mfrac><mrow><mi>sin</mi><mo></mo><mrow><mo>(</mo><mrow><mi>ψ</mi><mo>-</mo><mi>θ</mi></mrow><mo>)</mo></mrow></mrow><mrow><mi>cos</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>ψ</mi></mrow></mfrac><mo></mo><msub><mi>Rr</mi><mi>i</mi></msub></mrow><mo>+</mo><mrow><mi>tan</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>ψ</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>x</mi><mi>i</mi></msub></mrow><mo>+</mo><mrow><mi>f</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>tan</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>ψ</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>w</mi><mi>i</mi></msub></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>16</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
Analogous expansions of equations (3)-(6) can similarly be constructed.
FIG. 6(
FIG. 6(
a
b
47
49
The geometrical quantities u, a, f, h, R, θ and ψ shown in ) all refer to an individual measurement point a within a given measurement line. It is convenient to associate the definition of these quantities with the particular line sensor rather than the entire sensor assembly. This choice allows the associated equation (16) and subsequent equations to have a generally similar format for all sensor measurements, independent of orientation in space. For example, ) shows the geometrical definitions associated with a measurement point a within a line sensor , that makes measurements in a horizontal direction. The associated version of equation (16) is:
<math overflow="scroll"><mtable><mtr><mtd><mrow><msub><mi>a</mi><mi>i</mi></msub><mo>=</mo><mrow><msub><mi>u</mi><mrow><mi>i</mi><mo>-</mo><mi>p</mi></mrow></msub><mo>+</mo><msub><mi>x</mi><mi>i</mi></msub><mo>+</mo><msub><mi>fw</mi><mi>i</mi></msub><mo>+</mo><mrow><mfrac><mrow><mi>sin</mi><mo></mo><mrow><mo>(</mo><mrow><mi>ψ</mi><mo>-</mo><mi>θ</mi></mrow><mo>)</mo></mrow></mrow><mrow><mi>cos</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>ψ</mi></mrow></mfrac><mo></mo><msub><mi>Rr</mi><mi>i</mi></msub></mrow><mo>-</mo><mrow><mi>tan</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>ψ</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>y</mi><mi>i</mi></msub></mrow><mo>-</mo><mrow><mi>f</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>tan</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>ψ</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>z</mi><mi>i</mi></msub></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>17</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
FIG. 5
where it can be seen that the overall equation format is preserved. The 90-degree difference in line sensor orientation causes quantities y and z to be interchanged with x and w, with sign changes where needed. These latter quantities are defined relative to the entire sensor assembly, and not just to individual sensors. Similar equations apply to the measurements from the other line sensors shown in . For non-perpendicular line sensor orientations, for example, a triangular sensor array, equations (16) and (17) need to be written in terms of vector components of the displacement quantities.
The equations analogous to equation (6) that derive from equations (16) and (17) can be assembled to form a matrix G with 5n columns and numerous rows. The displacement quantities obtained by solving equation (14) can then be subtracted from the raw measurements, analogous to the use of equations (11)-(13), to give the true surface shape map of the measured object.
FIG. 2
The formulation of equations (16) and (17) is based on the assumption that the displacement quantities are small compared with the measurement spacing within the line sensors. When displacement quantities are relatively large, point b in , and analogously in subsequent figures, no longer shares the longitudinal path of point a. Instead, a point within the line sensor nearby to b shares that path. The discrepancy becomes a concern when large surface slopes ψ are present. The issue can be handled by doing a first calculation assuming that all points a and b share their longitudinal paths, i.e., as described above. Then the points b can be chosen to be at the line sensor locations that give shared longitudinal paths after accounting for the motions of the measured object. The calculation can be repeated until convergence is obtained. Typically, very few iterations are required.
It is apparent that the ideas that constitute this invention can be applied to meet a wide range of measurement needs. The present disclosure describes the basic principles of the invention, and gives many practical details. Many possible variants of the example sensor arrangements can give successful results. They may have fewer or more than two line sensors per measured surface, these line sensors may or may not all be intersecting, they may have parallel or fan beams, line sensors need not be straight lines, nor need they be continuous, i.e., to allow space for an intersecting line sensor. It is not even essential that the measurements be made specifically along lines, only that pairs of corresponding measured points a and b can be identified. It is evident that a person skilled in the art could use the principles disclosed here to construct a surface shape map measurement system that varies in some details from the particular examples described herein. It is also evident that such a person could also employ mathematical methods different from the examples presented here to achieve the same or similar numerical results. All such variations lie within the scope of this invention.
DESCRIPTION OF THE DRAWINGS
Reference will now be made to the accompanying drawings showing, by way of illustration a particular embodiment of the present invention and in which:
FIG. 1
. Illustrates a surface profile measurement, (a) using a single sensor, (b) using multiple sensors [PRIOR ART];
FIG. 2
. Illustrates a sensor arrangement according to one embodiment of the present invention measuring a single generally flat surface;
FIG. 3
. Illustrates a sensor arrangement according to a further embodiment of the present invention using line sensors measuring opposing generally flat surfaces;
FIG. 4
. Illustrates a sensor arrangement according to one embodiment of the present invention using symmetrically placed line sensors measuring generally flat opposing surfaces;
FIG. 5
. Illustrates one embodiment of a sensor arrangement according to a further embodiment of the present invention measuring objects with large surface slopes; and
FIG. 6
FIG. 5
. Illustrates a cross-sectional view of the sensor arrangement according to , illustrating the geometrical quantities associated with (a) a sensor array measuring vertically, and (b) a sensor array measuring horizontally. | |
Recent archaeological excavations at Liang Jon, a limestone rockshelter in the East Kalimantan province of Indonesian Borneo, have revealed a cultural sequence covering the period from around 16,700 calibrated radiocarbon years before present (16.7 kyr cal BP) until the late Holocene—a time of dynamic environmental, social, and economic change throughout Island Southeast Asia. There are few published archaeological sequences from this period of human history from Borneo, a geographically strategic region in the wider early human settlement of the region, highlighting the importance of our initial finds and dating work at Liang Jon. We describe our excavation and present chronostratigraphic and initial summary data to outline the significance this cultural sequence has in reconciling archaeological evidence and dated rock art records from early human cultural behaviour at the easternmost margin of the Late Pleistocene continental landmass of Sunda. Summary data, including stone artefacts, marine shell beads, faunal remains, and a pre-Austronesian burial, contributes to our understanding of regional trends associated with widespread cultural and technological change during the Pleistocene to Holocene transition, when the present-day island of Borneo was formed. | https://researchnow.flinders.edu.au/en/publications/a-late-pleistocene-to-holocene-archaeological-record-from-east-ka |
TOP BRASS (Klehm 1968)
Double flowers, white, wide ivory guard petals surround a large double bomb flower of canary yellow highlighted with light pink petaloids in the center. Light fragrance, good cut flower. Unique white flowers with yellow topping.
Category: PEONY (Paeonia)
Type: Lactiflora hybride (herbaceous)
Flower Type: Double
Height: 90 cm
Colour: white, yellow
Fragrance: yes
Flowering season: middle
Awards: | https://www.irises.cz/en/online-store/pivonky-en/prostokorene-4/top-brass-klehm-1968-detail |
Today, product owners are the direct point of contact for the customer. Successful product owners will have a product backlog, prioritized pipeline and requirements, and project forecasts that speak to demand management. To build this into your marketing strategy, you can consider building a product owner resume.
Your technical product owner resume is easy to read while also conveying necessary information about qualifications and experience. When it comes to your resume template and resume format, keep it simple. Before a human looks at your resume, a computer will avoid any fancy images or graphics that might be hard for software to parse.
A Product Owner is an IT professional who is responsible for setting, evaluating and prioritizing the work generated by the software Scrum team as a means to ensure that the product’s features are impeccable and functioning well. A well-drafted Product Owner Resume mentions the following duties and tasks – incorporating feature request into product roadmap; grooming and prioritizing backlog; setting sprint goals, writing acceptance tests; planning releases and upgrades, developing user stories, defining acceptance criteria; refining agile methodologies, keeping track on industry trends, and analyzing the market. (Source: www.qwikresume.com)
After writing your objective, you can begin listing your relevant professional experience in reverse chronological order. For a product owner position, consider other roles you've had on an Agile team, in project management or in another leadership position. For each role, include your title, the name of the company and the dates you worked there. You may also include roles related to IT or software development if you're applying for a role at a technology company. | https://www.futurestarr.com/blog/mathematics/product-owner-resume |
CONVENTION | ORGANIZERS | PUREDATA
L’Œuvre ouverte | PureData Convention 07 brings together artists, developers and theoreticians who develop, use and reflect on PureData. It acknowledges the broad range of artistic disciplines that make use of the software and addresses questions of openness and accessibility. It provides a theoretical context for the understanding of media art practices that engage in the aesthetics and politics of Free Open Source Software Culture.
L’Œuvre ouverte | PureData Convention 07 consists of a series of conferences, demonstrations, round table discussions, performances and exhibitions. The convention strives to reflect on the aesthetics and politics of Free Open Source Software culture by focusing on the development, artistic uses and critical writing about PureData. L’Œuvre ouverte advances the collective development of PureData through group coding sessions and by fostering a constructive dialogue among programmers, users and theoreticians.
Building on the success of the first convention held in 2004, in Graz, Austria, the PureData community in Montréal is pleased to host the 2nd International PureData Convention.
Montreal has a diverse artistic community dedicated to the exploration of new technologies and interdisciplinary exchanges with technically engaged groups. Collaboratively developed new media tools such as PureData have found their way into several facets of our artistic landscape including visual art, music, sound art, theatre, dance and VJ culture. The ever-increasing public appreciation and interest in tools like PureData are evidence of the substantial research and development being conducted in the larger community. This is the result of the dissemination efforts and commitment of several media arts organizations and the ongoing exchanges carried out by grassroots networks such as the Montréal PureData user group (PD MTL). | http://convention07.puredata.info/en/about/?action=organizers |
Issue Media Group (IMG) is committed to fostering and preserving a culture of inclusion and diversity. We embrace and encourage differences in gender, race, ethnicity, color, religion, sexual orientation, age, marital or family status, and all other characteristics that diversify its staff, including all full-time employees, contractors, contributors and vendors. Furthermore, we believe that an interest in diversity should extend outward and be reflected across the span of our work and relationships.
We practice inclusive reporting and storytelling that accurately and fairly portrays the communities in which we work. We seek out and include sources that are diverse in age, race, ethnicity, religion, sexual orientation, socio-economic class, political opinion, and social ideas. We uphold this belief in all of our reporting and projects.
We strive to apply this commitment to diversity across all employment practices, including recruitment and selection, compensation and benefits, professional development and training, promotions, and terminations. By encouraging communication, participation, and a respect and understanding for the surrounding community, IMG seeks to create a safe, open work environment for staff of all backgrounds.
Share
Sponsored By
Focus Areas
Architecture + Design
Environment + Sustainability
Arts + Culture
Health + Wellness
Community Development
Higher Education
COVID19
Move to Cincinnati
Diversity
Research + Innovation
Education + Learning
Talent
Entrepreneurship
Transportation
About Soapbox
Careers
Commitment to diversity
Contact Us
Have a tip?
Newsletter Signup
Soapbox Links
Underwriting policy
Copyright © Issue Media Group. All rights reserved. | https://www.soapboxmedia.com/about/diversity-commitment.aspx |
This article provides you with another aspect of this topic. It gives you an overview of distinct differences between the two terms Level of Detail and Level of Development. Besides, you can also know better about different LOD throughout our BIM projects. Finally, there will be an introduction to the Level of Detail (LOD) querying checklist. It is an assistant to determine clients’ requirements before commencement.
1. Level of Detail vs. Level of Development
LOD is sometimes referred to as Level of Detail and Level of Development. In this article, we use LOD to refer to the “Level of Detail”. There are important differences between the two terms. Let’s dig into two terms below:
Level of Detail
The term “Level of Detail” (LOD) demonstrates the degree to which the element model is detailed and specific. It measures the amount of information provided, increases from a symbolic model to an actual model. For example, modeling the steel framing columns:
- LOD 100: You can model a basic shape like a “box”;
- LOD 200: Known as a generic model with approximate size, shape, position. You can also add non-graphic information to the model element;
- LOD 300: As a specific object with accurate size, shape, position, the orientation of main vertical structural elements. You can also add non-graphic information to the model elements like steel materials;
- LOD 350: As an actual model including base plates, gusset plates, shape, position, and interfaces with other building systems;
- LOD 400: Including detailing, fabrication, assembly, and installation information. You can also add non-graphic information to the model element;
Level of Development
The term “Level of Development” illustrates the development of the BIM model from the conceptual design stage to the completion of construction. The LOD allows professionals to develop reliable models at different stages of the project lifecycle. Various LOD specifications have been proposed and adopted in the industry. A typical LOD specification includes five levels:
- LOD 100: Conceptual design. The model can be used to perform whole building types of analysis (volume, building orientation, cost per square foot, etc.);
- LOD 200: Schematic design or design development. The model helps users analyze the systems by application of generalized performance criteria;
- LOD 300: Construction documents and shop drawings. The model is suitable for analysis and simulation for detailed elements and systems;
- LOD 400: Fabrication and assembly. As normal, trade contractor or fabricator uses the model;
- LOD 500: As-built model. The model is suitable for the maintenance and operations of the facility;
Source: https://www.aia.org/
In short, the two terms are used in the development of BIM models. They show the same model development process but from different perspectives. Level of Detail refers to the geometry of the element while Level of Development refers to both the geometry and the other information. For instance, the application of the model, type of information derived from each level. Architects, engineers, and others can use LOD to clearly communicate with each other without debates.
2. Understanding LOD throughout the BIM projects
Scan to BIM project for Office Building with LOD 300
The project consisted of the Revit modeling for a 9-story office building with LOD 300. We modeled all architectural, structural, and MEP elements i.e. facade, ceiling, framing, duct, pipe, conduit above ½ inches.
3D BIM Coordination Project for Hospital Building with LOD 300
The hospital project included Revit modeling, MEP coordination of the kitchen area. We later exported shop drawings of the plumbing system for the client as well. Besides, we involved in 360 simulations of the patient room, operating room, and hall. All models were created with LOD 300.
Scan to BIM project for Laboratory with LOD 300 and 350
The scope of the project comprised Revit modeling of interior Architectural and MEP systems. All models required LOD 300. Strikingly, we needed to model the medical dryer with LOD 350. The pipe system had to be properly named and classified with the label on the pipes.
Scan to BIM project for Administrative Building with LOD 400
The administrative building project included Revit modeling for Architecture, Structure, and MEP. Besides, our team was responsible for making annotations of plans. Include floor materials, door tags, key plans, drawings, elevation materials. All models required LOD 4 in the UK standard. It’s also the highest quality in the UK.
Looking for a BIM provider for construction projects?
Our BIM consultant is happy to help you with any questions. Just share with us your requirements, we’ll work with you to analyze the project and give you a budgetary quotation.
3. LOD Querying Checklist – An assistant to clarify clients’ requirements
Knowing the right clients’ requirements is important. Let’s imagine that your client has asked you to develop a BIM model with “Level of Detail (LOD) 350”. You and your client all know about the concept of LOD 350. But it is still can not ensure that both you and your client are getting the same understanding.
Thus, it’s necessary to clarify the LOD requirements with clients before modeling. Besides, a BIM project can have various LOD needs depending on each area or position. By using the LOD querying checklist, the modeler will define the required LOD of each building element. The client can confirm or feedback on what the modeler provides. In this way, you can avoid confusion or debates between the client and the modeler. The following is an example of a LOD Querying Checklist we’ve used in Scan to BIM projects.
When every requirement is clearly defined, the process of modeling gets started. In the process of modeling, the modeler uses the 3D view, the section to review LOD, and use Schedule to analyze LOI requirements.
Final thoughts
Obviously, understanding the required LOD is important in each BIM projects. Using LOD, designers and engineers can work with other stakeholders about the usability and limitations of a model. As an industry standard, the LOD is mostly utilized as an efficient and collaborative communication tool.
ViBIM is a global provider of Building Information Modeling (BIM) services. We’ve had more than 5 years of experience and expertise in Scan to BIM services, 3D BIM coordination, BIM design, and Dynamo BIM services for clients in the UK, US. | https://vibims.com/lod-querying-checklist-a-great-assistant-for-bim-project |
I made my way to the shore around 7am on Sunday morning to witness the sun's rising. the suns was due to appear at around 7:13am, and I did not want to miss one single second of dawn breaking in on Easter morning.
I needed to see it's coming...night pushing up the day.
so, there was I was at 7am sitting in the dark waiting.
two hours later, I found myself still waiting on one of the galveston jetties that has become a sanctuary for me over the past couple of years. it's my jetty. every visit to galveston I always seem to make my way to that specific one. the granite rocks that compose it hold many of my tears, fears, secrets, hopes and prayers. it is the place I come to
be still
curse
wail
laugh
listen
be binded
be humbled
be awed
sit
dwell in mystery
create
remember.
while waiting, I decided to explore the rocks that had been thrown into formation to protect and connect. within seconds I was creating art with my camera, in total awe of the raw beauty, unique patterns and markings of each of the rocks I came across.
the fog never truly lifted and the sunlight never really made its way to those of us hoping to bask in it's fullness.
but,
it did rise and the light softly filtered through the fog enough for beauty to find me, speak to me and trust my cameras and me for awhile.
When we approach with reverence, great things decide to approach us. Our real life comes to the surface and its light awakens the concealed beauty in things. When we walk on the earth with reverence, beauty will decide to trust us.
John O'Donohue, Beauty: The Invisible Embrace
There are so many ways to use our creativity to increase beauty & hope in the world, so many. I'm always scouting out via Pinterest & Instagram for new ways for the kids in the after school art class I teach, to work out their creative muscles & learn that there are truly a variety of ways we can be creators and not just consumers in the world.
So for art class this week, we made cement planters & played with a lot of soil as we planted succulents shipped to us straight from sunny California in cups donated to us by Amy's Ice-cream.
We had a blast!
It was a bit messy...well a lot messy and I will definitely made a little list of "what to do differently" next week to make the experience even better for everyone, but sooooo much fun & the kids were so excited about their new plants, get dirt on their hands (not so much cement... gloves will definitely help with that next week) & create in a new way. I saw eyes light up & focus in some of the kids I hadn't seen in the art room before. I loved every minute of it & I'm looking forward to getting back to it next week.
Click HERE for instructions on how you can mold concrete planters.
Making Room at the Table
3/22/2016
Saturday was my second Saturday of hosting a workshop I created & invited people to register to attend, & I loved every minute of- even the washing of dirty dishes & palettes. No lie! Because when I am scrubbing and rinsing, I'm celebrating that I had something to wash off... my dreams are becoming real. It's truly happening... one dirty palette at a time.
Also, the workshops & creativity studios are teaching me that I love people & truly receive life from hosting gatherings, especially when they include sharing life at the table and making it possible for each person to explore the deep well of creativity that is within them.
Not only that, but I absolutely love the moment of surprise that always seems to happen when that one person who apologized in advance for not being an artist, creates something that I wish I could keep to hang on my wall because it is a thing a wonder & so dope.
So, friends I am thrilled to say that I am going to keep making room at the table. I have some dreams of collaborating with other artists in town and creating some fun spaces for the people in this great city of Houston to tap into their creativity as they share life around the big art table in Studio D.
Stay tuned and even check out what's all ready on the calendar by clicking HERE. I have workshop planned for June with watercolors, mimosas & John Coltrane vinyl on the record player that is bound to be a good time for all.
hello, spring, hello!
3/20/2016
“It is spring again. The earth is like a child that knows poems by heart.” -Rainer Maria Rilke
one of the best things about living in Houston, is being only 30 or so minutes away from the beach. thankful for the privilege of transportation and a work schedule that allows me to rest on Sundays & plan spontaneous day trips to Galveston for color play, delightful gulf coast breezes & light... lots of it. just the right dose of inspiration to get me all excited & hopeful about another week of living, working, creating, failing, winning & loving.
I have learned that if we can just push past our internal pressure to always be "doing something" or "be productive," & truly take time off to rest, do nothing, play or delight in things that have nothing to do with meeting deadlines or our work... we will be better humans & better at our craft, whatever it may be. definitely not a new concept for sure, but I am often surprised by how often I need to be reminded through burnout, talks at conferences, books, etc. that time off is essential to living a good life.
it's critical.
below are glimpses of a few things & moments that captured my attention this first day of spring, moments where my soul rested & slowed down long enough to breathe deeply.
I hope you find time today or this week, even if it is just for 15-minutes, to do the same. we all need breathing room.
Enter Into Holy Week Creatively
3/15/2016
“...The paradox of real human creativity is that it is not the flexing of our human – our created will… the imposing of order, the dredging up of something new out of the depths of our interiority.
Our creativity is most fully and freely expressed as humans, when we, as artists, stand back and let be…That it is so far from being an exercise of will–much more an exercise of the most extraordinarily concentrated ‘suspension’ of will, so that something is allowed to happen…. “ -Rowan Williams
I'm a grateful to be able to host & guide a workshop in my studio this Saturday, that invites participants to create with intention as we prepare to enter the days of Holy Week, paying attention to what is revealed through the process.
Art as Prayer Workshop with Encaustic is a guided 2.5 hour process of tapping into your creativity using poetry, pen & paper, paint, magazine images and encaustic wax to approach the creative process as a form of prayer.
During this workshop we will create with intention, paying attention to what is revealed through the creative process and less focus on the product you will ultimately create.
Space is limited to 6 participants, so register today if you would like to start your Holy Week off creatively.
I hope to see you there.
Click HERE to reserve your spot. | http://www.larartphotography.com/journal/archives/03-2016 |
This is a fun and easy recipe that’s fun to make, fun to eat, and will be a hit at your next event!
Finally, a quick, and easy recipe that the entire party will love. The beauty in this dish is that many of the essentials are pre-made for you and all you have to do is put it together. This simple fish dish works well with both wild salmon, and farmed salmon. It’s also crazy easy to make.If you are hosting an event, or having a get-together and want to impress your guests, this is the way to go.
Did I mention it SERVES 36 PEOPLE? Well it does! Also, don’t be afraid to substitute in some extra veggies if that’s more your sort of thing. Take a bite and enjoy! Some of the ingredients I listed above are optional and are what I use to make my favorite flavors pop. Add or subtract from the recipe till you have something truly unique, and VERY DELICIOUS! | http://stationnortharts.com/2016/06/20/simple-salmon-pinwheel-recipe/ |
Lassa fever
With the celebration gone with its expenses, many wish that the good time remains and the memories lasting long. However, leftovers that could not be consumed will be thrown out and in most cases the animals in the field will gather for a feast. If only they would eat their food and do no harm, but no, sometimes they make their presence known.
In some parts of the country, methods of waste disposal and management are still inadequate as open dumping continues to be the practice. Consequently, this attracts animals, which visit the dump in search of food or just for fun. As a result, there could be transmission of diseases from such animals to humans when they get into close contact, causing conditions that could range from mild to fatal.
Lassa Fever is one of such conditions that can arise, worse still when there is an epidemic. The migratory nature of people during the holidays makes it possible for the condition to be carried from place to place.
Lassa Fever is a viral illness that is transmitted through animals (hence called a zoonotic disease), it occurs mainly in some parts of West Africa, including Nigeria. This follows the distribution of the vector, the multi-mammate rat in those regions. Lassa Fever was named after the town that had the first case. It is known to have an impact on the health of individuals affected and sometimes cases are underreported possibly due to the poor health-seeking behaviour of the people.
The host (the organism that harbours an infective agent) of the Lassa Fever virus is a rodent, the multi-mammate rat (Mastomys natalensis) that may have the virus in its urine or droppings for a long time which is a method of transmission and the multi-mammate rat has a high reproductive rate which favours its continuous existence. In regions where the host is found, they live in open fields near human dwellings and get closer especially in search of food.
The infected rodents excrete the virus through their urine and droppings and humans get infected with Lassa Fever virus by ingesting contaminated food or water, touching objects that are contaminated with the virus, direct contact with the infected waste from the host, from person to person through blood, tissues, bodily fluids. Also, the rodent is used for food in some areas and this increases risk of infection with the virus.
Lassa Fever may pose great challenge at the hospital as healthy individuals may become infected if adequate protective measures are not taken while treating an ill person infected with the virus.
Anyone can be infected with the Lassa Fever virus and is very important to note that close contact with an infected person increases your risk of getting infected. The incubation period (that is the period between exposure to an infection and the appearance of the first symptoms) of Lassa Fever ranges from about 6-21 days. This means that a person may be infected and spread the infection before showing symptoms of the disease. In some cases, the symptoms may be mild and resolve after that, while in other cases, it may progress to cause more severe condition. Some symptoms of Lassa Fever include feeling of unwell, general weakness, fever, headache muscle pain, chest pain, diarrhoea, sore throat, cough, facial swelling, difficulty in breathing, hearing loss, bleeding from mouth or nose, among others.
The diagnosis of Lassa Fever requires a high index of suspicion by all. It includes a thorough medical history and physical examination by a medical professionals qualified to do so. Once Lassa fever is suspected, the health care professionals providing care, alongside family and friends of the infected person apply adequate protective measures to prevent being infected. Also, the should be contact tracing of individuals who had been in close contact with the infected person so as curtail development of an epidemic or worsen any existing one as the case may be.
Management of Lassa Fever involves supportive care offered in the early stages like adequate hydration and providing symptomatic relief among many others. Medical treatment with an antiviral drug, ribavirin is also effective.
It’s worthy of note that reporting symptoms early on to the physician is very important.
Preventing Lassa Fever is very essential and involves a multi-sectorial approach, also including integrated efforts of individuals, families, communities and government. Prevention and control of the infection includes maintaining adequate food hygiene, hand hygiene, environmental hygiene; destruction of the rodents hosting the virus; wearing protective clothing (like face masks and hand gloves and many others) while taking care of an infected person.
Supporting research in developing vaccines that will protect against Lassa Fever is encouraged.
Health quote of the week:
“There is no power for change greater than a community discovering what it cares about.” –Magaret J. Wheatley | |
The development of foreign policy during the first 50 years of the nation, diplomats were guided by the idea that the united states should observe political isolation from european powers during peacetime and maintain strict neutrality during periods of war. The united states should reduce its involvement in latin american affairs 2 the monroe doctrine permits the united states to intervene actively in the affairs of latin american nations. The united states, per its own records, became a sovereign nation in 1776 by 1783 it was internationally recognized as a sovereign nation all sovereign nations have a foreign policy and are therefore involved in foreign affairs. By nineteen twenty, the united states national income was greater than the combined incomes of britain, france, germany, japan, canada, and seventeen smaller countries.
The reluctance of americans to be involved in foreign affairs shouldn't be a surprise as previous polling has shown americans' lack of desire to intervene in the recent russia/ukraine conflict. Through his first six years in office, franklin roosevelt spent much of his time trying to bring the united states out of the great depression the president, however, certainly did not ignore america's foreign policy as he crafted the new deal roosevelt, at heart, believed the united states had an. Nearly six in 10 people say the united states should not take a leading role in trying to solve conflicts, a new york times/cbs news poll found. The corollary announced that the united states would serve as the policeman of the western hemisphere, a policy which eventually created much resentment in latin america peacemaker though often recognized for the aggressiveness of his foreign policy, roosevelt was also a peacemaker.
The united states should be involved in foreign affairs such as diplomacy and showing the rest of the world how a peaceful democracy works what doesn't need to happen is the us military continually responding to emergencies all over the planet like a 9-1-1 service america should be a bastion for democracy to the rest of the world. Egypt and the united states belong to a number of the same international organizations, including the united nations, international monetary fund, world bank, and world trade organization egypt also is a partner for cooperation with the organization for security and cooperation in europe, an observer to the organization of american states, and. The united states is faced with a diverse set of foreign policy problems, and the american public expects political leaders to address these issues in order to capture the full range and complexity of foreign policy issues the public finds relevant, respondents were asked for the five most important foreign policy problems facing the next. The us can get in bigger long term trouble if we get involved into foreign affairs the us isn't the world's police officer, and we shouldn't be if you think of the consequences that the us can get from interfering, then there are many.
As for foreign affairs, where i was editor from 1972 to 1984, articles on oil and energy policy issues prior to the 1973 middle east war and the first oil crisis, by walter levy and james akins, sounded an alarm little heeded. Afghanistan and the united states belong to a number of the same international organizations, including the united nations, international monetary fund, and world bank afghanistan also is a partner for cooperation with the organization for security and cooperation in europe and joined the world trade organization in 2016. In foreign policy, progressives are adrift, caught between dated paradigms that have not yet come to terms with the current geopolitical moment. One of the more controversial aspects of getting involved in foreign affairs is the moral implication that comes with involvement at this point in world history and affairs, the united states. A world without us primacy, samuel huntington once wrote, will be a world with more violence and disorder and less democracy and economic growth than a world where the united states continues to have more influence than any other country in shaping global affairs.
For decades, the united states has followed the monroe doctrine and the roosevelt corollary in our foreign policy with latin america the united states did not want other countries involved in the western hemisphere, but was acceptable for the united states to get involved. The shift to an involved foreign policy, starting with the world wars, and continuing with the proxy wars in vietnam and korea, as well as oil-driven and anti-terrorism involvement in the middle east, all cost massive amounts of money. The united states should get involved in foreign conflict, because the principle of the united states is the rights for all humanity, knowing the rights of the people like the air strike in syria, was a good example of united states getting involved.
Wilson's efforts to get the united states into the league of nations failed, but his general approach to foreign policy took root and profoundly influenced how americans thought about foreign. (archived document, may contain errors) an understanding of the constitution's foreign affairs power by thomas j campbell on april14,, 1986, elements of the united states naval and air forces. Upon taking office, president franklin delano roosevelt tended to see a necessity for the united states to participate more actively in international affairs, but his ability to apply his personal outlook to foreign policy was limited by the strength of isolationist sentiment in the us congress.
The united states has been involved in a number of foreign interventions throughout its history there have been two dominant schools of thought in america about foreign policy, namely interventionism and isolationism which either encourage or discourage foreign intervention respectively. Conflict between spain and the united states over involvement in cuba. Throughout the cold war, us involvement in foreign elections was mainly motivated by the goal of containing communism, said thomas carothers, a foreign policy expert at the carnegie endowment.
America on the sidelines: the united states and world affairs, 1931-1941 a comprehensive student interactive giving the user a full scope of america's political and diplomatic responses to world events between the two world wars. United states involvement in regime change has entailed both overt and covert actions aimed at altering, replacing, or preserving foreign governments in the latter half of the 19th century, the us government initiated actions for regime change mainly in latin america and the southwest pacific, and included the mexican-american, spanish-american and philippine-american wars. However, as the free countries fell, one by one, to the nazi war machine, americans began to realize the folly of their foolish optimism and clamored for increasing involvement in foreign affairs. | http://wotermpaperxvst.laluzsiuna.info/the-united-states-involvement-in-foreign-affairs.html |
The response of the cancer patients to chemotherapy treatment varies from person to person. For some patients cancer cells are resistant to treatment and these cells can relapse again which is known as minimal residual ...
Improving short-term memory performance of healthy young males using alpha band neurofeedback
(International Society for Neurofeedback and Research, 2019)
To examine whether it was possible to improve short-term memory performance of healthy participants by increasing relative alpha band power (7–11.5 Hz) using neurofeedback, we first converted a commercial EEG device ...
Using Students' Performance to Improve Ontologies for Intelligent E-Learning System
(EDAM, KISIKLI MH ALEMDAG CD YAN YOL SK, SBK IS MERKEZI NO 5, KAT 1 USKUDAR, ISTANBUL, 81190, TURKEY, 2015)
Ontologies have often been recommended for E-learning systems, but few efforts have successfully incorporated student data to represent knowledge conceptualizations. Defining key concepts and their relations between each ...
Capturing B type acute lymphoblastic leukemia cells using two types of antibodies
(WILEY, 111 RIVER ST, HOBOKEN 07030-5774, NJ USA, 2019)
One way to monitor minimal residual disease (MRD) is to screen cells for multiple surface markers using flow cytometry. In order to develop an alternative microfluidic based method, isolation of B type acute lymphoblastic ...
Magnetic micro/nanoparticle flocculation-based signal amplification for biosensing
(DOVE MEDICAL PRESS LTD, PO BOX 300-008, ALBANY, AUCKLAND 0752, NEW ZEALAND, 07.07.2016)
We report a time and cost efficient signal amplification method for biosensors employing magnetic particles. In this method, magnetic particles in an applied external magnetic field form magnetic dipoles, interact with ...
Micro- and nanodevices integrated with biomolecular probes
(PERGAMON-ELSEVIER SCIENCE LTD, THE BOULEVARD, LANGFORD LANE, KIDLINGTON, OXFORD OX5 1GB, ENGLAND, 2015)
Understanding how biomolecules, proteins and cells interact with their surroundings and other biological entities has become the fundamental design criterion for most biomedical micro- and nanodevices. Advances in biology, ...
Magnetic-particle based signal amplification method integrated with mobile-devices for low cost biosensing
(ELSEVIER SCIENCE BV, SARA BURGERHARTSTRAAT 25, PO BOX 211, 1000 AE AMSTERDAM, NETHERLANDS, 2017)
We present a signal amplification method for biosensing applications using magnetic particles. In this method, mobile devices and simple spherical glass beads are used as a low-cost microscope to detect magnetic particles. ...
Detection of Proteins Using Nano Magnetic Particle Accumulation-Based Signal Amplification
(MDPI, ST ALBAN-ANLAGE 66, CH-4052 BASEL, SWITZERLAND, 2016)
We report a biosensing method based on magnetic particles where coated magnetic particles are used for immunomagnetic separation, and uncoated magnetic particles are used for signal enhancement. To quantify the signal ...
Ball Lens Based Mobile Microscope
(GAZI UNIVCENTER CAMPUS TECHNOLOGY FAC B BLOCK EK BINA, 2ND FL, ANKARA, 06500, TURKEY, 2016)
In this paper we report a low cost, simple and mobile microscope based on attachment of a ball lens to a cell phone. The system's noise and parameters affecting the image quality is investigated. The ball lens provides ... | http://acikerisim.agu.edu.tr/xmlui/discover?rpp=10&etal=0&group_by=none&page=2&filtertype_0=author&filter_relational_operator_0=equals&filter_0=Icoz%2C+Kutay |
(Phys.org) —Early human societies consisted of small, tight-knit groups of individuals who knew each other. Members probably cooperated with one another based on prior experience and the expectation that individual beneficiaries of generosity would reciprocate. However, large, modern societies depend on transactions between strangers who may have no further contact after the transaction finishes. According to research by Gabriele Camera of the Economic Science Institute at Chapman University in Orange, California and his colleagues, money allows members of a large group to maintain trust when interacting with strangers, and therefore facilitates cooperation in modern societies. The study appears in the Proceedings of the National Academy of Sciences.
It's relatively easy to decide whether you should cooperate with someone you already know. Have they proved trustworthy before? If you do them a favor, are they likely to do something for you in the future? In early hunter-gatherer societies, where everyone knew everyone else, determining when to cooperate and when to refuse probably wasn't very difficult.
Today, however, we interact frequently with strangers. For society to run smoothly, we must cooperate with people we've never met before and may never see again.
To find out whether money makes people in large societies more likely to cooperate, Camera's team designed a helping game, dividing subjects into pairs consisting of a "consumer" and a "producer." The consumer had the opportunity to help the producer, for a small cost.
The researchers placed the subjects in groups of 2,4, 8 and 32. When there were more than two people in a group, partners were unable to identify each other. As group size increased, the probability that current partners would be partners in the future, with an opportunity for reciprocation, decreased. Cooperation also decreased as group size increased.
In a later version of the game, the team gave subjects the opportunity to exchange tokens, which acted as an analog for money. A consumer could give a producer a token in exchange for help. This time, cooperation rates stayed the same, regardless of group size.
The researchers suggest that money provides stability as societies evolve and grow larger. It allows trust to exist in transactions between people who do not know each other. People trust that a stranger with money is less likely to try to get something for nothing than a stranger without money is.
Introducing money to a society does seem to incur a social cost. When tokens were included in the experiment, producers could either help in exchange for a token or help unconditionally, as a gift. Almost no gift-giving occurred at all. In comparison, earlier, when no tokens were available, all exchanges had been unconditional. Adding tokens caused the norm of monetary exchange to replace the norm of voluntary cooperation.
Explore further: Punishment promotes human cooperation when people trust each other
More information: Money and trust among strangers, PNAS, Published online before print August 26, 2013, DOI: 10.1073/pnas.1301888110
Abstract
What makes money essential for the functioning of modern society? Through an experiment, we present evidence for the existence of a relevant behavioral dimension in addition to the standard theoretical arguments. Subjects faced repeated opportunities to help an anonymous counterpart who changed over time. Cooperation required trusting that help given to a stranger today would be returned by a stranger in the future. Cooperation levels declined when going from small to large groups of strangers, even if monitoring and payoffs from cooperation were invariant to group size. We then introduced intrinsically worthless tokens. Tokens endogenously became money: subjects took to reward help with a token and to demand a token in exchange for help. Subjects trusted that strangers would return help for a token. Cooperation levels remained stable as the groups grew larger. In all conditions, full cooperation was possible through a social norm of decentralized enforcement, without using tokens. This turned out to be especially demanding in large groups. Lack of trust among strangers thus made money behaviorally essential. To explain these results, we developed an evolutionary model. When behavior in society is heterogeneous, cooperation collapses without tokens. In contrast, the use of tokens makes cooperation evolutionarily stable. | https://phys.org/news/2013-08-economists-large-groups-money-cooperation.html |
Time moves on, and CHANCEL CHOIR rehearsals begin once again – tonight. I have been singing in a church choir, or playing the piano, or doing plays in church, for as long as I have memories. Some churches were small, some churches were so big that Christmas productions would last for several performances for several thousand people.
In any situation, as a musician, it’s good for me to step back and remember that musical talent is a gift, but it needs to be paired with “craft”; a craft that requires several levels of learning and, most of all, constant practice.
In music, there is of course the learning of the notes: making sure the notes being played or sung (as far as tones & melody) correspond exactly to the notes written on the page. Once those are in place it is time to look at how the notes are played or sung: loud, soft, slow, fast, etc.
Once the notes are learned, along with the way they are to be performed, it is a matter of “detailing”; making sure that we are not ONLY singing or playing the correct notes at the correct time and with the correct dynamic range, but that we are communicating the mood and message of the song.
All of this learning is part of a craft which pairs with natural talent under the direction of a trained ear and trained teacher. It is the job of the DIRECTOR/TEACHER/COACH to listen not only to the individual artist but to a group, as in the case of a choir or instrumental ensemble. The director determines exactly what type of practice is required at what time; to make sure that the performance is as musical, as communicative and as precise as possible.
We, in the choir, don’t start the first rehearsal knowing everything or giving a perfect performance, it takes time, energy, heart & soul. It takes practice. We don’t start making music well simply because we are labeled as members of the choir or handbell choir.
God, our Father, has called us and brought us to a place where we are His children. We are His children because He calls us His children. He “creates” by speaking the words. When He “says” we are His children…we are. But becoming (or, a better word might be, “realizing”) who we are, and living like the people He says we are takes time, energy, heart & soul; it takes practice. A common mistake for a person of God is to believe that once the choice has been made to BELIEVE & FOLLOW, there is nothing more to be done.
That is partially true. There is much about being in the Kingdom that is out of our hands, God is the “Decider”. But for us, being named by God is not the end, it is only the beginning of the life-journey. We realize what it means to truly be a member of a musical group when our individual notes not only fall into place with the other members so that together we play beautiful music, but also when we begin breathing together and thinking together; when we race together and when we rest together.
After much practice we can perform together without need to concentrate so much on the technical things we’ve been doing over and over, perfecting, polishing…and we start thinking on the true message and the true music. At that point we begin to understand what it means to truly carry the label, “member of the choir” or “member of the orchestra”. When we walk with God, together with those around us who also believe and follow (not looking at our feet and path as much as we used to when we first started, but looking up and seeing those around us, enjoying the view, and listening intently to the One who leads us) then we trust the Voice and understand what it means to BE a Child of God.
It is up to the Director (with a capital “D”) to listen and watch US, determining what type of practice would best lead us to that place. And it takes patient practice to become that disciple with a depth of faith to experience the indescribable peace of the believer. It doesn’t happen immediately, any more than a musician starts off with perfection. The notes have to be learned first, then the appropriate dynamic. Then the details…even then, one can’t take their eyes off of the Director/Father…for He alone is in charge of the performance.
So, let us practice, let us be willing to fail, be willing to accept the failure of others, and be willing to go back and do it again. Let’s get the “notes” into our voices before moving on to something else. The message of the music is important to those watching our every move and listening to the song we sing. | http://www.central-christian-church.com/2019/08/27/choir/ |
Could vegetable processing facilities and grain storage open new markets and save farmland in south Puget Sound and Southwest Washington?
When farmers lose buyers, whether a farmers’ market customer, local processing facility, or grain mill, it becomes that much more difficult to make a living by farming. Our region’s farmers reflected this reality in 2017 when they identified gaps in the food system infrastructure such as food processing facilities, storage…
The 2008 Farm Bill ushered in a suite of programs that support the development of local and regional food systems, market diversification opportunities for farmers, healthy food access initiatives and other innovative programs that seize upon the great potential of food to bolster local economies, create jobs and deepen the…
With his new budget, Donald Trump proposes to take more than $1 trillion in taxpayer money and disperse fully $750 billion to the military. Out of every taxpayer dollar, in other words, 62 cents go to the military and our militarized Department of Homeland Security (Veterans’ benefits take another seven…
Cutting through the bullshit... | https://olywip.org/page/2/ |
Zimbabwe is crafting the Climate Change Bill, a legal instrument aimed at mitigating the effects of the phenomenon of climate change through financing, regulating gas emissions in greenhouses among other measures it will curb, Speaker of the National Assembly Advocate Jacob Mudenda has said.
He said it was the role of Parliaments in their oversight role, the world over to ensure that the Executive embrace the best practices in reducing gas emissions have better waste management methodologies and mainstream climate-related legislation.
Adv Mudenda said this in Bali, Indonesia where he is attending the 144 Assembly of International Parliamentary Union that brings together legislators across the globe.
The conference is running under the theme “Getting to Zero: Mobilising Parliaments to Act on Climate Change.”
“Zimbabwe’s response measures to climate change are guided by the principles of Common but Differentiated Responsibilities, Respective Capabilities and Climate Justice. In this respect, Zimbabwe has raised its commitment to reduce Greenhouse Gas Emissions from 33% to 40% per capita by 2030 in its 2021 Nationally Determined Contributions as guided by the implementation of the Low Emission Development Strategy,” he said.
“This has been bolstered by Zimbabwe’s mainstreaming of the climate change phenomenon in its National Development Strategy (2021-2025). Additionally, Zimbabwe is crafting a comprehensive Climate Change Bill whose focus is climate financing, measurement of greenhouse gas emissions, compliance, reporting and verification matrix.”
He said some of the best practices that Parliaments could adopt in greenhouse gas emissions reduction towards the net-zero agenda, include legislating towards incentivizing green infrastructure project implementation, better waste management methodologies.
“In addition, mainstreaming of climate change-related legislation in order to expedite the transition to clean and renewable energy development is necessary,” he said.
Adv Mudenda said the phenomenon of climate change has intensified globally, progressing at a faster rate than initially projected by scientists.
“Climate-induced calamities are on the increase as witnessed by unprecedented weather patterns and catastrophic droughts as well as the devastating cyclones. To that end, our responses as Parliaments should be intensified by enacting appropriate legislation for mitigatory measurements.”
“Heads of State and Government are urged to assiduously increase their Nationally Determined Contributions, ambitions and climate actions towards securing Net Zero emissions. In so doing, they would keep the 1.5 degrees Celsius temperature rise threshold within reach. To this end, Parliaments should use their constitutional mandates to ensure that governments meet their mitigatory targets unequivocally through robust oversight on the Executive.”
He called for member countries to ensure compliance with international treaties on climate change.
“To this end, oversight on all mitigation projects and budget allocations must be effectively implemented by Parliaments. Similarly, Zimbabwe launched its National Climate Fund in 2021, primarily to give climate action direction and sustainability,” he said.
Earlier this month, Adv Mudenda met the Indonesia ambassador to Zimbabwe, Mr Dewa Juniarta Sastrawan where they discussed how to deepen cooperation.
The diplomat had also paid Adv Mudenda a courtesy call to officially invite him to Bali for the conference as the host country. | https://www.zimbabwesituation.com/news/climate-bill-on-cards-speaker/ |
Australia-Korea Foundation Grant Round Open
The Australia-Korea Foundation (AKF) aims to promote bilateral relations between Korea and Australia through annual grant funding to organisations and individuals to support activities which advance Australia’s engagement with Korea.
The AKF grant round is now open and will close at 2pm (AEST) 18 September 2020.
Grant activities can include collaborations, exchanges and partnerships in the areas of:
- cross-cultural learning;
- trade and commerce relationships;
- technological, scientific or education innovation; or
- strategic international relations.
Further information about the AKF can be found at: | https://darwininnovationhub.com.au/australia-korea-foundation-grant-round-open/ |
Melissa Mueller grew up working at her parent’s motorcycle dealership outside of Atlanta, Georgia. By the time she was an adult, she’d held nearly every job at the company. But motorcycles were never her passion. Instead, she always had a special interest in computers — which is why, whenever she got the chance, she’d offer to solve the dealership’s hardware or software issues.
What started as a favor to her parents quickly evolved into a true passion. It all began one day when Melissa overheard her mom complain about the cost of getting more gift certificates printed. At the time they used carbon-copy paper to give store credit to their customers. Melissa decided to replace the old system with a computer program that would create, store, and print gift certificates, making the entire process much easier to manager. She thought, “If somebody else can do it, I should be able to do it, too.”
A true self-starter, Melissa bought herself a coding book and, by trial and error, wrote her first C# / ASP.NET / HTML / CSS program. Having tasted the thrill of programming success, Melissa knew she wanted more. She wanted to code for a living, and decided to pursue a formal education in computer programming. Melissa earned her bachelor’s degree in Systems Analysis and Integration in 2012, graduating with highest honors.
Then, after 35 years as a top performing U.S. dealership, Melissa’s parents decided to sell the company. Melissa was now on her own, free to pursue a full-time career in coding. After a short stint as a network administrator, Melissa stumbled upon an open position for a Salesforce role at Mitsubishi Electric that felt like a great fit. At the time, she had no experience with Salesforce, but with her background in coding she knew it was something she could learn.
“The day I found out that I had a phone interview, I went to Trailhead, downloaded the Developer Edition, and started taking trails,” she remembers. She already had 18 badges when she went in for the interview.
Melissa got the job and has been on her Salesforce journey for a year now. We spoke with her about coding, the Trailblazer Community, and how she prepared for her Admin certification exam (which she recently passed!). Here’s her story:
A: I first coded back in eighth grade, when we learned BASIC at school. But when I transferred to the local public school, they didn’t offer computer classes, so I focused on performing arts instead. I didn’t take a computer course again until college, though I’d always liked learning BASIC. I lost touch with computer science until I started working with computers again at the dealership. It reignited that interest.
A: I’ve always really liked solving problems — not just business problems, but writing code that makes something work. It can also feel like you’re banging your head against the wall when it’s not coming together, but it’s really satisfying when you get it right and you’ve made someone’s life easier with what you’ve created.
A: Not really, because in my current role I’m acquiring new skills beyond coding. I like that I’m using more well-rounded tools now. Salesforce has full point-and-click functionality, but it also has coding. When I tell someone, ‘I’m an Administrator,’ I’m confident that there’s a huge market of companies looking for exactly that. It feels great to know that there is security in what I do, whereas learning and specializing in one programming language limits the scope of positions that I’m qualified for.
A: I recently joined Twitter and have been getting more involved by connecting with other Trailblazers and contributing where I can. I’ve also found that connecting with other Trailblazers in person is invaluable because it’s really hard when you get stuck. When you have the opportunity to ask someone directly, you can look at it together and talk through the problem.
Recently, I met up with Zayne Turner at an event and in less than ten minutes, she helped with two problems that I’d been stuck on. Another Trailblazer that I met at TrailheadDX spent an hour of his time working with me. Leaning on the expertise of the community has really helped.
I think Trailblazers are people who are willing to take a leap into something unknown or not fully explored, and run with it. They look for ways to make things better — not just in their own lives, but for the companies they work for by making lives easier and processes less expensive.
Melissa has picked up a lot of helpful tips on her road to becoming a Trailblazer. For other Admins eager to learn how to code, she suggests that they take it step-by-step. Before jumping into any Developer trails on Trailhead, she recommends first completing these three tasks:
Complete all Trailhead’s Admin trails first
Learn about application logic
Understand the purpose of each coding language
Today, Melissa is a Salesforce Developer and Certified Admin with over 65 badges on Trailhead. In true Trailblazer fashion, she shared her favorite trails that helped her prepare for the certification exam. These 4 Modules, 2 Trailmixes, and 1 Project helped her achieve a pass on her first try:
Module: Reports & Dashboards
Module: Picklist Administration
Module: Formulas & Validations
Trailmix: Prepare For Your Salesforce Administrator Credential
Trailmix: Build Your Admin Career on Salesforce
Project: Improve Your Classic App by Migrating it to Lightning Experience
Are you ready to tackle some trails yourself? Click here to get started on Trailhead.
And if you have an inspiring Trailblazer story to share, we want to hear it! Tweet us @salesforce using the #BlazingTrails hashtag.
This article is part of an ongoing series highlighting the many voices and stories that make up Salesforce’s diverse community of Trailblazers. | https://www.salesforce.com/content/blogs/us/en/2018/02/how-trailhead-helped-ace-job-interview.html?bc=WA |
How surfing helped a local therapist improve his practice
As a lifelong surfer who is also in private practice as a therapist here in Santa Cruz, I am often struck by the parallels between surfing and therapy. When I am surfing, I view waves as opportunities rolling through the sea, ever-changing as they interact with the bottom of the ocean. In order to surf them, you have to be aware of where they are coming from and know how to put yourself in the best place to catch them. In surfing, this place is called the peak—the spot where the waves form up the most and are easiest to catch. Before you can even get to the peak, though, you have to paddle out through the already breaking waves, or white water.
Learning to read the white water comes from experience. If you are a beginning surfer, you might try to paddle out directly through many layers of white water, which can be exhausting and futile. Usually, if you try to paddle straight to the peak, white water just pushes you back, but as you become a more experienced surfer, you learn that you have to paddle around the breaking waves. Even if that path is a longer distance, it takes much less effort. You have to acknowledge the power of the whitewater and respect it.
Humans, of course, are also incredibly complex and dynamic, continually altering how they act according to who is around them. And as a therapist, it is rare that you can just jump in and work on an issue with a client. Before you start, you have to be aware of people’s lines of defense. It is usually not a great idea to just barrel through a person’s many layers of protection, since that will often cause their defenses to just get stronger. Instead, you have to honor their defenses, acknowledge them and not directly challenge them, but learn to work with them.
When I was starting out as a therapist and I learned that one of my clients was drinking more than he wanted to, my first thought was, “Well … stop drinking.” But I knew that that approach would not be very helpful. Even though it took longer, it was much more effective to first explore the attraction of drinking and to collaboratively think about what healthier activities could satisfy a similar desire and eventually replace drinking.
Back in the ocean, once you are past the white water, if you want to catch a wave you have to figure out where to be to do that. There are no landmarks in the ocean. The only information you have are the waves that are rolling through. So it is important to watch those waves closely, even the ones that don’t break. These will give you the information about where to be in order to catch a good wave when it comes. In particular, learning to spot where the smaller waves start to form up will give you information about where the bigger waves are going to break.
In the same vein, I have learned that it is important to be highly attentive to your clients and pay close attention to their smaller emotional reactions. These can often predict larger underlying issues. For example, when I was once working with a father and son in therapy, I noticed that the son had a very strong reaction when the father didn’t really listen to what he was saying. It turned out that the son not being heard by his father—on a much deeper level—was an essential part of what we had to work through together.
In the ocean again, you are now out past the white water and sitting at the peak where the waves form up. The next step is learning when to paddle in order to catch a wave. Timing is critical in surfing. If you paddle too early, you might get ahead of the wave and it will break on top of you. If you paddle too late, the wave might not get steep enough to catch, and it will just roll under you and pass you by.
Many of the mistakes that beginning surfers make have to do with timing and positioning. When you are first learning, you paddle for a lot of waves and only catch a small percentage of them. You waste a considerable amount of energy, but expending this energy while figuring out how to progress is an important step in learning anything. This experiential learning phase is essential; there are many things in surfing that can’t be taught. It is a very subjective and qualitative art form. There is no quantitative way to describe what needs to be done to catch a wave; you can’t say that you have to start paddling for the wave when it is exactly 10 feet away from you and has a 37 degree angle. Because the ocean is an incredibly dynamic environment, there are innumerable variables involved, making every wave and every situation different. That is why this inefficient trial and error period is important in learning how to surf. You have to get out there and experience it in order to learn it.
It becomes very satisfying when you start to hone your skills. You learn that if you paddle hard at the right time, and your positioning is good, you can catch the wave with just a couple of strokes. Experienced surfers make this look extremely easy, or even effortless. Once you are more practiced and able to catch waves more reliably, you also begin to enjoy the moments of just quietly floating on the surface of the water, since you know that you are likely to actually ride more of the waves you paddle for. These moments are an important time to savor and contemplate the last wave and rejuvenate for the next one.
Timing and pacing is incredibly important when working therapeutically as well. As a beginning therapist, I was afraid of silence in the room. I would quickly try to fill it with whatever words I could think of, even if filling the airspace was not the best thing to do at the time. I was essentially, frantically paddling for any wave that looked even remotely catchable and kicking out of waves too early when there was more ride to be had. As I matured as a therapist, I became much more comfortable with silence. I realized that it can be a very important time where clients are digesting something or configuring their thoughts into words. I remember when I was working with a client and she came to the realization that she had been playing a parental role with her younger siblings for most of her life. At first she was forced into that role because there was an emotional vacuum in her family, since neither of her parents really knew how to be parents. Now that she and her siblings are adults, she was coming to the awareness in therapy that she had the choice to keep playing that parental role or free herself to start doing something different. I gave her plenty of quiet space to let this realization sink in.
At this point in the surfer’s story, you have paddled out, you lined up where you are supposed to be, you paddled at the right time in the right place and you caught the wave. Now you are actually riding the wave. You become instantly sucked into the present moment in order to flow with your surroundings. The wave is a dynamic force and you have to make split-second decisions and micro-adjustments to stay attuned to it. As the wall of water gets steeper, you shift your body to put more weight on your back foot to adjust how the board is planing on the water. You have to be incredibly flexible and open to possibility when you are riding a wave. When I first catch a wave, I have an idea of what that wave might do, but the reality is I can’t entirely predict that. So when I am riding that wave, I am living fully, using my intuition and interacting with what is happening in the moment.
This correlates closely to my work as a therapist, when it is critically important to be flexible during sessions with my clients, as well as in my overall approach to working with them. It is a frequent occurrence in therapy to enter a session with your own agenda and have a clear idea of what you might want to accomplish, but you have to be willing to let that go if the situation calls for something different, and instead do what seems most appropriate in the moment. There is a surrender of control and a necessary letting go of your expectations and planning for the perfect situation, because in the end you don’t have much control of what will happen when you are working within another person’s emotional realm. This focus on flexibility and patience in both surfing and therapy has to do with the unpredictability of the ocean and the unpredictability of human beings. Adapting to a person’s needs, which change every moment, and attending to someone’s constantly varying emotional climate requires being mentally and physically present, just as surfing does. Both activities, in essence, encourage you to seize the present moment and make the most of what you have right now, which in actuality, is all we can ever do. | http://goodtimes.sc/cover-stories/surfing-is-life/ |
1. Algorithm Design
An algorithm is a finite set of rules giving a sequence of operations for solving a particular problem or stating, if necessary, that there is no solution.
This page has been specially prepared for my beloved students.
There are many approaches to algorithm development, two of which are:-
- * Flowcharts
- * Pseudocode (or structured English)
It is the use of English or English-like statements to represent a program or a systems design.
I will now illustrate the development of algorithms through examples. But before doing so let us see what has to be done after the algorithms have been developed.
1.1 Dry Run
It is the use of test data to check the paths through a program, or system, design (i.e. the algorithm) without the use of a computer.
To perform a dry run we make us of a trace table.
Trace Table: – It is a tabular method of recording the values expected to be taken by variables as test data is processed by a program. These values are then compared against the actual results. | https://getjobyouwant.com/what-about-algorithm-design |
Every day, we are at risk of experiencing a variety of unforeseen life events, all of which could result in difficult consequences, like financial loss, property damage, or health conditions. These unexpected events could severely impact you financial plan and your family’s future.
A sound risk management strategy can help protect your family from the financial consequences of life’s unexpected events. This type of strategy can include personal insurance, liability insurance, long term care insurance, and life insurance. Together with a sound asset allocation strategy, a risk management strategy incorporates “necessary” risk to create a strategy that aims to reach goals in a comfortable manner. Insurance protects you by transferring the financial risk of life’s events to an insurance company, giving you financial security and allowing you to sleep at night.
In particular, we like to work with all clients to develop a long-term care funding plan (which usually includes long-term care insurance) and to make sure that family is provided for in the event of death (which may require life insurance). But, before recommending insurance, we undertake a comprehensive review of the client’s entire financial plan to ensure that decisions are made in a thoughtful way and in alignment with the family’s values. | https://taylorfinancial7.carsonwealth.com/services/high-net-worth-families/risk-management/ |
Disclosing your Disability, Difference or Condition at College
Disclosure means you share some aspects of your disability, difference or condition to others within your environment, such as at work, in higher education or with friends. It’s important to state that you don’t have to disclose anything about your autism diagnosis, or any other disabilities, conditions or differences you have, if you don’t want to. The decision to disclose lies with you, you shouldn’t feel pressure from anyone else to do so, and State institutions like Universities or Colleges are obliged under the law to keep any personal information you disclose confidential. However, there are some benefits to disclosing your autism diagnosis, or other disabilities or differences you have, at your University, such as accessing supports for classes, tutorials and assessments, that may make the disclosure process worthwhile. This section aims to raise awareness of some key reasons why disclosure might be the right choice for you.
Many disabled people fear being discriminated against by wider society, and this can be a major reason why they might prefer not to disclose their disability or difference and to ‘mask’ or disguise their characteristics or traits to fit into society. This is because there is still a negative stigma attached to disability, and some people within society might hold attitudes around disability that might be prejudiced against disabled people. Many disabled people fear that they may be judged for having a disability, rather than their skills, or their personal qualities they can bring, and that this can lead to stigmatising or judgemental attitudes that can negatively impact on their work. Many disabled people hold the view that the Higher Education Institute should do everything possible to accommodate the disabled person’s access needs, and to remove any potentially disabling barriers that might arise at University or College to ensure that they have the best learning experience possible.
Nobody should experience discrimination, particularly on the grounds of their difference or disability, and that there are University-wide and national laws and policies like the Equal Status Act and the Disability Act that are designed to stop this kind of discrimination from happening. Disclosing your experience of being autistic can also be a great way to counter these barriers, and challenge stereotypes to neurotypical or allistic (people who are not autistic) people who might not have the day-to-day lived experience of being autistic, or who have misformed presumptions about autism and the barriers you experience on a daily basis.
The Education Act obliges all education institutions, including colleges and universities, to provide disabled students or students with learning support needs with appropriate resources, accommodations and supports to meet their educational needs.
Educational institutions must establish and maintain an admissions policy that allows as many people as possible to access education, including people with disabilities and neurodivergent students.
The Equal Status Act (2000) provides for a way that Universities can support disabled students to access their education called ‘Reasonable Accommodations’. Section 4 of the Equal Status Act states that “A reasonable accommodation can be any means of providing special treatment or facilities if, without such accommodations, it would be impossible or unduly difficult for the person to avail of the service provided by the educational establishment”.
However, the Act also states that the educational institution, like other service providers, might not have to provide accommodations if it causes an ‘undue burden’ financially to the institution. However, the grounds for a University claiming this is limited. In cases where there is State funding available that can pay for the required accommodations, like the Special Fund for Students with Disabilities, then the institution must provide the accommodation, along with any other ‘nominal costs’ associated with putting the accommodation in place.
You have the right to access additional supports if you need it
Ireland has laws and policies, including pieces of legislation like the Equal Status Act that obliges Universities, Institutes of Technology and Higher Education Institutes to ensure that disabled students and autistic students can access their education on the same basis as their neurotypical or non-disabled peers. This gives autistic students the right to access additional services and supports, including Reasonable Accommodations, to support you in your academic life and to achieve the qualification you want.
All universities and higher education institutes have a designated section, usually a Disability Support Service or an Access Officer, who is responsible for supporting students with disabilities whilst they’re on campus. They’re there to help you if you need anything specific from your College or University (like educational materials, recorders, handouts or wheelchair access) or if there are any facilities that you’re not happy with.
The Disability Support Officer or Access Officer will be your go-to person within the College or University to discuss any concerns you might have regarding how your condition, difference or disability might impact your right to access education. Every College or University has different policies and procedures for providing support in place, so it might be a good idea to contact them in person or via email to find out what supports are available. This can help you to make the most of your time spent at University or College. You can ask your Student Union to see if any clubs or societies can be made more accessible to you, or if there are any specific societies that advocate for students with disabilities and their interests that you can join.
Benefits of Disclosure
The main advantage of disclosing that you are autistic to your higher education institute is that lecturers, tutors and staff can provide you with services and supports that can fit your needs as a student. Staff at the University can work with you to provide the support you need to help you succeed in your course.
Some of the supports you can ask from your Disability Support Officer include:
Your Disability Support Service can also help connect you with other support services that can help you adjust to college life, including Student Counselling or Academic Writing Centres.
Should I disclose that I’m autistic?
Disclosure is a personal choice – you don’t have to disclose your autism diagnosis to others if you want to, and you are not obliged to disclose your autism diagnosis. Do bear in mind though that staff at your higher education institute might not know what your support needs are, they might not be able to support you in the way you’d like them to.
In the round, it is usually a good idea to disclose that you’re autistic if you feel comfortable and confident enough to do so. Whilst it can be particularly helpful to disclose and reach out for supports, disclosing that you’re autistic might also be helpful to you if you’re thriving at University, if you feel confident about being open about being autistic. Being open about your diagnosis can be helpful if you want to increase autistic acceptance, understanding and inclusion around the campus and challenge barriers, misconceptions and stereotypes surrounding autism and different neurotypes and disabilities.
What are some common misconceptions around disclosing my diagnosis?
To help you to come to a decision about whether to disclose, it might be helpful to dispel some of the common misconceptions around disclosure. When you tell your University or Higher Education Institute about your diagnosis, only a small number of staff will know that you’re autistic and are bound by legal and ethical considerations not to tell anyone else about your autism diagnosis, as well as any other disabilities or differences you might have, without your express permission. They are there to support you in your academic studies, and if they refer you to anyone else within the Institute, it is to ensure that you receive the best support available.
Universities and Colleges want to see their students succeed and to complete their academic studies. For neurodivergent, disabled and autistic students, this experience of college or academic life can be quite different, and you might find some parts of your studies more difficult than your neurotypical or non-disabled peers. Whilst Universities or Colleges are making their practices more accessible and inclusive to autistic people, they might still need to put in place additional supports to navigate the sensory environment and ensure a positive academic experience for everyone. If you need more supports and accommodations that can help you to work more effectively, your University, Institute of Technology or College will accommodate your support needs where possible. You can also develop study plans and supports that can support you to use your skills, talents and strengths to the fore in your studies
How do I disclose and reach out for support?
To get support, you can speak to your lecturer/tutor or get in touch with your University or College’s Disability Support Service. This might require having to go through a formal diagnosis process and documentation of your diagnosis in order to receive reasonable accommodations, but you don’t need to go through a diagnosis process if you have already done so as a child or teenager – you can produce a copy of your Psychologist Report or Supporting Letter. For more information about the process and what it entails, it might be useful to get in touch with the Disability Support Service. Whilst parents, family members or friends can provide added support, they cannot speak to HEI staff without your express permission. If you wish to have your parents support you when accessing supports, and if they’re willing to travel to your University or College to support you, you can invite your parents to any meetings you might have with lecturers, tutors or support staff, or you can give staff permission to contact your parents to talk about what supports you need.
Consider how being autistic might impact your studies at University
When deciding to disclose your autism diagnosis, you might consider how your disability, as well as the everyday accessibility and inclusion barriers you might encounter at College or University, might have an impact on your studies. It is important to remember that having a disability or difference like autism is not a bad or shameful thing, and that it can be a different way of perceiving and understanding the world around you. It is not your fault that you feel excluded at University or that you don’t have your support needs met. We need autistic and disabled people in all walks of life and in every aspect of society. It is the job of wider society, including higher education institutions, to address the wider stigma and barriers that are associated with having a disability, including neurodevelopmental differences like autism, and to do everything possible to include you at University, as you are, and without imposing the need to ‘mask’ or hide your autistic traits away from others. Whilst some people might prefer not to disclose their autism diagnosis if they feel that it doesn’t impact their ability as a student, it can be reassuring to know that your Higher Education Institute will always have supports if you do change your mind and decide to disclose, or even disclose right now with a view to accessing supports at a later date.
Understanding Fears
It is completely valid to have apprehensions around the prospect of disclosing your disability or difference to access supports, at all aspects of life, given the private and personal nature of this information. It is important to note that being autistic, like being disabled, is a core part of your identity as a person and it impacts the way that you experience the world. There are also external factors, like pressure to minimise your disability or difference to conform or fit into society, or you might be feeling unsure or anxious about the process which might have an impact on your decision.
The media often portrays disability and neurodivergent people, including autistic people, in a negative or paternalistic light. This can misinform perceptions society might have that portray disability as a bad thing, or that stereotypes disabled people, rather than their thoughts and actions, as “inspirational” for their disability alone. Other depictions can conflate ‘disability’ as having a ‘lack of capacity or ability’, and that depicts disability and some disabled people as having a particular set of support needs, only needing care, or having their parents or carers speak for them. Neurodiversity, autism and disability can present itself in many forms, and that portray autism as a wide spectrum of strengths and support needs that span beyond, and sometimes diverge from the traditional media perceptions surrounding autism, and disability. Therefore it is always important for Universities to start from a place where every autistic person is competent and is capable of achieving the success they want, with the right supports for their access needs in place.
Disclosing your experience of being autistic can also be a good way to counter these barriers and challenge stereotypes to neurotypical or allistic people who might not have the day-to-day lived experience of being autistic, or who have misformed presumptions about autism and the barriers you experience on a daily basis. It can also demonstrate to neurotypical or non-disabled people that with the right supports and adjustments in place, you can show your strengths, qualities and talents as a person and achieve success in the career you want.
Starting university or college is a fantastic achievement and making the transition to higher education is an exciting time for many people. Whilst as a neurodivergent student, you might find barriers to inclusion and changes to structures like new processes, new policies, different buildings or lecture theatres to find, new ways to travel there, new people, and new ways of learning as a student. If you feel that disclosing that you’re autistic might help to address any accessibility issues you might encounter, or even to feel more comfortable and confident in your academic life, you can do so, as there are many good reasons why disclosure might enhance your student experience. If you wish to discuss what supports you need to get the most out of your college experience, we would recommend speaking with the Disability Support Service, Accessibility Officer or your Student Union’s Welfare Officer to talk about what supports you need.
Check out Jenny Dunwoody’s video, where she discuses late diagnosis and letting people know that you are autistic and Laocin Brennanu video of ‘Why do you think it is important in your education journey to disclose your autism diagnosis’. | https://autismfriendlyhei.ie/article/disclosing-your-disability-difference-or-condition-at-college/ |
He passed for 281 yards and two touchdowns and ran for 67 yards and three scores in a 50-0 win over Salisbury.
Kristen Cocozza Southern Lehigh (soccer)
Southern Lehigh girls soccer player Kristen Cocozza was voted top female athlete from among the three nominees.
Cocozza scored a goal in the Spartans' 2-1 soccer win over Saucon Valley in the District 11 3A semifinals. She has surpassed 50 career goals this season.
ABOUT ATHLETE OF THE WEEK
Voting for the Coordinated Health Athlete of the Week runs from 5 p.m. on Mondays to 9 a.m. on Thursdays. Each week, The Morning Call sports staff each week will select six, three male and three female, top performing varsity student-athlete finalists, who will be eligible to be named Athlete of the Week based on a public vote.
Subject to additional criteria to be judged by Coordinated Health, including academic record and nonathletic extracurricular activity, both Athletes of the Week will be eligible for a $500 scholarship to be awarded by Coordinated Health. | |
On February 2, 2017, Delaware Governor John Carney signed into law Delaware Senate Bill 13 (“S.B. 13”), which represents Delaware’s effort to overhaul the state’s unclaimed property laws. Although S.B. 13 addresses many of the areas on which corporations and unclaimed property practitioners have been seeking guidance (see previous blog: DE Approves Legislation to Overhaul Their UP Laws) a few key issues in the current Delaware act have yet to be addressed.
Among these is how Delaware will ultimately address its current extrapolation practices. As included in S.B 13, the Delaware State Escheator must promulgate regulations regarding the method of estimation to create consistency in any examination or Voluntary Disclosure Agreement. These regulations are due to be finalized by July 1, 2017.
For holders currently under audit, these regulations will be a critical piece of information as they consider whether to either continue with the current audit process, elect to convert to an expedited audit or join the Secretary of State’s VDA program. As per the requirements of the bill, this election must be made within 60 days of the adoption of the estimation regulations. Accordingly, it is critical that holders perform the necessary modeling and analysis of their unclaimed property situation ahead of time so that they are armed with all the necessary information to make an informed decision.
Organizations need to be mindful of changing legislation and the impact it can have on their escheat compliance program. If you have any questions about the legislation or assessing your current position, we encourage you to contact us for expert guidance. | https://www.unclaimedpropertyspecialists.com/blog/delaware-governor-signs-legislation-to-overhaul-their-unclaimed-property-laws |
MoDOT, Metropolitan Planning Organizations (MPOs), Regional Planning Commissions (RPCs), public officials, special interest groups and citizens set and refine Missouri’s transportation vision in the Long-Range Transportation Plan (LRTP). The vision is Missouri’s ideal transportation system; however, Missouri cannot afford all the components of this ideal system. The LRTP also includes policies and goals and a fiscally constrained strategy for achieving the highest-priority components of the transportation vision within an agreed upon timeframe. This requires working with MPOs and RPCs to determine where Missouri’s transportation dollars should be spent.
The two levels of needs identification, regional and statewide, are further classified into two groups: physical system condition needs that target the state of road and bridge repair and functional needs that target how well the transportation system is operating.
Needs prioritization is based on the goals in Missouri’s LRTP. MoDOT districts and planning partners annually prioritize regional needs. Statewide needs will be prioritized when MoDOT’s LRTP is updated; however, emerging needs can be added to the needs priority list between updates. Both regional and statewide needs will be prioritized primarily on objective data.
The high priority needs list is fiscally constrained and is not a commitment to design or construct projects. Each time needs are prioritized, existing needs will be re-evaluated. Some high priority needs may never be designed or constructed due to prohibitive costs, changing priorities or other reasons. Needs from the high priority list will be selected for project scoping.
Project prioritization is based primarily on data and is a starting place for determining the best candidates for funding. There are separate project prioritization processes for each category in MoDOT’s funding distribution method.
High Priority – These projects are the first to be selected for commitment to right of way purchases and construction.
The high priority project list is fiscally constrained to five years of funding and is not a commitment for construction. Each time projects are prioritized, existing projects not yet programmed for construction will be re-evaluated. Some high priority projects may never be constructed due to prohibitive costs, changing priorities or other reasons. If MoDOT and its planning partners unanimously agree that a project no longer addresses a valid need, it will be removed from the priority project list, freeing resources for other projects.
MoDOT districts, local officials and planning partners review the project prioritization processes each year. Every completely scoped project will be prioritized and there is a steady flow of projects ready for prioritization each year. Only high priority projects are selected for the Statewide Transportation Improvement Program (STIP), thus committing them for construction.
Refer to MoDOT’s Practitioner’s Guide for further information on specific project prioritization processes. | http://epg.modot.org/index.php?title=121.2_The_Planning_Process&diff=26264&oldid=19957 |
Today we received our organic vegetable box as we do every Monday. Inside where some great vegetables and this little note:
What a great short note to say that this lettuce is not perfect but that there is also nothing wrong with it. This is what I call direct and easy to understand communication. I, as a customer, would like to see more of this kind of communication. But obviously this is not the norm we all know when we talk about Sustainability / CSR reports and related documents.
This kind of communication as illustrated above is therefore I believe even more important if you are communicating your Sustainability / CSR topics as a business.
Why? Because Sustainability / CSR topics are not as easy to communicate as a soft drink that has less sugar then the leading brand for example. A Sustainability / CSR message is a lot less exciting and relies more on facts and is generally considered ‘boring’ by most of its stakeholders.
My top five currently are:
To sum up:
Good and effective Sustainability / CSR communication needs to be direct, uncomplicated and friendly but at the same time focused on the cultural context of the individual target group.
Here is an example: A message of Sustainability / CSR excellence that is intended for the Scandinavian market has to be focus more on the cultural context of the Scandinavian public. This same communication would most likely not work with the audience in the Spanish market.
I will try to find the time in the coming weeks to write a separate post about this crucial aspect in Sustainability / CSR communications: The cultural difference and Sustainability / CSR communication. In the meantime I would love to hear your views on the points I raised in this post. | http://www.sustainabilityforum.com/top-five-sustainability-csr-communication-examples/ |
Critique by L.C. Russell Edited by: George C Koller
Toby Malek has stepped outside the norm and done a series of abstract expressionist watercolors. Abstract Expressionism is bold and aggressive. When you think of abstract expressionist works you generally think of bright slashes and dollops of color on canvas á la Jackson Pollock, Willem de Kooning or Franz Kline. Abstract expressionism breaks into two general groups – Action Painting , which stresses the physical action involved in painting (the motion of paint) and Color Field Painting which is primarily concerned with the affects of pure color on a canvas. By choosing to use watercolor on paper , Malek has actually combined both factions of abstract expressionism and given them his own unique slant.
Watercolor is transparent which allows for a freshness and luminosity in its washes. A painter using oils or acrylic paints, one opaque color over another until he has achieved his desired result. A watercolorist’s approach is the opposite. Essentially instead of building up, he leaves out. Watercolor is a very unpredictable medium full of unexpected challenges. Malek has taken full advantage of the capricious nature of the medium and used it to his advantage.
What I was struck by was the organic feel each painting has. There’s a vibrant fluidity about them. They appear to grow and flow from the paper like living entities. The first of the series is made up of mostly earthy greens and rich blues with accents of complimentary red-orange and yellow. It brings to mind a rainy day seen through a fogged window. The second painting is much darker. It’s made up of deep greens and earthen hues with a single startling swatch of aubergine . It has a very primal feel to it. The third painting is more vigorous . It’s almost playfully chaotic. The blank areas of the paper are almost as interesting as the painted surfaces. The fourth painting brings to mind sunlight seen through leaves. The rest of the series takes full advantage of the medium’s transparency. They’re softer, more fluid. They range in feel from melancholy to hopeful. Shades of blue and burnt sienna mingle with pale lemony yellow. Splashes of rose red accent greens and yellows. Each painting gets softer and uses the fluidity of the medium to bring out the texture and color of the paper more fully. The whiteness of the paper brings a luminosity to the soft flowing colors. The artist explores the motion of the paint without ever losing control of his brush. The final painting in the collection is the darkest. It almost feels as though the artist has taken you through the progression of a day. The first painting being dawn with its ruddy glow to dusk… not quite night-time. The last painting brings to mind evening, just as the street lights are coming on.
I’ve never particularly cared for abstract expressionism. I’ve always thought of it as more of a lazy cop out with good spin doctors than actual art. Toby’s managed to change my mind about it. His watercolors bring art to the artifice. | http://www.tobymalek.com/watercolor-paintings-abstract-expressionism/ |
The causes of stomach pain and chills include gastroenteritis, salmonella, and even the common cold. Treatment depends on the cause. Learn more about these, and the other causes of stomach pain.
Having abdominal pain after eating, also known as postprandial pain, can also be associated with nausea or diarrhea immediately after eating. Abdominal pain that gets worse after eating commonly occurs when there is infection or irritants to the organs of the digestive system.
Abdominal Pain and Symptoms Chart. Abdominal pain — a dull ache, a burning sensation, or a sharp, stabbing pain — is one of the most common complaints in all of medicine.
Gerd Wietholt 2. Okt. 2013. Oktober ist Gerd Garwer von. 14 bis 17 Uhr in. perten gerd garwer (M.) die Ausstellung in der sparkasse West-. markt Wietholt, 123 Walfort, 64, 1566, Gerd
Stomach pain, or abdominal pain can be irritating and may feel like cramping, however the condition is usually a sign of a common illness or infection.
Right side abdominal pain can describe any kind of sharp, dull, aching, or painful feeling in the area between the top of your pelvis to your lower chest.
Experiencing stomach pain, left or right abdominal pain or pain under the rib cage? You might have irritable bowel syndrome, acid reflux, ulcers and more. Learn how to get rid of stomach problems.
Bloated stomach abdominal pain is so common that some even classify it as an epidemic, since it affects 10% to 30% of people.
Nevertheless, any case of abdominal pain needs thorough history taking and clinical assessment. This is all the more important when patient complains of abdominal pain when coughing.
Stomach pain is something everyone experiences at one point or another. The good news is there are many natural remedies for abdominal pain.
Nobody can survive without food. Though food is essential for nutrition and energy, in some cases we experience severe bloating and stomach pain after eating.
Does your stomach hurt? Find out more about the possible causes of stomach pain and tummy trouble in general.
Gerd And Mesenteric Adenitis Gerd Wietholt 2. Okt. 2013. Oktober ist Gerd Garwer von. 14 bis 17 Uhr in. perten gerd garwer (M.) die Ausstellung in der sparkasse West-. markt Wietholt, 123 Walfort, 64,
Abdominal pain is felt in the abdomen. The abdomen is an anatomical area that is bounded by the lower margin of the ribs and diaphragm above, the pelvic bone.
Abdominal pain is usually felt in the part of the trunk below the ribs and above the pelvis and the groin. The most common pain is a stomach or bellyache.
Talk to the provider about the location of the pain and its time pattern. Let the provider know if there are other symptoms like fever, fatigue, general ill feeling, change in behavior, nausea, vomiting, or.
Ulcers in the stomach can cause abdominal pain or stomach ache after eating. Ulcers are erosions in the soft lining of stomach or intestines. Foods with high acid content aggravates the ulcers and cause pain in the abdomen after eating.
My son is 23 years old and has been dealing with severe abdominal pain and vomiting attacks for about four years. It starts when he gets up in the morning.
Hi, I too have upper right quad pain just below my ribs. I am a male, 46yrs old 6ft and weigh 175 lbs. My pain comes and goes and has for about 6 months.
Abdominal pain occurs in the area between the chest and the pelvis. It can relate to different organs, such as the stomach, gallbladder, or large intestine. Causes include gas and menstrual cramps. | https://649mset.org/abdominal-pain-acid-reflux-nausea-vomiting-stomach-ache/ |
An authoritative book published in collaboration with Christie's, featuring photographs of the Bergé Saint Laurent collection in situ, complete with estimated value information and final auction prices. In February 2009, 733 pieces from Pierre Bergé's and Yves Saint Laurent's art collection--one of the world's largest private collections--was auctioned off in a record-breaking sale of the century. Modern paintings, baroque bronzes, antique silverware, statues, cameos, and minerals comprise this diverse collection that furnished the pair's two luxurious residences in Paris, and included major works by Picasso, Brancusi, Matisse, Mondrian, in addition to furniture by the Art Deco masters Eileen Gray and Jean Dunand. Many works sold for prices far exceeding the highest estimates. The five-volume catalog published by Christie's for the event sold out before the end of the auction, leaving collectors and art connoisseurs the world over empty-handed. This new book features one hundred of the most important pieces from the collection with detailed commentary by Christie's experts. An introduction by Christie's vice president François de Ricqlès revisits the intense three-day auction at the Grand Palais. An appendix includes images of the works sold, accompanied by their estimated values and final auction prices. Publication coincides with the auction of the collection from their Château Gabriel property in November 2009. | https://journalartistaart.com/9782080301307/the-yves-saint-laurent-pierre-berge-collection-the-sale-of-the-century.html |
Nematodes Could Be the Reason Garden Is Unproductive is part 14 of The Alabama Vegetable Gardener series.
Some gardeners are surprised to find that their gardens are not producing as many vegetables as they had expected. There could be several reasons for a garden’s poor performance: low soil pH, poorly drained or compacted soils, inadequate sunlight, or insufficient nutrients. But if these factors are not the problem, nematodes could be the culprit responsible for poor performance. Many gardeners fail to recognize nematode damage because nematodes feed on the plant’s roots, restricting their growth and impairing their ability to take up needed minerals and moisture from the soil. Above ground, plants damaged by nematodes are often stunted, exhibit mineral deficiencies, and, in extreme cases, may wilt and die.
What Are Nematodes?
Nematodes are extremely small, wormlike animals that can only be seen with the aid of magnification. Actually, there are many species of nematodes. Some feed on decaying organic matter in the soil (visible with human eye); others parasitize animals including humans; a few species feed on plant roots (only visible with microscope). The latter group is called plant parasitic nematodes. They are armed with tiny, hollow spears by which they feed, sucking the plant’s juices. Of the many plant parasitic nematode species, rootknot nematode is the most common and widespread in the state and is so named because of the characteristic swellings it produces on the plant’s roots as a result of its feeding. Root-knot nematode attacks a variety of vegetables and even weeds. Because of its ability to feed on so many vegetables, few—with the possible exception of sweet corn—can be grown safely in areas where high populations of this nematode are found.
Other plant parasitic nematode species, which include stunt nematode, sting nematode, reniform nematode, and lesion nematode, do not cause typical root-knot swellings but nevertheless cause serious injury. To identify these nematodes, a nematode analysis of the soil may be necessary to determine if those kinds of nematodes are a problem.
The best time to sample for nematodes is from September to late October. Taking soil samples for a nematode analysis any other time of the year, especially in the winter, is not recommended.
Take soil samples within the row from around the root zone where nematodes are concentrated, place them in a plastic bag to prevent the soil from drying, and keep them in a cool place. Soil samples can be analyzed at the Plant Diagnostic Laboratory for a fee ($10). Private laboratories also analyze soil for nematodes.
If you find that you have a nematode problem in your garden, there are several options available for controlling them. Fallowing (keeping the infested area free of all vegetation, including weeds) for 2 years or more is an effective and inexpensive method if you have plenty of land. When selecting your vegetable seed or transplants, purchase a variety that has nematode resistance. Rotate your vegetables within your garden from year to year to reduce not only nematode injury but also diseases. Try not to plant the same vegetable or related vegetables on the same land more often than every third year.
No chemical controls for nematodes are available at this time for the home gardener. Soil solarization may be your only alternative in cases where nematode populations are extremely high. Soil solarization is a method that employs a transparent polyethylene cover to trap heat. This procedure has been shown, when used correctly, to be effective in reducing (not eliminating) plant-parasitic nematodes, as well as soilborne diseases and weeds. Transparent polyethylene tarps are placed over the infested soil for 4 to 6 weeks beginning in June. The sun then heats the soil to temperatures that kill many soil pests and brings favorable physical and chemical changes in the soil itself.
Read the complete Alabama Vegetable Gardener.
- Part 1—Planning for the Home Garden
- Part 2—A Well-Drained Soil
- Part 3—Acid Soils Create Gardening Problems
- Part 4—Excessive Phosphorus in Garden Soils
- Part 5—Wood Ash for Lime and Potash
- Part 6—Garden Fertilizer
- Part 7—Fertilizing the Organic Garden
- Part 8—Weed Control in the Home Garden
- Part 9—Growing Tomatoes
- Part 10—Bitter Cucumbers
- Part 11—Home-Grown Seed
- Part 12—Vegetable Information
- Part 13—Control Diseases for Top-Quality Tomatoes
- Part 14—Nematodes Could Be the Reason Garden is Unproductive
- Part 15-Vegetable Garden Insects
- Part 16-Garden Problem Guide
- Part 17-Harvesting Your Own Groceries
Download a complete copy of the Alabama Vegetable Gardener here. | https://www.aces.edu/blog/topics/vegetables-lawn-garden/nematodes-could-be-the-reason-garden-is-unproductive/ |
The present invention relates to a sterilization non-pump energy-saving penetration water purifier, a wastewater pipe and a water inlet pipe of a RO reverse osmosis membrane treatment unit are connected with an energy recovery device, after work exchange, water inlet pipe end in-flow water of the energy recovery device is connected with the water inlet pipe before a water pump, after work exchange, wastewater pipe end in-flow water is discharged, and the wastewater pipe is connected with the front end of the energy recovery device, and is provided with an adjusting valve for control, the adjusting valve is used for adjusting water pressure, and a water storage tank, water pipes and the like are made of sterilized materials. Beneficial effects of timely monitoring of a filter assembly, improvement of RO reverse osmosis membrane service life, and reduction of energy consumption and wastewater output volume can be achieved. | |
A. You can pay by bank transfer, in which case you will have to send us proof of the transfer within 48 hours, by e-mail to: [email protected], mentioning the pending reservation number.
Or, you can pay by credit card, using our PayPal Technology Web service. (5% extra fee will apply).
A. The remaining balance concerning to your stay should be paid in cash or by an alternative payment method, which may have been established by the owner of your selected property.
A. The remaining balance is usually paid in cash but some property owners may give you other options of payment.
We suggest you to check the property’s details section in order to find this information.
A. If you need an invoice, you should request it by e-mail to [email protected], 48 hours prior to your arrival, mentioning your reservation number.
A. Yes, there is a damage deposit that must be delivered upon your check-IN time.
We kindly ask you to check the the total amount on the property’s detail section.
The damage deposit is required in cash or through your credit card details.
The damage deposit will not be refundable in any of the following situations: | http://www.homes2stay.com/en/?/faqs/payment |
The Xiong’an Supercomputing center project, which is under construction, will serve as the "urban brain" of Xiong’an, which will create an urban computing system that integrates "edge computing, cloud computing, and supercomputing".
A few days ago, the Xiongan Urban Computing (Super Computing Cloud) Center project started construction in the Rongdong area of Xiongan New District. The project is expected to be completed by the end of 2021 and put into operation in 2022.
Xiong’an Urban Computing (Supercomputing Cloud) Center Project is abbreviated as “Xiong’an Supercomputing Center”. The project is located in Yuerong Park, an ecological green park area on the west side of Rongdong Area. It covers an area of 45 acres and has a total construction area of about 38,000 square meters. It is divided into three floors above ground and one underground floor. The above-ground building area is 13,505 square meters (the total building area of ultra-low energy consumption area is 10,580 square meters), and the underground building area is 24,031 square meters.
The construction content of the first phase of the project mainly includes three aspects: the data center, the Xiongan cloud platform, and the supporting facilities of the Xiongan supercomputer system:
河北雄安新区其中一处建设现场
IDC Phase I has approximately 539 equipment cabinets and supporting infrastructure, providing services such as server hosting, space rental, network bandwidth and other services for enterprises and individuals settled in Xiong’an New Area;
Xiong’an Cloud Platform, this phase will build a cloud resource pool with a scale of about 1,970 servers, establish a cloud computing infrastructure platform including computing, storage and networks. It will provide intelligent infrastructure for Xiong’an New Area and to build a global intelligent environment and carry the new district government application, core data and application services open to the public.
The computer room and electromechanical facilities of the supercomputing system will be built to support the construction scale of about 2Pflops (1PFLOPS equals 1 floating point instruction/second) peak computing capacity.
Since the central government decided to establish the Hebei Xiong'an New District, the construction of the new district has been in full swing. Many projects have been started one after another.
According to the Plan, the construction of Xiongan New District should highlight seven key tasks: First, build a green and smart new city and build a world-class green modern smart city. 2. Create a beautiful ecological city environment. 3. Develop high-tech industries, actively absorb and gather innovative elements and resources, and cultivate new kinetic energy 4. Provide high-quality public services, build high-quality public facilities, and create a new model for urban management. 5. Build a fast and efficient transportation network and create a green transportation system. 6. Promote the reform of the system and mechanism, help market and the government play their role in resource allocation to stimulate market vitality. 7. Open door wider to the international and create new platforms for expanding development and external cooperation.
Among the above seven important tasks, many of them are closely related to the data center industry, and some require the data center as the support of the Internet infrastructure. It can be said that in the future development and construction of Xiongan New Area, a data center is indispensable, so Xiong’an Supercomputing Center will definitely play an important role in the future development of Xiongan New Area.
According to the introduction of the Xiongan New District, the Xiongan Supercomputing Center project that under construction is the “urban brain” of Xiong’an. It will create an urban computing system that integrates “edge computing, cloud computing, and supercomputing”, and will serving the digital twin city’s Big Data, blockchain, Internet of Things, AI, VR/AR provide network, computing, and storage.
They will build a unified cloud resource management platform to realize the on-demand distribution of overall resources, flexible services and unified management to meet the business needs of government units, enterprises, and individuals in the new district for computing, storage, and network resources, and support smart cities and transportation, smart health care, precision poverty alleviation, population information database, enterprise information database, geographic information database, economic database, Internet of Things and other applications in order to promote the informatization process of the government and enterprises in Xiong’an New District.
Compiled by China IDCNOVA, it’s open and available for repost, reproduce, quote or retransmission if clearly stating the source with web link combined.
If you want to deep into any specific topics related to the industry to get more insights, please contact [email protected] or order our syndicated/custom report. Also, welcome to check our enterprise services to see how we can help you. | http://www.idcnova.com/html/1/59/153/809.html |
Mariah Carey (born March 27, 1969) is an American singer-songwriter, record producer, and actress. Known for her five-octave vocal range, melismatic singing style, and signature use of the whistle register, she is referred to as the “Songbird Supreme” and the “Queen of Christmas”. She rose to fame in 1990 with her eponymous debut album, released under the guidance of Columbia Records executive Tommy Mottola, who married her three years later. Carey is the first artist in history to have their first five singles reach number one on the Billboard Hot 100, from “Vision of Love” to “Emotions”.
She achieved worldwide success with follow-up albums Music Box (1993), Merry Christmas (1994), and Daydream (1995). These albums spawned some of Carey’s most successful singles, including “Hero”, “Without You”, “All I Want for Christmas Is You”, “Fantasy”, “Always Be My Baby”, as well as “One Sweet Day”, which topped the US Billboard Hot 100 decade-end chart (the 1990s). After separating from Mottola, Carey adopted a new image and incorporated more elements of hip hop into her music with the release of Butterfly (1997). Billboard named her the country’s most successful artist of the 1990s, while the World Music Awards honored her as the world’s best-selling music artist of the 1990s and the best-selling pop female artist of the millennium.
After eleven consecutive years charting a U.S. number-one single, Carey parted ways with Columbia in 2001 and signed a $100 million recording contract with Virgin Records in April of that year. However, following her highly publicized physical and emotional breakdown, as well as the critical and commercial failure of her film Glitter (2001) and its accompanying soundtrack, her contract was bought out for $28 million by Virgin and she signed with Island Records the following year. After a relatively unsuccessful period, she returned to the top of music charts with The Emancipation of Mimi (2005), the world’s second-best-selling album of 2005. Its second single, “We Belong Together”, topped the US Billboard Hot 100 decade-end chart (the 2000s). Her performance in the 2009 film Precious won her the Breakthrough Actress Performance Award at the Palm Springs International Film Festival. Carey’s subsequent ventures included serving as a judge on American Idol, starring in the docu-series Mariah’s World, and appearing in the films The Butler (2013), A Christmas Melody (2015), and The Lego Batman Movie (2017).
With sales of over 200 million records worldwide, she is one of the best-selling music artists of all time. Carey has amassed an extensive catalog, with nineteen of her songs topping the Billboard Hot 100, and holds the record for the most number-one singles by a solo artist, a female songwriter, and a female producer. According to the Recording Industry Association of America (RIAA), she is the highest certified female artist in the United States, with 68.5 million certified album units tying with Barbra Streisand. In 2012, she was ranked second on VH1’s list of the 100 Greatest Women in Music. In 2019, Billboard named her the all-time top female artist in the United States, based on both album and song chart performances. Aside from her commercial accomplishments, Carey has won five Grammy Awards, nineteen World Music Awards, ten American Music Awards, and fifteen Billboard Music Awards. An inductee of the Songwriters Hall of Fame, she is noted for inspiring other artists in pop and contemporary R&B music. | https://www.news-celebs.com/tag/mariah-carey/ |
Detention, deportation, and the ensuing separation can devastate families and traumatize children. Find resources in this section to help understand the impact of immigration enforcement on children and families in the child welfare system.
Children in Harm's Way: Criminal Justice, Immigration Enforcement, and Child Welfare
Phillips, Cervantes, Lincroft, Dettlaff, & Bruce (Eds.) (2013)
Sentencing Project & First Focus
Includes articles written by leading scholars, policy analysts, and practitioners about a subgroup of children whose parents are affected by the interplay of the criminal justice, child welfare, and immigration enforcement systems.
Detained or Deported: What About My Children?
Women’s Refugee Commission (2019)
Provides a toolkit for immigrant and undocumented parents on protecting their parental rights and navigating the child welfare and court systems. The resource also provides contact information for State child welfare agencies, Central America and Mexico child welfare agencies, and adoption reunion registries. The parental rights toolkit is available in English (PDF - 2,365 KB) and Spanish (PDF - 2,540 KB). A supplement document that addresses recent changes in relevant Federal and State policy is also available (PDF - 1,690 KB).
Disappearing Parents: A Report on Immigration Enforcement and the Child Welfare System (PDF - 686 KB)
Rabin (2011)
University of Arizona
Discusses the findings of a study that explored the impact of immigration enforcement practices on children who have been separated from their detained parents. This report includes recommendations for Federal reforms, including effective assistance of counsel in child welfare proceedings, a key liaison in Immigration and Customs Enforcement facilities, and detention reform.
Facing Our Future: Children in the Aftermath of Immigration Enforcement (PDF - 1,229 KB)
Chaudry, Capps, Pedroza, Castañeda, Santos, & Scott (2010)
The Urban Institute
Examines the consequences of parental arrest, detention, and deportation. This report provides recommendations for stakeholders to mitigate the harmful effects of immigration enforcement on children.
ICE ERO Detention Reporting and Information Line
U.S. Immigration and Customs Enforcement (ICE) (2018)
Provides contact information for agency stakeholders who may have questions or concerns for the Office of Enforcement and Removal Operations (ERO). The site also provides links to download fliers on ERO's toll-free reporting and information line, 1-888-351-4024, in English (PDF - 571 KB) and Spanish (PDF - 1,178 KB). Call center representatives are available Monday through Friday from 8:00 a.m. to 8:00 p.m. EST to handle questions and concerns regarding reports of human trafficking and other crimes, the separation of minor children from their families or other custodial issues, inquires from the general public and law enforcement officials, and more.
Immigrant Families and Public Child Welfare: Barriers to Services and Approaches for Change Earner
Child Welfare, 86(4), 2011
View Abstract
Describes the results of two focus groups of immigrant parents who recently experienced child protective investigations in New York City. The article provides recommendations for addressing identified barriers to culturally competent service.
The Impact of Immigration Enforcement on Child Welfare (PDF - 418 KB)
Cervantes & Lincroft (2010)
First Focus & Migration and Child Welfare National Network
Analyzes the impact of immigration enforcement on children and State child welfare agencies. This report recommends reforms for improving child and family well-being by keeping children with their families and out of the child welfare system whenever possible while enforcing immigration law.
Maintaining Parental Rights During Immigration Enforcement Actions and Detention: Summary Report (PDF - 213 KB)
Florence Immigrant and Refugee Rights Project, Women's Refugee Commission, & Applied Research Center (2010)
Discusses how to maintain parental rights during immigration enforcement proceedings. This report provides an overview of recommendations for next steps.
Overview of Policies and Standards: Detained Parents and the Child Welfare System (PDF - 88 KB)
U.S. Immigration and Customs Enforcement (2020)
Presents policy and standards to address the apprehension, monitoring, and removal of certain parents or legal guardians in the United States who are not U.S. citizens or nationals while safeguarding their parental rights.
Policies and Procedures Involving Detained Parents and Legal Guardians (PDF - 282 KB)
U.S. Immigration and Customs Enforcement (2018)
Offers a factsheet on the policies and procedures when detaining parents and legal guardians of children, including placement, facilitating placement in family or State court proceedings, parent-child visitation, coordinating the care or travel of the child, call center information, and more. The factsheet is also available in Spanish (PDF - 141 KB).
Policy Number 11064.2: Detention and Removal of Alien Parents or Legal Guardians (PDF - 1,577 KB)
U.S. Immigration and Customs Enforcement (2017)
Provides guidance on the detention and removal of alien or undocumented parents or legal guardians of children involved in family court or child welfare proceedings, including information on coordinating children's care or travel, visitation requirements, and more.
Protecting Your Parental Rights: A Resource for Immigrant Detainees With Child Custody Issues in Arizona (PDF - 2,929 KB)
Florence Immigrant and Refugee Rights Project (2010)
Provides information on different types of abuse, factors that may trigger child protective services (CPS) involvement, and what should be done if CPS removes children from their home.
Torn Apart by Immigration Enforcement: Parental Rights and Immigration Detention (PDF - 2,478 KB)
Butera (2010)
Women's Refugee Commission
Discusses challenges to parental rights and family preservation faced by undocumented parents at the time of their apprehension, detention, and deportation. | https://www.childwelfare.gov/topics/systemwide/diverse-populations/immigration/enforcement/ |
Sound is a stimulus that feeds the brain. The longer we continue to mishear, the more strain on the brain—and the greater our risk of fading away. So how do we prevent it?
Never let me fade
One of the saddest things in life is to see someone who has faded away. They are no longer who they once were because they have allowed their hearing to simply fade away, reducing their brain's 24/7 connection to the outside world, to other people, and to the opportunities of life.
As a result they have less mental and social stimulation, and less opportunities to be themselves: less times when they can bring their life's worth of experience, personality and potential to any given moment, or interaction, or situation.
Putting up a front
To begin with a fader may put on a front. They'll smile and nod in (what they guess is) the right place, and often give others the impression that everything is as it should be. But those who know them best will have noticed that, whilst they look like themselves, they're less engaged, less confident. They're slightly more distant, slightly less responsive, slightly less "tuned in". Some may even mistake it for dementia.
They may have begun to shrink away from situations they find more challenging, which only serves further reduces their connection to what's happening. It's a slippery slope; a vicious circle.
The Slippery Slope
As they continue to fade, they become less involved and increasingly reliant on others, who remain better connected than themselves. Sometimes they will go from being the leader within a relationship to being completely dependent, needing to be told what to do because they are less aware of what's going on themselves.
If they are lucky, they will reach a breaking point early enough to seek the professional advice of a hearing healthcare professional. If they are unlucky, they will be pigeonholed as someone society sees as irrelevant, and they will consequently begin to see themselves the same way.
We have seen it happen too many times, to too many people. People find themselves on the slippery slope and then don't know how to get off it.
Rewriting our destiny
Changes in hearing are inevitable — it's part of being human. But fading away is optional.
When we see hearing as our connection, we see that it's all about keeping that connection strong and constant—throughout life. It's about keeping our hearing prepared, empowered and protected. Because the best best way to avoid fading away is not to get onto the slippery slope in the first place. | https://audify.uk/mishearing/preventing-mishearing |
Homozygosity mapping and whole exome sequencing reveal a novel ERCC8 mutation in a Chinese consanguineous family with unique cerebellar ataxia.
A consanguineous Chinese family was affected by an apparently novel autosomal recessive disorder characterized by cerebellar ataxia, cutaneous photosensitivity, and mild intellectual disability. The family was evaluated by homozygosity mapping, haplotype analysis, whole exome sequencing, and candidate gene mutation screening to identify the disease-associated gene and mutation. Bioinformatics methods were used to predict the functional significance of the mutated gene product. ERCC8 mutations and phenotypes were examined. All three patients presented cerebellar ataxia, cutaneous photosensitivity, and mild intellectual disability. Whole genome and candidate region linkage analysis in the consanguineous family revealed a maximum logarithm of the odds score at 5q12.1. This homozygous region was confirmed by homozygosity mapping. The pathogenic missense mutation p.Gly257Arg affecting an evolutionary highly conserved amino acid was identified in ERCC8 at 5q12.1. Integrated application of whole exome sequencing and homozygosity mapping is an efficient approach for gene mapping and mutation identification in consanguineous families. We identified a novel ERCC8 mutation and new unique disease phenotype. These results also confirmed the genotype-phenotype relationship between mutations in ERCC8 and clinical findings.
| |
Under the Lychee Tree (2020-ongoing) is a photographic project that confronts the human condition through themes related to memory, grieving, and the cycle of reincarnation. By creating metaphorical visual images and connecting the symbols in the objects and historical landscape, I am looking for the subjective image of the place where I grew up, attempting to create an allegory to illustrate intimacy, the impermanence of life and implicit emotions.
The relationship with local myths, folklore and their imagined content is the source of information for the works, and this strategy functions as visual and textual parables. Mount Luofu, a sacred mountain not far from my home, was also a place fit for the gods in the writings of the ancient Chinese poet Liu Yuxi. Many years ago, people who lived here could see the sun at midnight; A traditional Chinese fable, The Butterfly Dream, posed philosophical arguments that human beings are hard to distinguish the exact boundary between reality and illusion. Everything can be transformed mutually; At the local funeral, people will remind each other not to harm any animals or insects because our dead relatives may come back as various creatures. These myths and folktales have inherited the spiritual sustenance from generation to generation, giving an understanding of life and death, and the courage to confront the loss.
The romanticized historical landscapes, still life, and portraits construct the intersection of reality and memory, in which a certain sense of separation from reality can be discerned. As a way to deal with trauma, crisis, and uncertainty, how can we reconstruct new narratives by connecting history and memory via visual creation, to have a conversation with the past human experiences? In times of crisis, emotional resonance with others brings comfort and psychological relief. We are still relying on the illusion brought by these visual stories - for avoiding inner desires and fears, to confront the prospect of loss and nothingness. | https://liangjiaxin.com/Under-the-Lychee-Tree-2020-ongoing |
In each sector, up to four trajectories were developed for the types of changes that might be seen. These are designed to cover a broad range of possibilities and to test the boundaries of what might be possible. They are intended to reflect the whole range of potential futures that might be experienced in that sector. They are illustrative and are not based on assumptions about future policy and its impacts, and should not be interpreted as such.
The trajectories developed have drawn on existing work as well as input from a large number of experts in businesses, NGOs, technical fields, and academics, through workshops and other discussions. Several hundred stakeholders have so far been involved in the analysis, and about 100 of those experts took part in detailed discussions about the trajectories. We are keen to refine this analysis in the light of new evidence. The section below describes how the trajectories were defined and developed.
The work aimed to achieve a level of consistency across the different sectors in terms of ‘level of change’, so that a ‘level 2’ effort in one sector would be broadly comparable to a ‘level 2’ effort elsewhere. Although by necessity this is something of a subjective judgement – particularly when comparing very different sectors, for example offshore wind power and thermal comfort levels in buildings.
The energy supply sectors
The energy supply trajectories examine different energy generation sectors. These trajectories have been presented as four levels of potential roll-out of energy supply infrastructure (levels 1–4), representing increasing levels of effort. The levels depend on the lead time and build rate of new energy infrastructure, and different assumptions about how quickly and on what scale the infrastructure can be rolled out. The higher levels also depend on improvements in technology, such as floating wind turbines and carbon capture and storage. The build rates will in practice depend not only on the physical possibilities, but also on investment decisions by the companies involved, as well as wider international developments and public acceptance.
- Level 1: assumes little or no attempt to decarbonise or change or only short run efforts; and that unproven low carbon technologies are not developed or deployed.
- Level 2: describes what might be achieved by applying a level of effort that is likely to be viewed as ambitious but reasonable by most or all experts. For some sectors this would be similar to the build rate expected with the successful implementation of the programmes or projects currently in progress.
- Level 3: describes what might be achieved by applying a very ambitious level of effort that is unlikely to happen without significant change from the current system; it assumes significant technological breakthroughs.
- Level 4: describes a level of change that could be achieved with effort at the extreme upper end of what is thought to be physically plausible by the most optimistic observer. This level pushes towards the physical or technical limits of what can be achieved.
It should be recognised that even at level 2, the consequences of pursuing this effort across several different sectors in parallel will place a high demand on supply chains and skills, especially given that other countries are likely to be undertaking concurrent infrastructure changes. In addition to the domestic supply sectors, the analysis also sets out some international dimensions, including four levels of potential bioenergy imports and four levels of electricity imports.
The energy demand and non-energy sectors
The demand sectors explore several different drivers of change. The primary drivers of change are summarised below. Where these factors can be considered as changing levels of effort or ambition, these are described in the analysis as levels 1–4 on a similar basis to the supply side sectors. Where the changes described reflect a choice rather than a scale (for example choices of fuel or technology), they are described as trajectories A, B, C, D; these choices cannot be compared between sectors.
The demand trajectories have been developed to be consistent with two key input assumptions: 0.5% per year growth in population, based on the central scenario of the Office of National Statistics; and 2.5% growth in the UK GDP to reflect HM Treasury’s assumption for long term growth. Different actual rates of population and GDP growth would have potentially significant impacts on the level of effort required to reach 80% emissions reductions.
In determining the trajectories, several factors are considered:
- Levels of behavioural and lifestyle change: reductions in energy demand and emissions through changes such as wasting less food; accepting lower average room temperatures in winter; and transport mode shifts, such as from private to public transport.
- Levels of technological improvement and change: the development and penetration of less carbon intensive technologies, such as LED lighting or ground source heat pumps; technological advance such as new industrial processes; and improvements in the efficiency of existing technologies. More ambitious trajectories may be dependent on the successful deployment of technologies still in development.
- Different technological or fuel choices: technological and fuel choices that are not directly related to ambition levels; examples include choices between district heating or ground source heat pumps, or between fuel cells and batteries for cars.
- Structural change: reflects possible changes in the structure of the economy, for example a decline or resurgence in manufacturing. | http://2050-calculator-tool-wiki.decc.gov.uk/pages/183 |
Our client based in Wyboston is looking for an Instructor Manager. The role will be home working however, you will be expected to visit the office once a week in Wyboston and will be required to travel to Netherlands and Germany on a regular basis.
The Instructor Manager duties include
- Responsible for the consistent delivery of agreed lesson plans and curriculum.
- Responsible for high quality instructor delivery within training locations across the global business.
- Working with Finance to ensure optimum utilisation of all full-time Instructors.
- Ensure necessary compliance to agreed standards (CIF, Ofsted) is maintained and demonstrated.
- Liaise with Apprenticeship Quality team and Delivery Resource Manager to ensure Instructors are in alignment with quality standards for Apprentice deliveries.
- In support of optimum utilisation, ensure all FT Instructors maintain a range of product knowledge.
- Works with Instructor Resource manager and RPO service to ensure a robust end to end recruitment process.
- Work with Delivery Manager to hold regular events for the instructor communities, both online and in-person events to engage Instructors and Delivery Partners.
- Liaise with Vendors and Partners on market trends and opportunities.
The ideal Instructor Manager
- A successful manager with previous experience of managing a broad range of Instructors in a commercial and professional learning environment.
- Has been a trainer or have proven experience managing large technical teams.
- Broad understanding of technology and technical relevant technical skills in the market
- Digital Apprenticeship experience
- Proven financial and commercial acumen.
- Strong influencer with good leadership abilities.
- The ideal candidate for this role will have a clear ability to think commercially and align their technical understanding with the commercial demands of the business.
- Willing to travel to European education centres as required.
- Knowledge and understanding of CIF (Common Inspection Framework) and experience of Ofsted inspection would be a distinct advantage.
- Flexible in attitude and working hours reflecting demands from a global business.
The Instructor Manager will work full time, 40 hours per week. Salary £60,000 .
Shepherd Stubbs is an Equal Opportunities Employer acting both as an Employment Agency and Employment Business. | https://jobmove.com/job/2313048/Instructor-Manager |
Olivia V.G. Clarke means business . The sixteen-year-old student, activist, and published author has recently released her anthology Black Girl White School: Thriving, Surviving, and No, You Can’t Touch My Hair , which includes 123 pages of poems, essays, and stories from Black girls and women aged 12 to 22.
They write about what it’s like to be a Black girl navigating spaces in which they are often the only Black girls doing so.
This is something Olivia can speak about from personal experience. As a student at Columbus School for Girls, she spent most of her youth engaging in political and racial politics . It’s often not an easy road to take, but Olivia has channeled her experiences into something that can help others.
The idea for her book struck her one day, so she ran it by her mom.
While she could have written a book just based on her own experiences, Olivia recognized the value and power in including a lot of voices in the project. She took to social media to find writers who might want to contribute their own stories.
“I wanted to do an anthology because so many Black girls who attend predominantly white institutions have important stories to tell. I haven’t experienced them all myself, so everyone has something different to bring to the conversation.”
She continues, “I wanted to raise and amplify the voices of Black women and girls that might be different from my own as well. Just so that no matter where you are, what part of your journey you’re in, you can relate to something in the book.”
The entire project took Olivia a year-and-a-half of hard work and focus. She was able to produce an anthology that is inclusive, and that celebrates and recognizes many forms of writing.
Olivia also created a journal to go along with her book. Happily, her book hit number one on Amazon in several categories.
The book isn’t the only way Olivia is contributing to the world. She’s a leader at her school, and serves on the institution’s Diversity Executive Board. She’s planned conferences, organized student-run faculty development activities and programs, and is President of her school’s Dance Club. In other words: she’s busy!
Those accomplishments don’t even round out Olivia’s entire resume . But she also explains on her site that she’s still a regular teen. “I like to hang out with my friends, dance, binge watch K-Dramas, eat potatoes, listen to all kinds of music. And ducks. I love ducks.”
Olivia also explains why she wanted to write the book on her blog.
“The purpose of this book, Black Girl, White School , is to offer support and guidance for Black girls in predominantly white institutions as well as offer insight to the teachers and administrations of a predominately white institution so that they may gain a better understanding of our experiences and enhance their role as allies in diversity and inclusion in schools.”
Olivia told her local news station that she started the project right before the health crisis picked up steam.
“I started this right before [the virus] hit. So, everything was really chaotic at the time. I wanted to help [other girls] in the way I wasn’t necessarily helped. One of the things difficult is when you’re a minority at a PWI [predominantly white institution] is there isn’t many of you, so you do feel alone.”
She also pointed out that it’s possible more people are ready for her message.
“It’s an important conversation to have and people may be more receptive to it right now. Also think what are the repercussions of systemic racism and discrimination in schools and how that affects Black and brown students.”
She adds that the goal is two-fold: Olivia hopes her book will uplift others and that it will also start conversations.
“I want to raise up Black voices especially Black female voices that aren’t necessarily heard, because we’re young. I want this to be a book that ignites conversations more than anything.”
In addition to coming up with a journal for Black girls and women to write their own experiences, Olivia also put together a second journal for allies.
Olivia’s book is definitely garnering raves on Amazon, and there’s no doubt that her future efforts will be just as successful, or even more so.
0
0
Comments
Sign in to post a message
You're the first to comment. | https://scoopernews.com/000/2020/10/12/16-year-old-author-olivia-v-g-clarke-publishes-anthology-about-black-girls-who-break-barriers/11907272 |
The International Conference on China-CEECs Forestry Research and Education Cooperation, hosted by China State Forestry Administration and CAF, was closed in success in the afternoon of 31 Oct., after two days of heated and effective discussions. Ms. Dai Guangcui, Deputy Director General of the Department of International Cooperation, SFA, and Prof. Miha Humar, Dean of Biotechnical Faculty of the University of Ljubljana, Slovenia, addressed the closing ceremony. Mr. Xiao Wenfa, Vice President of CAF, hosted the ceremony, and delivered a closing speech.
Central and eastern European countries boast forest resources and forest management knowledge. They have a long history in forest resources utilization and various forest cultures. Both China and CEECs attach importance to forestry development, and share common interests and goals in strengthening forest management, multi-function utilization, forest research and education, and industrial development and trade cooperation. With these common grounds, the 17 countries gathered to discuss and contribute to China-CEECs forest cooperation.
During the two days, experts and scholars were engaged in in-depth exchanges and discussions in silviculture, forest ecology, environment and protection, forest monitoring and assessment, forest bio-economy, and forestry education and training. Representatives from enterprises discussed on promoting industrial and trade collaboration. Through these heated exchanges and discussions, experience in forestry development was shared, research areas and difficulties faced understood, suggestions in cooperation proposed, and cooperation prospects showcased, which linked experts with research teams. All the information and channels shown from the Conference will serve as a basis and bridge for China and CEECs in forestry cooperation. They will contribute to increasing forest resources, improving quality and functions of forest ecosystems, eco-environment, and human welfare, the implementation of the Paris Agreement to address climate change, and achieving the SDGs.
In order to better advance China-CEECs forestry cooperation, Ms. Dai Guangcui proposed that all countries should make good use of the 16+1 cooperation mechanism for further coordination and collaboration. Coordinators and the coordinating mechanism should be given into full play to promote information exchanges, coordinating activities, and pragmatic cooperation. The two sides should work jointly to maintain and improve the website of China and CEEC Forestry, to enhance information sharing. They should actively look up the Chinese and English versions of the website, to timely update and make good use of the information. In addition, economic and trade cooperation should also be advanced on the basis of enhancing cooperation on forestry research and education. China and CEECs should take the Belt and Road Initiative as an opportunity, and the China-Europe Express Railway as transportation channels.
At the conference, hosts of the five themes reported their discussions and made a conclusion, laying a solid foundation for future collaboration.
The following consensus was reached:
First, there is potential to be tapped in silviculture, forest ecology, environment and protection, forest monitoring and assessment, forest bio-economy, and forestry education and training. This Conference could be used as a starting point to build the network for research exchanges, so as to jointly apply for and carry out international research programs, conduct personnel exchanges and information sharing, hosting academic activities, publishing academic papers, and building laboratories. This can concretely advance the pragmatic and efficient cooperation in forestry research among the 16+1 countries for win-win results.
Second, there is great potential in cooperation on forestry education and training between China and CEECs. 16+1 cooperation on forestry talents exchanges and capacity building can build on the cooperation on research. Through exchanges in experts, scholars and graduate students, hosting high-level cooperation, and academic seminars, talents exchanges could be advanced to lay a solid foundation for 16+1 cooperation on forestry research.
Third, based on results from this Conference, the 16+1 forestry research and education alliance should be explored, with forestry research and education institutes in the 17 countries as the main body. The alliance aims at cooperation for win-win progress, and works to promote sustainable forest management, ecological progress and green growth.
The above three consensus are also directions for future cooperation. | http://en.caf.ac.cn/info/1026/1372.htm |
The federal government has launched the process of listing the Mazama pocket gopher as threatened under the Endangered Species Act. It joins two other South Sound prairie species also on their way to being listed.
Evidence suggests that four of nine Mazama pocket gopher subspecies are threatened with extinction, according the U.S. Fish and Wildlife Service.
To address that threat, the listing would designate 9,234 acres of prairie habitat in Thurston and Pierce counties where the gophers live as critical habitat. That designation could limit use of the property, including property on Joint Base Lewis-McChord.
The process will take a year and will include opportunities for public comment.
Fish and Wildlife also ruled Monday that the Tacoma pocket gopher, another species reviewed for protection, is extinct.
The Tacoma pocket gopher, discovered in 1853, ranged from Point Defiance in Tacoma south to Steilacoom and east to Puyallup.
“It’s a tragedy that the Tacoma pocket gopher went extinct waiting for protection,” said Tierra Curry, a conservation biologist at the Center for Biological Diversity, which first petitioned the federal agency to list the pocket gopher under ESA in 2002. “Endangered Species Act protection will give the other subspecies a fighting chance, and will also protect their habitat — some of the few remaining prairie grasslands.”
The status of the prairie species have been a concern for a decade. In October, Fish and Wildlife proposed the Endangered Species Act listing for the Taylor’s Checkerspot butterfly, which was determined to be in danger of becoming extinct, and the streaked horned lark, which is threatened with extinction.
The three species live in South Sound prairie lands. Only about 10 percent of the original prairie remains undeveloped; less than 3 percent of that 10 percent is considered high-quality habitat.
Land-use restrictions caused by the pocket gopher and the streaked horned lark would be less severe because both are potentially being listed as “threatened” instead of “endangered.”
Because of that distinction, part of the listing proposal includes exemptions for small residential land owners and their property. Any use of the property that would not otherwise require a permit would not require a permit from the Endangered Species Act, under the proposed exemption.
But the possible listings not only pertain to Thurston and Pierce county property owners; they also could affect Lewis-McChord.
Much of the base training ground is on prairie lands. Ken Berg of the U.S. Fish and Wildlife Service said the staff at JBLM has been planning for the possible endangered species listing for a decade.
Not being able to train on the prairie could mean soldiers at the base would have to go elsewhere, Berg said.
“If they can’t train at Fort Lewis, they will have to go somewhere else, and that will probably be out of the state. … None of us want that,” Berg said. “They can’t do it alone; they need help from their neighbors, and their neighbors are Pierce and Thurston counties and the cities inside those counties because they have a shared responsibility for the prairies.”
Pocket gophers are burrowing animals that build tunnels used as habitat by other critters, including squirrels, toads, snakes and frogs. They grow to about 11 inches long and serve as prey for snakes, owls, weasels and hawks.
There is a 60-day public comment period on the proposed listing. Submit comments on the Federal Registry’s website at www.regulations.gov.
Copyright © 2012 Tacoma News, Inc,. A subsidiary of The McClatchy Company.
This article originally appeared here. | http://www.biologicaldiversity.org/news/center/articles/2012/news-tribune-12-12-2012.html |
A particular form of cinnabar (HgS) adopts the zinc blende structure. The length of the unit cell edge is \(5.852 \AA\).
(a) Calculate the density of HgS in this form.
(b) The mineral tiemannite (HgSe) also forms a solid phase with the zinc blende structure. The length of the unit cell edge in this mineral is \(6.085 \AA\). What accounts for the larger unit cell length in tiemmanite?
(c) Which of the two substances has the higher density? How do you account for the difference in densities?
Text Transcription:
5.852 \AA
6.085 \AA
Step 1 of 5) Water ionizes to a slight degree, forming. The extent of this autoionization is expressed by the ion-product constant for water:. This relationship holds for both pure water and aqueous solutions. The Kw expression indicates that the product of 3H+4 and 3OH-4 is a constant. Thus, it decreases. Acidic solutions are those that contain more H+1aq2 than OH-1aq2, whereas basic solutions contain more OH-1aq2 than H+1aq2. When 3H+4 = 3OH-4, the solution is neutral. The concentration of H+1aq2 can be expressed in terms of the pH of a neutral solution is 7.00, whereas the pH of an acidic solution is below 7.00, and the pH of a basic solution is above 7.00. This p notation is also used to represent the negative logarithm of other small quantities, as in pOH and pKw. The pH of a solution can be measured using a pH meter, or it can be estimated using acid–base indicators. | https://studysoup.com/tsg/1115248/chemistry-the-central-science-14-edition-chapter-12-problem-12-61 |
What are the Different Elementary School Teacher Jobs?
There are a wide variety of elementary school teacher jobs that cater to different abilities and levels of education. This range of jobs includes teachers, teacher’s aides, principals, and librarians, among other positions. They may require a master's, bachelor's, or associate's degree.
The teacher is one of the more obvious elementary school teacher jobs. Elementary teachers are usually responsible for teaching a classroom several academic and sometimes non-academic subjects, which may include reading, writing, mathematics, science, and social studies. Some teachers, however, may choose to specialize in one subject. Elementary school teachers typically have a bachelor’s degree or higher in education, as well as a teaching credential or license, though these requirements are sometimes waived at private institutions.
Teachers who specialize in physical education, art education, or music education have separate courses of study, but usually pursue a bachelor’s degree or higher in their specialty. Oftentimes, the physical education teacher jobs are combined with teaching health. This can include early hygiene, communication skills, and early sex education. In addition to writing lesson plans and doing clerical work, all people serving in these elementary school teacher jobs are charged with the duty of overseeing children’s academic and emotional development. This includes fostering healthy social relationships between students.
Teacher’s aides, sometimes called paraprofessionals, are another option for elementary school teacher jobs that require less education. Teacher’s aides help the teacher by doing paperwork, such as grading, helping students with learning activities, monitoring the playground and cafeteria during lunch and recess, and managing behavior in the classroom, amongst other duties. This job typically requires a minimum of a two-year degree or completion of a certificate program, depending on the applicable laws.
Education administrators, such as superintendents or principals, are usually more highly paid elementary school teacher jobs with a greater amount of responsibility and a higher education requirement. Elementary school principals often have a master’s or doctoral degree and a certain amount of experience in teaching and administration. They are responsible for meeting education standards, observing teachers, preparing a budget, interfacing with parents, disciplining students, and developing school policies.
Librarians typically have a degree or license in their field. They help students in the school library, filing reading materials and teaching children how to find books and conduct research. Other elementary school jobs include, but are not limited to, secretaries, nurses, and custodial officers. Secretaries are responsible for clerical work, including recording student attendance and making phone calls on behalf of the principal. The school nurse must have a license in nursing and is responsible for treating students’ ailments. A custodial officer, sometimes called a janitor, cleans the building and performs maintenance. | https://www.wisegeek.net/what-are-the-different-elementary-school-teacher-jobs.htm |
By Elizabeth Oettiker, LMSW, Care Manager
This June 15th is World Elder Abuse Awareness Day.
According to the Pew Research Center, 22% of the US population is age 60 and older. Are you aware that approximately 1 in 10 adults over the age of 60 is a victim of elder abuse? More alarmingly, only 1 in every 24 elder abuse cases is reported. Elder abuse leaves both physical and emotional scars.
As we age and begin to experience cognitive decline and increased isolation, our chances of becoming a victim of elder abuse climb in correlation. Most perpetrators of elder abuse are individuals that are previously known to the older adult. Victims are often fearful, anxious, and distrusting of others and refuse needed help as a result.
World Elder Abuse Awareness Day is meant as a call for help – to help those who have suffered and to end this individual and communal crisis.
Let’s first understand that elder abuse is divided into six subcategories:
- Self–Neglect: An older adult’s inability to adequately meet their health and safety needs results in a lack of proper medical care, nutrition, housing, or other basic needs.
- Physical Abuse: Pain or other injury is inflicted upon an older adult.
- Sexual Assault: Any inappropriate touching, intercourse, or other sexual activity inflicted upon an older adult without their explicit consent.
- Financial Exploitation: Misappropriation or misuse of an older adult’s money or property.
- Emotional Abuse: Inflicting mental pain or anguish on an older adult.
- Neglect: Failure to provide care in a way that meets the health and safety needs of an older adult.
Identifying the signs of elder abuse is critical to prevention. Signs of physical and sexual abuse or neglect can include bruises or other injuries, medication overdoses, pulling away from physical touch, changes in sleep patterns, and refusal to see visitors. Signs of emotional or psychological abuse include agitation or fear in the presence of a specific person (usually the abuser), apathy, withdrawal, and mood swings. And lastly, signs of financial abuse include a sudden inability to pay one’s monthly bills, large financial transactions outside of a person’s typical patterns, and simply suspicion that one’s finances are being misappropriated.
Elder abuse can be prevented. We must listen to older adults and caregivers to understand challenges and provide support when needed. Family and caregivers should learn to identify the signs of elder abuse. Lastly, one should familiarize themselves with how to report elder abuse and support the older adult in receiving assistance.
Excellent resources are available and are found at https://aging.maryland.gov/Pages/elder-abuse-prevention.aspx.
If you or someone you care about needs additional support to help cope, The Option Group is here to help. Please contact our professional care management team for assistance.
About The Option Group: Founded in 2010, The Option Group’s compassionate team of experienced Certified Life Care Managers serves families, their loved ones, medical professionals, and professional family advisors in Maryland, Pennsylvania, and Delaware. The firm understands the challenges of caring for an individual who needs assistance due to aging, dementia, disability, or serious illness. Their skilled providers possess over 100 years of combined experience navigating the healthcare maze and accessing hundreds of quality resources. The Option Group helps families spend quality time with their loved ones, providing clear choices that lead to better care. For more information, visit www.theoptiongroup.net or call 410-667-0266 (MD) or 717-287-9900 / 610-885-8899/ 215-896-6756 (PA) / or 302-858-6449 (DE). | https://theoptiongroup.net/learn-today-about-preventing-elder-abuse/ |
######
Figure showing examples of specification of harm outcomes in systematic reviews
######
Click here for additional data file.
######
Table showing examples of specification of harm outcomes in systematic reviews
######
Click here for additional data file.
######
Table showing examples of study classifications for harm outcomes
######
Click here for additional data file.
Introduction
============
> "When we looked at that data, it actually showed an increase in harm amongst those who got the active treatment, and we ditched it because we weren't expecting it and we were concerned that the presentation of these data would have an impact on people's understanding of the study findings."[@ref1]
Health technology assessment is a form of policy research that examines evidence of safety, efficacy, and cost effectiveness of a healthcare technology to provide guidance and recommendations to support decisions about treatment. Health technology assessment systematic reviews of clinical studies aim to include all relevant studies conducted on a particular topic and to provide an unbiased summary of their results, thus producing the best evidence on the benefits and harms of medical treatments. However, research has shown that the validity of systematic reviews can be affected by outcome reporting bias in the primary studies, which has been defined as selection (on the basis of the results) of a subset of the original variables recorded for inclusion in a study publication.[@ref2]
The prevalence and impact of outcome reporting bias has recently been investigated in a large unselected cohort of Cochrane systematic reviews (ORBIT (Outcome Reporting Bias In Trials) I study).[@ref3] This study, which focused on a single primary outcome for each review, found that over half the reviews (157/283, 55%) could not include data for the review primary outcome from all eligible studies. Additionally, interviews were conducted with trialists to understand the reasons for discrepancies between outcomes specified in the study protocol and those reported in the study publication.[@ref1] The main finding was that trialists had reported the outcomes in a biased way in over a quarter of the studies.
The ORBIT I study focused primarily on selective non-reporting bias for benefit outcomes. Empirical evidence suggests that the reporting of data on harms is likely to be less complete than that of efficacy measures.[@ref4] There are also many studies that have previously measured poor adverse event reporting in primary studies and systematic reviews, and all concluded that the reporting of harm outcomes is problematic.[@ref5] [@ref6] [@ref7] Interviews with trialists have revealed that in one instance important harm outcomes were subject to selective non-reporting because the trialists preferred to focus on the positive benefits of an intervention, while leaving "undesirable" data on harms unreported.[@ref1]
In the current study, ORBIT II, we estimated the prevalence of selective non-reporting of outcomes in studies within a cohort of published meta-analyses, where the outcome was harm. We developed a new classification system for the assessment of selective non-reporting of harm outcomes, and we demonstrate the application of this classification in two cohorts of systematic reviews to characterise the reasons for the non-reporting of harms data.
Methods
=======
Data source
-----------
We examined both an unselected cohort of new reviews from the Cochrane Library (Cochrane cohort) and a separate cohort of systematic reviews of adverse events (adverse event cohort). Each month the Cochrane Library indexes newly published reviews in each monthly issue as "new reviews." PS identified all new Cochrane reviews from six monthly issues (issue 9, 2012 to issue 2, 2013). For the adverse event cohort, we had access to a bibliographic list of potentially eligible systematic reviews of adverse effects that had previously been identified and evaluated in other publications.[@ref8] [@ref9] [@ref10] In brief, two separate researchers (YKL and other colleagues) checked all records that were published between 2007 and 2011 in the Cochrane Database of Systematic Reviews and the Database of Abstracts of Reviews of Effects. A review was included in the bibliographic list if the primary aim was to evaluate adverse effects associated with any healthcare intervention (as stated in the objectives of the review by the author). We excluded reviews in which adverse effects were a secondary outcome or the objective was to evaluate the "effectiveness and safety" of an intervention. The two cohorts of reviews were therefore clearly distinguishable; the Cochrane cohort typically consisted of reviews that aimed to assess the beneficial and unintended effects of an intervention within the same reviews. In contrast, the adverse event cohort consisted of reviews that were designed to focus on harms, and as such would have used search strategies tailored towards identifying studies reporting on specific harms. We included reviews that included exclusively randomised controlled trials and a combination of randomised controlled trials and non-randomised studies. We excluded reviews that considered only non-randomised studies, methodological and diagnostic test accuracy studies, and overviews of reviews.
Assessment of systematic reviews
--------------------------------
For each review in the cohorts, JJK or PS examined the section referring to types of outcome measures to determine whether the review specified no harm outcome, harm outcomes pooled together (for example, any adverse events or all adverse events), or a specific harm outcome (for example, gastrointestinal bleeding or heart failure). The lead reviewer was then contacted and asked to confirm our categorisation and to select the single most important harm outcome if multiple specific harms were listed. Where no contact could be established, a clinical professor in clinical pharmacology and co-convenor of the Cochrane Adverse Effects Methods Group (YKL) reviewed our categorisations and where necessary selected a single primary harm outcome from those listed. The supplementary figure and table provide examples of reviews where the review did not specifically evaluate harm outcomes, the single primary harm outcome was clear from the review, the single primary harm outcome had to be chosen by the reviewer or pharmacological expert, and only pooled harms were specified.
We then further scrutinised the reviews where a single primary harm outcome had been defined. Reviews that did not identify any studies (empty review) were not assessed further. Equally, reviews that specified no harm outcomes or reported only on pooled harm outcomes were excluded from further consideration because an assessment of outcome reporting bias in these situations would not be possible or feasible. Two investigators (PS and JJK) scrutinised each review to check whether all included studies fully reported the single primary harm outcome.
Reviews were also eligible for further assessment if any primary studies had been excluded from the review for the single reason of not reporting on any review outcomes of interest. This is because potential outcome reporting bias can occur when a study report does not mention or give results for particular outcomes; absence of data on adverse effects does not necessarily mean that such outcomes were not measured or analysed. We therefore checked the list of excluded studies within a systematic review and reasons for exclusion to see if a study had been inappropriately excluded because the study did not report on any of the relevant review outcomes. If the references to excluded studies of interest were not provided by the reviews (in the adverse event cohort), we contacted the lead authors for clarification. If these study reports were not available on request, then we excluded the review from further assessment because a complete assessment could not be performed.
We selected a sample of 50 eligible reviews from each cohort for further assessment. The 50 reviews were randomly sampled from the list of eligible reviews that contained no more than 20 studies. This restriction was applied because the ORBIT I study showed that review authors were less likely to respond if the burden of work was too great; this typically arose when a review included a large number of studies requiring assessment.
Classification of studies in the reviews
----------------------------------------
### Full reporting
We considered full reporting to have taken place if outcome data on the single primary harm outcome from the primary studies had been included by reviewers in the review meta-analysis (or tabulated in full if a meta-analysis was not appropriate). Such outcome data may have been included in the study report or indirectly calculated from the results. For binary outcome data, we considered full reporting to have occurred if the sample size was reported in each group together with either the number of participants with the event for each group or the odds ratio or relative risk with precise P value or a measure of precision or variability (confidence interval or standard error). For continuous outcome data, we judged that full reporting had taken place if the study described group sample sizes and magnitude of the treatment effect (for example, group means or medians or mean differences), and an exact P value or a measure of precision or variability (confidence interval, standard deviation, or standard error). When data on the single primary harm outcome were missing or incompletely described in the review, but detailed examination of the primary study showed that the single primary harm outcome had actually been fully reported, we classified this situation as full reporting. If data were available (but somehow omitted from the review), we provided feedback to review authors so that the data could be included in an update of the review.
### Not reported or partially reported
We developed a classification system to assess whether a study had been excluded from a meta-analysis or the descriptive analysis because the data for the harm outcome were either not reported or only partially reported. The system was designed to make a judgment about the reason for missing data on harm outcomes and was refined over the initial few months of the study. When any amendments were made, we reviewed all previous classifications and adjusted them accordingly to ensure consistency of application. The categories reflect the stages of assessing whether a specific harm outcome was measured or compared, and finally the nature of the results presented (table 1[](#tbl1){ref-type="table"}). We used the category letters (P-V) to distinguish them from the A-I classifications used for benefit outcomes in the ORBIT I study.[@ref3] The classification system was designed to be used with both randomised controlled trials and non-randomised studies. A supplementary table provides examples and guidance of when to use each of the ORBIT II classifications.
######
ORBIT II classification system
Classification Description Level of reporting Risk of bias\*
---------------------------------------------------------------------------------------------- ---------------------------------------------------------------------------------- -------------------- ----------------
**Explicit specific harm outcome**
Measured and compared across treatment groups:
P1 States outcome analysed but reported only that P\>0.05 Partial High risk
P2 States outcome analysed but reported only that P\<0.05 Partial High risk
P3 Insufficient reporting for meta-analysis or full tabulation Partial Low risk
Measured but not compared across treatment groups:
Q Clear that outcome was measured and clear outcome was not compared NA No risk
Measured, not clear whether compared or not across treatment groups†
R1 Clear that outcome was measured but no results reported None High risk
R2 Result reported globally across all groups None High risk
R3 Result reported from some groups only None High risk
**Specific harm outcome not explicitly mentioned**
Clinical judgment says likely measured and likely compared across treatment groups:
S1 Only pooled adverse events reported (could include specific harm outcome) None High risk
S2 No harms mentioned or reported None High risk
Clinical judgment says likely measured but no events:
T1 Specific harm not mentioned but all other specific harms fully reported None Low risk
T2 No description of specific harms None Low risk
**Specific harm outcome not explicitly mentioned, clinical judgment says unlikely measured**
U No harms mentioned or reported None Low risk
**Explicit the specific harm outcome was not measured**
V Report clearly specifies that data on specific harm of interest was not measured NA No risk
NA=not applicable (clear that outcome was not going to be compared).
\*Bias would occur if specific harm had been measured, but data were presented or suppressed in a way that would mask the harm profile of particular interventions.
†Clinical judgment says likely measured and likely compared across treatment groups.
In the context of harm outcomes, we awarded classifications for "high risk" outcome reporting bias when the specific harm had been measured but the data were presented or suppressed in a way that would mask the harm profile of particular interventions (including providing detail on the seriousness of the harms)---that is, P1, P2, R, and S classifications (table 1). The reasoning behind this particular definition of bias is that in all these situations we at least suspect that the harm outcome had been measured and thus the selective non-reporting or partial reporting could have been driven by a biased related reason (for example, higher frequency of harm in one treatment arm). Missing data as a result of a P1, P2, R, or S classification are also likely to have the biggest impact on the treatment effect in a meta-analysis of reviews.
Using all the identified publications for a study, one investigator (PS or JJK) classified any study that did not fully report the review single primary harm outcome of interest. This also involved evaluating excluded studies that had been selected for assessment. Review authors were also contacted to answer any queries and to provide their expert clinical judgments on the classifications for each study. For each classification, justification for the categorisation was recorded in prose to supplement the category code, including verbatim quotes from the study publication whenever possible. When the coauthors of the corresponding review were unable to assist with our assessments, an expert in adverse events (YKL) also completed the assessment. This approach ensured that each assessment had input from one clinical expert and one non-clinical methodological expert. Any complex cases were discussed with experts in trial design and management (DA, CG, or PRW) at study group meetings. Discrepancies were discussed until a final overall classification was agreed for each study and the justification for the classification documented in full. To check for consistency, at the end of the study JJK reviewed all agreed classifications, with the justification. This additional quality assurance step ensured that the same classification was awarded to studies that had missing or partially reported data on harms for the same reason. Supplementary figure A provides a summary of the study methods.
Results
=======
Description of review cohorts
-----------------------------
### Cochrane cohort
The Cochrane Library published 243 new reviews in issue 9, 2012 to issue 2, 2013 (fig 1[](#fig1){ref-type="fig"}). Specific harm outcomes were listed in 92 reviews, of which 16 identified a single primary harm outcome in the review text. For the remaining 76 reviews, lead reviewers, coauthors, or YKL selected a single primary harm outcome from those specific harms listed (which happened to be the first listed harm outcome in 55 (72%) of the reviews). In the 92 reviews that aimed to assess specific harms, the median number of studies per review was 7 (range 0-75, interquartile range 3-12). A total of 13 reviews did not require further assessment: eight did not identify any studies (empty review) and five fully reported the single review primary harm outcome for all eligible studies. Further assessment was required in the remaining 79/92 reviews (86%) as they did not include full data on the single review primary harm outcome from all eligible studies.
{#fig1}
### Adverse event cohort
A total of 234 reviews published between 2007 and 2011 were identified in the adverse event cohort (fig 2[](#fig2){ref-type="fig"}). Specific harms were listed in all but four reviews, where only pooled harms were stated. A single primary harm outcome was clearly defined in the review text for 190 of the 230 reviews where specific harms were stated. The single primary harm outcome for the remaining 40 reviews was selected by lead reviewers, coauthors, or YKL (this was the first listed harm outcome in 36 (90%) reviews). In the 230 reviews specifying specific harms, the median number of studies per review was 18 (range 1-209, interquartile range 16-29). A total of 57 reviews did not require further assessment as they fully reported the single review primary harm outcome for all eligible studies. Further assessment was required in the remaining 173/230 reviews (76%) as they did not include full data on the single review primary harm outcome from all eligible studies. However, a complete assessment could only be done in about half of these reviews (n=86) because citations of studies that were excluded owing to "no relevant outcome data" were not provided in the reference list of the review and were not obtainable from the review authors.
{#fig2}
Description of studies with missing single primary harm outcome in review
-------------------------------------------------------------------------
We assessed the 92 reviews in the Cochrane cohort and found that the review single primary harm outcome was partially reported or not reported for 705 (76%) of the 931 studies included (fig 3[](#fig3){ref-type="fig"}). For the adverse event cohort, there were a total of 8837 studies across all 230 reviews where a single primary harm outcome was specified, 7720 of which were implicated in the 173 reviews where further outcome reporting bias assessment was required (fig 4[](#fig4){ref-type="fig"}). Nearly half (47%, 4159/8837) of the studies did not report or had partially reported the single primary harm outcome; only 796 of these were included in the 86 reviews for which a complete assessment could be carried out. References were unavailable for 2337 studies that were excluded owing to "no relevant data," of which the design of the study was unknown in 1637 (fig 4).
{#fig3}
{#fig4}
Classification of studies
-------------------------
Across the sample of 50 reviews from each cohort, data on the single primary harm outcome were missing in 41% (486/1178) of the studies (407 included studies, 79 excluded studies; 375 randomised controlled trials, 111 non-randomised studies, fig 5[](#fig5){ref-type="fig"}).
{#fig5}
Table 2[](#tbl2){ref-type="table"} shows the classification of the 486 studies where the single primary harm outcome data were either missing or partially reported in the review (170 studies from the Cochrane cohort and 316 from the adverse effect cohort). Nearly a fifth of assessed studies (19%; 93/486) provided full data on the single primary harm outcome of interest that was not included in the review (table 2). Forty eight studies reported actual event rates for each treatment arm or a suitable effect estimate with a corresponding measure of precision, 23 specified that there were no harms observed in the study, 21 specified there were no actual events in the study concerning the single primary harm outcome, and one reported the data in full in a way that was not suitable for inclusion in the review analysis.
######
Studies assessed for outcome reporting bias
Classification Cochrane cohorts Adverse event cohorts Total No of studies (%¶)
-------------------- ------------------ ---------- ----------------------- -------------------------- ----------- ------------
P1 6 (4.8) 0 (0.0) 7 (4.1) 5 (5.6) 18 (4.6)
P2 0 (0.0) 0 (0.0) 0 (0.0) 4 (4.4) 4 (1.0)
P3 0 (0.0) 0 (0.0) 0 (0.0) 1 (1.1) 1 (0.3)
Q 0 (0.0) 0 (0.0) 0 (0.0) 0 (0.0) 0 (0)
R1 5 (4.0) 0 (0.0) 21 (12.2) 16 (17.8) 42 (10.7)
R2 7 (5.6) 0 (0.0) 25 (14.5) 13 (14.4) 45 (11.5)
R3 7 (5.6) 0 (0.0) 5 (2.9) 4 (4.4) 16 (4.1)
S1 2 (1.6) 0 (0.0) 12 (7.0) 4 (4.4) 18 (4.6)
S2 31 (24.8) 0 (0.0) 50 (29.1) 24 (26.7) 105 (26.7)
T1 5 (4.0) 3 (50.0) 3 (1.7) 2 (2.2) 13 (3.3)
T2 35 (28.0) 0 (0.0) 36 (20.9) 1 (1.1) 72 (18.3)
U 27 (21.6) 3 (50.0) 12 (7.0) 13 (14.4) 55 (14.0)
V 0 (0) 0 (0.0) 1 (0.6) 3 (3.3 4 (1.0)
Total 125 6 172 90 393
Full reporting\*\* 38 1 40 14 93
Overall total 163 7 212 104 486
\*Calculated as percentage of total number of randomised controlled trials in Cochrane cohort (excluding full reporting) (n=125).
†Calculated as percentage of total number of non-randomised studies in Cochrane cohort (excluding full reporting) (n=6).
‡Calculated as percentage of total number of randomised controlled trials in adverse events cohort (excluding full reporting) (n=172).
§Calculated as percentage of total number of non-randomised studies in adverse events cohort (excluding full reporting) (n=90).
¶Calculated as percentage of total number of classifications (excluding full reporting) (n=393).
\*\*Review primary harm outcome data reported in full in study report but not in review.
In nearly a third of studies assessed (32%, 126/393) where a missing data classification was needed, it was clear that the single review primary harm outcome was measured (P, Q, or R classifications) but either not reported or partially reported. In over half of the studies (53%, 208/393), it was likely that the single review primary harm outcome was measured (S or T classification) but not mentioned specifically. Outcome reporting bias was suspected in 63% (248/393) of studies (P1, P2, R, and S classifications).
Discussion
==========
The principle findings of the study showed a high number of reviews suspected of outcome reporting bias as a result of missing or partially reported harm related outcomes. In this study, an assessment of selective non-reporting of outcomes in a review was required if one or more studies eligible for inclusion in the review did not report data on the single review primary harm outcome. An assessment was needed in 86% of reviews in the Cochrane cohort and 76% of reviews in the adverse event cohort. The proportion of reviews requiring assessment for harm related outcomes was substantially higher than that found in the previous Outcome Reporting Bias In Trials (ORBIT) I study in which 55% (157/283) of Cochrane reviews did not include full data for the single review primary benefit outcome of interest from all eligible trials.[@ref3] In the ORBIT I study, 31% of trials did not report on the primary benefit outcome; this compares with 76% of the studies not reporting on the single primary harm outcome from the Cochrane cohort and 47% from the adverse event cohort. In ORBIT I, 50% of trials (359/712) were under high suspicion of outcome reporting bias, compared with 63% (248/393) in this study (P1, P2, R, and S classifications). Readers of systematic reviews should be aware that outcome reporting bias could potentially have an important impact on the effect size estimates of adverse events.
Strengths and limitations of this study
---------------------------------------
The strengths of this study are that we evaluated two large cohorts of reviews. Most reviews in the Cochrane cohort quantified both the beneficial and the harmful effects of healthcare interventions within the same review. The adverse event cohort of reviews aimed specifically to synthesise studies reporting on specific harms, which may have been longer term harms. No reviews overlapped in the two cohorts (they stemmed from non-overlapping time periods), and none of the studies assessed for outcome reporting bias were included in multiple reviews. Since non-randomised studies are often needed to address questions about serious, rare, and long term harmful or unintended effects, our classification system was developed to encompass missing harms outcome data for both randomised controlled trials and non-randomised studies. Review authors or an expert in clinical pharmacology were involved in the assessments, and a senior investigator checked a textual justification for each classification. All assessments were therefore carried out by a clinical expert and a non-clinical methodologist. Importantly, more than two thirds of the reviews assessed in the Cochrane cohort had input on classification from the lead reviews. There was relatively less reviewer input for the adverse event cohort, which is not unexpected given that this cohort of reviews was slightly older.
In this study, we made a judgment as to whether the review single primary harm outcome was measured or not based on all the study references listed in the review. One way to improve this judgment would be to obtain study protocols of eligible studies to compare prespecified outcomes with those reported in the final study reports. The comparison between what was planned and assumed to be measured (in terms of outcome specification) and what was actually reported (or not reported) has the potential to simplify the classification of missing outcome data.
We suspect that there are three aspects of this study that may lead us to underestimate the extent of outcome reporting bias. To adopt a similar approach to ORBIT I, we chose to look at one primary review harm outcome for assessment from each review. When choosing a single primary harm outcome, it is possible that these were selected by the reviewers or pharmacological expert because it was the particular harm that was well recognised, important, serious, or common. This means that the harm outcomes evaluated in our study would have been less prone to outcome reporting bias. Hence our findings may actually turn out to be an underestimate of the greater scale of the problem. In practice, individual reviewers should complete the assessment for all specified outcomes; this was not feasible in our study because of the large cohort of reviews. Secondly, the absence of references to excluded studies meant that nearly half of the reviews in the adverse event cohort were excluded because it was not possible for us to complete a full assessment of outcome reporting bias. Although these exclusions were unavoidable, we acknowledge that there may be greater suspicion of outcome reporting bias in such reviews owing to these excluded studies not reporting on any relevant outcome data when compared with those reviews we were able to assess within the same adverse events cohort. Finally, owing to the high prevalence of reviews affected by missing single primary harm outcome data, we were only able to fully assess a sample of 50 reviews from each cohort of reviews. We do not suspect that our sampling strategy will have impacted importantly on the results of this study as the reviews were unselected in terms of the type of harm, intervention, or population. However, if there were more studies in any particular specialty, there might be a greater expectation that specific harms would have been measured, so the suspicion of outcome reporting bias would be higher in the reviews we did not look at..
Implications for reporting harms in studies of healthcare interventions
-----------------------------------------------------------------------
Many of the classifications for the partial or non-reporting of harms data found in this study relate to poor reporting practice. Better reporting of harms would provide timely and important information to guide clinicians and the public in making decisions about treatment not only at the individual study level but also through allowing harms to be properly investigated in systematic reviews and meta-analysis, which can have greater statistical power from pooled data. We appreciate that many individual studies will be underpowered to detect significant differences between groups for harm outcomes. Nevertheless, it is important that these individual studies fully report on all harms data, including "zero events" and harms that are rare.
To help monitor the complete reporting of harms (for randomised controlled trials at least), researchers or independent boards (sponsors, research ethics committees, or regulatory authorities) must develop and implement plans to monitor and report data for the safety of participants. The monitoring plan should evaluate and report the incidence and severity of expected harms to confirm that they match with those expected at the initiation of the research. The incidence and causality of any unanticipated or unexpected harms should also be closely monitored and reported. Adherence to the CONSORT (consolidating standards of reporting trials) extension for harms [@ref11] or STROBE (strengthening the reporting of observational studies in epidemiology)[@ref12] for non-randomised studies could also greatly reduce the problem of poor reporting of harms. Nevertheless, a recent review evaluating studies that have examined the influence of the CONSORT for harms criteria has shown that adverse events are poorly defined, with six of the seven included studies demonstrating less than 50% adherence to the items on the checklist.[@ref13] Journals should be more explicit in their recommendations and expectations regarding the endorsement of the CONSORT or STROBE statement and related extensions (for example, CONSORT extension for harms). Few journals recommend or require specific endorsement of the CONSORT for harms statement in their instructions for authors' section.[@ref14]
Implications for systematic reviews
-----------------------------------
The reliability of systematic reviews can be improved if more attention is paid to specifying harm outcomes in a review. The Cochrane handbook specifically states "There should in general be no more than three primary outcomes and they should include at least one desirable and at least one undesirable outcome (to assess beneficial and adverse effects, respectively)."[@ref15] Despite such guidance nearly a fifth (17%) of newly published reviews in the Cochrane cohort did not specify any harm outcomes, and 44% specified only pooled harms. This is only a marginal improvement on the 24% (18/78) of Cochrane reviews published in issue 1, 2005 that did not report on adverse events.[@ref6] In addition, a recent study of 296 reviews identified from the Database of Abstracts of Reviews of Effects revealed that nearly a third of these reviews did not clearly define the adverse events reviewed.[@ref16] It was not feasible to assess outcome reporting bias in reviews that dealt with only pooled harms because there would be no way to assess whether specific harms may have been excluded from the eligible studies when calculating "all harms." Moreover, we discovered that nearly a fifth of studies that underwent an assessment for outcome reporting bias had actually provided full data (which had somehow been omitted from the review) on the single primary harm outcome. We strongly recommend that authors of systematic reviews pay more attention to declaring the important harms for inclusion in the review at the protocol stage. Extra care is required during data extraction to ensure that reported outcomes data from included studies is not missed; we also believe that for complete transparency, data on zero events or no harms should also be reported in reviews. In this study, any missing data on harms from reviews that were found in study reports were fed back to all review authors.
Studies should not be excluded from reviews because of having" no relevant outcome data," as the outcome data may be missing as a direct result of selective outcome reporting.[@ref3] Nearly half the reviews requiring assessment in the adverse event cohort could not be assessed because studies were excluded for this reason and no record was kept of the references to these excluded studies.
The classification system used in this study has been presented and applied during a workshop that we developed and delivered at international Cochrane colloquiums. The feedback from this workshop supported the practical application of our classification system, and many participants were able to relate their own experiences to the types of scenarios that are captured in the classification. Following the application of the classification system, the Cochrane risk of bias tool is currently being updated to include the assessment of bias in both randomised controlled trials and non-randomised studies. The proposed new structure of the risk of bias tool considers selective outcome reporting as being analogous to publication bias (non-reporting of whole studies). It is planned that this form of bias will be appraised outside the risk of bias tool (for example, as part of the GRADE assessment in the summary of findings tables).[@ref17] Our classification system does not confirm bias but will help reviewers gain a better understanding of the reasons for the lack of detail on harm reporting and which mechanisms may be at high risk of bias. The implementation, writing of guidelines, and Cochrane handbook chapters will include guidance from both ORBIT I and ORBIT II; this should raise the awareness of this problem for both benefit and harm outcomes among the community of systematic review authors. This in turn should improve the ability of decision makers to make informed choices that consider both the benefits and the harms of an intervention in an unbiased way, ultimately improving patient safety.
Future research
---------------
The poor reporting of harms data in studies and systematic reviews has implications for clinicians and patients because there are difficulties in judging the benefit-risk trade-off when much of the harms data is inadequately reported or not reported at all. However, the mechanism for bias in harms reporting remains unclear, although we are aware of a few potential scenarios. This includes the conscious desire to avoid publishing data that are unfavourable to a particular intervention. The opposite is true if study authors make their own personal judgment that particular adverse events are not serious or unimportant and not significant, and therefore do not merit being reported.
Owing to problems with recall bias in the earlier interview study[@ref1] and because little emphasis was placed on harm outcomes, we plan in future to interview trialists about differences between outcomes specified in trial protocols and the trial report during the peer review process to better understand mechanisms for outcome reporting bias across both benefit and harm outcomes. In partnership with *The BMJ*, we are conducting a pilot study to determine the feasibility of carrying out such interviews. We also plan to write a separate tutorial paper for assessing outcome reporting bias in all benefit and harm outcomes for a single review using the methods from ORBIT I and ORBIT II.
Conclusions
-----------
Our investigation found that many reviews were affected by missing data on harms from at least one eligible study. We suspected high risk of outcome reporting bias as the cause of the missing data in over half the studies assessed. There is a clear need to raise the awareness of both the existence and the potential impact of bias when study authors measure harm outcomes and then to choose to either selectively not report the findings or present the results in a way that cannot be reliably used in a systematic review.
### What is already known on this topic
1. Empirical evidence suggests that the reporting of data on harms is likely to be less complete than that of benefit outcomes
2. Outcome reporting bias has previously been identified as a threat to evidence based medicine
3. Although previous research involving benefit outcomes has suggested that outcome reporting bias was suspected in at least one trial in over a third of reviews, little is known about the prevalence of outcome reporting bias in harm outcomes
### What this study adds
1. Outcome reporting bias for harms was evident in nearly two thirds of all primary studies included in systematic reviews
2. The reliability of systematic reviews can be improved if more attention is paid to specifying harm outcomes in a review
3. Studies should not be excluded from reviews because of having" no relevant outcome data," as the outcome data may be missing as a direct result of selective outcome reporting
We thank the reviewers whose collaboration made this research possible. Their input includes defining the review primary harm outcome of interest, forwarding study reports from their reviews, and establishing the outcome reporting bias classification for particular studies within their reviews.
Contributors: DGA, CG, JJK, and PRW obtained the study funding and designed the study. JJK, YL, and PS acquired the data. All authors analysed and interpreted the data. JJK and PS prepared the initial manuscript and performed the statistical analysis. DGA, CG, JJK, YL, and PRW supervised the study and critically revised the manuscript. All authors commented on the final manuscript before submission. PS was responsible for administration, technical, and material support. JJK is the guarantor.
Funding: The Outcome Reporting Bias In Trials (ORBIT II) project was funded by the Medical Research Council (grant No MR/J004855/1). DGA is supported by a Cancer Research UL programme grant (C5529). The funders had no role in the study design, data collection and analysis, decision to publish, or preparation of this manuscript.
Competing interests: All authors have completed the ICMJE uniform disclosure form at [www.icmje.org/coi_disclosure.pdf](http://www.icmje.org/coi_disclosure.pdf) (available on request from the corresponding author) and declare: no support from any organisation for the submitted work; no financial relationships with any organisation that might have an interest in the submitted work in the previous three years; YL is co-convenor of the Cochrane Adverse Effects Methods Group; however, the authors have no other relationships or activities that could appear to have influenced the submitted work.
Ethical approval: Not required.
Data sharing: The data from this study are available from the corresponding author (<[email protected]>). For each of the two cohorts of reviews, details on the eligibility of reviews for further assessment are available; this includes the selection of the single primary harm outcome and summaries of the number of studies reporting or not reporting on the single review primary harm outcome from each review. For the sample of reviews where a full outcome reporting bias assessment was undertaken, final study outcome reporting bias classifications and justifications for classifications are all available.
Transparency: The manuscript's guarantor (JJK) affirms that the manuscript is an honest, accurate, and transparent account of the study being reported; that no important aspects of the study have been omitted; and that any discrepancies from the study as planned (and, if relevant, registered) have been explained.
Cite this as: *BMJ* 2014;349:g6501
| |
Julia Louis-Dreyfus. Julia Louis-Dreyfus (born January 31, 1961) is an American actress, comedienne and producer who was a cast member of Saturday Night Live from 1982 to 1985.
Julia Louis–Dreyfus. Julia Louis–Dreyfus (born January 31, 1961) is an American actress, comedienne and producer who was a cast member of Saturday Night Live from 1982 to 1985.
Secondly, are Jerry Seinfeld and Julia Louis Dreyfus friends? Jerry Seinfeld always had the best on-screen chemistry with close friend Julia Louis–Dreyfus. Seinfeld credits the success of the show to Louis–Dreyfus, and said he knew just 30 seconds into her audition that she was perfect for the role of Elaine Benes, his ex-girlfriend turned good friend in the series.
Similarly, you may ask, how much did Julia Louis Dreyfus inherit from her father?
Actress Julia Louis–Dreyfus isn’t just a television star. She’s also the daughter of a billionaire businessman, Gerard Louis–Dreyfus, who passed away in 2016. Although it was not reported how much Louis–Dreyfus may have inherited from her father’s estate, Forbes estimated his fortune to be around $3.4 billion in 2006.
Who played Elaine on Seinfeld?
Julia Louis-Dreyfus Seinfeld
How much is Will Ferrell worth?
Ferrell has starred in multiple successful movies that have become huge in the box offices. There’s no doubt that his net worth will continue to increase in his future as a comedian and actor. Will Ferrell’s net worth is estimated to be roughly $100 million dollars.
How much is Julia Dreyfus worth?
Julia Louis-Dreyfus has a net worth of $200 million.
Why was Sarah Silverman fired from SNL?
She has stated that she was not ready for SNL when she got the job. She said that when she was fired it hurt her confidence for a year, but after that nothing could hurt her and that she attributes her time to SNL as being a key reason why she has been so tough in her career.
What size is Julia Louis Dreyfus?
1.6 m
Is Julia Louis Dreyfus related to Margarita?
Margarita is the second cousin once removed (by marriage) of American actress Julia Louis-Dreyfus.
How much is Jason Alexander worth?
Jason Alexander’s net worth is $50 million Alexander is worth an estimated $50 million in 2018, according to Celebrity Net Worth. At the end of Seinfeld’s nine-season run in 1998 he was making around $600,000 per episode, CNBC reported. That worked out to roughly $11,000 per line.
Who Is Julia Dreyfus husband?
Brad Hall m. 1987
What is Oprah worth?
Oprah Winfrey, worth a record $4 billion, becomes one of the world’s 500 richest people. Media mogul Oprah Winfrey just became one of the 500 richest people in the world. Since January 1, her net worth has grown by over $420 million and now totals $4.02 billion, according to the Bloomberg Billionaires Index.
How much is Donald Trump worth?
In its 2018 billionaires ranking, Forbes estimated Trump’s net worth at $3.1 billion (766th in the world, 248th in the U.S.). Bloomberg Billionaires Index listed Trump’s net worth as $2.48 billion on May 31, 2018, and Wealth-X listed it as at least $3.8 billion on July 16, 2018.
How much is Angelina Jolie worth?
Angelina Jolie’s net worth Angelina Jolie has an estimated net worth of $100 million.
How is Jerry Seinfeld so rich?
Much of Jerry Seinfeld’s income and net worth comes from: (1) His eponymous show Seinfeld and its years of syndication. Netflix reportedly agreed to pay $100 million for a pair of Seinfeld specials, plus the full library of Comedians in Cars Getting Coffee.
What is Larry David’s net worth?
He has also gained huge recognition when he created the HBO series ‘Curb Your Enthusiasm’. As of 2020, Larry David’s net worth is estimated to be $400 million dollars, making him one of the richest comedians and actors in the world.
How much is Jerry Seinfeld worth?
Since then, Jerry has appeared in a lot of different productions, and had an incredibly successful career in stand-up comedy. His career has been so successful, that Jerry Seinfeld’s net worth is estimated to be $950 million, making him the richest comedian in the world. | https://czechsinexile.org/when-was-julia-louis-dreyfus-on-snl/ |
Makoose Ka Win are rites of passage that are conducted each spring at by the grandmothers at Turtle Lodge, who provide teachings of how to honour and carry oneself as a Woman.
Any female can participate. Each year we encourage young women to spend time learning the sacredness of Woman by participation in the Makoose Ka Win. It is time for Women to claim and embrace their rightful positions of honour and responsibility in walking with and leading all people — men, women & children, back to our sacred way of life. Older women who did not have a chance to experience their rite of passage as a young woman are also welcome to hear the teachings and participate in a special ceremony of initiation into womanhood.
When is the next Makoose Ka Win?
May 20-24, 2016 The May 2016 Makoose Ka Win will take place alongside the “A Return of Our Families to Mide-Aki (Kind-Hearted Mother Earth) Gathering,” taking place from May 21-24.
Where is the next Makoose Ka Win?
All women and their mentors are expected to camp and stay onsite for the duration of the rites of passage. Young women under the age of 18 must be accompanied at all times by an adult woman mentor.
Interested in participating in the next Makoose Ka Win?
Email [email protected] for more information.
Please click here to donate to make this next spring’s Makoose Ka Win a reality! | http://www.turtlelodge.org/event-view/makoose-ka-win-rites-of-passage-for-girls-to-womanhood-manitou-api-may-20-24-2016/ |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
The invention relates generally to graphics image processing and more particularly to the processing of vertex data for rendering an image on a display.
Graphics image processing is a computationally intensive process that is structured hierarchically to optimize the use of special purpose hardware and software. Complex images are created as, or partitioned into, smaller areas that have definable characteristics, and each of these smaller areas are processed to provide the details required to determine the value that is assigned to each individual picture element (pixel) in a display.
In conventional graphics image processing systems, the complex images consist of a combination of polygon areas, typically triangular areas, that form the image. The complex images are processed by software on a general purpose processor to produce characteristics that are associated with each of the polygon areas. The characteristics of the polygon areas are encoded as attributes that are associated with each vertex of the polygon that encloses the area. For example, each vertex includes a color attribute that defines the color at that vertex. The color at points between two vertexes is determined thereafter by an interpolation of the colors at each vertex. In the general case, the attribute values at the vertexes of each polygon define the coefficients that are used to determine the value at any location on the surface defined by the polygon.
FIG. 1A
510
505
500
510
505
The attributes associated with each vertex of each polygon are communicated to a special purpose graphics processing device. The graphics processing device typically consists of a setup engine and a rasterizer. The setup engine processes the vertexes associated with each polygon to produce surface coefficients. The rasterizer processes the surface coefficients to define each value that is to be displayed for each location within each polygon. The time to process each polygon is the sum of the time required to setup the polygon plus the time to rasterize the polygon. illustrates the relationship between the size of the polygon and the time to process the polygon. The setup time required by the setup engine to process the vertexes associated with each polygon to produce the surface coefficients is relatively independent of the size of the polygon. The rasterizing time required by the rasterizer to process the surface coefficients is dependent upon the size of the polygon being rendered, because the rasterizer determines a value for each pixel that is contained within the polygon. The total polygon processing time is the sum of setup time and the rasterizing time .
FIG. 1B
FIG. 1B
FIG. 1B
530
520
520
510
505
530
520
520
520
505
520
520
520
550
a
a
c
b
c
a
The time required to render a polygon affects the overall image processing rate of the graphics image processing system, because the graphics image processing system cannot continually supply images at a rate that is faster than the rate at which the graphics processing device can render the polygons associated with each image. This dependency results in a decrease in the image processing rate for images having a high amount of detail, because although each of the many small areas representing these details can be rendered quickly, each of these many areas incurs a setup time delay. Conversely, an image that has few details will consist of a few large polygons, and although each polygon consumes a rendering time that is proportional to its size, only a few setup time delays will be incurred. is presented, for illustrative purposes only, to demonstrate this dependency for images that are rendered to a full screen display. Line represents the linear dependency of the image processing time to the number of polygons being processed. A complex image will consist of many small polygons, as illustrated by region of curve . Each of these small polygons will incur the setup time required to determine the surface coefficients, plus a rasterizing time . As illustrated by line in , the primary component of the image processing time is the cumulative time of N polygons times the setup time for each polygon. A relatively simple image, on the other hand, will consist of a few polygons, each of the polygons covering a relatively large portion of the image area, as illustrated by region of curve . The primary component of the image processing time for a few large polygons is the rasterizing time to determine the pixel value for each pixel location within each of the large polygons. Region represents the processing of average sized polygons, between the regions of a few large polygons and many small polygons . The span of the image processing time of illustrates the range of processing time that could be incurred in a conventional system, depending upon the complexity of the image being processed.
In a conventional system, to increase the rate at which the graphics processing device processes polygons, two approaches can be taken. The components that perform the setup function and rasterizing function can be made to operate more quickly, or the device can be structured to allow the setup and rasterizing functions to operate in parallel. Increasing the speed of components has a direct impact on the cost, size, and power dissipation of the device, and is limited by available technology. Alternatively, or in addition to increasing the speed of components, a buffer is provided as the interface between the setup engine and the rasterizer, to allow for parallel operation. The buffer stores the surface coefficients that are produced by the setup engine until the rasterizer processes them. The buffer decouples the setup engine performance from the rasterizer performance, so that the delays of each do not result in a cumulative delay. If the rasterizer consumes a significant amount of time processing the surface coefficients of a large polygon, the buffer allows the setup engine to continue to process the vertexes of subsequent polygons during this time. If small polygons are interspersed among large polygons, a significant rate improvement can be realized. While a large polygon is being rendered, the setup engine processes each of the small polygons. When the rasterizer completes the rasterization of the large polygon, it commences the rasterization of each of the small polygons. Because the rasterization is substantially dependent upon the size of the polygon being rendered, each of the small polygons are rendered quickly. To allow for this parallel processing and resultant rate improvement, the buffer must be sufficiently sized so as to allow the setup engine to continue to process the vertexes of multiple subsequent polygons while a large polygon is being rendered.
1
With ever increasing advances in graphics image processing to provide for realistic renderings, the details associated with graphics images continually increases. This increase in detail has had a substantial impact on the conventional graphics processing devices, in two areas. The increase in realism requires an increase in the amount of data corresponding to the coefficients required to describe the polygon surfaces, and the time required to process this increased amount of data increases. Because the amount of data associated with each vertex attribute is larger, the conventional buffer is insufficiently sized to allow the setup engine to process a large number of subsequent vertex attributes while the rasterizer is processing the large polygons. Therefore, the buffer is less able to decouple the setup engine performance from the rasterizer performance, and the setup time is more likely to affect the overall image processing performance, as illustrated in FIG. B.
550
FIG. 1B
The overall image processing performance is limited by the upper bound of the span of the image processing time in , because the image processing system must provide an image processing rate that is independent of the content of the particular images being rendered.
Consequently, there exists a need for a graphics processing device and method for processing graphics data that provides for an image processing rate that is substantially independent of the image complexity.
BRIEF DESCRIPTION OF THE DRAWINGS
FIGS. 1A and 1B
illustrates example graphs of the time required to process polygons and images.
FIG. 2
illustrates a graphics processing system in accordance with this invention.
FIGS. 3A and 3B
illustrates example graphs of the time required to process polygons and images in accordance with this invention.
FIG. 4
illustrates an example block diagram of a variable performance setup engine in accordance with this invention.
FIGS. 5A-5C
illustrate examples of a sequential multiplication process in accordance with this invention.
FIG. 6
illustrates an example block diagram of a sequential multiplier in accordance with this invention.
FIG.7
illustrates an example block diagram of an alternative embodiment of a sequential multiplication device in accordance with this invention.
DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT OF THE INVENTION
The disclosed invention provides a method and apparatus for processing polygons for rendering on a display having a high image processing rate and a minimal buffering requirement. The graphics processing method and apparatus includes a variable performance setup engine that produces surface attributes corresponding to each polygon, and a rasterizer that provides the pixel values corresponding to each polygon based on the surface attributes. The variable performance setup engine is structured so as to provide the surface attributes of each polygon within a time that is correlated to the size of the polygon. In this manner, the overall polygon processing rate will be substantially related to the size of the polygon. By providing a short processing time for small polygons, and a longer processing time for larger polygons, the image processing rate is shown to be less dependent upon the sizes of the polygons that comprise the image. The invention thereby provides for an overall image processing rate that is substantially independent of the complexity of the image being rendered.
Although the invention is applicable to polygons of any general form, the invention described herein uses the processing of triangular areas as an example application, for clarity. As presented, the principles of this invention can be applied without the use of additional buffers. In a preferred embodiment the use of buffers and other optimization techniques are employed, to further improve performance, as would be common in the art.
FIG. 2
10
50
40
50
20
30
10
15
20
15
22
30
22
52
40
illustrates an example block diagram of a graphics system in accordance with this invention. The graphics system includes an image source , a graphics processing device , and a display . The graphics processing device includes a variable performance setup engine and a rasterizer . The image source provides vertex attributes that define each polygon that forms the image by the attribute values at each vertex of each polygon. The variable performance setup engine processes each polygon's vertex attributes to determine surface coefficients that define, algorithmically, how to determine a rendering value corresponding to each location within the polygon. The rasterizer traces a path that covers the location of each picture element (pixel) within the polygon and uses the surface coefficients to determine the pixel value that is to be rendered by the display at each of these locations.
20
20
511
3
20
511
511
511
511
20
511
20
511
20
510
511
510
20
511
510
a
b
c
a
b
c
c
c
FIG. 3A
FIG. 3A
FIG. 3A
The variable performance setup engine is designed so as to provide a setup time that is dependent upon the size of the polygon. An example of the performance of the variable performance setup engine is illustrated by line in FIG. A. The variable performance setup engine in this example provides for three setup times, setup time A , setup time B , and setup time C . Setup time A represents the time required by the variable performance setup engine to setup small triangles; setup time B represents the time required by the variable performance setup engine to setup moderately sized triangles; and setup time C represents the time required by the variable performance setup engine to setup large triangles. The conventional setup time is illustrated in as a dashed line, for reference. Setup time C is illustrated in as being greater than the conventional setup time for illustrative purposes. As will be subsequently discussed, the variable performance setup engine includes components that are not contained in a conventional setup engine; therefore, setup time C is illustrated in as being greater than that which could be achieved by the conventional setup time , given the same cost and size constraints.
501
511
505
511
510
501
500
511
510
501
500
501
500
50
501
501
501
FIG. 1A
FIG. 1A
a
a
c
c
b
a
b
c
As above, the polygon processing time is the sum of the setup time plus the rasterization time . As illustrated in , because setup time A is less than the conventional setup time , the polygon processing time for small triangles is less than the conventional polygon processing time . Because setup time C may be greater than the conventional setup time , the polygon processing time for large triangles is illustrated as being larger than conventional polygon processing time . The polygon processing time for moderately sized triangles is preferably less than the conventional polygon processing time . As illustrated in , as compared to the conventional graphics processing device, the graphics processing device in accordance with this invention provides variable performance characteristics , , and in dependence upon the size of the polygons that comprise the image.
FIG. 3B
FIG. 3B
50
511
510
511
531
530
521
520
531
521
520
521
520
511
510
521
521
521
521
a
a
a
a
b
b
c
c
c
a
b
c.
illustrates the effect that the variable performance characteristics of graphics processing device has on the overall image processing time. As discussed above, the primary component of the processing time for a very complex image, having many small triangles, is the cumulative setup times. In accordance with this invention, the setup time A is less than the conventional setup time ; therefore, the number of polygons N times the setup time A , illustrated as line segment , is substantially less than the conventional cumulative setup time . As such, the overall image processing time for processing many small triangles is substantially less than the conventional image processing time . Moderately sized triangles preferably incur less setup time , and therefore the overall image processing time for moderately complex images is generally less than the conventional image processing time . Conversely, a simple image, comprising a few large triangles, may incur a processing time than is greater than the conventional processing time , if the setup time C for large triangles is larger than the conventional setup time . As illustrated by the foreshortening of the line in , however, the number of large triangles that can be included in an image is, in general, limited. For example, if an image has a size X, and consists of triangles of size Y, the number of triangles of size Y is limited to X/Y, assuming no overlapping triangles. If the size Y is large, X/Y must be small; if the size Y is moderate, X/Y is a moderate number; if the size Y is small, X/Y must be large. This relationship between the size of the triangles and the number of triangles is illustrated by the location, relative to the horizontal axis, of the foreshortened line segments , , and
50
551
521
521
521
551
550
a
b
c
Thus, as illustrated, the variable performance characteristics of the graphics processing device may provide for a performance that is greater or less than that of a conventional graphics processing device, depending upon the complexity of the image. However, as illustrated by span , the overall image processing time is limited to the range of the foreshortened line segments , , and . As can be seen, in accordance with this invention, the span of image processing time is substantially less than the span of image processing time of the conventional graphics processing device.
FIG. 4
20
0
1
2
0
1
2
0
1
2
0
1
2
0
1
2
22
30
illustrates an example block diagram of a portion of a variable performance setup engine that effects the variable performance characteristics in accordance with this invention. The setup engine receives the coordinates of vertexes V, V, V and parameter values P, P, P that are associated with each of these vertexes V, V, V. The setup engine determines the rate of change, or gradient, of the parameter with respect to an incremental change of location within the polygon in the horizontal (x) and the vertical (y) directions. For example, the parameters P, P, and P may be the brightness of the polygon at each vertex V, V, V. The setup engine determines the x-gradient and y-gradient of the brightness parameter. In this simple example, the rasterizer determines the brightness for all the pixel locations between the vertexes by incrementally adding the x-gradient to each prior pixel value as it computes the pixel values across a line in the x dimension, and by adding the y-gradient as it progresses to the next line in the y dimension. The setup engine also processes other parameters, such as color, texture, and visibility. These gradients, and combinations of gradients and other factors, comprise the surface coefficients that are provided to the rasterizer for rendering each pixel within each triangle.
As is common in the art, the x and y gradients of a parameter are determined by the equations:
&lt;PTEXT&gt;&lt;PDAT&gt;x-gradient&equals;((dy10*dp20)&minus;(dy20*dp10))/area;&lt;/PDAT&gt;&lt;/PTEXT&gt;
&lt;PTEXT&gt;&lt;PDAT&gt;y-gradient&equals;((dx20*dp10)&minus;(dx10*dp20))/area,&lt;/PDAT&gt;&lt;/PTEXT&gt;
where dx10, dx20, dy10, dy20, dp10, dp20 are defined below, and area is a measure of the area of the triangle.
110
111
110
1
0
1
0
1
0
111
2
0
2
0
2
0
112
1
0
113
2
0
The three vertexes are compared in the subtractors and to determine the extent of the triangle in the x and y dimensions. Subtractor compares vertex V to vertex V and determines dx10, the difference between the x coordinate of vertex V and the x coordinate of vertex V, and dy10, the difference between the y coordinate of vertex V and the y coordinate of vertex V. Similarly subtractor compares vertex V to vertex V and determines dx20, the difference between the x coordinate of vertex V and the x coordinate of vertex V, and dy20, the difference between the y coordinate of vertex V and the y coordinate of vertex V. Subtractor determines dp10, the difference between the parameter value at vertex V and the parameter value at vertex V. Subtractor determines dp20, the difference between the parameter value at vertex V and the parameter value at vertex V.
120
121
122
123
114
115
161
162
130
163
190
124
125
161
162
163
190
The sequential multipliers , , , and determine the intermediate products in the above equations dy10*dp20, dy20*dp10, dx20*dp10, and dx10*dp20, respectively. Subtractors and determine the intermediate factors ((dy10*dp20)-(dy20*dp10)) and ((dx20*dp10)-(dx10*dp20)) of the above equations, respectively. The reciprocal determinator determines the inverse of the area , and sequential multipliers and multiply the intermediate factors and by the inverse of the area to form the x and y gradients, respectively.
20
120
121
122
123
124
125
5
202
201
24
202
1
2
3
210
1
211
2
212
3
211
212
210
211
220
210
211
212
1
2
3
FIG. 5A
The variable performance characteristics of the variable performance setup engine is effected by controlling the operation of the sequential multipliers , , , , and optionally sequential multipliers and , in dependence upon the size of the multiplicands being multiplied. As is common in the art, a variety of techniques are available for performing complex multiplications via a sequence of simpler multiplications; one such technique being illustrated in FIG. A. represents the multiplication of two numbers A and B , which are each bits wide, as a three step process. The number A consists of 3 eight bit submultiplicands A, A, and A. A first subproduct of A*B is produced during clock cycle 1. A second subproduct of A*B is produced during clock cycle 2, and a third subproduct of A*B is produced during clock cycle 3. Each subproduct and is shifted by eight bits relative to the previous subproducts and , and the product of A*B is the sum of the appropriately shifted subproducts , , and . By performing the multiplications as a three-step process, each step only requires the multiplication of a 24 bit number (B) by an eight bit, or one byte, number (A, A, A), rather than a direct 24 by 24 bit multiplication. In general, because of the sequential nature of this multiplication process, the three step 8 bit by 24 bit sequential multiplier is slower than a non-sequential 24 bit by 24 bit multiplier, but can be implemented with fewer components than the 24 bit by 24 bit multiplier. Other techniques for performing sequential arithmetic operations that minimize the complexity of the operation to be performed, at the expense of the time required to effect the operations, are common in the art.
FIG. 5B
FIG. 5A
FIG. 5C
FIGS. 5B and 5C
FIG. 5B
FIG. 5C
3
2
3
2
210
211
212
211
212
1
2
3
210
211
212
220
illustrates the reduction of the three step multiplication process of to a two step process, and illustrates the reduction to a one step process. In the size of the A multiplicand is determined, in terms of the number of 8 bit bytes required to contain the particular value of the A multiplicand. A value of A that has a 0 in A and a non-zero in A has a size of 2 bytes; a value of A that has a 0 in both A and A has a size of 1 byte. illustrates the sequential multiplication of A*B when A has a size of two. The subproducts and are computed as above, but the step of computing the third subproduct , which is known to be zero, is bypassed. illustrates the sequential multiplication of A*B when A has a size of one, wherein the steps of computing the second subproduct and third subproduct are bypassed. In this manner, multiplications with multiplicands that are small in size are performed faster than multiplications with multiplicands that are large in size. As is common in the art, the reduction in clock cycles can be effected directly or indirectly. In a direct implementation, the size of the multiplicand is determined a priori, and the sequential multiplier is controlled by providing it with the appropriate number of clock pulses corresponding to the size. In the indirect approach, the sequential multiplier determines whether the bytes A, A, and A that are remaining to be multiplied by B to form subproducts , , and are zero, and asserts a “done” signal when the remaining subproduct cycles can be bypassed. Thus, the “done” signal may be asserted before or after one clock cycle, two clock cycles, or three clock cycles, depending upon the size of the multiplicand. Upon receipt of the “done” signal, the subsequent processes are free to immediately use the formed product A*B , without necessarily waiting for three clock cycles. For ease of understanding, the invention is subsequently presented herein using the direct determination of the number of clock cycles required to effect the multiplication, although the indirect method can be employed as well, as would be evident to one of ordinary skill in the art.
0
1
2
100
120
121
122
123
114
115
124
125
100
120
121
122
123
100
101
120
121
122
123
100
102
102
120
121
122
123
The extents of the triangle dx10, dy10, dx20, and dy20 are correlated to the size of triangle. If each of the extents dx10, dy10, dx20, and dy20 are small, the triangle represented by vertexes V, V, and V must be small. The control A determines the size of each of the extents dx10, dy10, dx20, and dy20, and determines the minimum number of clock cycles required to produce the intermediate products dy10*dp20, dy20*dp10, dx20*dp10, and dx10*dp20, based on these extents. Each of the sequential multipliers , , , and could be independently controlled, based on the size of each of the extents dy10, dy20, dx20, and dx10, respectively. However, if any of the extents dx10, dy10, dx20, dy20 are larger in size than any of the others, the subsequent processes, such as the subtractions at and and the multiplications at and , must wait until the subproduct from the larger sized extent is available. Therefore, to ease the timing and synchronization tasks, the control A determines the minimum number of clock cycles required to effect the multiplications at , , , and based upon the extent dx10, dy10, dx20, dy20 having the largest size. The control A provides the clock pulses to the sequential multipliers , , , and to effect the sequential multiplications for the determined minimum number of clock cycles. The control A also generates a control signal that signals the completion of the determined minimum number of clock cycles. That is, the control signal signals when the outputs of the sequential multipliers , , , and are available for subsequent processing.
100
100
190
120
121
122
123
210
1
210
210
100
190
210
100
210
100
210
FIGS. 5A-5C
As would be evident to one of ordinary skill in the art, the control A may use other criteria in addition to or in lieu of the size of the extents of the polygons to effect an optimization in processing time. For example, the control A may use the area , or the area of a bounding box that includes the polygon, as an input, and forces a limited number of clock cycles for small areas. This is effected by forcing the multipliers , , , and to bypass of the production of the first subproduct of , regardless of the value of each corresponding A. The first subproduct directly affects the precision, or resolution, of the rendering of the polygon; the lack of high precision introduced by bypassing the production of the first subproduct , however, may not be visually apparent in a small area. Similarly, the control A may use the differences dp10 and dp20 of the parameter values in conjunction with, or in lieu of, the area to determine whether the first subproduct is required for precision. This determination may also be dependent upon the type of parameter, such as whether the parameter is color, visibility, brightness, hue, and so on. For example, the human visual system is more sensitive to brightness than to color. The control A may force the bypass of the production of the first subproduct when the gradient of the color is being determined for a small triangle, but not when the gradient of the brightness of this same triangle is being determined. In a similar manner, for draft-quality, or low-resolution, renderings of an image, less precision is necessary than for a high-quality, or high-resolution, rendering. In draft mode, the control A is structured to control the multiplication stages so as to bypass the production of the first subproduct , thereby reducing the setup time by a third for all polygons. These and other control and optimization techniques will be apparent to one of ordinary skill in the art.
150
124
125
161
162
100
102
150
124
125
150
151
124
125
152
Optionally, control B similarly determines the number of clock cycles required to effect the multiplications at and based on the larger of the sizes of the intermediate factors ((dy10*dp20)-(dy20*dp10)) and ((dx20*dp10)-(dx10*dp20)) . Control A provides the control signal that informs control B when to begin the multiplications at and . Control B provides the determined number of clock pulses to the sequential multipliers and , and asserts a control signal when the determined minimum number of clock cycles are completed.
FIG. 6
FIGS. 5A-5C
FIGS. 5A-5C
FIGS. 5A-5C
FIG. 4
12
121
125
12
330
350
310
302
302
302
301
310
312
320
302
302
302
311
311
101
151
100
150
302
330
330
340
302
1
301
310
312
350
340
355
355
311
310
312
320
302
330
330
340
302
2
302
310
312
350
340
355
311
310
312
320
302
330
330
340
302
3
302
310
312
340
355
355
100
101
355
120
121
122
123
102
a
b
c
a
b
c
a
a
b
b
c
c
th
th
th
th
illustrates an example block diagram of a sequential multiplier that may be used to implement the sequential multipliers - to facilitate the variable performance characteristics of this invention. The sequential multiplier forms the product A*B of two 24 bit numbers A, B via the repetitive use of an 8 bit by 24 bit multiplier , and shifting accumulator , under the control of a sequencer . The 24 bit number A is contained in three 8 bit registers , , and ; the 24 bit number B is contained in a 24 bit register . The sequencer output controls a switcher to sequentially select registers , , and in response to each clock pulse . The clock pulse corresponds, for example, to the output or of control A and control B , respectively. At the first clock pulse, the contents of register are provided to the multiplier . The multiplier forms a 32 bit subproduct in register corresponding to the contents of register (submultiplicand A of ) multiplied by the contents of (B). Under the control of the sequencer output , the shifting accumulator adds the subproduct in register to the lower 32 bits of an accumulator register . It is assumed herein that the shifting accumulator is initialized to zero at the start of each polygon processing cycle, using initialization techniques common in the art. At the next clock pulse , if any, the sequencer sets the output to control the switcher to provide register to the multiplier . The multiplier forms a 32 bit subproduct in register corresponding to the contents of register (A of ) multiplied by the contents of (B). Under the control of the sequencer output , the shifting accumulator adds the contents of the register to the 9through 40bits of the accumulator register . At the next clock pulse , if any, the sequencer sets the output to control the switcher to provide register to the multiplier . The multiplier forms a 32 bit subproduct in register corresponding to the contents of register (A of ) multiplied by the contents of (B). Under the control of the sequencer output , the shifting accumulator adds the contents of the register to the 17through 48bits of the accumulator register . At the end of each clock cycle, the accumulator register contains the running subtotal of the subproducts computed thus far. Thus, if the control A of determines that the largest size of the extents dx10, dy10, dx20, dy20 is two, then only two clock pulses are asserted. At the end of the second clock cycle, the accumulator register of each of the sequential multipliers , , , and contains the completed product, and the control signal is asserted to signal this completion.
FIG. 4
FIGS. 5 and 6
FIG. 7
100
120
121
122
123
1
0
123
401
402
410
420
410
12
100
4
410
401
402
413
420
401
402
406
401
402
407
406
12
410
12
406
123
123
411
410
410
412
412
410
120
121
122
123
102
4
In , the control A uses the extents dx10, dx20, dy10, dy20 to determine the minimum number of clock pulses required to effect the multiplication of each extent with the appropriate parameter differences dp10, dp20. Some small triangles may, however, have a large extent in one dimension, and a small extent in the other, such as, for example, a long narrow triangle. The largest extent determines the number of clock cycles required, and may not result in a short setup time for such triangles. In accordance with another aspect of this invention, the parameter differences dp10 and dp20 are also used to determine the minimum number of clock cycles required to effect the multiplication of the parameter differences and the extents. In an alternative embodiment of this invention, the sequential multipliers , , , and use whichever multiplicand is smaller in size as the partitioned multiplicand A in . In this manner, for example, if the horizontal extent dx10 between vertex V and V has a size of 3 bytes, and the parameter difference dp20 has a size of one byte, the sequential multiplier produces the intermediate product dx10*dp20 in one clock cycle. illustrates an example block diagram to effect this selection of multiplicands. Each multiplicand A and B are provided to a control and a switch . The control associated with each multiplier replaces the single control A of FIG. . The control compares the sizes of multiplicands A and B , and asserts the select signal to the switch so as to connect the smaller of A and B to A′ and the larger of A and B to B′ . The smaller multiplicand A′ is provided to the partitioned A input of the sequential multiplier . The control provides the determined minimum number of clock pulses to the sequential multiplier to effect the sequential multiplication of A*B, based on the size of the smaller multiplicand A′ . In the above example of multiplier , dp20 will be switched to the A input and dx10 to the B input of the multiplier , and one clock pulse will be provided by the control . Upon completion of the determined minimum number of clock cycles, the control asserts the done signal. The logical AND of the done signals from each of the controls associated with each of the multipliers , , , and provides the control signal that signals the completion of all the subproduct multiplications in FIG. . Because, in general, the parameter differences dp10 and dp20 of a triangle have a relatively high correlation to the size of the triangle, this alternative embodiment increases the likelihood that small triangles will be processed within a small number of clock cycles.
12
355
100
150
110
115
120
125
120
125
120
125
12
FIG. 3
FIG. 4
It should be understood that the implementation of other variations and modifications of the invention in its various aspects will be apparent to those of ordinary skill in the art, and that the invention is not limited by the specific embodiments described. For example, the sequential multiplier is described herein as a 3 cycle 8 bit by 24 bit multiplier. The number of cycles and the bit width of the multiplicands may be any convenient set of cycles and widths to effect the desired degree of precision in the product. Similarly, the accumulator register is illustrated as being 48 bits wide, although a smaller register may be used if less precision is required. In a like manner, the variable performance characteristics of is presented as a 3 tiered setup function, for the general classification of “small”, “medium”, and “large” polygons. As would be evident to one of ordinary skill in the art, additional tiers may be provided to further optimize performance as a more detailed function of the polygon size. The invention as presented may be implemented in hardware, software, firmware, or a combination of each. For example, the control A and control B , as well as the subtractors - may be embedded software routines in a processing device or computer, and the multipliers - may be special purpose hardware multipliers. Similarly, although six multipliers - are illustrated in , the multiplication operations performed by these multipliers - may be performed by a fewer number of multipliers that are time-shared, or multiplexed, to effect each operation. It is therefore contemplated to cover by the present invention, any and all modifications, variations, or equivalents that fall within the spirit and scope of the basic underlying principles disclosed and claimed herein. | |
Sunflower field to bloom this summer
TWRA only plants the flowers every other year to give the soil time to regenerate.
Author:
WBIR Staff
Published:
5:27 PM EDT June 3, 2019
Updated:
6:44 PM EDT June 3, 2019
KNOXVILLE, Tenn — The sunflowers will be back this summer at Forks of the River in South Knoxville.
The flowers typically bloom in July, creating a stunning scene.
Everyone loves to visit the spot to take pictures, but wildlife leaders said it actually has another purpose.
"Sunflowers are planted primarily for wildlife benefit. A variety of songbirds utilize sunflowers as a number one food source. Now, if you put out a bird feeder with birdseed out on your back porch, by and large, the first seed that is gone is going to be the sunflowers," Tennessee Wildlife Resources Agency spokesperson Matt Cameron said.
TWRA only plants the flowers every other year to give the soil time to regenerate. | |
Blockchain Consensus?
Glossary
Categorizing consensus
Chain-based Proof of Work
Proof of Work (PoW)
Proof of Meaningful Work (PoMW)
Hybrid Proof of Work (HPoW)
Proof of Work time (PoWT)
Delayed Proof of Work (dPoW)
Proof of Edit Distance
ePoW: equitable chance and energy-saving.
Semi-Synchronous Proof of Work (SSPoW)
Chain-based Proof of Stake
Chain-based Proof of Capacity/Space
Chain-based Hybrid models
Chain-based Proof of Burn
Chain-based Trusted computing algorithms
Chain-based PBFT and BFT-based Proof of Stake
Chain-based others
Chain-based DAG
Magi's proof-of-work (mPoW)
Common Attacks
Performance indicators
ThresholdRelay
Holochain
Powered By
GitBook
Proof of Edit Distance
Algorithm
Edit distances are a class of algorithms that score how close two strings are to each other. For instance the
an Edit Distance
for “ETH” and “ETC” is “0.8222” where two identical strings would score a “1”. There are many algorithms also in the string similarity space including the
Levenshtein Distance
,
Smith-Waterman Gotoh
Distance,
and the
Ratcliff-Obershelp Distance.
Using Proof of Edit distance for forging new blocks
Miners compete to find a string that when hashed in a normalization process is above a minimum distance threshold. This string could then be the hash of an intermediary-blockchain and the header hash for the next block.
Let Minimum Distance Threshold by “t”, String to find “B”, and Edit Distance Function “ED”. Such that for each blockchain header hash “h” satisfies:
ED( H(h), H(B) ) < t
Or in the case of merging two blockchains:
ED(H(h1),H(B)) < t && ED(H(h2),H(B)) < t === true
To find the new block in an intermediary-blockchain, the miner would iterate through a random charset or number, hashing strings until it finds a hash that is above the threshold for all of the blocks.
Pros
Proof of Edit Distance is mining algorithm agnostic.
Any hash or string structure can be provided as an input which means that as long as the blockchain has unique hashes it can be easily added to the Proof of Edit challenge.
Cons
Used in
Block Collider
Links
Block collider whitepaper
Medium
Previous
Delayed Proof of Work (dPoW)
Next
ePoW: equitable chance and energy-saving. | https://tokens-economy.gitbook.io/consensus/chain-based-proof-of-work/proof-of-distance |
How to make carolina style bbq sauce
How do you make Carolina BBQ sauce from scratch?
Ingredients 1 Cup Apple Cider Vinegar. ¾ Cup Ketchup. ¼ Cup Dark Brown Sugar. 1 TBS Yellow Mustard. 1 TBS Worcestershire Sauce . 1 tsp Hot Sauce (Preferably Texas Pete’s) 1 tsp Kosher Salt. ½ tsp Ground Pepper.
What is Carolina style BBQ?
Carolina Style Carolina barbecue is usually pork, served pulled, shredded, or chopped, but sometimes sliced. It may also be rubbed with a spice mixture before smoking and mopped with a spice and vinegar liquid during smoking. It is probably the oldest form of American barbecue .
How do you make your own barbecue sauce?
Ingredients 2 cups of ketchup. 1/4 cup apple cider vinegar. 1/4 cup of Worcestershire sauce . 1/4 cup firmly packed brown sugar. 2 Tbsp. molasses. 2 Tbsp. mustard. 1 Tbsp. Tabasco sauce (or your favorite hot sauce ) 1/2 teaspoon black pepper.
What type of BBQ sauce is vinegar based?
May 17, 2019. Carolina vinegar BBQ sauce is a sour, tangy, and spicy sauce that originated in North Carolina. This thin, vinegar – based sauce is extremely easy to make and is the ultimate BBQ sauce for smoked or grilled pork.
Can you add vinegar to BBQ sauce?
With a great barbecue sauce , there should be a harmonious interplay between smoky, spicy, and sweet with a dash of vinegar to balance out the flavors.
What is the difference between Texas and Carolina BBQ?
Most of the flavor of Texas barbecue comes from the fat in the meat after it has been cooked low and slow. Dry rubs are often used in Texas and BBQ sauce is almost always served on the side. Carolinas: Carolina BBQ generally consists of pork, but the cut of meat can differ depending on region.
What is the best pork cut for BBQ?
As a general rule, the primal pork cuts from the top of the pig (the loin) are leaner and tender than pieces from the bottom. Cooking the tougher cuts ( shoulder and hocks) low and slow can make these pieces tender and juicy.
What are the types of BBQ?
The four main types of barbecue… No it ain’t Beef, Pork, Chicken , and Roadkill Kansas City Style. Out here in the wild west, Kansas City style is the barbecue with which we’re most familiar, and is the dominant style of most of the sauces on the local grocery store shelves. Memphis style. Texas style. Carolina style.
Is Carolina BBQ spicy?
Carolina Vinegar BBQ Sauce is tangy, spicy and is the ultimate sauce when you’re serving pork! Originating in North Carolina , this sauce is easy to make with just 6 ingredients.
What can I use instead of barbecue sauce?
For 1 cup barbecue sauce : Mix together 3/4 cup (12 tablespoons) ketchup, 2 tablespoons mustard and 2 tablespoons brown sugar. Double or halve these ingredients for more or less sauce .
How do you make sweet BBQ sauce from scratch?
Ingredients 1 1/4 cups ketchup preferably organic. 1 cup dark brown sugar. 1/4 cup molasses. 1/4 cup pineapple juice or you can sub apple cider vinegar. 1/4 cup water. 1 tablespoon worchestire sauce . 2 1/2 teaspoons ground mustard. 2 teaspoons smoked paprika.
Does vinegar based BBQ sauce need to be refrigerated?
Since food with a pH value lower than 4.5 is too acidic to support the growth of spoilage bacteria, it’s safe to store barbecue sauce at room temperature, in your cupboard or pantry. Conclusion: Keep your BBQ sauce anywhere you want .
How much vinegar do you put in BBQ sauce?
Ingredients 1 cup cider vinegar . 1 tablespoon salt. ½ teaspoon cayenne pepper. 1 teaspoon crushed red pepper flakes. 1 tablespoon brown sugar.
Is Vinegar a sauce?
Vinegar is an ingredient with multiple uses. It is an ingredient. A sauce is a prepared mixture of ingredients used to flavor a meal. Water isn’t a sauce , lemon juice isn’t a sauce , etc. | https://rdbbq.com/cooking-tips-with-sauce-bbq/how-to-make-carolina-style-bbq-sauce.html |
Sem 1 2006,
|
Sem 1 2007,
Sem 1 2008,
Sem 1 2009,
Sem 1 2010,
Sem 1 2011,
Sem 1 2012,
Sem 1 2013,
Sem 1 2014,
Sem 1 2015,
Sem 1 2016
|
|
ONPS1054
|
|
Bundoora Campus
|
|
Postgraduate
|
|
171H School of Science
|
|
Face-to-Face
|
Sem 1 2017,
|
Sem 1 2018,
Sem 1 2019,
Sem 1 2020,
Sem 1 2021,
Sem 1 2022
Course Coordinator: Assoc. Prof. Danilla Grando
Course Coordinator Phone: +61 3 9925
Course Coordinator Email: [email protected]
Pre-requisite Courses and Assumed Knowledge and Capabilities
Microbiology to at least second year undergraduate level is a prerequisite requirement with assumed knowledge and capabilities. As such it is advised that you have successfully completed BIOL2173 Microbiology at RMIT, or BIOL2416/2417 Diagnostic Microbiology or equivalent course
Course Description
Medical Microbiology is a central discipline in the medical sciences and is concerned with the cause, diagnosis, prevention and treatment of infectious diseases.
This advanced course aims to extend your understanding and appreciation of interactions between microbes and their human hosts; antimicrobial agents and microbial resistance; pathogenesis and diagnosis of microbial infections; and infections of body systems.
The course is delivered through a blended learning approach where you will be guided through online pre-class learning activities that will prepare you for face-to-face practical classes and tutorials. You will develop skills in scientific communication (oral and written), problem solving, learning in small groups, independent learning and time management.
Objectives/Learning Outcomes/Capability Development
This course contributes to the MC111 Master of Biotechnology Program Learning Outcomes:
PLO-1 Understanding science
1.2 You will have an understanding of recent developments in a specialised area of biotechnology.
PLO-2 Advanced skills to critically analyse and solve problems in biotechnology
2.2 You will generate and evaluate complex ideas and concepts at an abstract level.
PLO-3 Application of knowledge and skills
You will critically analyse and solve problems in biotechnology by:
3.1 Demonstrating creativity, initiative and a high level of autonomy in research and/or professional practice
PLO-4 Communication
You will be able to effectively communicate concepts of biotechnology to specialist and non-specialist audiences, using a variety of presentation modes.
PLO-5 Personal and professional responsibility
5.1 You will be accountable for individual learning and scientific work by being an independent and self-directed learner
5.2 You will work effectively, responsibly, ethically, and safely in an individual or team context.
This course contributes to the MC158 Master of Laboratory Medicine
1. Knowledge capability
Have a comprehensive understanding of key scientific principles underpinning laboratory medicine and have developed a systemic knowledge of core cellular and molecular processes underlying health and disease. Have advanced knowledge of two core clinical speciality disciplines of laboratory medicine and advanced management skills.
2. Technical capability
Ability to develop and perform a range of diagnostic techniques relevant to the field of laboratory medicine. To use logical and systemic thinking and high-level critical analysis skills to solve problems by utilising diagnostic techniques and methodologies in the chosen areas of clinical laboratory specialisation.
3. Professional work practices
Have a critical awareness of principles relating to scientific integrity, ethical issues and legal framework that underpins the field of laboratory medicine. Contribute to professional work settings through effective interpersonal and teamwork skills to support constructive interactions.
On completion of this course, you should be able to:
- Demonstrate an understanding at an advanced level of microbial virulence mechanisms, selection of the most appropriate diagnostic testing for specific infections, select appropriate microbial susceptibility testing for the infectious agent identified and understand methods to detect resistance to specific antimicrobial agents.
- Competently and safely perform microbiological tests on biological specimens in a laboratory environment that adhere to PC2 requirements for safe work procedures.
- Select and perform appropriate quality control for the processing and manipulation of clinical samples and the tests associated with infectious disease diagnostics.
- Effectively communicate scientific and microbiological concepts clearly, concisely and logically.
- Critically assess and interpret scientific literature.
- Analyse and report on complex diagnostic scenarios, and solve problems, plan a diagnostic strategy and learn independently.
Overview of Learning Activities
Online learning activities with recorded explanations from industry experts, laboratory classes (face to face), tutorials (online-interactive), independent learning, written assignments.
A major part of the practical program of this course mimics the workplace in a diagnostic microbiology laboratory.
The online learning activities provide the theoretical background to this training.
Overview of Learning Resources
Students are expected to interact with the material presented on Canvas, and to read the relevant sections of prescribed and recommended textbooks as well as references provided.
Overview of Assessment
Note that: All hurdle requirements for this course are indicated clearly in the assessment regime that follows, against the relevant assessment task(s) and all have been approved by the College Deputy Pro Vice-Chancellor (Learning & Teaching).
It is a hurdle requirement that you must demonstrate competency by achieving at least 50% in the practical components of the course. The skills learned are essential to ensure that you operate safely as a professional, and for accreditation purposes.
Overview of Assessment
Practical report/s, laboratory skills and recording of results, critical review, written theory and practical assessment tasks. Practical assessment is based on industry practices and is supervised and assessed by people with experience in diagnostic microbiology. | http://www1.rmit.edu.au/courses/001126 |
One way to meet your physical activity goals is by participating in aerobic activities. Aerobic exercise includes any activity that makes you breathe hard and increases your heart rate for a sustained period of time. Common aerobic activities include walking, swimming, and bicycling.
Experts recommend moderate-intensity exercise. This pace may make you breathe harder and make it more difficult to talk, but you should still be able to carry on a conversation. If you are just beginning, slowly work up to moving at a moderate-intensity pace.
Take a brisk walk around the block with family, friends, or coworkers.
Walk up the stairs instead of taking the elevator when it is safe to do so.
Park your car farther away from entrances of stores, movie theatres, or your home and walk the extra distance when it is safe to do so.
Take a beginner�s level low-impact aerobics or step class. | http://www.fittforlife.com/jacksonville.personal.training.article29.html |
232 S.W.2d 564 (1950)
STATE ex rel. AMMONS
v.
CITY OF KNOXVILLE et al.
STATE ex rel. SCRUGGS
v.
CITY OF KNOXVILLE et al.
Court of Appeals of Tennessee, Eastern Section, at Knoxville.
March 13, 1950.
Certiorari Denied August 31, 1950.
*565 S.F. Dye, Ben F. McAuley and R.R. Kramer, all of Knoxville, for complainants.
Richard L. Carson, of Knoxville, for defendants.
Certiorari Denied by Supreme Court August 31, 1950.
SWEPSTON, Justice.
This appeal is by the City of Knoxville from a decree of the Chancellor holding that the resignation of two policemen, Ammons and Scruggs, were executed by them under duress.
The questions for decision raised by the assignments of error are:
(1) Whether they did resign under duress.
(2) If they did, are they guilty of laches barring them from relying on duress?
(3) Are they estopped judicially or equitably by reason of positions taken by them in certain proceedings participated in by them as is reflected on the face of the pleadings in same?
(4) Is this suit res adjudicata because of those former proceedings and the judgment of the Court of Appeals?
We believe it will be conducive to brevity and to an intelligible disposition of the case to relate at once in proper sequence both those matters which are not in dispute and our findings as to disputed questions of fact.
These two policemen had been on the force a number of years, Ammons since 1930 and Scruggs since 1936 when their troubles arose in May 1944. Their records were clean and they are given a good character in this record; each is married; up to the inception of this trouble each was working eight hours per day on the force and a like period for a private employer as guards at Appalachian Mills; one of them had attained the rank of sergeant.
May 10, 1944 the local newspapers carried stories to the effect that these men had been accused of having accepted a bribe of $300 for allowing a load of liquor to be unloaded at the Elks Home at the instance of an individual employed there. At this time George R. Dempster was City Manager of Knoxville and appears from the record to be an aggressive, dynamic person of considerable force and will, anxious and alert to do his job well. Upon learning of the accusation he immediately had these men brought in by the Chief of Police and in his presence and the presence of several other officials and a newspaper reporter he demanded the written resignations of the two as an alternative to his threats of criminal prosecution and of a trial under the civil service rules of the City Charter, after having heard the accuser's statement.
They refused to resign at that time. Formal charges under civil service rules were promptly brought and set for hearing. Complainants then consulted counsel and both they and counsel sought to pacify the City Manager and convince him of their innocence but to no avail. He was greatly agitated over the matter from the start and continued in the same frame of mind during the ensuing weeks; he was soon to come up for reelection and had no patience or taste for this potential scandal. Each time he was approached he would hear to nothing but their resignations. The civil service hearing was continued at the request of complainants and finally set for June 1, 1944. On that day before the time for the hearing complainants appeared with their attorney and executed the resignations. They testified they did so because they had worried and thought over the matter, that they were embarrassed for themselves, their wives and family and friends and did not know how they could establish their innocence, so they gave in.
Notwithstanding the resignations the criminal warrants which the City Manager had directed to be procured were issued the next day. This is strange indeed, because Ex. 9 is an affidavit of the accuser dated June 1 which exonerates the complainants. June 9 a preliminary hearing lasting eight hours was had in the General Sessions Court as a result of which complainants *566 were found not guilty and the charges dismissed.
In the fall of 1944 Scruggs had a conversation with the City Manager who then stated that he had investigated the matter and was convinced they had been mistreated and he was going to have the error rectified. Pursuant thereto complainants' counsel filed petitions on January 17, 1945 with the City Council for restoration. A committee was appointed by the Council to investigate and report, but before the committee had completed the investigation petitioners by letter of January 23 addressed to the City Council withdrew their request, stating in effect that, although they had been completely exonerated by the affidavit of the individual by whom they were supposed to have been bribed, which affidavit was made and filed June 1, 1944 insofar as the City was concerned and by the hearing on the criminal charge in the General Sessions Court, they nevertheless had ascertained there was some opposition by certain members of the City council to their reinstatement; further "we fail to understand, in view of the above facts, why this opposition has developed, but since it has, and since we have, since the filing of this petition, been offered more lucrative positions, we hereby withdraw our application for reinstatement to the police force of the City of Knoxville".
This request for restoration was withdrawn because it was realized that the City Council had no authority to restore them, but a plan was agreed upon by counsel for complainants and the Law Director of the City with the evident approval of the City Manager, and pursuant to that plan petitions for mandamus were filed in the Circuit Court on February 13, 1945 and judgments, that were actually agreed judgments though not so appearing on their face, were entered (R. 17 & R. 184) restoring the petitioners to duty. They were then transferred to the fire department with the understanding that after a short while they would be put back on their jobs as policemen and that they could not lose seniority rights.
At the insistence of the City Manager they omitted from the petitions for mandamus anything about the threats and coercion, so as to make it as mild as possible, because he had promised to take care of them, and these petitions leading to compromise judgments were the first step in that direction.
Sometime after the entry of those judgments the City appealed on the technical record to the Court of Appeals, which held as follows:
(1) That the mandamus petitions, in alleging that petitioners were accused by individuals and that "petitioner resigned his position * * * for the purpose of relieving the embarrassment, worry and trouble that was being heaped upon him, his family, friends and acquaintances and upon the City of Knoxville and its officials, including the two named herein as defendants. At the time he resigned * * * he did so as the result of the aforesaid circumstances," failed to charge the City with any wrongdoing and that, therefore, so far as the City is concerned, the resignations were voluntary;
(2) That therefore section 76 of the Charter provisions applies which is: "Whenever a policeman or fireman has in any way severed his connection by resigning or being removed or discharged from his service in the employment of the City, before he shall again be elected, he shall be required to stand a civil service examination just as any other applicant and subject to the same qualifications as required for new applicants";
(3) That, if for any reason, the resignation be held nugatory, the City would still have the right to try the accused in the manner provided by the Charter, and that the courts are without power to determine the guilt or innocence of such employee with a view to restoration, except upon appeal after the Charter provisions have been carried out, citing State ex rel. Baker v. City of Knoxville, 166 Tenn. 563, 64 S.W.2d 17, holding that provisions of the City Charter may not thus be by-passed by an unauthorized resort to the courts and that the City itself cannot waive such charter provisions for the purpose of restoring such employee;
*567 (4) That the judgments of the Circuit Court be reversed and the mandamus petitions be dismissed.
Shortly afterwards the present bill alleging duress for the first time was filed June 23, 1947 and after a hearing the Chancellor decreed as stated at the beginning of this opinion.
The City by its four assignments of error challenges the action of the Chancellor in finding duress, in holding that petitioners were not guilty of laches, nor estopped either equitably or judicially nor bound by res adjudicata in bringing the present suit.
We are of opinion that the evidence does not preponderate against the Chancellor's finding of duress existing up to the date when the resignations were finally signed, but, in fact, fully supports the decree.
The subject of "Duress" by threats is fully treated in 17 Am. Jur. p. 881 et seq.
On page 885 it is said: "It is generally held, however, that the threat must be of such a nature and made under such circumstances as to constitute a reasonable and adequate cause to control the will of the threatened person, and must have that effect and the act sought to be avoided must be performed by the person while in that condition; and that an act subsequent to the time when the threats were employed will not be considered as having been done under duress. If, however, the threats were long continued, and the act which it is sought to avoid was done such a short time thereafter as to indicate that the mind of the person was still under the influence of the threats, it has been held that this will constitute an act done under duress".
See Bogle v. Hammons, 49 Tenn. 136, 140, where the deed was executed a month or two after the threat was made to subject Bogle to the penalty of the Military order (1862) if he refused to accept Confederate money for his land.
Even though these men had the advice of counsel during the interval from May 10 to June 1, we are not willing to hold that this necessarily removed the effect of the continued threat of criminal prosecution with the consequent embarrassment and the apparent inability at that time to establish their innocence, which later was established.
The real question in these cases is not merely the nature of the threat, nor how the mind of a reasonably strong person would be affected, but it is what state of mind was induced in the victim. Blair v. Coffman, 2 Overt 176, 5 Am. Dec. 659; Loud v. Hamilton, Tenn. Ch. App., 51 S.W. 140, 144, 45 L.R.A. 400.
In view of subsequent developments above related we are of opinion that complainants were not guilty of laches, nor estopped either equitably nor judicially.
It is argued that the statements of the City Manager and of the Law Director were those of individuals and not binding on the City, with reference to the later occurrences. We do not subscribe to that view. If these men were wronged, it was not only because of the individual accuser but also because of the manner in which the representative of the City handled the charge. This was certainly the act of the City. Hence, when the same representatives of the City sought to make amends and correction of the wrong, it was likewise the act of the City; the representative simply went about it the wrong way.
It is argued that complainants are guilty of laches because two years elapsed before duress was charged. Also that there is judicial estoppel because of the sworn petitions for mandamus, the pertinent language of which is quoted, supra, in which they stated the facts as to their resignations, which language the Court of Appeals held to be a statement that the resignations were voluntary, citing Melton v. Anderson, Tenn. App., 222 S.W.2d 666.
There can be no misapprehension at this date about the rule of judicial estoppel; as fully shown in that opinion the basis of the rule is not whether prejudice resulted to the other party but is the prejudice resulting to the administration of justice if a litigant were allowed to swear one way one time and a different way another. But it is equally conducive to the attainment of justice and hence just as important *568 a part of the rule that the party be allowed to explain an ostensible inconsistency, or that the statement was made inadvertently, inconsiderately or by mistake.
There can scarcely be any doubt that the City is responsible for both the laches and the euphemistic averments of the language of the prior pleadings, of which it now seeks to take advantage. The same will not be permitted here.
The argument as to res adjudicate is to be resolved on the same basis. The Court of Appeals acted on what was before it, but the true facts did not appear because the City had not wanted them to appear and had so requested the complainants, who acted accordingly. The City is itself patently estopped to rely on these defenses.
We overrule all assignments and affirm the decree of the Chancellor with cost. Decree will be entered here accordingly.
ANDERSON, P.J., and BAPTIST, J., concur.
| |
Recently, more research has been working towards different dimensions for memory––specifically 2.5D high-bandwidth memory and 3D NAND. Aside from those two dimensions, 2D is also making waves with the concept of spintronics and graphene.
An example of general 2D, 3D, and 2.5D technology integration. Image used courtesy of Shen et al
With research being conducted on 2D memory with spintronics and graphene, the question of how 2D memory and spintronics work together, especially with a focus on data-processing applications.
Spintronics and 2D Memory for Data-Processing?
Industry-standard spintronic devices typically utilize cobalt electrodes to inject and detect spin currents within graphene. Magnetic graphene can inject, detect, and transport spins by itself, leading to the realization of new 2D-spin logic circuitry.
How does this play into data-processing systems?
Modern computer systems are built around the Von Neumann architecture, meaning data storage is separate from the processing unit. This separation causes power and time consumption for proposed large data systems, requiring external discrete devices for constant data transmission.
Two-dimensional layered materials provide design flexibility to leave behind standard data processing and storage practices and move into designing high-performance memory devices. These 2D memory devices will have various combinations, from graphene and black phosphorus to hexagonal boron nitride and other metal carbide materials. These combinations lead to a device with a larger bandgap, faster write/read speed, higher memory density, and smaller footprint capability.
Researching Magnetic Moments
Spintronic devices provide high-speed and energy-saving abilities to the table, potential alternatives to conventional electronics. Using a magnetic moment, the magnetic strength and orientation of a magnet, or object that produces a magnetic field, cause the movement of electrons to store and transfer information. Spintronic research has sought out atomically thin materials to scale down spintronic memory devices to meet the current demand for small-scaled electronic footprints.
The use of graphene material has been a promising approach for 2D-based designs. Still, it has always needed additional components due to the disadvantage of not self-generating spin currents. Studies suggest that if graphene were to be modified to act as a magnetic material, the magnetism would help generate the spin current needed to store and transfer data without external elements.
Researchers from the Physics of Nanodevices at the University of Groningen, Zernike Institute for Advanced Materials, applied the study on magnetizing graphene to experimental trials to confirm if the modified material would generate a highly spin-polarized current.
A simplified schematic of the researched device, which shows the electrical and thermal generation of spin currents in a bilayer graphene/CrSBr heterostructure. Image used courtesy of the University of Groningen
The main takeaway from their research is ultimately how, by magnetizing graphene, this material could become a potential choice to further 2D spin-logic devices since it can efficiently convert the charge to spin current and then transfer it over long distances.
With this potential avenue opening up, the door to further 2D research memory can open up just a bit further. Despite this opportunity, how could 2D materials become integrated into traditional memory devices?
Integrating 2D Materials into Traditional Memory Devices
Understanding that graphene plays a crucial role in developing 2D-based devices, researchers at the Chinese University of Hong Kong began experiments to find ways to implement 2D materials with current memory devices to improve performance.
The researchers proposed a ferroelectric field-effect transistor (FeFET) to be used to showcase resistive switching and charge capture/recapture as it is placed with traditional non-2D material without sacrificing any unique qualities. In theory, combining 2D materials with functional materials can cause higher power consumption and increase the footprint.
Memristors are used as artificial synaptic devices. These passive, two-terminal electrical components can hold a resistive state that cannot be replicated by any combination of resistors, capacitors, or inductors. The memristor has a variable resistance, which means that it depends on the historical sum of the current that has passed through the device.
A flowchart and schematic that shows the memristive mechanisms for polarization switching and resistive switching through 2D materials. Image used courtesy of Li et al
There are variations of memristors altered with applied mechanisms; conductive filament (CF), grain boundary (GB), phase-transition, and ferroelectric 2D memristors. CF memristors can control the ionic movement of particles when metal oxides are injected; however, they suffer from random uncontrolled movement when an electric field is present.
GB memristors are critical in establishing predefined paths for the migration of electrons, atoms, and ions. The GB memristors were proven to have conducted heat that ruptured the functional material during the experimental trial.
Phase-transition memristors are a very challenging approach; however. During the study, the researchers converted an electric field into the in-plane motion of the pre-intercalated lithium ions. This method was not a replicable approach for mass production. The last tried memristor variation was the ferroelectric approach.
By applying an external electric field, the material had a spontaneous electric polarization that is reversible. Ferroelectric-based materials offer a more extensive dynamic range due to a sensitive overlay of the channel and electrode. This range will bring forth a new switching power of ferroelectric switching, though further testing is necessary to see if it can outshine resistive switching.
Even with the waves of innovative research coming out on 2D memory and materials, where will this research lead towards? If more research can be done focusing on 2D, could it leave an impact on the tech industry?
Preliminary Stages of 2D Memory
Even with studies being done on graphene and on ways to integrate 2D materials with existing systems, each perspective proves that there is still much to overcome in developing 2D memory devices. Creating 2D memory devices will positively impact the large data technologies, cloud computation, and artificial intelligence markets.
To meet the large data demand, researchers and developers must continue to dive into the use of 2D materials for new memory devices. Overcoming the design challenges will allow memory devices to establish low power consumption, increased write/read speeds, and smaller device size for 2D memory technology.
Interested in learning more about other spintronic advancements? Find out more down below.
Researchers Make Strides in “Spintronics” (Spin Electronics)
NYU and IBM Researchers Discover a New Spintronics-Based Fast Data Transfer Solution
Spin-Gapless Semiconductors Show Promise in Spintronic Devices
For lighting, electrical, signage, and technology solutions that allow you to do more call Sverige Energy today at +4(670) 4122522. | https://sverige.energy/%D1%81ircuits/reaching-towards-2d-memory-is-magnetic-graphene-and-spintronics-the-key |
In the Building Envelope 1 course, the design and performance of above grade envelope assemblies were covered. In the Building Envelope 2 course, below grade assemblies including basements, crawlspaces, parkades, podium waterproofing, foundation walls, and slabs on grade and slabs below grade, will be addressed. The course will pivot to more advanced application of the theoretical and practical aspects of building envelope design. This will include design review of proprietary building envelope assemblies, establishing effective thermal performance of complex buildings and building envelope condition assessments and forensics. Case studies will be used to develop the student's abilities to make and communicate engineering judgements. Topics include: Below grade assemblies including walls, floor, and roof assemblies separating both heated and unheated spaces from the ground. Design and performance aspects with respect to the control of surface water, ground water, heat loss, vapour diffusion, air leakage, condensation, as well as improving long term durability of the assemblies. Overview of Building Codes applied to below-grade assemblies 2D and 3D building envelope details of below grade assemblies. Assessing performance and risks of "proprietary" panelized envelope systems such as curtain wall, window wall, mass timber panels and precast concrete. This will include assessment of 2D and 3D building envelope details with the specific focus on the "continuity" of the building envelope control layers (rain penetration control, thermal insulation, air barrier, and vapour retarder/barrier). Design of high thermal performance envelopes including use of BC Hydro's Thermal Bridging Guide and other tools to assess and reduce the impact of thermal bridging in buildings. Building envelope condition assessment methods, common failure modes, and remedial strategies using case studies Innovations and research pertaining to building envelope assemblies and components with the focus on moisture, air, heat management, and durability.
3.0
Upon successful completion of this course, the student will be able to:
Effective as of Fall 2021
BSCI 9220 is offered as a part of the following programs:
Interested in being notified about future offerings of BSCI 9220 - Building Envelope 2? If so, fill out the information below and we'll notify you by email when courses for each new term are displayed here. | https://www.bcit.ca/study/courses/bsci9220 |
LatencyInternet traffic travels at the speed of light. That means that a request from a web-surfer in California to a web server in New York takes about 0.03 seconds (30 milliseconds) to make the round trip. In practice, because the request may pass through a dozen or more routers and switches, each with some delay, it will average about 90 milliseconds for a good connection.
With satellite connections the distances are so vast that even light speed isn't fast enough to not be noticeable. The satellites used are 22,000+ miles above the equator, so the round trip in on the order of 95,000 miles from North America. That means there will be a round trip of over 500 milliseconds, not counting the normal Internet switching and routing. The satellite switches are also relatively slow (they route the signal between up and downlinks), so that the fastest possible connection is about 650 milliseconds.
This time lag is called latency, and is used to explain some of the problems for such Internet uses as VoIP and real-time gaming. | http://datastormusers.com/glossaryterm.cfm?phrase=latency |
CROSS-REFERENCE TO RELATED APPLICATION
BACKGROUND OF THE INVENTION
CITATION LIST
SUMMARY
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
Effects of the Disclosure
Other Embodiments
REFERENCE SIGN LIST
This application is based on and claims the benefit of the priority from the earlier Japanese Patent Application No. 2015-233986 filed on Nov. 30, 2015 the description of which is incorporated herein by reference.
Technical Field
The present invention relates to techniques for assisting a driver who is driving, and more specifically relates to an apparatus for alerting the driver of a red light in a travelling direction of a host vehicle.
Related Art
Driving assistance has been adapted to obtain information of a road status of position ahead of a vehicle and a current position of the vehicle to increase a driver's awareness, avoid collision and provide efficient navigation thereby improving a gasoline mileage of the vehicle.
Patent literature 1 discloses a driving assistance apparatus which recognizes a driving lane in which a host vehicle is travelling, acquires traffic signal data of a traffic light in a travelling direction of a host vehicle, and alerts the driver to a red light existing in a travelling direction thereof, for example.
[Patent Literature 1] JP 2008-242986 A
In order to save fuel, particular regions around the world have implemented a road system which permits a left or right turn even at a red light. Driving assistance is considered to be equally critical in such designated regions, in addition to non-designated regions. The Japanese Patent Literature 1 does not however accommodate such driving assistance in the designated regions which may cause inconvenience to drivers.
In view of the circumstances described above, it is an object of the present disclosure to provide suitable and flexible driving assistance at a red light regardless of the region.
190
110
140
160
180
A driving assistance apparatus of the present disclosure is provided with a traffic signal recognition unit, a position recognition unit, a notification unit () and a prohibition unit (steps S to S and steps S to S).
190
110
140
160
180
The traffic signal recognition unit recognizes a state of traffic light in a travelling direction of a host vehicle. The position recognition unit recognizes a position of the host vehicle. The notification unit (S) issues a notification of a red light when a state of a traffic light is recognized as being a red light at the traffic signal recognition unit. The prohibition unit (S-S, S-S) prohibits a notification from being issued by the notification unit if a determination unit determines the position of a host vehicle is within the designated regions.
The configuration set forth provides a suitable and flexible driving assistance system to the driver which can be applied to both designated regions and other regions that are not designated.
It is noted that the symbols set forth in in the specifications and the claims are provided to explicitly describe a preferred embodiment and do not limit the technical scope of the invention.
With reference to the accompanying drawings, a preferred embodiment of the present invention will be described.
1
2
3
4
5
6
7
6
FIG. 1
A driving assistance system shown in is a system mounted in a vehicle, is provided with an image sensor , a navigation apparatus , on-vehicle sensors , a road-vehicle communication device , an assistance execution unit , and a control device unit . The assistance execution unit described here is equivalent to a driving assistance apparatus.
2
The image sensor is provided with a CCD camera having a color indicator function, and is set to capture an image around a host vehicle, that is, at least in an area in front of the host vehicle.
3
3
FIG. 4
The navigation apparatus is a known apparatus which acquires positional information from, for example, a GPS (Global Positioning System), displays a position of the host vehicle on a map of a surrounding area of the host vehicle, sets a route to a selected destination and provides route guidance to the destination. The navigation apparatus maintains road regulation information, road sign information and lane information, for example. The road regulation information includes, for example, at least information on whether a region is a designated region as shown in , which is a region allowing a left or right turn at a red traffic light, for example, hereon, referred to as a “designated region” or whether it is not a “designated region” and therefore referred to as “non-designated region” hereon. The road sign information refers to information related to roads signs placed on a road side and signs on a road surface. Additionally, lane information is information related to a number of lanes and to left or right turn only lanes.
4
On-vehicle sensors are made up of each type of sensors for detecting a driving operation and host vehicle behavior. In the example, at least a vehicle velocity sensor detecting a velocity of the host vehicle and a direction indicator sensor detecting an operational state of the direction indicator are included.
5
3
The road-vehicle communications device acquires each item of information by communicating with a road side apparatus set in a vicinity of a road. The acquired information may include, for example, information showing an operational state of the infrastructure of a traffic light, in addition to same road regulation information that is maintained in the navigation apparatus described above, sign information and lane information.
FIG. 1
7
71
72
73
71
72
73
As is shown in , the control device unit is provided with a display unit , an alarm and a vehicle control device . The display unit is a monitor displaying each type of image. The alarm is provided with, for example, a speaker outputting an alarm sound and a voice message. The vehicle control device is provided with each type of device for controlling an engine, a brake, and steering wheel, for example. The devices mentioned above are known devices therefore a detailed description is omitted here.
6
6
6
The assistance execution unit is configured mainly of a known microcomputer having a CPU (central processing unit), a RAM (random-access memory), a ROM (read-only memory) and a semi-conductor, for example, a flash memory (hereon referred to as memory). Each function of the assistance execution unit is enabled by the CPU executing a program stored in a non-transitory recording media. By executing the program a corresponding method is thus executed. The assistance execution unit may be formed from one or more than one microcomputers. In the example, the memory refers to a program stored in the non-transitory recording media which refers to any media that stores data and information.
6
61
62
63
64
65
66
67
6
67
67
67
67
67
67
67
The assistance execution unit is provided with at least a position recognition unit , a traffic signal recognition unit , a sign recognition unit , a lane recognition unit , an instruction detector , a velocity detector and a red-light notification unit , as a functional system implemented by the execution of a program which is executed by the CPU. The method to actualize the components forming the assistance execution unit is not limited to software, that is, either a part or all of the members described above may be actualized by, a logic circuit and an analog circuit-combined hardware, for example. The red light notification unit is further provided with a notification unit A, a determination unit B, a prohibition unit C, a prohibition invalidation unit D, an intention determination unit E and a non-designated region prohibition unit F.
61
3
3
62
2
62
5
The position recognition unit , acquires a current position of the host vehicle via the navigation apparatus . The current position of the host vehicle may however be acquired directly from the GPS receiver, without going through the navigation apparatus . The traffic signal recognition unit processes the image data acquired at the image sensor and in doing so extracts a traffic light information in a travelling direction of the host vehicle and recognizes a state of the traffic light. The state of a traffic light is an operational state thereof. That is, the signal recognition system recognizes at least whether or not the traffic light is on red. The information related to the state of the traffic light may be information acquired from infrastructure via the road-vehicle communication device .
63
2
3
5
FIG. 5
The sign recognition unit recognizes traffic signs included in the image, by processing the image acquired at the image sensor . The traffic signs include road signs shown on a road surface, in addition to road signs shown at a road side. As shown in , traffic signals subjected to recognition are road signs used in the designated regions, which include at least, a sign prohibiting a right turn at a red light or a sign prohibiting a left turn at a red light (hereon referred to as “a prohibition sign for a left or right turn at a red light”), and a road sign or road surface sign showing the host vehicle lane is a turn left or right only lane. The information used may be information acquired from the navigation apparatus and information acquired via the road-vehicle communication device for example.
64
2
3
61
The lane recognition unit recognizes a driving lane which is a lane in which the host vehicle is currently driving (traveling on), by processing the image acquired at the image sensor . Incidentally, recognition of the driving lane, is however not limited to processing the acquired image, and may be recognized by a combination of road information acquired from the navigation apparatus and the position of the host vehicle recognized at the position recognition unit .
65
4
66
4
The instruction detector detects the operational state of the direction indicator, based on a turn signal which is output from the direction indicator sensor included in the on-vehicle sensors . The velocity detector detects vehicle speed which is a velocity of the host vehicle based on an output of the velocity sensor included in the on-vehicle sensors .
67
61
62
63
64
65
66
The red light notification unit issues a notification about a red light based on recognition results of the position recognition unit , the traffic signal recognition unit , the sign recognition unit , and the lane recognition unit , and detection results of the instruction detector , and the velocity detector .
67
67
67
190
67
67
67
67
110
140
160
180
FIG. 2
Components configuring the red light notification unit will now be described with reference to the functional block diagram shown in . The notification unit A issues a notification of a red light signal when the state of a traffic light is on red (:S). The determination unit B determines whether the position of the host vehicle is in a designated region. The prohibition unit C prohibits the notification from being issued by the notification unit A when a positional condition is satisfied (:S-S, S-S). More specifically, if the positional condition of the host vehicle is determined to be within the designated regions where a left or right turn is permitted at a red light, the notification is not issued.
67
67
63
67
150
The prohibition invalidation unit D invalidates the prohibition of issuing the notification of a red light issued by the prohibition unit C when a traffic sign recognized by the sign recognition unit shows that a left or right turn is prohibited if a traffic light is on red (:).
67
67
120
140
160
180
67
67
63
67
110
160
180
67
The intention determination unit E determines that a driver of the host vehicle has an intention to turn left or right as an intention condition (:S-S, S-S). The non-designated region prohibition unit F prohibits the issue of the notification of a red light to the driver in non-designated regions, when the prohibition unit C recognizes the position as being in a non-designated region and an arrow signal is recognized at the signal recognition unit (:S, S-S). This applies if the intention of the driver determined at the intention determination unit E and an arrow signal are the same. The arrow signal mentioned here permits a left or a right turn at a red light. The process of a red light notification will be further described in the next unit.
Process
FIG. 3
67
62
Now referring to the flow chart in , a red light notification process executed by the red light notification unit will be described. The process is initiated when a red light is recognized at the traffic signal recognition unit .
100
110
62
61
3
5
120
160
Once the process is initiated, at step S the position of the host vehicle is acquired. At step S, the CPU functioning as the traffic signal recognition unit determines whether a current position of the host vehicle is within the designated regions as a positional condition based on the current position recognized at the position recognition unit and pre-specified information of designated regions, acquired via the navigation apparatus or via the road-vehicle communication device . Specifically, the CPU determines whether the positional condition is satisfied, in other words, if the current position of the host vehicle is within a designated region permitting a left or right turn at a red light. When the positional conditions are satisfied the process can proceed to step S, when the positional condition are not satisfied the process proceeds to step S.
120
63
64
150
130
120
67
At step S, the CPU determines if the driving lane of the host vehicle is a turn left or right only lane, based on the recognition results at the indication recognition unit and the lane recognition unit . When the driving lane of the host vehicle is a turn left or right only lane, it is judged accordingly that the driver intends to make a left or right turn and the process can proceed to step S. When the lane is not a left or right turn only lane, the process proceeds to step S. The S is equivalent to the intention determination unit E.
130
65
140
190
At step S, the CPU determines if there is a turn signal, more specifically, determining whether the driver instructs a right turn or a left turn based on detection results of the instruction detector . When the turn signal is activated the process can proceed to step S and when the turn signal is not activated, it is assumed that the driver has an intention to go straight and the process proceeds to step S.
140
66
150
190
At step S the CPU determines if the vehicle speed is lower than a pre-set threshold velocity, based on detection results of the velocity detector . When the vehicle velocity is lower than the threshold velocity, it is judged that the driver intends to make a left or right turn and the process can proceed to step S. When the vehicle velocity is determined as being higher than the threshold velocity, the driver's intention is determined as being unclear and the process proceeds to step S.
150
63
190
At step S the CPU determines whether the prohibition sign for a left or right turn at a red light is recognized, based on recognition results of the recognition determination unit . When the prohibition sign for a left or right turn is recognized, the process can proceed to step S, on the other hand, when the prohibition sign is not recognized it is determined that a left or right turn can be made even at a red light, and the process is completed without the notification of a red light.
160
62
170
190
At step S, the CPU determines whether an arrow signal permitting left or right turn is shown based on recognition results of the traffic signal recognition unit . If the arrow signal is shown the process can proceed to step S, if however it is not shown the process proceeds to step S.
170
63
64
180
At step S, the CPU determines whether the driving lane of the host vehicle is a left or right turn only lane, and also whether a direction of the left or right turn is the same as a direction of an arrow sign, based on recognition results of the sign recognition unit and on the lane recognition unit . At this point, if affirmative judgment is made, more specifically, if determined that a left or right turn can be made even at a red light, notification of the red light is thus omitted, and the process is completed. When the left or right turn is not the same as the direction shown on an arrow, the process proceeds to step S.
180
65
190
At step S, the CPU determines whether the direction of the detected turn signal is the same as the direction of the arrow sign based on detection results of the instruction detector . When the direction of the turn signal is the same as the direction of the arrow sign, it is determined that a left or right turn is permitted even at a red light, thus, notification of a red light is omitted and the process is completed. When the direction is determined to be not the same as the arrow sign, the process proceeds to step S.
190
71
72
At step S, optical or audible notification enables the driver to recognize that a light is on red, using at least one of a display unit and an alarm , and the process is completed.
190
67
110
140
160
180
67
150
67
120
140
160
180
67
110
160
180
67
120
130
140
170
180
It is noted that, step S is the notification unit A, steps S to S and steps S to S are the prohibition unit C, step is the prohibition invalidation unit D, steps S to S and steps S to S are the intention determination unit E, step S and steps S to S are the non-designated region prohibition unit F. The intention conditions are affirmative at step S, affirmative at both steps S and S, and affirmative at either step S or step S.
As described above, according to the preferred embodiment, in designated regions which permit a left or right turn at a red light, a red light signal is still notified if the driver's intention to make a left or right turn is unclear, and if there is the prohibition sign for a left or right turn at a red light. In the non-designated regions, the red light is notified to the driver, unless the left or right turn only driving lane or the direction shown by the direction indicator and the direction shown by the arrow sign are the same. Additionally, in the preferred embodiment, when the red light is recognized, unnecessary notifications are decreased resulting in suitable and flexible driving assistance that accommodates assistance in both pre-specified and non-designated regions.
A mode to carry out the invention has been illustrated and described herein, but it should be understood that various changes and modifications may be made without departing from the spirit and the scope of the invention.
For example, in the embodiment notification of a red light signal is adopted, however, other means of notification may be employed to notify to the driver that a left or right turn is permitted even at a red light in the relevant areas when necessary.
In a further example, an element in the embodiment having a function may be divided into a plurality of elements, on the other hand, a plurality if elements having one function may be combined into one element. A part of the elements in the preferred embodiments may also be omitted, and at least a part of the elements in the present configuration set forth may be incorporated (added or substituted) into another embodiment.
In addition to the driving assistance apparatus actualized as the assistance execution unit described above, a program for functioning a computer, a non-transitory recording media of the program recorded in, for example a semiconductor memory, a driving assistance method and the like, that is, various aspects of the claimed subject matter can be used to actualize the driving assistance apparatus.
1
2
3
4
5
6
7
61
62
63
64
65
66
67
71
72
73
driving assistance system, image sensor, navigation apparatus, on-vehicle sensors, road-vehicle communication device, assistance execution unit, control device unit, position recognition unit, traffic signal recognition unit, sign recognition unit, lane recognition unit, instruction detector, velocity detector, red light notification unit, display unit, alarm, vehicle control device.
BRIEF DESCRIPTION OF THE DRAWINGS
The following detailed description of the illustrative embodiments can be understood when read in conjunction with the following drawings. In the accompanying drawings:
FIG. 1
is a block diagram showing a configuration of a driving assistance apparatus according to a preferred embodiment;
FIG. 2
is a functional block of a red light notification unit;
FIG. 3
is a flow chart of a process executed by a red light signal notification unit;
FIG. 4
is explanatory diagram showing a left or right turn permitted state even at the red light; and
FIG. 5
is an explanatory diagram exemplifying a prohibition sign for a left or right turn at a red light. | |
As a designer, it can be challenging to bring classic traditions into a modern layout. That was the challenge in this gorgeous Purchase home.
The kitchen strikes a balance between the natural and the industrial, utilizing stone, wood, and leather alongside frosted glass and steel.
Crystal chandeliers play off of the open windows grid, emphasizing sunlight and nature as a backdrop to this refined setting.
Clean lines and minimalistic layouts allow for a tranquil feeling in the kitchen.
The Details of the Kitchen
Click on various elements of this room to learn a little bit more about the pieces that brought this all together.
Island Chairs
These gorgeous leather bar style chairs are etc etc
Crystal Chandeliers
Here is some information all about the chandelier, etc etc.
Cabinets
This carefully selected cabinetry takes a minimalist approach using wood textures that are framed in clean steel lines.
Upper Cabinets
This modern industrial cabinetry offers a refreshing contrast to the elements of nature that shine through in the windows around them.
Crystal Chandeliers
These chandeliers are beautiful and let in the sun etc etc etc
Appliances and Cabinetry
It was important that the cabinets and appliances merge together to create one overall impression on the viewer. | http://www.ajoycedesign.com/projects/80/ |
Plantar Fasciosis can be a very difficult condition to treat because of the intricate anatomy of the foot and ankle complex. To complicate issues, we now know that many lower quarter problems root from lumbopelvic and hip dysfunction as well. In previous posts, TSPT has done a literature review of the condition as well as talked about new treatment methods regarding plantar fasciosis. In these posts, one aspect of management we did not discuss in depth is assessing for neuropathic pain. From my clinical experiences and the experiences of my colleagues at the Harris Health System, many patients with plantar fasciosis have positive neural provocation tests for the distal branches of the tibial nerve.
Anatomy Review
After the tibial nerve passes around the medial malleolus, it splits into three distal branches: the medial plantar nerve, lateral plantar nerve, and medial calcaneal branch. Specifically, the lateral plantar nerve innervates the fifth and lateral 1/2 of the fourth toes and provides motor input to many of the intrinsic foot muscles. The nerve passes laterally across the foot and splits between the flexor digitorum brevis and quadratus plantae.
Assessment
To assess for tibial nerve adverse neural tension, have the patient lie supine. Passively extend the toes, dorsiflex and evert the ankle. This combined movement place a stress across the tibial nerve and its distal branches. Ask the patient if this position changes their primary symptoms (better, worse, or the same). Next, passively perform a straight leg raise maintaining the foot and ankle components. If this position recreates their primary symptoms, they have positive neural tension in the tibial nerve* (remember to test bilaterally as well). To further assess the tibial nerve, adduct and internally rotate the lower extremity. If the test is positive, appropriate treatment options include nerve sliders, tensioners, and manual therapy.
*When performing a straight leg raise, you are changing the hip component. No musculoskeletal structure courses from the hip to the ankle, so if symptoms change it must be the nervous system that is being assessed.
Conclusion
-Lateral plantar nerve pain can be a contributing factor to plantar fasciosis pain.
-By performing the proper assessment (discussed above), you can identify if neural tension is part of your patient's symptoms.
-Do not underestimate the impact of the peripheral nervous system in musculoskeletal dysfunction.
Lower Extremity Peripheral Nerve Testing
[Video taken from TSPT Insider Access Library- subscribe to learn other advanced assessments!]
Author: Jim Heafner PT, DPT, OCS is one of the founders of The Student Physical Therapist. He is owner of Heafner Health Physical Therapy in Boulder, Colorado.
Are You on the Inside?
Looking for advanced sports and orthopedic content? Take a look at our BRAND NEW Insider Access pages! New video and lecture content added monthly.
Barefoot Running: Review of the History of the Barefoot Movement by The Gait Guys
5/26/2014
The Gait Guys recently re-posted one of their original articles, and it occurred at the beginning of the barefoot running trend. As you'll read in the article, barefoot running had advocates decades before the "vibram five-finger movement." There are many reasons for this as barefoot running has been shown to improve sensory feedback in the feet and foot intrinsic muscle control. There have been some studies that have shown decreased force translation into the lower extremity due to the development of a more efficient gait pattern. Since this article was written, quite a bit more research has been done on the topic. As you may be aware, while barefoot running may be an excellent form of running for some, it is not true for others. Some are born with anatomical foot abnormalities that make barefoot running unrealistic. With a slight change in foot structure, the majority of the force goes through one area which can lead to fractures or other overuse injuries. Even so, the article is definitely worth reading as it details how humans have used their feet over time and the response the neurological and dermatological systems have when exposed to the ground without a medium.
ATFL Sprain or Neural Tension
3/5/2014
Following a lateral ankle injury, a patient often presents with swelling, pain, decreased ROM, an acute joint dysfunction, and decreased proprioception in the foot and ankle. Depending on the severity of the injury, these symptoms usually begin to improve within a matter of weeks. However, occasionally symptoms persists despite doing all the proper things during your treatment sessions.
Most commonly, if a lateral ankle injury occurs the Anterior Talofibular Ligament (ATFL) will be stressed and injured. The mechanism of injury stressing the ligament typically includes adduction and traction of the talus on a plantarflexed and inverted foot. What many individuals fail to consider is the close interaction between the Intermediate Dorsal Cutaneous Nerve (a branch of the superficial peroneal nerve) and ATFL. The Intermediate Dorsal Cutaneous Nerve courses just superior to the ATFL and can also undergo a significant amount of stress during a lateral ankle inversion injury. The nerve is purely sensory and provides sensation to the dorsal aspect of the foot. When the nerve has been irritated, common clinical findings include pain, paresthesia, and a + Tinel's Sign.
To check for neural tension in the superficial peroneal nerve (you cannot solely tease out the Intermediate Dorsal Cutaneous Nerve), have the patient lie in supine. Bring the affected foot and ankle into plantar flexion and inversion. Next, perform a straight leg raise on the affected limb while maintaining the foot in PF and Inversion. If pain increases, this is positive neural tension. It is very important to perform the straight leg raise because if you only perform PF and Inversion, pain could be coming from either the ligamentous injury or neural tension. You must further tension the nerve proximally.
One should be quick to point out that neural tension may be present, but it is not always the cause of a person's symptoms. In order for the neural tension to be considered relevant adverse neutral tension it must fulfill 3 criteria:
1) Does the test reproduce their pain?
2) Is there a side to side difference?
3) Does the pain change by moving a distant component?
Assessing neural tension is one quality that differentiates the novice clinician from an expert. Next time you see a lateral ankle injury, consider the interaction between the Anterior Talofibular Ligament and the Superficial Peroneal Nerve.
Quick Gait Assessment
7/27/2013
In the clinic, we often only have the length of the gym to analyze a patient's gait pattern. They patient may walk back and forth 2-3 times, giving you a total of 30 seconds to 1 minute to fully assess their pattern and recognize any deviations.
In this post from the Physioblogger, he discusses his Quick Gait Assessment. His assessment includes looking at the feet, hips, and trunk. He starts at the feet and works cephalad. Beginning at the feet, he assesses heel to toe progression and the amount of pronation/supination. Next at the hips, he analyzes frontal plane motion and the amount of pelvic sway. Finally in the thoracic region, quick notes are made on the amount of arm swing and trunk stiffness.
Important points:
-No diagnosis is made during the gait assessment. Formulating hypotheses as to why a deviation is present is fine, but do not make definitive judgements as to why deviations are occurring. It is simply an observation.
-Always remember a patient's injury, mechanism, lifestyle. What structures are involved? How can this injury/ their lifestyle impact the gait cycle?
-If possible, videotape your patients! Watch their gait patterns after they are gone. Take a few notes, perform the appropriate tests and measure, and act accordingly!
Everyone has a different system they use for their quick gait assessment. Having a consistent method and practicing that method is important to your success as a therapist. Remember, we are movement analysis specialists.
Because we all strive to be movement analysis specialists, a little gait mechanics review never hurts.
Each graph breaks down the ROM requirements, muscle, torque demand, and functional significance as described by Rancho Los Amigos.
All graphs courtesy of Saint Louis University student, class '12.
Plantar Fasciopathy
10/13/2012
It has been estimated that Plantar Fasciitis occurs in approximately 2 million people and can account for between 8% and 15% of all foot pain complaints. While the term "-itis" is often associated with inflammation, there is growing evidence that there might not be an inflammatory state, but rather a degenerative process occurring in the plantar fascia. Because of this growing belief, authors are saying a more appropriate term would be "plantar fasciopathy" or "plantar heel pain."
Plantar heel pain is best described as a sharp pain in the patient's rear foot that is worse in the morning (usually the first step out of bed) and at the beginning of a weight bearing activities. The pain typically lessens with continued activity, but often increases toward the end of the day. Individuals most susceptible to developing heel pain are middle-aged women, obese individuals, athletes, and runners. Clinically, you will see excessive pronation and a depressed longitudinal arch in many of these clients. Some extrinsic factors contributing to the pathology include training surfaces, shoe wear, and poor training methods. Understanding the anatomy makes it clear why this population is at an increased risk. The plantar fascia runs from the medial tuberosity of the calcaneus and inserts into the metatarsophalangeal joints, the proximal phalanges, and the flexor tendon sheaths. The fascia is responsible for supporting the longitudinal arch of the foot and assisting in dynamic shock absorption. The attachment of the plantar fascia to the medial calcaneal tuberosity explains why patients often experience pain upon palpation of that area.
Diagnosis of plantar fasciopathy is often made on a clinical basis. Due to degenerative changes and tendon thickening, the diagnosis may be made with an ultrasound as well. Current treatment methods include rest, modalities, stretching, strengthening, manual therapy, splinting, orthotics, surgery, and more. New research is constantly being published due to the high incidence of the injury. This review will take an in depth look at several of the available treatment techniques for plantar fasciopathy. Many of the studies we looked at included strengthening and stretching in the treatment plans along with some other intervention. Improvement was often shown in both groups, but we were unable to find any studies that specifically looked at one type of strengthening exercise compared to another. Some of the most common barefoot exercises seen in the clinic include towel scrunching and picking up marbles. Due to the biomechanical theory of the plantar fascia aiding in the support of the medial arch, it would seem logical to include strengthening of the posterior tibialis in rehabilitation. The posterior tibialis is the prime muscle for raising the medial longitudinal arch and can take stress off the plantar fascia. As noted in our previous posts, the exercise to most effectively activate the posterior tibialis is resisted forefoot adduction.
Another study we reviewed compared a new calcaneal taping technique versus a sham taping group, a stretching group, and a no treatment group. The calcaneal taping technique inverted the heel to raise the medial longitudinal arch. A first piece of tape pulled the calcaneus medially. Pieces 2 and 3 followed the same pattern, overlapping 1/3 of each prior piece of tape. Piece 4 wrapped around the heel lateral to medial, supporting the arch and anchoring pieces 1-3. This 4 piece technique was considered quick and cost effective. This calcaneal taping intervention resulted in significantly greater reductions in pain compared to the sham taping, stretching, and no treatment groups. Additionally, a study comparing Medial Arch Support to Low-Dye Taping found that both groups had improvements in pain, but the Medial Arch Support had significantly greater improvements. These interventions should be considered for short-term relief, so that the patient can be pain-free for more intense therapy or activities.
A third intervention we reviewed assessed the effects of low level laser therapy in the treatment of plantar fasciitis. Laser treatments were given 3 times per week for 4 weeks with a 30mW . 83 um continuous-wave IR diode laser. The goal of the laser therapy was to alter cellular metabolism, protein synthesis, and create an immune response. The conclusions of randomized controlled evaluation found that low level laser therapy was not beneficial in the treatment of plantar heel pain. A study we looked at compared the effects of stretching and orthotics vs. e-stim, stretching, and orthotics. Both groups improved, but there was not difference between the two groups, so e-stim appears to have no additional benefit.
With the recent boom in barefoot running, there has been a movement to begin incorporating barefoot or minimalist exercises/training into rehabilitation of plantar fasciitis. The theory involves placing increased forces on the intrinsic muscles of the foot, so that they can be retrained to support the arch and take stress off the plantar fascia. A study we looked at how the addition of Nike Free 5.0 shoes could affect the patients' complaints. The Nike Free 5.0 shoes offer a flexible midsole that somewhat mimics barefoot training. In the study, two groups were assigned an exercise protocol that involved balance training, stretching and strengthening exercises. One group wore conventional shoes, while the other wore the Nike Free 5.0 shoes. At the end of the study, both groups had a significant decrease in pain, the Nike Free 5.0 shoes more so. Due to the poor design, the results of this study must be looked at closely. At 24 participants, it was a small sample size and there may have been a psychological effect, since the Nike group received new shoes, while the conventional group used old shoes. Along with other factors, it is not clear if minimalist shoes can enhance rehabilitation for individuals with plantar fasciitis. It would be interesting to see the effect of more minimalist-type shoes (New Balance Minimus, Vibram Five Finger, etc.) could have on therapy in a properly done study.
One of the more common interventions that is performed is stretching. A study we looked at compared the results of the standard achilles tendon stretch to a sitting plantar fascia stretch. For the plantar fascia stretch, the patient would cross his/her legs and place the affected foot on the opposite knee. The patient then grasps the toes (especially the big toe) and maximally dorsiflexes them until a stretch is felt in the foot. In the study, the patients would perform their stretch first thing in the morning and before getting up after sitting for awhile. The study found both interventions to be successful, but the plantar fascia specific stretch more so. It should be noted that the study had no true control to rule out the patients' improvements due to natural healing processes.
Dry needling is still a limited treatment technique for physical therapists; however, patients can have access to acupuncture on a wider basis. One article compared two groups to see the effect of acupuncture on plantar fasciitis. Both groups received standard treatments, such as icing, stretching, intrinsic foot strengthening, and NSAIDs. One group received acupuncture, additionally. Both groups found improvements in pain. There was no difference between the two groups after 4 weeks, but the acupuncture group was slightly better after 8 weeks.
A treatment technique that is gaining popularity involves Instrument Assisted Soft Tissue Mobilization (IASTM). There are many products out there that fall under the category of IASTM: Graston Technique, ASTYM, Edge Tool, etc. The theory is generally the same behind them in that, through use of the tools, a healing inflammatory phase can be initiated by stimulating blood flow, nutrients, and fibroblasts to the area. Through proliferation of the fibroblasts, healing and formation of collagen can begin. The soft tissue mobilization can additionally aide in reorganization of the collagen fibers to proper orientation. This study in particular was a preliminary look at Graston Technique, discussing the theory, protocol, initial evidence, and some case studies. As plantar fasciitis is a soft tissue pathology, IASTM could have useful implications for patients with this disorder. When further research is performed on the subject, it may be found that IASTM has a very important place in treating these patients.
References:
Abd El Salam MS, Abd Elhafz YN. "Low-dye taping versus medial arch support in managing pain and pain-related disability in patients with plantar fasciitis." Foot Ankle Spec. 2011 Apr;4(2):86-91. Web. 10/13/12.
Bassford, Jeffrey. "A Randomized Controlled Evaluation of Low Level Laser Therapy: Plantar Fasciitis." Arch Phys Med Rehabil. 79. (1998): n. page. Web. 8 Oct. 2012.
Beyzadeoğlu T, Gökçe A, Bekler H. "[The effectiveness of dorsiflexion night splint added to conservative treatment for plantar fasciitis]." Acta Orthop Traumatol Turc. 2007;41(3):220-4. Web. 10/13/12.
Digiovanni BF, Nawoczenski DA, Malay DP, Graci PA, Williams TT, Wilding GE, Baumhauer JF. "Plantar fascia-specific stretching exercise improves outcomes in patients with chronic plantar fasciitis. A prospective clinical trial with two-year follow-up." J Bone Joint Surg Am. 2006 Aug;88(8):1775-81. Web. 10/12/12.
Hammer, WI. "The effect of mechanical load on degenerated soft tissue." J body Mov Ther. 12.3 (2008): 246-256. Web. 8 Oct. 2012.
Hyland, Matthew. "Randomized Control Trial of Calcaneal Taping, Sham Taping, and Plantar Fascia Stretching for the Short-term Management of Plantar Heel Pain." Journal of Orthopaedic and Sports Physical Therapy. 36.6 (2006): n. page. Web. 8 Oct. 2012.
Karagounis P, Tsironi M, Prionas G, Tsiganos G, Baltopoulos P. "Treatment of plantar fasciitis in recreational athletes: two different therapeutic protocols." Foot Ankle Spec. 2011 Aug;4(4):226-34. Web. 10/13/12.
Lee SY, McKeon P, Hertel J. "Does the use of orthoses improve self-reported pain and function measures in patients with plantar fasciitis? A meta-analysis." Phys Ther Sport. 2009 Feb;10(1):12-8. Web. 10/10/2012.
Renan-Ording, Romulo. "Effectiveness of Myofascial Trigger Point Manual Therapy Combined with a Self-stretching Protocol for the Management of Plantar Heel Pain: A Randomized Control Trial." Journal of Orthopedic and Sports Physical Therapy. 41.2 (2011): 43-51. Web. 8 Oct. 2012.
Ryan, M, S Fraser, K McDonald, and J Taunton. "Examining the degree of pain reduction using a multielement exercise model with a conventional training shoe versus an ultraflexible training shoe for treating plantar fasciitis." Phys Sportsmed. 37.4 (2009): 67-84. Web. 10 Oct. 2012.
Stratton M, McPoil TG, Cornwall MW, Patrick K. "Use of low-frequency electrical stimulation for the treatment of plantar fasciitis." J Am Podiatr Med Assoc. 2009 Nov-Dec;99(6):481-8. Web. 10/13/12.
|
|
Dr. Brian Schwabe's NEW Book in partner with PaleoHacks!
Learn residency-level content on our
Insider Access pages
We value quality PT education & CEU's. Click the MedBridge logo below for TSPT savings! | https://www.thestudentphysicaltherapist.com/featured-articles/category/foot |
Bird watching is one of the developed world’s most popular pastimes because the 10,000 or so species we have left on our planet are amazingly diverse in size, colour, shape and lifestyle. This evolutionary splendour, whether perceived that way or not by birders, can be viewed easily in our backyards and parks, or for the more adventurous, on bird-watching expeditions. The questions of “how” and “why” occur to many curious birders and have inspired hundreds of scientists, including Charles Darwin, to devote their lives to unravelling the mysteries of how birds evolved their many adaptations for flight, reproduction and survival.
Ten Thousand Birds: Ornithology since Darwin, by Tim Birkhead, Jo Wimpenny and Bob Montgomerie, is a detailed review of the history of ornithology and chronicles the major breakthroughs in the past 150 years and the people who accomplished them. Why undertake such a lengthy and comprehensive review? First, these innovative studies on birds had a broader impact on our understanding of nature and science during the 20th century. Second, much of this history has been buried under an explosion of scientific publications in the past few decades, making it difficult for even the most conscientious researcher to appreciate the deep history of their own field. Birkhead, Wimpenny and Montgomerie go beyond the usual cast of characters and find clever studies published by little-known scientists who were often overlooked or ignored by the big players even in their time. This book was written primarily for a scientific audience, but there is also much of interest to an attentive and patient non-specialist.
Chapter 4, “Ebb and Flow,” is a case in point. For centuries, animal migration has been one of the biggest mysteries of the natural world. It seems unbelievable that little birds can fly many thousands of kilometres to their southern homes, survive dangerous crossings of mountains, deserts and oceans, and return to exactly the same place they started from. Why do they bother? How do they navigate? How do young, naive birds make their first trip? How did scientists figure out the answers to these questions? Birkhead, Wimpenny and Montgomerie explain that the first studies of migration were done in the late 1800s at lighthouses and lantern ships, where thousands of birds could be observed at night, many falling victim to collisions with these obstacles. Bird-banding studies began around 1900 with the hope that birds carrying numbered leg bands would occasionally be recovered later in their journey, revealing migration routes and destinations. In 1907, Hans Christian Mortensen banded 102 migrating Eurasian Teal on the west coast of Denmark and two were recovered more than 1,000 kilometres away in Ireland and southern Spain. This needle-in-the-haystack approach is still hugely popular, and hundreds of thousands of birds are banded worldwide each year.
Bird banding set the stage for the first “displacement” experiments, which moved breeding seabirds far from their colonies, even to entirely novel places north of their breeding range, and showed the birds could easily and quickly navigate back. Subsequent innovations in this field often came from new technology such as radar to detect migrating birds, following migrating birds via airplane, testing migration orientation in the lab using special funnel cages that record the birds’ footprints, and, most recently, tracking individual birds over their entire journey using satellite or light logger devices. Thanks to these pioneers, we now know that birds use multiple navigation systems (sun, stars, landmarks, magnetic fields, polarized light) and that much of migration behaviour is genetically inherited. Even so, the amazing journeys revealed via direct tracking still amaze scientists. Bar-tailed godwits, shorebirds that breed in the Arctic, fly non-stop for 10,000 kilometres, over nine days and nights, from Alaska to their winter quarters in New Zealand.
Not all chapters in Ten Thousands Birds are easy reading. The detail on individual studies and people is impressive, sometimes several “textbook” pages each, and can be daunting at times. A scholar may want to read every word, while a layperson will want to skip around the book to find interesting biographies and stories—there are plenty to choose from.
Delving into the details of the evolution, ecology, physiology and behaviour of birds can be rewarding because it empowers you to enjoy nature even more. A birder watching a black-capped chickadee at a backyard feeder in winter may see a cute, tuxedo-clad bundle of energy. An ornithologist would see a social network of dominant and subordinate birds, well-insulated survivors who use the energy-saving trick of torpor to lower their body temperature on the coldest winter nights, and future philanderers who in spring will eavesdrop on the dawn chorus and sneak off-territory to mate with better males from next door. How can we not be awed by the world of the chickadee? There is more to nature than attractive birds and peaceful scenery. There is a complexity and deep evolutionary history that teach us what nature is really all about and why it is worth saving. | http://reviewcanada.ca/magazine/2014/06/timeless-flight/ |
Recently digital artworks find their way more and more into public collections. Museums, collectors and archives see themselves increasingly confronted with the questions and challenges related to presenting and preserving digital art. Digital artworks rely on their technological environments, such as hardware and software, and these are constantly changing. Artworks adapt or perish. Collections do not yet have much experience in dealing with these type of artworks; artists and producers do, but their focus lies not in archiving. How to bridge this gap? Through collaborations between artists, museum and archival professionals, scholars and collections we want to share our knowledge. What new strategies can we develop together in order for born-digital art to become future proof?
Symposium
Over the last years, LIMA dedicated its research to the preservation and presentation of digital art. Since the symposium ‘Transformation Digital Art 2016’ and the documentary ‘Digital Art who Cares?’ in cooperation with the Foundation for the Conservation of Contemporary Art (SBMK) and Dutch Museums, LIMA continued this research. New insights and the next steps will be presented during the upcoming symposium ‘FUTURE PROOF!? Transformation Digital Art 2017’ on February 8 and 9 2017 at the Stedelijk Museum Schiedam. In ‘Future Proof’ LIMA researches scripts for interactive software in cooperation with Dutch media artist Geert Mul. Based on the previous research practical protocols for sustainable storage, documentation and scripts for future presentations will be developed. Also, archiving strategies for media artists will be explored. The programme consists of keynotes, workshops and panel discussions.
Programme
Wednesday, February 8, 9.30 AM - 17.00 PM
Thursday, February 9, 9.30 AM - 13.00 PM
Costs
The two-day symposium costs € 25,- per person, the workshops (documentation for collections or for artists) are free of charge.
Sign up
Please sign up by emailing your name, function, organisation and preference for the workshop you like to attend to [email protected] with FUTURE PROOF?! in the subject line. You will receive a confirmation with detailed information on the exact programme, location and payment method. | https://www.incca.org/events/symposium-future-proof-transformation-digital-art-2017 |
Meeting President Maithripala Sirisena on Thursday (6), topmost Buddhist monks forced him to pledge that not even an "initial draft" would be drawn without the explicit approval of Buddhist hierarchy.
"I assured the Maha Sangha (great monks) that even an initial draft will not be drawn without consulting them," the president announced in Sinhala.
President warned
A Tamil or English translation was not made available suggeting that the president was keen on making his message clear only to the Sinhala Buddhist opposition.
"I assured the Maha Sangha that they will be informed if an initial draft on new constitution is formulated. It's a transparent process," he tweeted.
Following the meeting, leading monk Anamaduwe Dhammadassi revealed that they warned the president against granting concessions to the Tamils through a constitution reform.
"We told the president that there will be no backing for any new or amended constitution, if it changes the nature of the unitary state, deny the foremost position given to Buddhism, devolve police and land rights to provincial councils and establish a second chamber that guarantee more minority representation," Dhammadassi Thero told journalists in Kandy.
Weakening Buddhist authority
He further emphasised that adding a provision which safeguards the fundamental rights of other religious groups would weaken the authority of Buddhists in the country.
President Sirisena had promised to direct the committee on constitutional reforms to seek input from the Buddhist leadership before drafting a bill.
The constitution reform process was launched earlier this year by Islandwide public consultations.
The Public Representations Committee (PRC) led by Lal Wijenayake handed over its recommendations in a 309 page report to the prime minister in May 2016.
Ousted President Mahinda Rajapaksa who is a leader of Sirisena's Sri Lanka Freedom Party (SLFP) has strongly opposed any reforms that would guarantee more autonomy to Tamils. | https://www.srilankamirror.com/news/3830-buddhist-monks-force-sri-lanka-president-to-roll-back-reforms |
The Single-Dose HPV Vaccine Evaluation Consortium, coordinated by PATH and encompassing nine leading research institutions, has begun work to collate and synthesize existing evidence and evaluate new data on the potential for single-dose human papillomavirus (HPV) vaccine delivery.
While 80 countries and territories have introduced HPV vaccines on a two- or three-dose schedule into their national immunization schedules, rollout in low- and lower-middle-income countries has lagged. If demonstrated to be effective, single-dose HPV vaccination could significantly accelerate national vaccine introduction by simplifying programs and lowering procurement and delivery costs.
Funded by the Bill & Melinda Gates Foundation, the consortium will review existing evidence and evaluate new information available from trials and other observational studies on the effectiveness of a single-dose schedule in order to inform global policy discussions and guidance around HPV vaccination. A group of modeling experts within the consortium will also analyze data, identify critical data gaps, and conduct exploratory what-if scenarios to estimate the impact and cost-effectiveness of a single-dose schedule versus non-vaccination or two-dose schedules to inform decision-making.
The consortium, coordinated by PATH, includes Harvard University, the London School of Hygiene & Tropical Medicine, Université Laval, the University of British Columbia, the US Centers for Disease Control and Prevention, the US National Cancer Institute, Wits Reproductive Health and HIV Institute, and the World Health Organization.
In addition to the consortium members, representatives from the following institutions serve as advisors: the British Columbia Provincial Health Services Authority; International Agency for Research on Cancer; Medical Research Council Unit, The Gambia; Instituto Nacional de Salud Pública de Mexico; and Quebec Institut National de Santé Publique.
Posted January 30, 2018. | https://www.path.org/media-center/new-research-consortium-to-evaluate-evidence-for-single-dose-hpv-vaccination/ |
Central Garden & Pet (NASDAQ:CENTA) updated its FY 2021
After-Hours earnings guidance on Monday. The company provided earnings per share guidance of 2.05 for the period, compared to the Thomson Reuters consensus earnings per share estimate of $2.05.
A number of analysts recently commented on the company. KeyCorp lifted their price objective on Central Garden & Pet from $38.00 to $40.00 and gave the stock an overweight rating in a research report on Monday, August 3rd. ValuEngine lowered Central Garden & Pet from a hold rating to a sell rating in a research report on Wednesday. Monness Crespi & Hardt boosted their target price on Central Garden & Pet from $36.00 to $42.00 and gave the stock a buy rating in a research report on Thursday, August 6th. Finally, Zacks Investment Research upgraded Central Garden & Pet from a hold rating to a strong-buy rating and set a $43.00 target price for the company in a research report on Thursday, October 22nd. One analyst has rated the stock with a sell rating, three have assigned a buy rating and one has assigned a strong buy rating to the company. The company has an average rating of Buy and a consensus target price of $39.50.
Get Central Garden & Pet alerts:
Shares of CENTA opened at $36.96 on Thursday. The company has a debt-to-equity ratio of 0.65, a quick ratio of 2.70 and a current ratio of 3.81. The stock has a 50 day simple moving average of $37.27 and a 200 day simple moving average of $35.41. Central Garden & Pet has a 52-week low of $21.66 and a 52-week high of $41.10. The firm has a market capitalization of $2.02 billion, a PE ratio of 18.39 and a beta of 0.79.
Central Garden & Pet (NASDAQ:CENTA) last issued its quarterly earnings data on Sunday, November 22nd. The company reported $0.25 earnings per share (EPS) for the quarter, beating the Thomson Reuters’ consensus estimate of ($0.02) by $0.27. Central Garden & Pet had a return on equity of 11.16% and a net margin of 4.28%. Equities research analysts predict that Central Garden & Pet will post 1.97 EPS for the current fiscal year.
About Central Garden & Pet
Central Garden & Pet Company, together with its subsidiaries, produces and distributes products for the lawn and garden, and pet supplies markets in the United States. It operates through two segments, Pet and Garden. The Pet segment supplies products for dogs and cats, including edible bones, edible and non-edible chews, rawhides, dog and cat food and treats, toys, pet carriers, grooming supplies, and other accessories; and products for birds, small animals, and specialty pets, such as cages and habitats, toys, chews, and related accessories. | |
Geode Capital Management LLC grew its stake in shares of Central Garden & Pet Co (NASDAQ:CENTA) by 2.2% in the 4th quarter, according to the company in its most recent 13F filing with the Securities and Exchange Commission (SEC). The institutional investor owned 682,583 shares of the company’s stock after acquiring an additional 14,705 shares during the period. Geode Capital Management LLC owned about 1.23% of Central Garden & Pet worth $20,040,000 at the end of the most recent quarter.
A number of other hedge funds also recently made changes to their positions in CENTA. Meeder Asset Management Inc. grew its holdings in Central Garden & Pet by 78.5% during the 4th quarter. Meeder Asset Management Inc. now owns 1,401 shares of the company’s stock worth $41,000 after acquiring an additional 616 shares in the last quarter. Amundi Pioneer Asset Management Inc. acquired a new position in Central Garden & Pet during the 1st quarter worth $56,000. Zurcher Kantonalbank Zurich Cantonalbank grew its holdings in Central Garden & Pet by 38.6% during the 4th quarter. Zurcher Kantonalbank Zurich Cantonalbank now owns 2,667 shares of the company’s stock worth $78,000 after acquiring an additional 743 shares in the last quarter. Tower Research Capital LLC TRC grew its holdings in Central Garden & Pet by 778.6% during the 4th quarter. Tower Research Capital LLC TRC now owns 5,368 shares of the company’s stock worth $158,000 after acquiring an additional 4,757 shares in the last quarter. Finally, ProShare Advisors LLC acquired a new position in Central Garden & Pet during the 4th quarter worth $200,000. 68.20% of the stock is owned by institutional investors.
Get Central Garden & Pet alerts:
CENTA has been the topic of a number of recent research reports. KeyCorp raised their price target on shares of Central Garden & Pet from $32.00 to $35.00 and gave the stock an “overweight” rating in a research report on Thursday, February 6th. Zacks Investment Research upgraded shares of Central Garden & Pet from a “hold” rating to a “buy” rating and set a $32.00 price target on the stock in a research report on Wednesday. Finally, Bank of America upgraded shares of Central Garden & Pet from a “neutral” rating to a “buy” rating and raised their price target for the stock from $31.00 to $33.00 in a research report on Wednesday, March 18th. One research analyst has rated the stock with a hold rating and five have issued a buy rating to the company. The company presently has an average rating of “Buy” and an average target price of $34.00.
Central Garden & Pet stock opened at $28.04 on Thursday. The firm’s 50-day moving average is $26.15 and its 200-day moving average is $27.93. The company has a debt-to-equity ratio of 0.79, a quick ratio of 2.22 and a current ratio of 3.84. Central Garden & Pet Co has a 1 year low of $20.50 and a 1 year high of $32.29. The company has a market cap of $1.59 billion, a P/E ratio of 19.32, a PEG ratio of 2.99 and a beta of 0.24.
Central Garden & Pet (NASDAQ:CENTA) last issued its quarterly earnings data on Wednesday, February 5th. The company reported ($0.08) earnings per share for the quarter, beating the Thomson Reuters’ consensus estimate of ($0.11) by $0.03. The firm had revenue of $482.83 million for the quarter, compared to the consensus estimate of $472.28 million. Central Garden & Pet had a net margin of 3.60% and a return on equity of 8.60%. As a group, sell-side analysts predict that Central Garden & Pet Co will post 1.62 earnings per share for the current year.
Central Garden & Pet Profile
Central Garden & Pet Company, together with its subsidiaries, produces and distributes products for the lawn and garden, and pet supplies markets in the United States. It operates through two segments, Pet and Garden. The Pet segment supplies products for dogs and cats, including edible bones, edible and non-edible chews, dog and cat food and treats, toys, pet carriers, grooming supplies, and other accessories; and products for birds, small animals, and specialty pets, such as food, cages and habitats, toys, chews, and related accessories. | |
Whether you need help on optimization or math problems, solving imaging or computer vision tasks, performing a literature review, or resolving ...
Dr. Jacob V.
MD, Board Eligible American Board of Preventive Medicine PhD in Biomedical Informatics...MS in Biostatistics MPH Previous projects at the hospital where I recently completed my residency in Public...
Dr. Ishfaq Ahmad M.
I have done Ph.D. in Mathematics, and have expertise in handling data. I have 15 research papers in reputed Journals and have been teaching Mat...
Dr. Bhawna N.
Experienced in Data Science, Machine Learning, Computer Vision, Predictive Modelling, Research writing. 30 + publication in applied Machine le...
Dr. Benan D.
Emerging Technologies Researcher and Consultant, studied Ph.D. Brain, Mind and Computer Science at the University of Padua. Graduated from MSc...
As a specialist medical writer, I have been exploring the potential of artificial intelligence (AI) to revolutionize the field of systematic re...
Dr. Aman U.
I am a Ph.D. Scholar in Bioinformatics and Artificial intelligence. My freelance career and expertise are in diverse subject areas, not only as...
Dr. Kashmiri J.
I am a Biotechnologist with a keen interest in Data Science. I hold a PhD in Biotechnology, with a university gold medal for the best thesis. W...
I was accepted to the MAMF program at Columbia University in 2015 but chose for a variety of reasons to continue the economics doctoral program...
Dr. Josué J.
Ph.D. in biomaterials with an innovative and entrepreneurial mindset. My expertise includes project design and management, biomaterials design,...
Dr. Ali Muhammad S.
I am a thorough, detailed, engaged, thoughtful, and conscientious researcher, writer, and editor. Currently pursuing a Ph.D. (Deep Compression ...
Dr. Eugene A.
⭐Highly Rated Data Analytics Professor, Statistician, Data Analyst/Scientist⭐ ✅Unlimited revisions ✅Clear explanations ✅Well-documented code ✅ ...
Dr. Diksha V.
I am a doctorate in life sciences with an experience of over 9 years in the academic and corporate sector. I have managed projects focusing on...
Dr. Milton M.
I have great expertise in the application of statistical methodologies and ML algorithms. I am writing about machine learning, deep learning, A...
Khalil Ahmad is a Sr Biostatistician and Data Analyst .
I am an Assistant Professor of Statistics, senior Biostatistician/Statistician, and data analyst with an M.Sc., M.Phil., and Ph.D. in Statistic...
I am a full time data analyst working at a marketing company. I am also a recent graduate of Utah Valley University, where I majored in Russian...
Didy Yoga Lucky P.
I have experience in in vitro, in vivo, in silico study, analytical of plant extract, and isolation of metabolite. I also have written study to...
Freelance Artificial Intelligence | Data Analyst | Machine Learning | Deep Learning | Software Developer | Consultant having 8+ years of experi...
Throughout my career, I have established a reputation as an insightful and diligent criminologist, behaviour analyst, sociologist, politician, ...
Lawrence T.
- 5+ years in Analytics - 5 years building Artificial Intelligence technologies - 5 years carrying out Data Science Projects - Experienced in I...
Dr. Usman A.
I am a certified and professional Mathematics expert with an experience of more than 15 years in the fields of teaching, academic research, sup...
Dr. Nasir M.
Nasir has a PhD degree in Computer Science with specialization in data science, machine learning, optimization, genetic algorithms.
Dr. Qadeem K.
I have done several projects and research as well related to Data Science, Machine Learning, Artificial Intellegence,Python,data analysis,compu...
I hold a Master Degree in Mechanical Engineer (Energy & Process Engineering specialization) and a Ph.D. in Computer Science applied to ...
Interventional cardiologist. AI engineer. Full-stack developer.
Hire top artificial intelligence consultants with expertise in data science, machine learning, and more. Kolabtree is the world's largest platform for hiring trusted freelance scientists and consultants.
We take several measures to help you work with full confidence and peace of mind.
Keep your project private
Restrict who can see your project and send you proposals. Invite only specific freelancers to view your project.
NDAs and IP protection
Our T&C include a default confidentiality clause that protects your IP. Sign NDAs for added protection before disclosing project details.
Kolabtree ensures safety and security of your payments and personal information and project details. Kolabtree’s T&C includes a default confidentiality clause. You can also sign NDAs and custom agreements with freelancers for additional protection.
Post your project and receive quotes from relevant freelancers. You can also search for specific freelancers by expertise and invite them to your project. Discuss your project details with each freelancer before picking the one best expert.
We assure you of a 100% satisfaction guarantee, which means you only pay when you’re 100% satisfied with the work delivered. If you aren’t happy, we will refund 100% of your money.
You can choose to pay either a fixed or an hourly fee based on your scope of work. If you’re not sure how much your project costs, you can discuss with freelancers before arriving at a mutually agreed fee.
Kolabtree's terms and conditions prohibit freelancers from claiming ownership of intellectual property, and as a client, you are able to reinforce the message with additional communication, agreements or contracts.
Kolabtree is the place to go for professional help. Work was done promptly and efficiently. I would definitely seek the service again in my future projects
Maher AnousIndependent Plastic Surgeon, USA
A broad network of skilled people in many fields that is very hard to find elsewhere.
Roger SkagerwallTech entrepreneur, Sweden
The quality and quantity of accessible experts on Kolabtree is priceless.
Webster WatnikProfessor at California State University, USA
Contact experts directly
Speak directly with freelancers and explain your requirements.
100% satisfaction guaranteed
Pay only once work is delivered and you’re happy with it.
No upfront fees
No minimum commitment or contract required.
Flexible, secure payments
Pay a fixed or hourly fee. We hold your funds in escrow until you’re ready to pay.
Post project (Free)
Post your project publicly for all freelancers to view and send you proposals, or interact with specific freelancers privately.
Choose the best expert
Get bids from relevant experts. Interact freely with them before making a hire.
Collaborate
Share files, make audio/video calls and collaborate with your chosen expert.
Complete project
Verify the project is complete to your satisfaction before paying the expert.
How to hire an artificial intelligence expert
Artificial intelligence or simply AI is an interesting part of computer science that focuses on developing computer systems capable of performing tasks that traditionally requires a human brain.
The main areas where artificial intelligence is rapidly expanding include speech recognition, language translation, visual perception and decision-making in relation different activities.
Self-driving cars, law, medical diagnosis, robot control, hospital applications, retail analytics and chess playing computers illustrate a few practical examples of AI applied to real life in our society.
What do artificial intelligence experts do?
· Finance and banking: algorithmic trading, market analysis, data mining, portfolio management, credit underwriting and personal finance are examples of AI potential use in the near future.
· Aviation: simulators, tactical strategies and mission management have been used in conjunction with AI.
· Agriculture: AI has been used for monitoring and optimization of crops, soil, greenhouses in order increase food production.
· Law: currently there are 35 AI applications for legal practice, which can be broadly divided into systems to help law research, insights through analytics and automated processes, such as legal writing.
· Education: the idea of having an AI tutor or learning assistant and adaptive learning programs can become a reality in several educational institutions in the future.
· Healthcare: diagnosis, clinical decision systems, treatment planning, interpretation of digital images, disease prediction, risk factor analysis and elderly care are some of the tasks that can benefit from AI.
· Transportation: many car models have parking assistance and cruise control, which are built through AI; self-driving cars also rely on artificial intelligence and they are not far from reality.
· Computer science and robotics: AI has been used to solve many complex problems in these fields.
· Manufacturing: AI-based forecasting and factory control can greatly improve productivity and workflow.
· Human resources: in job searching and recruiting, AI programs can scan through resumes and rank candidates accordingly.
· Marketing, media, e-commerce: through computer vision, there are applications to predict consumer behavior and optimize advertising solutions.
· News and publishing: reports, analysis, sports results and news can be generated by computers; even storytelling and creative writing have been considered as potential areas for AI.
The list above is far from complete, as AI is developing very quickly in different areas. Many sectors in our society are being improved through machine learning.
Why hire an AI developer?
Currently, in both business and science, there is a huge demand for artificial intelligence products and solutions. An AI expert can help build AI solutions with low complexity and potentially high benefits.
AI developers for hire can help formulate strategies, implement those strategies and train other people to improve their AI skills, as well as write about this exciting field.
Artificial intelligent experts have used machine learning to solve challenges such as:
· Face, speech, handwriting and optical recognition
· Virtual reality and computer vision
· Artificial creativity and problem solving
· Strategic planning
· Medical diagnosis, treatment decisions, interpretation of medical images
· Gaming, robotics
· Language translation, chatterbots and natural language processing
How much do an artificial intelligence consultant cost?
Freelance artificial intelligence experts charge a minimum of 40 USD per hour for consultancy. Alternatively, it is possible to post a job with a fixed-fee for the entire project.
While smaller projects and ad-hoc tasks work well with hourly payments, long-term collaborations might present better results with fixed rates.
How to write an effective job to hire an AI expert
When searching for an AI consultant, you just need to provide the five basic topics highlighted below:
· Project description or scope of work (ideally very detailed)
· Duration of the project
· By when you need to hire
· Budget (per hour or per project, you decide)
· Skills required
Getting computers to learn and adapt is the most significant challenge for artificial intelligence consulting. Post your job for free and work with top AI developers for hire.
Related skills
Algorithms Big Data Bioinformatics Computational Sciences Computer Engineering Computer Graphics Computer Hardware Computer Programming Computer Science Computer Simulation Computer Software Data Analysis
Ready to hire an artificial intelligence expert? Post your project on Kolabtree and find AI developers for hire today. | https://www.kolabtree.com/find-an-expert/subject/artificial-intelligence?utm_source=Blog_AIBrands |
The findings of this Index regarding companies’ performance rely to a large extent on information shared by companies, in addition to information that is available in the public domain. Several factors beyond the companies’ control may impact the availability of information such as differences in disclosure requirements among countries or capacity constraints within companies, amongst others the Covid-19 pandemic. Therefore, in the case of limited or no engagement by such companies, this Index may not represent the full extent of their efforts.
● SCORES AND RANKS: Unilever ranks second maintaining its position compared with the Global Index 2018. The company’s overall score decreases from 6.7 to 6.3 in 2021. The company ranks first in Lifestyles (Category E) and Labeling (Category F), and performs above average in all Index categories.
● GOVERNANCE: The company has a comprehensive approach to tackling all forms of malnutrition and takes the next step by disclosing in its ‘Future Foods’ strategy how it aims to support a global “food systems transformation”. This strategy was released at the end of 2020 following the completion of its Unilever Sustainable Living Plan (USLP), which guided the company and many others in the industry for 10 years. The new strategy contains six time-bounded (by 2022 or 2025) nutrition-related goals. Apart from this, the company's largest food brand, Knorr, has defined the purpose to ‘Reinvent Food for Humanity’ and has committed to fortification of essential micronutrients and lowering amounts of salt, saturated fat and sugar across the product portfolio.
● GOVERNANCE: As in 2018, Unilever is commended for having its nutrition reporting independently verified at regular intervals. Plus, the company achieved its 2020 goal to double the proportion of products meeting its Nutrient Profiling Model (NPM) criteria, the ‘Highest Nutritional Standards’ (HNS). By 2020, 61 percent of food in its portfolio met the HNS standards, a figure which is externally verified, and the company has defined a new commitment to achieve 70 percent HNS compliance by 2022.
● PRODUCTS: The company shared with ATNI its new Fortification guidelines, which include its existing commitment to provide more than 200 billion servings with at least one of the five key micronutrients – vitamin A, vitamin D, iodine, iron, and zinc – by 2022. Compared to 2018, Unilever has enhanced its approach by seeking ingredients with high inherent levels of micronutrients. The company’s fortification strategy is built on the use of iodized salt, improved use of nutrient-rich ingredients, and adding essential nutrients to affordable, regularly consumed products.
● PRODUCTS: Unilever has a full fledged nutrient profiling model, which contributes to the company obtaining the highest ‘healthy multiplier’ possible in ATNI’s methodology (used for all indicators asking about policies and practices related to healthy products). As part of its Future Foods strategy, Unilever has committed to doubling the number of products with positive nutrients (vegetables, fruits, proteins, or micronutrients like vitamins, zinc, iron, and iodine) globally by 2025. The company informed ATNI it is in the process of updating its HNS to include positive nutrients, as well as sugar, benchmarks for all product groups. In addition, the company shared with ATNI its Guidance document for the use of the HNS in product development, which requires every new food retail product launched to meet the HNS, or otherwise requires a separate internal approval process.
● ACCESSIBILITY: Since 2018, Unilever has made stronger commitments to reach low-income consumers and those in low- and middle-income countries that lack access to affordably priced, healthy products. To reach priority populations with specially designed healthy products in more markets, Unilever has expanded its door-to-door ‘Shakti distribution’ model, highlighted in the India Spotlight Index 2020, and launched related programmes in 10 more countries, including Ethiopia, Sri Lanka, Pakistan, Colombia, and Egypt.
● MARKETING: With the new ‘Principles on Responsible Food & Beverage Marketing to Children’ policy released in 2020, the company has committed not to direct any marketing to children under 12. For digital platforms, Unilever expands its commitment to children under 13. For television and other media, the company has lowered its audience thresholds to not market in media where children under 12 represent more than 25 percent of the audience, compared to 35 percent in 2018. In addition, the company has committed not to use influencers under 12 and those who primarily appeal to children aged under 12.
● LIFESTYLES: To support workforce health and nutrition, Unilever developed its ‘Lamplighter’ employee programme in 2001, which aims to improve the physical health, exercise, nutrition, and mental resilience of its workforce in all countries with 100 or more employees, and includes independent impact evaluations – which is an industry best practice. The company has established a ‘Wellbeing Framework’, which addresses physical, mental, emotional, and purposeful wellbeing. Unilever is one of the few companies to make a commitment to improving the health and wellness of groups across the wider food supply chain that are not direct employees (such as smallholder farmers, factory workers, and small scale vendors). To support breastfeeding, Unilever has been enabling sites with over 50 female employees to provide breastfeeding facilities and access to crèche services. In addition, the company has launched a Global Paternity Leave Standard for Unilever employees which, by the end of 2019, saw all fathers entitled to a minimum of three weeks' paid leave.
● LIFESTYLES: Unilever has a variety of consumer-oriented health and/or nutrition education programs in both low-income and low- and middle-income settings. The company is one of four in this Index that only funds programs which are designed by and/or (co)implemented with diverse stakeholder groups with relevant expertise. For example, the ‘Seeds of Prosperity’ program, in partnership with GAIN and the Sustainable Trade Initiative (IDH), which supports nutrition literacy in tea farming regions. The company shared results with ATNI, showing in Assam and Tamil Nadu in India , dietary diversity scores increased significantly in all groups after six months.
● LABELING: Compared to 2018, the company has expanded its commitment to using nutrition or health claims on products that have been fortified only when they meet relevant Codex standards and the World Health Organization (WHO)/Food and Agriculture Organization (FAO) Guidelines on Food Fortification with Micronutrients. Apart from having both front-of-pack (FOP) and back-of-pack (BOP) labeling commitments, the company’s relatively strong performance in Labeling (category F) can also be attributed to its disclosure performance. Unilever discloses a commitment to implement an interpretive FOP system on some relevant products, rather than only a numeric format (as in 2018). Interpretative labels provide information in a clear, easy to understand format and can help consumers to make more informed choices regarding their health, and this is industry best practice.
● ENGAGEMENT: The company commits to playing an active and constructive part in supporting governments’ efforts to combat all forms of malnutrition globally, and provides more examples doing so than in 2018. For example, in Vietnam, it has been working with the National Institute of Nutrition under the Ministry of Health on national strategies for food fortification, while for South Africa, the company shared evidence with ATNI of efforts to support Government strategies to reduce sodium by focusing on stock cubes. The company published a detailed narrative about their engagement with different stakeholders to inform their nutrition activities, including international organizations, national bodies, and CSOs.
● GOVERNANCE: Through its Annual Reports and Accounts 2019, the company discloses results of its overall management review; although specific results for the Foods & Refreshment brands and division are less clear. Unilever confirmed to ATNI that it conducts formal reviews each year for the Foods & Refreshment divisional strategy, as well as for individual categories with the Unilever Leadership Executive (ULE) team. The company is encouraged to disclose accountability arrangements (day-to-day responsibility for its new nutrition strategy), and could consider explicitly linking and disclosing nutrition-related targets with CEO and other senior executives’ remunerations to further improve its performance.
●PRODUCTS: The company does not make a clear commitment to only fortify products of high underlying quality, although in its fortification guidelines (which the company shared with ATNI), it states that the ideal fortification carrier is HNS compliant. When not compliant, products require a risk-benefit assessment. ATNI recommends that Unilever increases its transparency by publishing its fortification guidelines.
● ACCESSIBILITY: It is recommended that Unilever strengthens its accessibility strategy by adopting and publicly disclosing a formal policy with concrete, measurable targets that specifically address the affordability of healthy products (meeting the company’s nutrition criteria or external standards).
● MARKETING: The company commits to all responsible marketing techniques laid out by the International Chamber of Commerce (ICC) Advertising and Marketing Communications code. However, it does not provide evidence of a formal, independent, third-party auditing process related to these commitments. Regarding responsible marketing to children, the company commits to not promote its brands or products in primary or secondary schools (except for educational purposes and in agreement with school administrators, and only in relation to products ‘responsibly made for kids’), and to not undertake any Marketing or Point of Sale Communications to children under six years of age. However, Unilever is strongly encouraged to expand this commitment to children under the age of 18, covering locations near schools and other places common for children, such as sports facilities, as recommended by WHO/UNICEF.
● LIFESTYLES: Unilever provides evidence that, in some of its consumer education programs, it excludes product or brand-level branding. The company is encouraged to exclude brand-level from community educational programs to ensure that educational programs are not used for marketing activities.
● LABELING: The company published its ‘Position on Front of Pack Nutrition Labelling’ (no date) online, which states its preference for the guideline daily amount (GDA) system and a determination to work towards the WHO ambition of one, simple, consistent global standard. As a good practice, the company states online that, when mandatory labelling schemes are in place, it will “not provide any additional nutrition labelling or nutrition information front-of-pack which could confuse consumers or dilute the impact or effectiveness of the mandatory scheme.”. Unilever has committed to use interpretative labelling on some of its relevant products globally, and it is recommended that the company expands this to all products.
● ENGAGEMENT: Unilever is encouraged to improve its lobbying disclosure on its website by publishing a more comprehensive list of trade associations in which it participates, as well as any potential governance conflicts of interest and seats of company Board members at these organizations. ATNI advises that the company adopts industry best practice by publicly expressing a commitment to only engage with governments and policymakers with the intention of supporting measures to prevent and address malnutrition, and only with an emphasis on independent, peer-reviewed science. The company could consider establishing a mechanism for corrective action regarding its engagement/lobbying practices by conducting regular internal/independent audits on lobbying practices, and publicly disclosing expenditure and memberships in trade associations. There is also significant scope for the company to: 1) improve its engagement with stakeholders in developing its nutrition strategy, policies, and/or programs; 2) seek specialist external experts’ advice on how to prevent and address various forms of malnutrition; and, 3) form partnerships with, or formally support, international initiatives/organizations to address malnutrition in priority populations. The company is therefore encouraged to conduct well-structured and focused engagement with stakeholders who have expertise in nutrition and addressing malnutrition, to strengthen their strategies and policies and obtain valuable feedback on their relevance and effectiveness.
The Product Profile is an independent assessment of the nutritional quality of companies’ product portfolios. For this purpose, ATNI uses the Health Star Rating (HSR) model, which rates foods from 0.5 to 5.0 based on their nutritional quality. ATNI uses the threshold of 3.5 stars or more to classify products as generally healthy. This assessment is undertaken in partnership with The George Institute for Global Health (TGI), with additional data input from Innova Market Insights.
The methodology for the Global Index 2021 Product Profile has been revised and now includes three scored elements. The overall Product Profile score reflects: B1.1, the mean healthiness of a company’s product portfolio; B1.2, the relative healthiness within product categories compared to peers, and; B1.3, changes in the nutritional quality of product portfolios compared to the Global Index 2018 Product Profile. The steps taken to calculate the final Product Profile scores are visualized in Box 1. The next section further explains each of these three elements.
Unilever has been assessed for the second time in the Global Index Product Profile. In the previous assessment, nine of the company’s markets were selected, and a total of 1,653 products analyzed – accounting for approximately 35-40% of global retail sales in 2017, excluding plain tea, and coffee. In this Index, a total of 3,616 products have been analyzed across 10 of the company’s major markets. Products from the top five best-selling product categories within each market are included. In 2019, these products accounted for 50-55% of the company’s global retail sales, excluding plain tea, and coffee.
Brazil, France and Germany are new countries included in this iteration. New Zealand and Hong Kong were included in the 2018 but have been omitted this time. In 2018, a total of 10 product categories were covered by the assessment, compared to 11 categories in 2021. Products form the ‘Baked Goods,’ ‘Breakfast cereals,’ and ‘Other hot drinks,’ categories are assessed in 2021 but were not in 2018. ‘Concentrates’ and ‘Dairy’ were assessed in 2018 but are not in 2021. The ‘Spreads’ category has been replaced with ‘Sweet Spreads’.
In this Product Profile assessment, Unilever’s scores 4.3 out of 10 (B1.1) in the mean healthiness element, 6.3 out of 10 (B1.2) for the relative healthiness of its products within categories compared to peers, and 2 out of 10 (B1.3) for changes in nutritional quality (mean HSR) over time. This results in Unilever obtaining an overall score of 4.2 out of 10, ranking 17 out of 25 in the Product Profile.
|Average
|
HSR (out
of 5 stars)
(sales-
weighted)
|10
|
Countries
included
|
Range of
|
global sales
included
|Healthy products
|
(HSR)
|Products suitable to market
|
to children (WHO regional
models) - UNSCORED
|2.2||Australia, Brazil, China, France, Germany, India, Mexico, South Africa, UK and USA||50-55%||No.
|
products
assessed
|%
|
products
healthy
(≥3.5
stars)
|%
|
retail
sales
healthy
2019
(≥3.5
stars) –
assessed
countries
only
|
% estimated
|
global
retail
sales
healthy
2019
(≥3.5
stars)
|No.
|
products
assessed
|%
|
products
suitable
|% sales
|
from
suitable
|3616||18%||17%||15%||3625||13%||6%|
● A total of 3,616 products manufactured by Unilever, sold in 10 countries, covering 11 product categories, were included in this Product Profile (plain tea and coffee, which account for a significant part of the company’s revenues, were not assessed on the basis that these make an inherently low nutritional contribution and are thereby not required to display a nutrient declaration). The company’s sales-weighted mean HSR is 2.2 out of 5. ATNI turns this value into a score between 0 and 10, resulting in a mean healthiness score of 4.3 out of 10 for Unilever. The company ranks 18 out of 25 companies in this first scored element (B1.1).
● Overall, 18% of distinct products assessed were found to meet the HSR healthy threshold (HSR >=3.5). Together, these products accounted for an estimated 17% of Unilever’s retail sales of packaged food and beverages 2019 in the selected markets (excluding plain tea, and coffee). Assuming the products and markets included in the assessment are representative of the company’s overall global sales, ATNI estimates the company derived approximately 15% of its global retail sales from healthy products in 2019.
WHO nutrient profiling models (unscored): Only 13% of products assessed were found to be of sufficient nutritional quality to market to children, according to the World Health Organization (WHO) regional nutrient profiling models. These products were estimated to generate 6% of the company’s sales in 2019. More information on this part of the assessment can be found in the Marketing section (Category D) of the Index.
|No.
|
products
analyzed
|%
|
products
healthy
(HSR>=3.5)
|Company
|
mean HSR
|Mean HSR for
|
all companies
selling this
product
category
|
Company performance
|
(rank in mean HSR
compared to peers
selling products in
the same category)
|Baked Goods||69||13%||1.8||2||5th out of 9|
|Ice cream and frozen desserts||1749||5%||2.1||2||3rd out of 7|
|Other Hot Drinks||13||0%||1.6||1.4||2nd out of 5|
|RTD Tea||18||0%||1.8||1.7||2nd out of 7|
|Sauces, Dressings and Condiments||1,025||15%||1.9||2.5||9th out of 11|
|Breakfast Cereals||22||100%||3.8||3.5||2nd out of 6|
|Processed Meat and Seafood||8||100%||4.1||3.1||1st out of 8|
|Ready Meals||184||61%||3.2||3||3rd out of 9|
|Rice, Pasta and Noodles||36||31%||3.2||2.4||3rd out of 6|
|Soup||480||52%||2.7||2.5||5th out of 8|
|Sweet Spreads||12||8%||2.5||2.2||2nd out of 5|
● For Unilever, ‘Processed Meat and Seafood,’ was the best performing category, where a total of 8 products analyzed obtained mean HSR of 4.1 out of 5. ‘Breakfast Cereals’ was the next best performing category (mean HSR of 3.8).
● For nine out of the 11 categories assessed, Unilever’s products perform equal to or better than the mean HSR of companies selling products in the same categories. The company performs best compared to peers in the ‘Processed Meat and Seafood’ category.
Unilever scores 6.3 out of 10 in this second scored element (B1.2) and ranks 13 out of 25 companies. This is based on its ranking compared to peers within the 11 categories, using the scoring system set out in ATNI’s methodology.
|No. of products
|
analyzed in 2018
|No. of products
|
analyzed in 2021
|Sales weighted
|
mean HSR 2018
|Sales weighted
|
mean HSR 2021
|Australia||204||264||2.3||2.2|
|China||99||209||1.8||2|
|India||107||190||2.4||2.1|
|Mexico||56||202||2.5||2.3|
|South Africa||199||242||2.7||2.5|
|UK||272||409||2.2||2.3|
|USA||479||553||1.9||2.1|
|TOTAL||1416||2069||2.1||2.2|
● Among the 18 companies for which this third scored element was applicable, Unilever was one of nine companies which showed an increase in mean HSR between the 2018 and 2021 Product Profiles (mean HSR=2.1 to 2.2). In 2018 assessment, ‘RTD Tea’ represented a much larger proportion of sales in the assessment, versus 2021. In contrast the ‘Sauces, Dressings and Condiments’ represented a much smaller proportion of sales in the 2018 assessment compared to 2021. These category differences have impacted the company’s overall results. | https://accesstonutrition.org/index/global-index-2021/scorecards/unilever-5/ |
In the winter of 2015, the world community agreed in Paris on a framework for lowering carbon emissions in the coming decades. This progress, though laudable, offers little comfort to the billions of people around the planet still vulnerable and exposed to the risks of extreme weather and climate change. Even if emissions magically dropped to zero today, there would still be a massive human suffering and death due to maladaptation to environmental challenges like droughts, floods, hurricanes, and wildfires.
In popular discussions, climate risks are discussed almost exclusively in terms of hazards—stronger and more frequent hurricanes, floods, and droughts, for example. But scholars agree that most of the impact of extreme weather and disasters is better considered a result of exposure andvulnerability—cities on shorelines, farms in floodplains, poor and isolated communities in urban areas, and how prepared these places are for the hazards they face no matter how adequately the world deals with climate change. No less a respected scientific body than the Intergovernmental Panel on Climate Change (IPCC) finds that increasing losses from extreme weather and disasters are overwhelmingly dependent on these dynamics.
This new report from Arizona State University’s Consortium for Science, Policy & Outcomes and The Breakthrough Institute calls for an improved framework for climate adaptation in the 21st century. The goal laid out in Adaptation for a High-Energy Planet is simple and can be supported regardless of views about global climate risk: reduce the number of deaths caused as a result of extreme weather and disasters every year, while still accelerating modernization and low-carbon growth on an increasingly high-energy planet. This requires innovative, pragmatic approaches to strengthening climate resilience.
Fortunately, there are good adaptation practices in place today, and lessons to learn from them. From crop development in Nepal to cyclones in India to energy access in sub-Saharan Africa, modern policies and technologies show how to improve society’s resilience to extreme weather and disasters. The report highlights these successful adaptations, connects them to robust social and economic development efforts, and explores what they mean for helping communities to thrive in an ever-changing world.
Read the full report here. | https://cspo.org/research/implementing-climate-pragmatism-2/adaptation-for-a-high-energy-planet/ |
TECHNICAL FIELD
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
The present disclosure relates to an apparatus, method, and system for low power wearable devices. More particularly, the present invention relates to an apparatus, method, and system for communicating with a wearable device using a low-powered communication protocol for non data-intensive information.
Wearable wireless devices are developed to simultaneously provide wireless communication between users and a convenience associated with the wireless being wearable and thus highly mobile.
According to the related art, wearable wireless devices utilize higher power wireless networks such as Bluetooth (BT), WiFi, 2G or 3G to transmit and receive cellular and interne data. As a result, the wearable wireless devices tend to have insufficiently short device use time between battery recharges.
Wearable wireless devices may incorporate lower power wireless network technologies such as Bluetooth Low Energy (BTLE). However, such wearable wireless devices suffer from a loss of important functionality (e.g., no voice call capability) due to lack of protocol support for data-intensive communication in BTLE single mode devices, and/or a loss of energy efficiency via BT/BTLE dual mode devices as BT/BTLE implementation according to the related art requires two devices equipped with dual mode devices to communicate using the higher power BT protocol. In addition, BT/BTLE dual mode devices do not support concurrent connection supporting both BT and BTLE protocols simultaneously. Consequently, wearable wireless devices suffer from a relatively short battery life, and excessive apparatus volume as device manufacturers design such wearable wireless devices to include increasingly large/oversized batteries to compensate for the relatively short battery life.
The above information is presented as background information only to assist with an understanding of the present disclosure. No determination has been made, and no assertion is made, as to whether any of the above might be applicable as prior art with regard to the present disclosure.
Aspects of the present disclosure are to address at least the above-mentioned problems and/or disadvantages and to provide at least the advantages described below. Accordingly, an aspect of the present disclosure is to provide an apparatus and method for communicating with a wearable wireless device.
In accordance with an aspect of the present disclosure, a method for operating an aggregator to transmit information to a user is provided. The method includes receiving information from at least one data source, selecting a transmission policy according to which the information is to be transmitted to a user, and transmitting the information to the user according to the selected transmission policy.
In accordance with another aspect of the present disclosure, an apparatus for transmitting information to a user is provided. The apparatus includes a communication unit configured to receive information from at least one data source, and to transmit the received information to the user, a storage unit configured to store the received information, and a control unit configured to select a transmission policy according to which the information is to be transmitted to a user, and to operatively control the communication unit to transmit the information to the user according to the selected transmission policy.
In accordance with an aspect of the present disclosure, a method for operating a wearable wireless device is provided. The method includes entering a power saving mode, powering on a low power communication unit while maintaining other non-essential units in the wearable wireless device in a power saving state, transmitting an inquiry to an access point inquiring whether the access point has information to transmit to the wearable wireless device, if the access point does not have information to transmit to the wearable wireless device, setting the low power communication unit to the power saving state; and if the access point has information to transmit to the wearable wireless device, exiting the power saving mode and communicating with the access point using one or more communication protocols.
In accordance with another aspect of the present disclosure, a wearable wireless device is provided. The wearable wireless device includes a storage unit configured to store information, a display unit configured to display a user interface with which a user may view information, a communication unit configured to wirelessly communicate with an access point, the communication unit including a lower power communication unit, and a control unit configured to control the wearable wireless device to enter a power saving mode when the wearable wireless device is not communicating with the access point, to power on the low power communication unit while maintaining other non-essential units in the wearable wireless device in a power saving state, to transmit an inquiry to the access point inquiring whether the access point has information to transmit to the wearable wireless device, to setting the lower power communication unit to the power saving state if the access point does not have information to transmit to the wearable wireless device, and to exit the power saving mode and communicate with the access point using one or more communication protocols if the access point has information to transmit to the wearable wireless device.
In accordance with another aspect of the present disclosure, a system for communicating with a wearable wireless device is provided. The system includes at least one data source, an aggregator configured to receive data from the at least one data source, and to communicate with an access point, the access point configured to communicate with the aggregator and to communicate with a wearable wireless device, the wearable wireless device configured to communicate with the access point so as to receive information from the aggregator through the access point.
In accordance with another aspect of the present disclosure, an access point is provided. The access point includes a communication unit configured to communicate with an aggregator and configured to communicate with a wearable wireless device, a storage unit configured to store information received from at least one of the aggregator and the wearable wireless device, and a control unit configured to communicate with the wearable wireless device using a combination of communication links according to a transmission policy.
In accordance with another aspect of the present disclosure, a method for operating an access point is provided. The method includes receiving information from an aggregator, receiving an inquiry from a wearable wireless device inquiring whether the access point has information to transmit to the wearable wireless device, transmitting a response to the inquiry from the wearable wireless device, and if the access point has information to transmit to the wearable wireless device, communicating the information to the wearable wireless device using one or more communication protocols.
Other aspects, advantages, and salient features of the disclosure will become apparent to those skilled in the art from the following detailed description, which, taken in conjunction with the annexed drawings, discloses exemplary embodiments of the disclosure.
Throughout the drawings, it should be noted that like reference numbers are used to depict the same or similar elements, features, and structures.
The following description with reference to the accompanying drawings is provided to assist in a comprehensive understanding of various embodiments of the present disclosure as defined by the claims and their equivalents. It includes various specific details to assist in that understanding but these are to be regarded as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the various embodiments described herein can be made without departing from the scope and spirit of the present disclosure. In addition, descriptions of well-known functions and constructions may be omitted for clarity and conciseness.
The terms and words used in the following description and claims are not limited to the bibliographical meanings, but, are merely used by the inventor to enable a clear and consistent understanding of the present disclosure. Accordingly, it should be apparent to those skilled in the art that the following description of various embodiments of the present disclosure is provided for illustration purpose only and not for the purpose of limiting the present disclosure as defined by the appended claims and their equivalents.
It is to be understood that the singular forms “a,” “an,” and “the” include plural referents unless the context clearly dictates otherwise. Thus, for example, reference to “a component surface” includes reference to one or more of such surfaces.
By the term “substantially” it is meant that the recited characteristic, parameter, or value need not be achieved exactly, but that deviations or variations, including for example, tolerances, measurement error, measurement accuracy limitations and other factors known to those of skill in the art, may occur in amounts that do not preclude the effect the characteristic was intended to provide.
Various embodiments of the present disclosure include an apparatus, method, and system for low power wearable wireless devices.
According to various embodiments of the present disclosure, the system for communicating with a low power wearable wireless device includes an aggregator, an access point, and a wearable device.
According to various embodiments of the present disclosure, the aggregator receives voice data and non-voice data, and transmits the voice data and/or non-voice data to the wearable device according to a predefined (e.g., selected) rules or communication scheme, and/or according to queries received from the wearable wireless device.
According to various embodiments of the present disclosure, the aggregator may transmit the voice data and/or non-voice data to an access point with which the wearable wireless device is in communication. Thereafter, the access point transmits the voice data and/or non-voice data to the wearable wireless device. According to various embodiments of the present disclosure, the aggregator and the access point may be integrated such that the wearable wireless device directly connects with the aggregator to transmit and receive voice data and/or non-voice data.
According to various embodiments of the present disclosure, the aggregator may reside remotely (e.g., the aggregator may be cloud-based). Alternatively, according to various embodiments of the present disclosure, the aggregator may reside locally. For example, the aggregator may be integrated with the access point device or within close proximity to the access point.
According to various embodiments of the present disclosure, the aggregator may perform information aggregation, scheduling, filtering, whitelisting and blacklisting on a user's (or wearable wireless device) voice data and non-voice data according to a user's preference settings. According to various embodiments of the present disclosure, the aggregator may transmit information to the wearable wireless device according to burst-oriented traffic patterns.
According to various embodiments of the present disclosure, the wearable wireless device may be configured to establish a plurality of connection links with the access point. For example, the connection links between the wearable wireless device and the access point may support a plurality of concurrent connections. Each of the plurality of concurrent connections between the wearable wireless device and the access point may communicate information from different data sources. The different data sources may be independent data sources. As an example, the wearable wireless device may establish a connection with the access point for voice data, and a connection with the access point for non-voice data. The wearable wireless device may establish the connection for voice data and the connection for non-voice data so as to allow for simultaneous communication (e.g., transmission/reception) of voice data and non-voice data.
According to various embodiments of the present disclosure, as a non-exhaustive illustration only, the wearable wireless device may refer to a watch, a wrist band, a lanyard, a dongle, a head-mounted display, a headset, and the like capable of wireless communication or network communication consistent with that disclosed herein.
According to various embodiments of the present disclosure, as a non-exhaustive illustration only, the access point may refer to mobile devices such as a cellular phone, a Personal Digital Assistant (PDA), a digital camera, a portable game console, and an MP3 player, a Portable/Personal Multimedia Player (PMP), a handheld e-book, a portable lap-top PC, a tablet, a Global Positioning System (GPS) navigation, and devices such as a desktop PC, a High Definition television (HDTV), a game console, an optical disc player, a set-top box, and a dedicated communication network device such as a wireless router, a wireless hub, a wireless bridge, and the like capable of wireless communication or network communication consistent with that disclosed herein.
According to various embodiments of the present disclosure, the wearable wireless device may transmit a message to at least one of an access point and an aggregator for inquiring whether the access point and/or aggregator has any pending information (e.g., a voice call, updates to subscribed services, and the like) to be transmitted to the wearable wireless device. The wearable wireless device may transmit the message using a low power wireless communication protocol. The wearable wireless device may transmit the message periodically according to a predetermined or selected schedule, and/or transmit the message according to user input (e.g., a request input by the user to update the status of a subscribed service, and the like).
According to various embodiments of the present disclosure, the aggregator may delay transmission of information to the wearable wireless device until the wearable wireless device transmits a message inquiring whether any pending information exists.
According to various embodiments of the present disclosure, the access point may communicate information with the wearable wireless device using various combinations of communication protocols. According to various embodiments of the present disclosure, the combination of communication protocols with which information is communicated between the access point and the wearable wireless device may be selected according to the type of information being communicated. For example, non data-intensive information may be communicated using a low power communication protocol. As another example, data-intensive information may be communicated using a communication protocol that differs from the low power communication protocol.
According to various embodiments of the present invention, the non data-intensive information and the data-intensive information may be characterized according to various transmission policies, or according to user preferences. For example, non data-intensive information may include Short Message Service (SMS) messages, and the like. As another example, data-intensive information may include voice data, media streaming, and the like. According to various embodiments of the present invention, the threshold for determining whether information corresponds to non data-intensive information or data-intensive information may be applied according to various transmission policies or user preferences such that the spectrum of information corresponding to non data-intensive information and the spectrum of information corresponding to data-intensive information may vary according to user (e.g., wearable wireless device), according to access point, or the like.
FIG. 1
is a diagram illustrating a system architecture for providing low power communication with a wearable device according to an exemplary embodiment of the present disclosure.
FIG. 1
100
110
120
130
100
140
150
160
Referring to , the system for providing low power communication with a wearable device includes an aggregator , an access point , and a wearable wireless device . The system may also include a Voice over Internet Protocol (VoIP) server , a base station , and/or an internet or cloud-based server .
100
120
According to various embodiments of the present disclosure, the system offloads high-power communication traffic including both voice data and non-voice data to the access point which thereafter relays (e.g., transmit) the voice data and/or non-voice data to the wearable wireless device via a combination of communication links including a low-power communication link so that the total energy consumed by transmitting the voice data and/or non-voice data is lower than the energy consumed when using a non-offloading scheme to communicate the information.
110
120
140
150
160
110
120
140
150
160
110
120
140
150
160
The aggregator may communicate with one or more access point devices , one or more VoIP servers , one or more base stations , one or more internet/cloud-based server , and the like. For example, the aggregator may receive voice data and non-voice data from one or more access point devices , one or more VoIP servers , one or more base stations , one or more internet/cloud-based server , and the like. According to various embodiments of the present disclosure, the aggregator may receive voice data, and/or non-voice data such as, for example, e-mails, Short Message Service (SMS) messages, Multimedia Messaging Service (MMS) messages, updates from web services such as social networking sites (e.g., Facebook, Twitter, Google+, LinkedIn, and the like), calendar updates, weather forecasts, instant messaging, Rich Site Summary (RSS) information, multimedia (e.g., images, photos, videos, audios), and the like via a connection with the access point , the VoIP server , the base station , the internet/cloud-based server , and the like, or any combination thereof.
110
120
130
Upon reception of voice data and/or non-voice data, the aggregator may transmit the voice data and/or voice data to the access point operatively connected to an intended recipient wearable wireless device .
110
110
110
110
130
110
130
According to various embodiments of the present disclosure, the aggregator may be configured to transmit the voice data and/or non-voice data to the access point operatively connected to the intended recipient wearable wireless device according to a predefined or selected communication scheme. For example, the aggregator may perform information aggregation, scheduling, filtering, whitelisting, blacklisting in relation to the information (e.g., received voice data and/or non-voice data), and the like, or some combination thereof. According to various embodiments of the present disclosure, the aggregator may selectively perform such actions according to characteristics of the information (e.g., type of information, sender, and the like) and/or the context in which the wearable wireless device operates (e.g., time, location, and the like). The aggregator may selectively perform such actions according to user preferences which may be configurable by a user of the wearable wireless device .
110
130
120
110
130
110
120
According to various embodiments of the present disclosure, the aggregator may aggregate information (e.g., received voice data and/or non-voice data) before relaying (e.g., transmitting) the information to the wearable wireless device (e.g., operatively through the access point ). The aggregator may selectively aggregate information according to user preferences such that certain information is aggregated and other information is not aggregated (e.g., based on information characteristics, contextual characteristics of the wearable wireless device , and the like). After aggregating the information, the aggregator may relay (e.g., transmit) the information to the access point using burst-oriented traffic patterns, according to a predefined scheduling scheme, and the like.
110
130
120
110
130
110
According to various embodiments of the present disclosure, the aggregator may relay (e.g., transmit) the information to the wearable wireless device (e.g., operatively through the access point ) according to predefined scheduling. The scheduling may be configured according to user preferences or according to a power optimizing scheme. For example, the aggregator may relay only some information, such as, for example, voice data (e.g., a phone call) to the wearable wireless device between predefined or selected times (e.g., at nighttime), while delaying transmission of other (e.g., less time sensitive) information such as, for example, e-mails, Short Message Service (SMS) messages, Multimedia Messaging Service (MMS) messages, updates from web services such as social networking sites (e.g., Facebook, Twitter, Google+, LinkedIn, and the like), calendar updates, weather forecasts, instant messaging, Rich Site Summary (RSS) information, multimedia (e.g., mages, photos, videos, audios), and the like until a predefined or selected time (e.g., after nighttime passes). According to various embodiments of the present disclosure, the user may configure the aggregator to schedule the relay of specific information and to schedule the restriction or delay relay of other information.
110
130
120
110
110
110
110
130
According to various embodiments of the present disclosure, the aggregator may relay (e.g., transmit) the information to the wearable wireless device (e.g., operatively through the access point ) according to a filtering scheme. The filtering scheme may be predefined or selected/configured by the user according to the user preferences. For example, the aggregator may only relay information received from certain sources (e.g., contacts, services, and/or the like) and restrict or delay the relay of information received from other sources. According to various embodiments of the present disclosure, the aggregator may immediately relay information from certain sources. Further, the aggregator may perform information aggregation, scheduling, filtering, whitelisting, blacklisting in relation to the information (e.g., received voice data and/or non-voice data), and the like, or some combination thereof on information from certain sources, and may perform another of aggregation, scheduling, filtering, whitelisting, blacklisting in relation to the information (e.g., received voice data and/or non-voice data), and the like, or a different combination thereof to information received from other sources. For example, the aggregator may filter the information such that information from certain sources is immediately relayed to the wearable wireless device , and information from other sources is aggregated and transmitted in bursts, and/or according to a predefined or selected scheduling scheme.
110
130
120
110
110
110
Similarly, the aggregator may apply whitelisting and/or blacklisting to the received information such that information relayed (e.g., transmitted) to the wearable wireless device (e.g., operatively through the access point ) is relayed according to a whitelist and/or blacklist accessed by the aggregator . The whitelist and/or the blacklist may be stored locally at the aggregator or may be stored remotely on a server accessible to the aggregator . According to the various embodiments of the present disclosure, the whitelist and/or blacklist may be configurable. For example, the user may configure the whitelist and/or blacklist according to user preferences.
130
130
130
As an example, the whitelist may correspond to a list of contacts and/or services from which information may be relayed to the wearable wireless device . The whitelist may also identify specific types of information that may be relayed to the wearable wireless device . In addition, the whitelist may identify that a specific type of information from a predefined group of contacts and/or services may be relayed to the wearable wireless device .
In contrast, as an example, a blacklist may correspond to a list of contacts and/or services from which information may not be relayed (e.g., the relay of such information may be restricted or delayed). The blacklist may also identify specific types of information for which relay thereof may be restricted or delayed.
110
120
150
140
160
According to various embodiments of the present disclosure, the aggregator may include a two-way communication link with the access point , a two-way communication link with the base station , a two-way communication link with the VoIP server , and a two-way communication link with the internet/cloud-based server via an IP based communication protocol, and the like, or a combination thereof.
120
110
130
150
According to various embodiments of the present disclosure, the access point may communicate with one or more aggregators , one or more wearable wireless device , one or more base stations , and the like, or any combination thereof.
120
130
According to various embodiments of the present disclosure, the access point provides a wearable wireless device with access to one or more voice data and/or non-voice data sources.
120
130
The access point may include a low power radio transceiver to communicate with the wearable wireless device so as to transmit/receive non data-intensive information via a low power wireless communication protocol. As an example, a low power wireless communication protocol may include Bluetooth Low Energy (BTLE), ANT/ANT+, a proprietary protocol, and the like.
120
130
The access point may also include a secondary radio transceiver to communicate with the wearable wireless device so as to transmit/receive data-intensive information via a secondary wireless communication protocol such as, for example, Bluetooth, WiFi, 2G, 3G, Long Term Evolution (LTE), and the like.
120
130
120
According to various embodiments of the present disclosure, the wireless communication protocol by which the access point communicates non data-intensive information with the wearable wireless device is different from the wireless communication protocol (e.g., the secondary wireless communication protocol) by which the access point communicates data-intensive information.
120
130
The access point may also include a tertiary short-range radio transceiver to communicate with the wearable wireless device so as to transmit/receive data via a short range wireless communication protocol. For example, the tertiary short-range radio transceiver may communicate using Near Field Communications (NFC), Radio Frequency Identification (RFID), and the like.
120
120
130
130
According to various embodiments of the present disclosure, the wireless communication protocol (e.g., the short-range wireless communication protocol) by which the access point transmits information via short-range communication is different from the wireless communication protocol by which the access point communicates non data-intensive information with the wearable wireless device and different from the wireless communication protocol (e.g., the secondary wireless communication protocol) by which the access point communicates data-intensive information with the wearable wireless device .
120
150
120
150
The access point may also include a communication link (e.g., two-way communication link) with the base station . For example, the access point may communicate with the base station using a cellular communication protocol such as, for example, 2G, 3G, and LTE.
120
110
120
110
110
120
110
120
110
120
120
110
The access point includes a communication link for communicating with the aggregator . For example, the access point may communicate with the aggregator using a dedicated wired or wireless communication link if the aggregator resides locally with the access point . In contrast, if the aggregator is located remotely in relation to the access point (e.g., if the aggregator is located in the cloud), then the access point may include a radio transceiver with which the access point communicates information with the aggregator using an IP-based communication protocol.
120
130
120
130
120
According to various embodiments of the present disclosure, the access point may communicate with the wearable wireless device using any combination of the low power wireless communication protocol, the secondary wireless communication protocol, and the short-range communication protocol. The access point may select the communication protocol with which to communicate the information with the wearable wireless device according to the type of information. The access point may concurrently transfer information over any combination of the three (or more) communication protocols so as to optimize the overall communication energy efficiency.
110
120
110
120
According to various embodiments of the present disclosure, the aggregator and the access point may be integrated such that a device provides functionality of both the aggregator and the access point .
130
130
120
According to various embodiments of the present disclosure, the wearable wireless device may operatively communicate information with one or more data sources so as to optimize the overall communication energy efficiency. For example, the wearable wireless device may communicate with the access point using a communication protocol selected according to the type of information to be communicated.
130
120
The wearable wireless device may include a low power radio transceiver to communicate with the access point so as to transmit/receive non data-intensive information via a low power wireless communication protocol. As an example, a low power wireless communication protocol may include BTLE, ANT/ANT+, a proprietary protocol, and the like.
130
120
The wearable wireless device may also a secondary radio transceiver to communicate with the access point so as to transmit/receive data-intensive information via a secondary wireless communication protocol such as, for example, Bluetooth, WiFi, 2G, 3G, Long Term Evolution (LTE), and the like.
130
120
The wearable wireless device may also include a tertiary short-range radio transceiver to communicate with the access point so as to transmit/receive data via a short range wireless communication protocol. For example, the tertiary short-range radio transceiver may communicate using Near Field Communications (NFC), Radio Frequency Identification (RFID), and the like.
130
120
130
120
According to various embodiments of the present disclosure, the wearable wireless device may communicate with the access point using any combination of the low power wireless communication protocol, the secondary wireless communication protocol, and the short-range communication protocol. The wearable wireless device may select the communication protocol with which to communicate the information with the access point according to the type of information.
120
130
In addition to communicating information with the access point using a communication protocol selected according to the type of information to be communicated, the wearable wireless device may employ other energy efficiency optimizing techniques.
130
130
130
130
According to various embodiments of the present disclosure, the wearable wireless device may be configured to place the radio transceivers included therein (e.g., the low power radio transceiver, the secondary radio transceiver, and the tertiary short-range radio transceiver) in a hibernation or a deep sleep state. The wearable wireless device may automatically place the radio transceivers included therein in the hibernation of the deep sleep state. As an example, the wearable wireless device may place any combination of the radio transceivers included therein in the hibernation or the deep sleep state. The wearable wireless device may power on or resume use of the transceivers upon reception of an interrupt generated by one or more always-on timers, sensors, and/or user input devices.
130
130
130
According to various embodiments of the present disclosure, the wearable wireless device may be configured to operate the transceivers included therein using a power duty cycling scheme. For example, the wearable wireless device may include one or more always-on timers that are configured (e.g., the value of which is set) according to the desired level of power duty cycling. For example, the desired level of power duty cycling may be set according to energy or performance constraints of the applications stored on the wearable wireless device .
130
130
130
130
130
According to various embodiments of the present disclosure, the wearable wireless device may be configured to power on or resume use of the transceivers included therein while keeping other systems included in the wearable wireless device in the hibernation or deep sleep state. For example, the wearable wireless device may be configured to power on or resume use of the low power radio transceiver while keeping the other systems included in the wearable wireless device in the hibernation or deep sleep state. The wearable wireless device may power on or resume use of the low power radio transceiver upon reception of an interrupt generated by one or more always-on timers, sensors, and/or user input devices.
130
120
110
120
130
According to various embodiments of the present disclosure, the wearable wireless device may transmit an inquiry to the access point (or to the aggregator via the access point ) to determine whether there is any request to establish a communication session such as, for example, to receive an incoming call, to retrieve any updated information from a cloud service (e.g., a subscribed internet service), and the like. The wearable device may transmit such inquiries using the low power wireless communication protocol.
140
130
150
140
130
150
140
140
According to various embodiments of the present disclosure, the VoIP server may include one or more communication links (e.g., a two-way communication link) with the aggregator , and the base station . The VoIP server may communicate voice data (or cellular data) with the aggregator and/or the base station . For example, the VoIP server may communicate the voice data using an IP communication protocol, a cellular communication protocol such as, for example, 2G, 3G, LTE, and the like. The VoIP server may perform cellular network authentication via one or more physical or soft Subscriber Identity Modules (SIMs).
150
110
120
140
150
110
120
140
150
110
120
140
According to various embodiments of the present disclosure, the base station may include one or more communication links with the aggregator , the access point , and the VoIP server . The base station may transmit voice data and/or non-voice data to one or more of the aggregator , the access point , and the VoIP server . As an example, the base station may communicate with the aggregator , the access point , and/or the VoIP server using a wireless communication protocol such as, for example, 2G, 3G, LTE, and the like.
160
110
160
130
110
160
160
110
According to various embodiments of the present disclosure, the interne or cloud-based server includes a communication link with the aggregator . The cloud-based server may be configured to communicate non-voice data (e.g., interne data) to the wearable wireless device (e.g., via the aggregator ). The interne or cloud-based server may provide a user with information relating to a service to which the user is subscribed. For example, the interne or cloud-based server may transmit to the aggregator e-mails, SMS messages, MMS messages, updates from web services such as social networking sites (e.g., Facebook, Twitter, Google+, Linkedln, and the like), calendar updates, weather forecasts, instant messaging, RSS information, multimedia (e.g., images, photos, videos, audios), and the like.
FIG. 2
is a flowchart illustrating a low power communication method for communicating with a wearable wireless device according to an exemplary embodiment of the present disclosure.
FIG. 2
210
Referring to , at operation , a VoIP server is operatively connected with an aggregator and/or a base station for handling two-way cellular and interne data traffic among the VoIP server, the aggregator, and the base station, or any combination thereof.
220
At operation , the aggregator is operatively connected with an access point, the base station, the VoIP server, and/or interne or cloud, or any combination thereof for handling two-way cellular and interne data traffic among such devices. The aggregator may be configured to perform information aggregation, scheduling, filtering, whitelisting, and/or blacklisting, of any combination thereof on a user's cellular data and/or interne data according to the user's preference settings. The aggregator may be configured transmit cellular data and/or interne data using burst-oriented traffic patterns.
230
At operation , the access point is operatively connected with a wearable wireless device, the aggregator, and/or the base station, or any combination thereof for handling two-way cellular data and/or internet data among such devices.
240
At operation , the wearable wireless device is automatically placed in a power saving mode. For example, the wearable wireless device may be configured to convert to a hibernation and/or a deep sleep state. The wearable wireless device may be automatically placed in the hibernation and/or a deep sleep state. The wearable wireless device may be configured such that when the wearable wireless device is in the hibernation and/or the deep sleep state, the wearable wireless device is ready to be powered on or resumed upon receiving an interrupt generated by one or more always-on timers, sensors, and/or user input devices.
250
At operation , the wearable wireless device may power on or resume use of a low power radio transceiver while maintaining other systems in the hibernation and/or deep sleep state. The wearable wireless device may use the low power radio transceiver to receive non data-intensive information. The wearable wireless device may use the low power radio transceiver to transmit a message (e.g., an inquiry) with which the wearable wireless device queries the access point and/or aggregator to determine whether the access point and/or the aggregator has any information to be transmitted to the wearable wireless device. For example, the wearable wireless device queries the access point and/or the aggregator to determine the access point and/or the aggregator has any request to establish a communication session (e.g., to receive an incoming call or to receive any updated information from, for example, a subscribed internet service).
In response to the query from the wearable wireless device, the access point determines whether the access point has received any requests for establishing a communication session from the aggregator and/or the base station. If the access point determines that the access point has received a request for establishing a communication session, then the access point responds to the wearable wireless device by attempting to establish a communication session with the wearable wireless device. In contrast, if the access point determines that the access point has not received a request for establishing a communication session, then the access point may indicate to the wearable wireless device that no request for a communication session exists. For example, the access point may transmit an indication that the access point has no outstanding requests for a communication session with the wearable wireless device.
260
If wearable wireless device receives an indication that a request for a communication session exists, then the wearable wireless device powers on or resumes use of the other systems that remained in the hibernation and/or deep sleep state. For example, at operation , the wearable wireless device establishes at least one communication link between the wearable wireless device and the access point and/or the aggregator.
According to various embodiments of the present disclosure, the wearable wireless device may establish communication links with the access point and/or the aggregator according to power management policies. For example, the wearable wireless device may use a low power communication protocol (e.g., BTLE, ANT/ANT+, and the like) for communicating non data-intensive communications. As another example, the wearable wireless device may use a secondary communication protocol (e.g., Bluetooth, WiFi, 2G, 3G, LTE), which consumes more power during use relative to the low power communication protocol, for communicating data-intensive communications.
270
At operation , the wearable wireless device communicates information with the access point and/or aggregator according to power management policies. For example, the wearable wireless device may use any combination of communication protocols for transferring the information. The wearable wireless device may use the low power communication protocol and a secondary communication protocol to transfer information concurrently according to the type of information being communicated.
280
280
240
Thereafter, at operation , the wearable wireless device determines whether to terminate the power saving mode. If the wearable wireless device determines not to terminate the power saving mode at operation , then after the wearable wireless device has communicated the outstanding information with the access point and/or the aggregator, then the wearable wireless device returns to operation at which the enters the power saving mode.
FIG. 3
is a flowchart illustrating a method of operating a wearable wireless device according to an exemplary embodiment of the present disclosure.
FIG. 3
310
Referring to , at operation , the wearable wireless device connects to an access point for two-way communication of cellular data and/or internet data.
320
At operation , the wearable wireless device enters a power saving mode. For example, the wearable wireless device automatically places systems in a hibernation and/or deep sleep state. The wearable wireless device automatically places the wireless transceivers (e.g., radio transceivers) in the hibernation and/or deep sleep state. The wearable wireless device may be configured to power on or resume use of the wireless transceivers upon receiving an interruption generated by one or more always-on timers, sensors, and/or use input devices.
330
At operation , the wearable wireless device powers on a low power communication unit (e.g., a low power transceiver). The wearable wireless device may power on the low power communication unit while maintaining other non-essential unit (e.g., other wireless transceivers) in the hibernation and/or deep sleep state. The wearable wireless device powers on the low power communication unit to receive non data-intensive information from the access point or to transmit a message (e.g., an inquiry) to the access point with which the wearable wireless device queries the access point to determine whether any outstanding requests for a communication session exists.
340
330
At operation , the wearable wireless device receives a response to the inquiry that the wearable wireless device transmitted to the access point at operation .
350
At operation , the wearable wireless device determines whether the access point has any outstanding requests for a communication session.
350
320
If the wearable wireless device determines that the access point does not have any outstanding requests for a communication session at operation , then the wearable wireless device returns to operation at which the wearable wireless device enters the power saving mode.
350
360
In contrast, if the wearable wireless device determines that the access point has an outstanding request for a communication session at operation , then the wearable wireless device proceeds to operation at which the wearable wireless device exits the power saving mode and resumes communication with the access point using one or more communication protocols for such communication. For example, the wearable wireless device may communicate with the access point using one or more communication protocols according to power management policies. As an example, the wearable wireless device may communicate with the access point using one or more communication protocols according to the type of information to be communicated between the wearable wireless device and the access point. For non data-intensive information, the wearable wireless device may communicate such information using a low power communication protocol. For data intensive information, the wearable wireless device may communicate such information using a secondary wireless communication protocol (e.g., Bluetooth, WiFi, 2G, 3G, LTE, and the like).
370
Thereafter, at operation , the wearable wireless terminal determines whether to enter the power saving mode. For example, the wearable wireless terminal determines whether the information associated with the outstanding communication sessions are complete.
370
320
If the wearable wireless terminal determines to enter the power saving mode at operation , then the wearable wireless terminal returns to operation .
FIG. 4
is a block diagram schematically illustrating a configuration of a wearable wireless device according to an exemplary embodiment of the present disclosure.
FIG. 4
400
410
420
430
440
460
400
450
400
470
Referring to , the wearable wireless device includes a control unit , a storage unit , a display unit , an input unit , and a communication unit . The wearable wireless device may also include a sensor unit . The wearable wireless device may also include an audio processing unit .
420
420
400
400
420
400
420
420
400
420
420
The storage unit can store user data, and the like, as well a program which performs operating functions according to various embodiments of the present disclosure. For example, the storage unit may store a program for controlling general operation of the wearable wireless device , an Operating System (OS) which boots the wearable wireless device , and application program for performing other optional functions such as a camera function, a sound replay function, an image or video replay function, a Near Field Communication (NFC) function, and the like. Further, the storage unit may store user data generated according to a user of the wearable wireless device , such as, for example, a text message, a game file, a music file, a movie file, and the like. In particular, the storage unit according to various embodiments of the present disclosure may store information associated with power management policies. For example, the storage unit may store rules or associations relating to the operation of the wearable wireless device for optimizing the energy efficiency thereof. The storage unit may store information relating to which communication means (e.g., wireless transceivers, communication protocols, and the like) to use for communicating various types of data with an access point. As an example, the storage unit may store information indicating that a low power communication protocol and/or low power wireless transceiver is to be used for communicating non data-intensive information with the access point, and indicating that secondary communication protocols (e.g., Bluetooth, 2G, 3G, LTE, and the like) and/or wireless transceivers are to be used for communicating data-intensive information.
430
400
430
400
430
430
430
440
430
The display unit displays information inputted by user or information to be provided to user as well as various menus or user interfaces of the wearable wireless device . For example, the display unit may provide various screens according to a use of the wearable wireless device , such as an idle screen, a message writing screen, a calling screen, and the like. The display unit may display an interface which the user may manipulate or otherwise enter inputs via a touch screen to enter selection of the data that may be transferred or selection of devices to which the data may be transferred. The display unit can be formed as a Liquid Crystal Display (LCD), an Organic Light Emitting Diode (OLED), an Active Matrix Organic Light Emitting Diode (AMOLED), and the like. However, various embodiments of the present disclosure are not limited to these examples. Further, the display unit can perform the function of the input unit if the display unit is formed as a touch screen.
440
440
400
440
440
410
400
440
The input unit may include input keys and function keys for receiving user input. For example, the input unit may include input keys and function keys for receiving an input of numbers or various sets of letter information, setting various functions, and controlling functions of the wearable wireless device . For example, the input unit may include a calling key for requesting a voice call, a video call request key for requesting a video call, a termination key for requesting termination of a voice call or a video call, a volume key for adjusting output volume of an audio signal, a direction key, and the like. In particular, the input unit according to various embodiments of the present disclosure may transmit to the control unit signals related to selection of data to transfer and/or selection of devices to which the data may be transferred, and signals related to operation of the wearable wireless device . Such an input unit may be formed by one or a combination of input means such as a touch pad, a touchscreen, a button-type key pad, a joystick, a wheel key, and the like.
470
470
470
470
472
474
470
410
470
410
472
470
400
472
470
470
474
470
470
The audio processing unit may be formed as an acoustic component. The audio processing unit transmits and receives audio signals, and encodes and decodes the audio signals. For example, the audio processing unit may include a CODEC and an audio amplifier. The audio processing unit is connected to a Speaker (SPK) and a Microphone (MIC) . The audio processing unit converts analog voice signals inputted from the MIC into digital voice signals, generates corresponding data for the digital voice signals, and transmits the data to the control unit . Further, the audio processing unit converts digital voice signals inputted from the control unit into analog voice signals, and outputs the analog voice signals through the SPK . Further, the audio processing unit may output various audio signals generated in the wearable wireless device through the SPK . For example, the audio processing unit can output audio signals according to an audio file (e.g., MP3 file) replay, a moving picture file replay, and the like through the SPK. In particular, according to various embodiments of the present disclosure, the audio processing unit may receive an audio input (e.g., an audio command corresponding to a requested command from the user) through the MIC . According to exemplary embodiments of the present invention, the audio processing unit may be operatively coupled to another input unit through which audio signals may be input. For example, the audio processing unit may be operatively coupled to a Bluetooth accessory (e.g., a Bluetooth headset, a Bluetooth microphone, etc.) and the like.
450
400
450
410
410
400
The sensor unit may include at least one sensor. The at least one sensor may detect and/or monitor a movement or change in position of the wearable wireless device . As an example, the at least one sensor may include a gyroscope, an accelerometer, a magnetometer, a barometer, a GPS sensor, an ambient light sensor, a temperature sensor, a galvanic sensor, a heart rate sensor, an optical blood flow sensor, and the like. The sensor unit may provide various information to the control unit with which the control unit may determine a context within which the wearable wireless device operates.
460
460
460
460
460
The communication unit may be configured for communicating with other devices. For example, the communication unit may be configured to communicate using various communication protocols and various communication transceivers. For example, the communication unit may communicate with other devices using a low power communication protocol such as, for example, BTLE, ANT/ANT+, and the like. The communication unit may communicate with other devices using a secondary communication protocol which uses more power to communicate than the low power communication protocol. As an example, the secondary communication protocol may include Bluetooth, WiFi, 2G, 3G, LTE, and the like. Further, the communication unit may communicate with other devices using a tertiary short-range communication protocol. For example, the tertiary short-range communication protocol may include NFC, RFID, and the like.
460
460
460
400
400
460
460
According to various embodiments of the present disclosure, the communication unit may be configured to communicate with an access point. The communication unit may communicate with the access point using one or more communication protocols. For example, according to various embodiments of the present disclosure, the communication unit may selectively use a communication protocol according to the type of information being communicated between the wearable wireless device and the access point, or otherwise according to a power management profile for improving (e.g., optimizing) energy efficiency of the wearable wireless device . The communication unit may use a low power communication means and/or protocol for communicating non data-intensive information and the like. The communication unit may use a secondary communication means and/or protocol for communicating data intensive information and the like.
460
460
461
462
463
According to various embodiments of the present disclosure, the communication unit may include one or more communication transceivers each of which may be configured to communicate using one or more communication protocols. For example, the communication unit may include a low power radio transceiver , a secondary radio transceiver , and a tertiary short-range radio transceiver .
461
The low power radio transceiver may configured to transmit and receive non data-intensive information. For example, the low radio transceiver may be configured to transmit and receive the non data-intensive information using a low power communication protocol. The low power communication protocol may correspond to a protocol that uses relatively little power during communication. For example, the low power communication protocol may be optimized for energy efficiency or otherwise designed with an important design consideration being energy efficiency. A low power communication protocol may be BLTE, ANT/ANT+, and the like.
462
462
462
462
461
The secondary radio transceiver may be configured to transmit and receive data-intensive information. For example, the secondary radio transceiver may be configured to transmit and receive the data-intensive information using a communication protocol such as, for example, Bluetooth, WiFi, 2G, 3G, LTE, and the like. As an example, the secondary radio transceiver may be configured to use a communication protocol which is designed such that energy efficiency during communication is not a primary consideration; primary considerations may include speed of data transfer, and the like. According to various embodiments of the present disclosure, the communication protocol used by the secondary radio transceiver is different than the communication protocol being used by the low power radio transceiver .
463
463
461
462
The tertiary short-range radio transceiver may be configured to transmit information using a short-range wireless communication protocol. For example, the short-range wireless communication protocol may be NFC, RFID, and the like. According to various embodiments of the present disclosure, the communication protocol used by the tertiary short-range radio transceiver is different than the communication protocol being used by the low power radio transceiver , and the communication protocol being used by the secondary radio transceiver .
460
461
462
463
460
460
461
462
463
According to various embodiments of the present disclosure, the communication unit may use the low power radio transceiver , the secondary radio transceiver , and tertiary short-range radio transceiver , or any combination thereof to transmit information. For example, the communication unit may use such transceivers so as to optimize the overall communication energy efficiency. The communication unit may use the low power radio transceiver , the secondary radio transceiver , and tertiary short-range radio transceiver , or any combination thereof, concurrently to transmit information (e.g., to the access point).
400
410
400
According to various embodiments of the present disclosure, the wearable wireless device may also include a camera unit (not shown). The camera unit may be configured to capture camera images. For example, the camera unit may capture preview images, still images, and video images. The camera unit may be controlled by the control unit . Such control may be based on user input through a camera application loaded on the wearable wireless device .
400
410
410
400
410
400
410
400
400
410
400
410
460
400
According to various embodiments of the present disclosure, the wearable wireless device comprises at least one control unit . The at least one control unit may be configured to operatively control the wearable wireless device . For example, the control unit may control operation of the various components or units included in the wearable wireless device . The control unit may transmit a signal to the various components included in the wearable wireless device and control a signal flow between internal blocks of the wearable wireless device . In particular, the control unit according to various embodiments of the present disclosure may control the wearable wireless device so as to operate in an energy efficient manner. For example, the control unit may control the communication unit so as to selectively use various communication protocols according to the information being transmitted and/or the context in which the wearable wireless device operates, and the like.
410
400
400
410
460
400
410
461
400
410
461
410
410
400
410
400
410
According to various embodiments of the present disclosure, the control unit may control the wearable wireless device to enter a power saving mode (e.g., when the wearable wireless device is not transmitting information with, for example, an access point). The control unit may control to place the communication unit in hibernation and/or a deep sleep state when the wearable wireless device enters the power saving mode. The control unit may control to activate (e.g., power on or resume use of) the low power radio transceiver to query the access point as to whether the access point has any outstanding communication session requests for communicating information to the wearable wireless device . For example, the control unit may control to activate the low power radio transceiver upon receiving an interrupt generated by one or more always-on timers, sensors, and/or user input devices. The control unit may control to set values of timers according to the desired level of power duty cycling given energy/performance constraints set by applications being used or according to user preferences. The control unit may control to awaken the wearable wireless device (e.g., exit the power saving mode) when the control unit determines that the access point has outstanding communication session requests (or otherwise has information to transmit to the wearable wireless device ). The control unit may control to manage communication with access point so as to selectively use various communication protocols according to power management policies.
FIG. 5
is a flowchart illustrating a method of operating an aggregator according to an exemplary embodiment of the present disclosure.
FIG. 5
510
Referring to , at operation , the aggregator receives data from a data source. For example, the data may be cellular data, internet data, and the like. The aggregator may operatively receive the data from a VoIP server, a base station, the Internet (e.g., a web-based or cloud-based server), and the like.
520
At operation , the aggregator compares the received data with transmission policies according to which the aggregator transmits information to users. The transmission policies may be stored locally or remotely, and may be configurable by a service or a user. The transmission policies may include, for example, performing information aggregation, scheduling, filtering, whitelisting, blacklisting, and the like.
530
At operation , the aggregator determines whether to immediately transmit the received data (or a portion thereof) to the user (e.g., using the wearable wireless device). For example, the aggregator may determine that voice data from a specific contact (e.g., a contact provided on a whitelist), or an emergency call should be immediately transmitted to the user. As another example, the aggregator may determine that all incoming calls, SMS messages, MMS messages, and the like should be transmitted to the user upon receipt of the associated data by the aggregator. As another example, the aggregator may determine that internet data such as, for example, an email, an update from a social networking site, and the like should not be immediately transmitted to the user (e.g., transmission of such data may be delayed or restricted).
According to various embodiments of the present invention, the aggregator may adopt a context-aware policy in addition to the transmission policy according to the type of information received (e.g., a call, a social update, and the like), in order to determine whether to immediately transmit the received data to the user. For example, such a context aware policy may consider a user's schedule (e.g., day of the week, time of the day, scheduled meetings, or the like), a user's location (e.g., the home, the office, or the like), a user's activity (e.g., driving), a sender of the information (e.g., family, friends, colleagues, or the like), location of the sender (e.g., a message from a sender who is listed as a contact in the user's terminal and who is located at the same location as the user may be immediately transmitted to the user), and/or the like. Accordingly, the aggregator may take into account the context of the user and/or terminal when determining whether to immediately transmit information or whether to delay or restrict transmission of such information.
According to various embodiments of the present invention, the aggregator may take into account a change in the context of the user and/or terminal when determining whether to immediately transmit information or whether to delay or restrict transmission of such information.
530
540
If the aggregator determines that the received data (or a portion thereof) should be immediately transmitted to the user at operation , then the aggregator proceeds to operation at which the aggregator determines whether to use an energy efficient transmission scheme. For example, the aggregator may determine whether a burst oriented transmission should be used.
530
550
If the aggregator determines that the aggregator should not use (or is otherwise unnecessary to use) an energy efficient transmission scheme to transmit the information to be transmitted to the user immediately at operation , then the aggregator proceeds to operation at which the aggregator transmits the data to the user (e.g., to the wearable wireless device).
530
560
In contrast, if the aggregator determines that the aggregator should use an energy efficient transmission scheme to transmit the information to be transmitted to the user immediately at operation , then the aggregator proceeds to operation at which the aggregator transmits the data to the user according to a selected energy efficient transmission schemes.
530
570
In contrast, if the aggregator determines not to immediately transmit the data to the user at operation , then the aggregator proceeds to operation at which the aggregator determines whether to store the data (e.g., until transmission is appropriate according to the applicable transmission policies).
570
580
In contrast, if the aggregator determines to store the data at operation , then the aggregator proceeds to operation at which the aggregator stores the data and transmits the data to the user (e.g., to the wearable wireless device) according to applicable transmission policies. For example, the aggregator may apply an information aggregation transmission policy according to which the aggregator transmits the information to the user when a predetermined time duration has lapsed or upon aggregated data intended for the user meets or exceeds an aggregate size threshold. As another example, the aggregator may apply a transmission policy according to which the aggregator transmits the information upon receiving a request from the user to transmit information thereto (e.g., the aggregator stores the data until the user pulls the data thereto). As another example, the aggregator may apply a transmission policy according to which the aggregator transmits the information upon receiving an override request from the application or cloud service generating the stored information. Such an application and/or cloud service may also embed such an overriding request in the metadata section of the delivered information via which the adjusted priority of the said information (e.g., from stored and delivery to immediate delivery) will persist until the next priority adjustment occurs. As another example, the aggregator may apply a transmission policy according to which the aggregator transmits the information upon receiving a request from the access point and/or the wearable device detecting a change of user's location, activity, and/or state.
570
590
In contrast, if the aggregator determines not to store the data at operation , then the aggregator proceeds to operation at which the aggregator dumps the data not to be stored. As an example, the aggregator may determine not to store data for transmission to the user if the data is of a type which the user is unable to view/use on the wearable wireless device, if the data exceeds a certain size threshold, if the data corresponds to services (and updates thereof) which the user does not wish to receive on the wearable wireless device, if the data corresponds to data on a blacklist, and the like.
FIG. 6
is a block diagram schematically illustrating a configuration of an aggregator according to an exemplary embodiment of the present disclosure.
FIG. 6
600
610
620
640
600
630
Referring to , the aggregator includes a control unit , a storage unit , and a communication unit . According to various embodiments of the present disclosure, the aggregator may also include an input unit .
620
620
600
600
620
600
620
620
The storage unit can store user data, and the like, as well a program which performs operating functions according to various embodiments of the present disclosure. For example, the storage unit may store a program for controlling general operation of the aggregator , an Operating System (OS) which boots the aggregator , and application program for performing other optional functions. For example, the storage unit may store rules or associations relating to the operation of the aggregator for optimizing the energy efficiency associated with transmission of data to the user. The storage unit may store information relating to which communication means (e.g., wireless transceivers, communication protocols, and the like) to use for communicating various types of data to the wearable wireless device. As an example, the storage unit may store information indicating that a low power communication protocol and/or low power wireless transceiver is to be used for communicating non data-intensive information with the wearable wireless device, and indicating that secondary communication protocols (e.g., Bluetooth, 2G, 3G, LTE, and the like) and/or wireless transceivers are to be used for communicating data-intensive information.
620
600
According to various embodiments of the present disclosure, the storage unit may store transmission policies according to which the aggregator transmits received data. For example, the transmission policies may relate to applying information aggregation, scheduling, filtering, whitelisting, and blacklisting and the like on a user's cellular and/or interne data, and the like.
640
640
640
640
640
The communication unit may be configured for communicating with other devices. For example, the communication unit may be configured to communicate using various communication protocols and various communication transceivers. For example, the communication unit may communicate with other devices using a low power communication protocol such as, for example, BTLE, ANT/ANT+, and the like. The communication unit may communicate with other devices using a secondary communication protocol which uses more power to communicate than the low power communication protocol. As an example, the secondary communication protocol may include Bluetooth, WiFi, 2G, 3G, LTE, and the like. Further, the communication unit may communicate with other devices using a tertiary short-range communication protocol. For example, the tertiary short-range communication protocol may include NFC, RFID, and the like.
640
According to various embodiments of the present disclosure, the communication unit may be configured to communicate with an access point, a base station, a VoIP server, the interne (e.g., a web-based or cloud-based server), and a wearable wireless device (e.g., if the aggregator and access point are integrated).
600
640
640
600
640
640
According to various embodiments of the present disclosure, if the aggregator is integrated with (or also serves as) an access point, then the communication unit may communicate with the wearable wireless device using one or more communication protocols. For example, according to various embodiments of the present disclosure, the communication unit may selectively use a communication protocol according to the type of information being communicated between the wearable wireless device and the aggregator , or otherwise according to a transmission policy for improving (e.g., optimizing) energy efficiency of transmission with the wearable wireless device. The communication unit may use a low power communication means and/or protocol for communicating non data-intensive information and the like. The communication unit may use a secondary communication means and/or protocol for communicating data intensive information and the like.
640
640
According to various embodiments of the present disclosure, the communication unit may include one or more communication transceivers each of which may be configured to communicate using one or more communication protocols. For example, the communication unit may include a low power radio transceiver, a secondary radio transceiver, and a tertiary short range radio transceiver.
The low power radio transceiver may be configured to transmit and receive non data-intensive information. For example, the low radio transceiver may be configured to transmit and receive the non data-intensive information using a low power communication protocol. The low power communication protocol may correspond to a protocol that uses relatively little power during communication. For example, the low power communication protocol may be optimized for energy efficiency or otherwise designed with an important design consideration being energy efficiency. A low power communication protocol may be BLTE, ANT/ANT+, and the like.
The secondary radio transceiver may be configured to transmit and receive data-intensive information. For example, the secondary radio transceiver may be configured to transmit and receive the data-intensive information using a communication protocol such as, for example, Bluetooth, WiFi, 2G, 3G, LTE, and the like. As an example, the secondary radio transceiver may be configured to use a communication protocol which is designed such that energy efficiency during communication is not a primary consideration; primary considerations may include speed of data transfer, and the like. According to various embodiments of the present disclosure, the communication protocol used by the secondary radio transceiver is different than the communication protocol being used by the low power radio transceiver.
461
462
The tertiary short-range radio transceiver may be configured to transmit information using a short-range wireless communication protocol. For example, the short-range wireless communication protocol may be NFC, RFID, and the like. According to various embodiments of the present disclosure, the communication protocol used by the tertiary short-range radio transceiver is different than the communication protocol being used by the low power radio transceiver , and the communication protocol being used by the secondary radio transceiver .
640
640
According to various embodiments of the present disclosure, the communication unit may use the low power radio transceiver, the secondary radio transceiver, and tertiary short-range radio transceiver, or any combination thereof to transmit information. For example, the communication unit may use such transceivers so as to optimize the overall communication energy efficiency of transmissions with the wearable wireless device. The communication unit may use the low power radio transceiver, the secondary radio transceiver, and tertiary short-range radio transceiver, or any combination thereof, concurrently to transmit information (e.g., to the wearable wireless device).
630
630
600
630
The input unit may include input keys and function keys for receiving user input. For example, the input unit may include input keys and function keys for receiving an input of numbers or various sets of letter information, setting various functions, and controlling functions of the aggregator . Such an input unit may be formed by one or a combination of input means such as a touch pad, a touchscreen, a button-type key pad, a joystick, a wheel key, and the like.
600
610
610
600
610
600
610
600
600
610
600
610
640
According to various embodiments of the present disclosure, the aggregator comprises at least one control unit . The at least one control unit may be configured to operatively control the aggregator . For example, the control unit may control operation of the various components or units included in the aggregator . The control unit may transmit a signal to the various components included in the aggregator and control a signal flow between internal blocks of the aggregator . In particular, the control unit according to various embodiments of the present disclosure may control the aggregator so as to transmit data to a user (e.g., a wearable wireless device) in an energy efficient manner. For example, the control unit may control the communication unit so as to selectively use various communication protocols according to the information being transmitted and/or the context in which the wearable wireless device operates, and the like.
610
According to various embodiments of the present disclosure, the control unit may control to transmit data to a user according to one or more predefined or selected transmission policies.
FIG. 7
is a block diagram schematically illustrating a configuration of an access point according to an exemplary embodiment of the present disclosure.
FIG. 7
700
710
720
740
700
730
Referring to , the access point includes a control unit , a storage unit , and a communication unit . According to various embodiments of the present disclosure, the access point may also include an input unit .
720
720
700
700
720
700
720
720
The storage unit can store user data, and the like, as well a program which performs operating functions according to various embodiments of the present disclosure. For example, the storage unit may store a program for controlling general operation of the access point , an OS which boots the access point , and an application program for performing other optional functions. For example, the storage unit may store rules or associations relating to the operation of the access point for optimizing the energy efficiency associated with transmission of data to the user (e.g., the wearable wireless device). The storage unit may store information relating to which communication means (e.g., wireless transceivers, communication protocols, and the like) to use for communicating various types of data to the wearable wireless device. As an example, the storage unit may store information indicating that a low power communication protocol and/or low power wireless transceiver is to be used for communicating non data-intensive information with the wearable wireless device, and indicating that secondary communication protocols (e.g., Bluetooth, 2G, 3G, LTE, and the like) and/or wireless transceivers are to be used for communicating data-intensive information.
720
700
According to various embodiments of the present disclosure, the storage unit may store transmission policies according to which the access point transmits received data. For example, the transmission policies may relate to applying information aggregation, scheduling, filtering, whitelisting, and blacklisting and the like on a user's cellular and/or interne data, and the like.
740
740
740
740
740
The communication unit may be configured for communicating with other devices. For example, the communication unit may be configured to communicate using various communication protocols and various communication transceivers. For example, the communication unit may communicate with other devices using a low power communication protocol such as, for example, BTLE, ANT/ANT+, and the like. The communication unit may communicate with other devices using a secondary communication protocol which uses more power to communicate than the low power communication protocol. As an example, the secondary communication protocol may include Bluetooth, WiFi, 2G, 3G, LTE, and the like. Further, the communication unit may communicate with other devices using a tertiary short-range communication protocol. For example, the tertiary short-range communication protocol may include NFC, RFID, and the like.
740
According to various embodiments of the present disclosure, the communication unit may be configured to communicate with an aggregator, a base station, a VoIP server, the interne (e.g., a web-based or cloud-based server), and a wearable wireless device.
740
740
740
700
740
740
According to various embodiments of the present disclosure, the communication unit may communicate with the wearable wireless device using one or more communication protocols. The communication unit may communicate with the wearable wireless device using one or more communication protocols concurrently. For example, according to various embodiments of the present disclosure, the communication unit may selectively use a communication protocol according to the type of information being communicated between the wearable wireless device and the access point , or otherwise according to a transmission policy for improving (e.g., optimizing) energy efficiency of transmission with the wearable wireless device. The communication unit may use a low power communication means and/or protocol for communicating non data-intensive information and the like. The communication unit may use a secondary communication means and/or protocol for communicating data intensive information and the like.
740
740
According to various embodiments of the present disclosure, the communication unit may include one or more communication transceivers each of which may be configured to communicate using one or more communication protocols. For example, the communication unit may include a low power radio transceiver, a secondary radio transceiver, and a tertiary short range radio transceiver.
The low power radio transceiver may be configured to transmit and receive non data-intensive information. For example, the low radio transceiver may be configured to transmit and receive the non data-intensive information using a low power communication protocol. The low power communication protocol may correspond to a protocol that uses relatively little power during communication. For example, the low power communication protocol may be optimized for energy efficiency or otherwise designed with an important design consideration being energy efficiency. A low power communication protocol may be BLTE, ANT/ANT+, and the like.
The secondary radio transceiver may be configured to transmit and receive data-intensive information. For example, the secondary radio transceiver may be configured to transmit and receive the data-intensive information using a communication protocol such as, for example, Bluetooth, WiFi, 2G, 3G, LTE, and the like. As an example, the secondary radio transceiver may be configured to use a communication protocol which is designed such that energy efficiency during communication is not a primary consideration; primary considerations may include speed of data transfer, and the like. According to various embodiments of the present disclosure, the communication protocol used by the secondary radio transceiver is different than the communication protocol being used by the low power radio transceiver.
The tertiary short-range radio transceiver may be configured to transmit information using a short-range wireless communication protocol. For example, the short-range wireless communication protocol may be NFC, RFID, and the like. According to various embodiments of the present disclosure, the communication protocol used by the tertiary short-range radio transceiver is different than the communication protocol being used by the low power radio transceiver, and the communication protocol being used by the secondary radio transceiver.
740
740
According to various embodiments of the present disclosure, the communication unit may use the low power radio transceiver, the secondary radio transceiver, and tertiary short-range radio transceiver, or any combination thereof to transmit information. For example, the communication unit may use such transceivers so as to optimize the overall communication energy efficiency of transmissions with the wearable wireless device. The communication unit may use the low power radio transceiver, the secondary radio transceiver, and tertiary short-range radio transceiver, or any combination thereof, concurrently to transmit information (e.g., to the wearable wireless device).
730
730
700
730
The input unit may include input keys and function keys for receiving user input. For example, the input unit may include input keys and function keys for receiving an input of numbers or various sets of letter information, setting various functions, and controlling functions of the access point . Such an input unit may be formed by one or a combination of input means such as a touch pad, a touchscreen, a button-type key pad, a joystick, a wheel key, and the like.
700
710
710
700
710
700
710
700
700
710
700
710
740
According to various embodiments of the present disclosure, the access point comprises at least one control unit . The control unit may be configured to operatively control the access point . For example, the control unit may control operation of the various components or units included in the access point . The control unit may transmit a signal to the various components included in the access point and control a signal flow between internal blocks of the access point . In particular, the control unit according to various embodiments of the present disclosure may control the access point so as to transmit data to a user (e.g., a wearable wireless device) in an energy efficient manner. For example, the control unit may control the communication unit so as to selectively use various communication protocols according to the information being transmitted and/or the context in which the wearable wireless device operates, and the like.
710
According to various embodiments of the present disclosure, the control unit may control to transmit data to a user according to one or more predefined or selected transmission policies.
It will be appreciated that various embodiments of the present disclosure according to the claims and description in the specification can be realized in the form of hardware, software or a combination of hardware and software.
Any such software may be stored in a non-transitory computer readable storage medium. The non-transitory computer readable storage medium stores one or more programs (software modules), the one or more programs comprising instructions, which when executed by one or more processors in an electronic device, cause the electronic device to perform a method of the present disclosure.
Any such software may be stored in the form of volatile or non-volatile storage such as, for example, a storage device like a Read Only Memory (ROM), whether erasable or rewritable or not, or in the form of memory such as, for example, Random Access Memory (RAM), memory chips, device or integrated circuits or on an optically or magnetically readable medium such as, for example, a Compact Disk (CD), Digital Versatile Disc (DVD), magnetic disk or magnetic tape or the like. It will be appreciated that the storage devices and storage media are various embodiments of non-transitory machine-readable storage that are suitable for storing a program or programs comprising instructions that, when executed, implement various embodiments of the present disclosure. Accordingly, various embodiments provide a program comprising code for implementing apparatus or a method as claimed in any one of the claims of this specification and a non-transitory machine-readable storage storing such a program.
While the present disclosure has been shown and described with reference to various embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims and their equivalents.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and other aspects, features, and advantages of certain embodiments of the present disclosure will be more apparent from the following description taken in conjunction with the accompanying drawings, in which:
FIG. 1
is a diagram illustrating a system architecture for providing low power communication with a wearable device according to an exemplary embodiment of the present disclosure;
FIG. 2
is a flowchart illustrating a low power communication method for communicating with a wearable wireless device according to an exemplary embodiment of the present disclosure;
FIG. 3
is a flowchart illustrating a method of operating a wearable wireless device according to an exemplary embodiment of the present disclosure;
FIG. 4
is a block diagram schematically illustrating a configuration of a wearable wireless device according to an exemplary embodiment of the present disclosure;
FIG. 5
is a flowchart illustrating a method of operating an aggregator according to an exemplary embodiment of the present disclosure;
FIG. 6
is a block diagram schematically illustrating a configuration of an aggregator according to an exemplary embodiment of the present disclosure; and
FIG. 7
is a block diagram schematically illustrating a configuration of an access point according to an exemplary embodiment of the present disclosure. | |
The Law Society of Northern Ireland has welcomed the re-opening of the housing market from Monday 15th June 2020.
In a statement the President of the Law Society of Northern Ireland, Rowan White, said:
“The Law Society welcomes the updated guidance issued by the Department for Communities, which will lead to the reopening of the housing market from Monday, 15th June 2020.
The Society is pleased to have contributed to the drafting of this guidance, which recognises the pivotal role that solicitors play in the property market in Northern Ireland.
The updated guidance and re-opening of the housing market reflects the many weeks of representations by the Society to Ministers and Government agencies to get the market moving again.
The Society acknowledges that, whilst this is not a full return to the position prior to the COVID-19 pandemic, it is still a very positive move forward.
Solicitors throughout Northern Ireland will now be able to support their clients to progress property transactions safely and in accordance with the guidance provided.
The key message from the Society is that, if you are intending to buy or sell a house or other property, you should consult your solicitor at as early stage as possible for advice and guidance on appropriate contractual safeguards to ensure that transactions can safely proceed to completion.
We look forward to working with all other sectors of the property market to enable our clients to progress and complete their house moves quickly and safely." | https://www.lawsoc-ni.org/law-society-welcomes-the-reopening-of-the-housing-market |
(NASHVILLE) – The State Collaborative on Reforming Education (SCORE) has released the 2014-15 State of Education in Tennessee report, a comprehensive review of Tennessee’s recent work to improve K-12 student academic achievement that identifies four priorities for public education in 2015.
The 72-page report was released by SCORE’s founder and chairman, Senator Bill Frist, M.D., at an event attended by 150 education partners from across Tennessee, including members of the General Assembly, leaders from the Tennessee Department of Education, and K-12 and postsecondary educators.
1. Select and implement high-quality assessments that are nationally benchmarked and aligned to Tennessee’s State Standards. The 2014-15 State of Education in Tennessee report calls for quickly moving ahead to implement the TNReady assessment in 2015-16 to replace the Tennessee Comprehensive Assessment Program (TCAP) math and English tests. It also identifies a need for more state support for districts and schools in selecting high-quality formative assessments, and it recommends a statewide study of the amount of testing in districts and schools as a step toward having fewer, better assessments. The reports says a state-level communications campaign is needed to explain to the public how high-quality assessments can improve student achievement.
2. Ensure the continued and improved implementation of Tennessee’s State Standards. The 2014-15 State of Education in Tennessee report emphasizes that the ongoing public review process of Tennessee’s State Standards must result in equally high or higher standards for students, and it calls on policymakers to refrain from passing legislation that would change the standards before the review is complete. It encourages multiple groups in the state to foster efforts by those closest to the classroom to offer input for the review so that recommendations address the top needs of students and teachers. The report also identifies a need for more training for teachers and school leaders and for high-quality learning materials aligned to the standards.
3. Elevate the teaching profession in Tennessee to ensure that high-quality candidates pursue a career in education and that Tennessee’s current teachers receive the support they need to improve student learning. The 2014-15 State of Education in Tennessee report recommends that the State Board of Education and the Tennessee Department of Education develop a more rigorous approval process for teacher preparation programs that would consider teacher retention and effectiveness data as well as the program’s entry requirements and curriculum. It also identifies a need for more training for school leaders in how best to use the teacher evaluation process to improve instruction. The report says the state should maintain its commitment to being the fastest-improving state for teacher pay while expanding programs that recognize exemplary instruction. It calls on the state and districts to work together on creating more leadership opportunities for teachers who want to remain in the classroom. While noting that assessment data show significant growth in grades 3-8 math but only slight increases in reading, the report also calls for a task force to develop a strategic plan to improve literacy.
4. Transform instruction through high-quality school leadership that meets local needs. The 2014-15 State of Education in Tennessee report recommends improving principal preparation programs with rigorous selection criteria, a research-based curriculum, high-quality clinical experiences, and partnerships between preparation programs and local school districts. To help principals build skills as instructional leaders, the report calls for more professional development and support. It also identifies a need for a new data system that will provide more comprehensive information about principal preparation programs, current school leader performance, and the principal labor market. The report also says there should be more training for district leaders in how to provide feedback and support in conjunction with principal evaluations.
In 2013, Tennessee became the fastest-improving state for student achievement, according to results from the National Assessment of Educational Progress. In 2014, ACT reported that Tennessee’s composite score growth ranked at the top of states that require all students to take the test. On TCAP, approximately 100,000 additional Tennessee students are on grade level in math and more than 57,000 additional Tennessee students are on grade level in science, compared to 2010. These results are early indicators of the impact student-focused polices are having on achievement in Tennessee.
SCORE also announced Friday that it will monitor work on the priorities throughout the year with a Progress Report that tracks what needs to be done, which education partners can help, and how to measure success. The Progress Report will indicate where progress has been made and highlight priority areas that need more support.
Read the 2014-15 State of Education in Tennessee report. | http://tnscore.org/score-releases-2014-15-state-of-education-in-tennessee-report/ |
- B-cells are a subtype of lymphocyte which synthesize Antibody and are the major effector cells of Humoral Immunity. The development of these leukocytes occurs largely within the bone marrow and the final steps of differentiation occur in the spleen.
|Function|
- The major function of B-cells is to synthesize Antibody molecules which bind with high specificity and affinity to microbial antigens. The function of antibody is discussed further in its own page; briefly, binding of antibody to microbes can either directly inhibit microbial function or causes recruitment of other immune effector cells to kill the bacteria. Consequently, B-cells are critical for immunity to extracellular pathogens.
|Subtypes|
- B-cells go through a variety of stages during their development which is discussed in B-cell Development. However, the major functionally important stages to be aware of are the final stages known as the Plasma Cell and Memory B Cell stages. Plasma Cells are B-cells specialized for high levels of antibody synthesis and secretion. Memory B Cells are quiescent antigen-sepecific cells which differentiate following a primary immune response to a particular microbe which can become rapidly activated to differentiate into Plasma Cells if the microbe if re-encountered. B-cells can also be classified based on the subtype of antibody which they secrete. | http://pathwaymedicine.org/B-cell |
Midland University, a private, Christian, liberal arts university in Fremont, Nebraska (just outside of metro Omaha), is seeking a Baseball Coach Graduate Assistant. This position will be offered within our graduate assistant structure, requiring admission to the University's Master of Education, or Master of Leadership Training and Development programs. In addition to the academic responsibilities, the candidate will be responsible for contributing to various aspects of the baseball program, including assistant coaching, program administration, practice preparation, and other duties assigned by the Head Coach. The person who holds this position will receive tuition remission from the University an on campus meal plan, and monthly stipend.
Job responsibilities include:
- Representing Midland University
- Assisting the head coach with the administration and leadership of the baseball program
- Providing coaching and instruction during training and practice activities
- Recruiting Overseeing team travel
- Directing strength and conditioning activities
- Practice preparation Video analysis
- Running camps and clinics
- Helping to ensure team compliance with all NAIA and institutional, rules and regulations
Need to have:
- A bachelor's degree
- Previous baseball coaching experience
- Good organizational skills
- Good interpersonal communication skills
- Fundamental computer skills
Should demonstrate:
- A positive attitude
- An ability to resolve issues independently
Compensation:
- Tuition Remission in the master's program. | https://midland.applicantpro.com/jobs/2004316.html |
We want you to experience an excellent standard of service each and every time you use Trendsetting Awards.
-
We aim to provide the highest quality services and information for all of our customers.
-
We will strive to ensure all of our customers are completely satisfied.
-
We will achieve these aims through knowledgeable and helpful staff utilizing efficient, cost-effective systems and processes.
-
When we receive complaints, we will ensure that every complaint will be dealt with promptly on the same day, openly and fairly through our customer care department.
-
We will carry out regular reviews of all complaints; allowing us to address problems quickly and in line with our continuous improvement philosophy.
-
We will always welcome and consider any new ways to improve our service and encourage any commitments you want to make to help us achieve our goals.
Courtesy
-
Our employees are trained in our service standards and how to achieve them.
-
They will exhibit customer friendly skills and be knowledgeable, professional and courteous in meeting the needs of our customers at all times. | https://staging.trendsettingawards.com/en/ourcommitmenttoyou |
Wait, What?
That's right. It's time - and this website will explain why.
When you come to Emory University, it is commonly promised that the funding and opportunities to associate how you want, and do what you want, are abundant and limitless. That promise is unfortunately slipping away, but it doesn’t have to. Among a variety of process changes to the finance code, we have found that the Student Activity Fee has not adjusted with inflation for over a decade. Because of this, our ability to program, associate, and accomplish what we want on this campus is diminished. That leads us to today. After a semester of doing our homework, SGA has found that a $15 increase to the student activity fee, would not only benefit the entire campus, it would put our SAF at where it should have been for years.
That’s the elevator pitch, but there is a lot more to this conversation. Why this process, and who is involved? Why is SGA focusing on this exactly? College is expensive enough - why would we actively ask to pay more? Will this affect my financial aid? It’s our job to make that case, and that’s what this website is for. Please take some time to check out our FAQ, our data, and more on why we think this is so important.
The Timeline
We want every student to have the opportunity to be involved, ask questions, and voice concerns. We have developed the following timeline with that goal in mind.
- November 11th - First Vote by the SGA Legislature - ESC N101 7:00 PM
- November 18th - Town Hall - ESC N101 6:00 PM
- November 18th - Second Vote by the SGA Legislature - ESC N101 7:00 PM
- November 20th - Student Body Referendum
The town hall is specifically designed for public input and conversation. We invite anyone and everyone to come speak their mind, and have a dialogue about this proposal!
Passage of the increase then requires a vote of the student body. If it passes, the increase will be approved by the Board of Trustees, and be implemented next academic year, 2020-2021.
View Our Data
Want to see the numbers for yourself? Data points and research can be downloaded from our OrgSync page.
Frequently-Asked Questions:
What is the Student Activity Fee (SAF)?
The Student Activity Fee is money allocated by students, for students. It supports everything from student organizations to club sports to scholarships.
If I receive financial aid, will it cover this?
Yes, financial aid will cover this. Tuition rises every year, and your financial aid increases with it. We’re advocating for about a 1% slice of the average increase. While small in that macro, that is still a 16% increase in funds available for the student body.
Why $15?
The last significant increase of the SAF was in 2006. You can check our math in the data section and while our tuition was supposed to raise with inflation, it hasn’t. The extra $15 is to make up the difference and set the SAF where it is supposed to be.
How can I ensure that this money is being managed responsibly?
Great question. We know we are asking a lot here, and we do not take it lightly. There is absolutely a lot of due diligence required on the part of SGA that must accompany this initiative. As such, we have also improved our budgeting process and are doing as much as we can to be proactive now in order to ensure that clubs have a positive budgeting experience in the spring. We are working to ensure that all club budgets will be created in an impartial, data-driven, and needs-oriented manner. We are confident that this structure will allow for all students to experience the benefits of this increase in the SAF.
How, exactly, is the SAF changing?
If this bill passes, the SAF will increase by $15 one time (from $95 to $110). Additionally, your SAF currently increases by about $3 every four years. This bill will change it so that your SAF will increase by 1.5% every year (to match average inflation).
Ready to Expand Emory's Student Experience?
Voting will start on on the 20th of November. A link will be available on this page at that time and sent via email to the undergraduate student body. | https://spark.adobe.com/page/UtTVXrzhjKZ1b/ |
Understanding Statistical Analysis and Modeling is a text for graduate and advanced undergraduate students in the social, behavioral, or managerial sciences seeking to understand the logic of statistical analysis. Robert Bruhl covers all the basic methods of descriptive and inferential statistics in an accessible manner by way of asking and answering research questions. Concepts are discussed in the context of a specific research project and the book includes probability theory as the basis for understanding statistical inference. Instructions on using SPSS® are included so that readers focus on interpreting statistical analysis rather than calculations. Tables are used, rather than formulas, to describe the various calculations involved with statistical analysis and the exercises in the book are intended to encourage students to formulate and execute their own empirical investigations.
Chapter 1: “Why” Conduct Research, and “Why” Use Statistics?
“Why” Conduct Research, and “Why” Use Statistics?
1.0 Learning Objectives
An empirical investigation is one based on observations of some set of persons, places, things, or events, and statistical analysis represents a set of tools useful in organizing and assessing such empirical observations. In this chapter, we
- describe three different ways in which phenomena (i.e., persons, places, things, or events) can be represented by their properties;
- describe two different types of study intending to answer different questions regarding a set of phenomena; and
- provide an outline of the different methods of statistical analysis appropriate for the different types of study and different types of property.
1.1 Motivation
Every investigation starts—and ends—with a purpose: “I want/need to ‘understand’ something about something.” If the investigator’s purpose is “I want/need to ‘understand’ some observable ...
- Loading... | https://methods.sagepub.com/book/understanding-statistical-analysis-and-modeling/i591.xml |
New Zealand’s ageing workforce is rapidly expanding. “For people in their 60s, the participation rate is currently 59 percent, but this will rise to 64 percent in 2038 and 67 percent in 2068” (more).
So how is this likely to affect health and safety?
The ageing workforce poses many opportunities for organisations. People who have been a part of the work force for decades offer an extensive range of valuable experience, knowledge and skills that can really benefit the workplace.
However, the ageing workforce also creates health and safety challenges that must be addressed.
Older workers may be at higher risk of work-related injuries. A study conducted by the University of Otago found that 70–79 year olds had the highest injury rates and proportion of claims due to falls (more).
There is also higher prevalence of musculoskeletal problems in older workers, as these often arise from repeated actions over a long period of time. Moreover, they often take longer to recover resulting in more days away from work (more). High workload, lack of management support or poor work culture can also have an effect on them.
Thus, companies need to focus on effective ways to manage and maintain their health and safety.
What can organisations do?
Recognising the differing needs of older workers is important to ensure they remain safe and healthy. Furthermore, implementing certain measures can help lower the risk of health and safety issues from arising.
*Common approaches companies may take include:
- Monitoring work-life balance and Flexible working arrangements – Flexible work options such as flexi-time, remote work or part-time hours, are seen as a way to enable older workers to remain productive in their jobs while meeting their own individual needs (which can also contribute to their overall wellbeing). It can also help transition them into retirement.
- Job (re)design – This could include creating specific roles that suit their abilities (e.g. project-based roles), adjusting job responsibilities, or reducing work-load (e.g. access to less labour intensive roles).
- Ergonomic (re)design – With the higher risk of musculoskeletal issues in older people, companies should consider (re)designing workstations that fit the requirements of each individual, to prevent short/long term ergonomic injuries from occurring.
- Health and Wellness programmes – Such programmes can really benefit their wellbeing inside and outside of the workplace. For instance, subsidised gym memberships and eye examinations, free annual flu vaccinations or dietary/lifestyle recommendations are commonly provided in workplaces.
*These approaches can be beneficial for all workers (regardless of their age).
Managing and engaging older workers – especially when it comes to health and safety – entails developing a supportive and inclusive work environment. By valuing their work despite their age and ensuring their needs are considered, it can lead to a more productive and healthier workplace.
For more information on the ageing workforce and their impact on businesses, check out this report by AUT here. Additionally, you can find more guidance on managing an ageing workforce here and here.
If your organisation needs assistance with creating health and safety systems that meets all employees’ needs (including older workers), contact the team at Working Wise by filling out our online form or giving us a call on 04 499 0710. | https://workingwise.nz/the-impact-of-an-ageing-workforce-on-companies/ |
We kindly inform you that, as long as the subject affiliation of our 300.000+ articles is in progress, you might get unsufficient or no results on your third level or second level search. In this case, please broaden your search criteria.
The paper presents the extremely interesting bronze coin of the types of round shield // two-handled cup (kypsele, kotyle, diota) (Fig. 1a–1b) discovered in 1996 during the archaeological excavations of the Thracian settlement located in the area of Adzhiyska Vodenitsa near the village (now a town) of Vetren, Septemvri Municipality, better known as “Emporion Pistiros”. Grounded on both informative types known as parasema, the author tries to interpret (issuer and time of minting) this unique bronze issue – an allusion of the Odrysian Royal court from the first half of the 4th c. BC under Seuthes II, Kotys I and their successors via the unambiguous presence of the cult cup – the kypsele or kotyle decorating the reverses of their coins.More...
The author studies the first years after the introduction of the chitalishte institution when these cultural centres appeared and established themselves in the dynamic sociocultural context of the local communities – first in some of the well-developed Bulgarian towns and later in many of the Bulgarian villages. Chitalishte is a cultural and educational institution and is thus studied in the context of the modernization, educational and nation building ideas pertinent in the 1860s and 1870s. At that time the institution developed its specific features (its local nature, complex functions, autonomous social form of governance). The article presents the decisive moments certifying for the institutional activity of the chitalishta with an accent on these issues which show close relations to the folk culture, which was as a need and as a type of communication dominant in the local culture.More...
The article represents the folklore groups created in the second half of the 20th century. They allow for the local village tradition (preserved as a living practice of its bearers) to enter the local chitalishte. The analysis of the filed-work research in the villages of Bistritsa (Sofia City Municipality) and Alino (Samokov Region) reveals different aspects of the relation between chitalishte institution and intangible cultural heritage in the changing social and cultural contexts, as well as in relation to the changing cultural policies. Thus the article offers an anthropological point of view to the transmission of traditional knowledge, skills and experience in chitalishte environment.More...
Asserting for decades on end its status of a focal point of the (social and) cultural life of (predominantly small) communities, the institution of the Bulgarian chitalishte in its more than a century existence has gradually but firmly accepted and realized its functions related to the transmission of the local culture. The text develops the discourse about the chitalishte as “memory” as well as a a “generator” of local culture, closely related to its institutional status based on community unification.More...
The research is historical and pedagogical and aims to outline the main trends in the development of the library education in Bulgaria during the period 1918 – 1944. It is also a first attempt for a multilevel study of library education as a segment of Bulgarian education, in particular of non-formal education in Bulgaria.More...
The research is historical and pedagogical of its kind; it seeks sources and aims to differentiate major trends in the development of the library education of the ethnical minorities in Bulgaria over the period 1944 – 1956. It is a first attempt for researching the contents and the forms of library education of ethnical minorities within a certain period of history. It is completely based on historical sources and enactments. The extracted positive practices and approaches are valuable experience of the contemporary education policy on integration and desegregation of ethnical minorities in one of the types of the extra-school, informal education – the library education which is inseparably involved in the Bulgarian education tradition with its 160-year history.More...
The ethnic identity of the inhabitants of Gora was formed over the course of many centuries during which time religious conversion took place (from Orthodox Christianity to Islam). This gave rise to a particular cultural matrix based on the continuous movement of various influences, deeply limited by patriarchal values and faith-based rules which dictated that woman’s role be tied to the home and the birthing of children. In this sense the “musical behavior” of women is in accordance with the generally accepted norms deemed desirable by the Gorani environment. Starting in the mid-twentieth century up to today, the ethnomusicological study of the musical and folkloric heritage of Gora has uncovered the role of women in the process of establishing continuity of the rare forms of traditional singing in private, semi-private and public spaces. Analyzing the results of in-field research carried out not only in their traditional homeland but in Belgrade, the musical experiences of the women can be defined as being aimed not only towards their own community, but also representing the promotion of Gorani culture in a wider framework. By comparing the position of the female narrator using chronological and spatial perspectives, their significance is perceived in the process of preserving and popularizing traditional singing, which is concurrently the link with the Others and the “materialization” of this ethnic group’s identity.More...
When the end of the 20th century brought ethnically motivated conflicts in Europe, as well as hostilities within the borders of repressive regimes in other parts of the world, it was clear that no existing form of remembrance and didactics aimed at preventing the recurrence of crimes had succeeded. A new, dissonant heritage cast a shadow over the slogan never again, and thus a valid question has been raised – if this legacy is to be protected, what would be the most appropriate model for that? The answer to the aforementioned dilemma has taken shape through reflection on ways to connect memory, as an element of intangible heritage, to physical space, and through research on ways to interpret this relationship as a subject of museology/ heritology. The solution has been found in sites of conscience, a unique model of preserving the collective memory and dissonant heritage in the societies in transition that have suffered mass atrocities in the recent past. We examined how sites of conscience could and should look like in practice through realistically designed scientific research in the Brčko District of Bosnia and Herzegovina. There is no manual, rule or prescription as to how the memorials should look like, nor is there a guarantee that they will fulfill their purpose. What is the aim of creating sites of conscience? There is not a single correct answer, as there is not a single obstacle. Still, as the guardians of heritage and museum professionals, we all have the obligation to decide on our roles in this issue.More...
This is a book about the history and the origin of the Proto-Bulgarians and their way to the Balkans and it follows the concept for modern Proto-Bulgarian history. What can be called "modern" is the fact, that the sources on which this book is based are rather different from the well known and traditionally used Latin and Byzantine authors, but among the reviewed sources are Chinese, Indian, Arab, Armenian and other texts of different types ans genres. The author Rumen Daskalov is giving his own interpretations and the purpose of his analysis is to emphasize, summarize and promote the best accomplishments of the Bulgarian school of Proto-Bulgarian history.More...
Magazine "Macedonian Review" began to print in 1991 as a continuation of the old magazine, printed from 1924 to 1943 and after restoration of the Sofia Macedonian Scientific Institute work in 1990.More...
The publication presents opinions on the Bulgarian national question of eight scientists from Central and Eastern Europe, incl. Czech Republic, Poland and Russia. They were elected foreign members of the Macedonian Scientific Institute because of their contribution to the promotion of the national cause. Attention is paid to the policy on the Macedonian question of the countries from which the scientists come. Their works in the field of language, history and ethnography are presented, revealing the Bulgarian national identity of the majority of the population in Macedonia.More...
Interest in learning foreign languages in Bulgaria in the 1930s is a direct consequence of the cultural and educational progress and the advancement of modern language teaching across Europe. Publications on the principles and methods of foreign language teaching from that period highlight moot points and contradictions in different approaches to foreign language teaching in the European as well as the Bulgarian educational context. Such papers outline the historical development of FLT in Bulgaria and make up an essential part of our educational heritage since they reflect major trends in the nation’s cultural development in the early 20th century.More...
Review of scientific conferences that took place in 2018-2019 and opened a new stage in the study of the heritage of the Sheremetev family in the history of Russia.More...
Данашњи шибенски котар има готово исте границе што их је имала жупа кнезова брибирских, која је сезала до иза брибирских мостина, тамо уз десну обалу ријеке Крке.More...
The starting of the First serbian uprising striving for creation of free national state brought to further disintegration. The new layer of military commanders had specific influence on development of educational system. Many dukes, and other individuals, initrated opening of schools in their counties. In 1808 schools were opened in Jagodina, Belusić and Velika Drenova.More...
Савић, Виктор. 2013. „Имена Константинова града у српским средњовековним ћириличким изворима“. Свети цар Константин и хришћанство IIMore... | https://www.ceeol.com/search/subject-result?f=%7B%22SubjectIDs%22%3A%5B101%5D%7D&page=402 |
How do you construct an historical claim?
Article
How do you construct an historical claim? Examining how Year 12 coped with challenging historiography
While preparing her Year 12 students for an International Baccalaureate paper on early Islam, Kirstie Murray became concerned that students' weaknesses in making claims would be particularly exposed by the challenging complexity of this topic's source record and its contested historiography.
Drawing on the practice of other history teachers, especially Laffin's ‘historians' habits' in Teaching History 142, she planned six lessons on the historiography of early Islam and simultaneously designed research with which to examine students' assumptions more closely than was possible with routine marking using examination markschemes. Murray concludes that some students need much more immersion in historians' writings if they are to overcome major misconceptions and if imitation of style is to be underpinned by adequate understanding of historians' practices. | https://www.history.org.uk/secondary/categories/465/resource/8549/how-do-you-construct-an-historical-claim |
Topic Page: Apis (Egyptian deity)
In Ancient Egypt, the Apis bull was the calf of a cow that was never able to have another calf. It was a calf with distinctive features that made it remarkable and unique. For example, the apis bull was black with a white diamond on its forehead, an image of an eagle on its back, two white hairs on its tail, and a scarab beetle mark under its tongue. Such a bull had to be special in the eyes of the ancient Egyptians. They thought that a flash of lightning had to strike the cow in such a way that the cow conceived a calf with the distinctive marks. This was enough for them to see this calf as a mark of something uniquely sacred. It had been sent from heaven by the deity to interact on Earth with humans.
Nothing persuaded the Egyptians that this was a coincidence; everything suggested to them that this was a divine plan, and they articulated the nature of the bull as a part of their theology. Like the Mnevis and the Buchis bulls, the Apis bull was an Earthly appearance of god. Throughout Kemet's history, there had been animals that had interceded between humans and the deities; there had even been animal representations in stone, wood, and metal of deities, but this was different. Here in the living flesh was an animal that was the incarnate of a god, living and acting like a bull among humans, but being himself divine. This idea would not be seen again until it was seen in human form with Jesus, who was considered flesh that became god. This entry looks at the origins of Apis worship, the major festival, and the priestly process of finding new bulls to take the place of Apis.
The Apis bull concept may have originated in Nubia. We know that it was worshipped in the Nile Valley long before it became associated with a particular deity. However, in Egypt, the Apis bull was Ausar on the Earth in full manifestation. Ausar was worshipped as the god of the Dead and resurrection at the end of the Old Kingdom. By then, Apis had been worshipped in Nubia and Egypt since at least the first dynasty. Some authors think that the Apis bull might be predynastic, a position that seems quite probable given the data regarding its presence at the first dynasty. Later, as Mnevis was Ra-Atum, so Buchis was Ra, and Apis the resurrected Ausar. These three bulls selected for their special markings and physical characteristics were gods on the Earth.
When the Apis died, he was mourned, ritualized, mummified, and buried with the same pomp and pageantry that one associated with the death and burial of a per-aa. Plutarch claims that the Apis bull was worshipped because the people believed him to be Ausar. This black bull, the mighty bull, the Great Black One, was Apis-Ausar, the soul of Ausar. Sacrifices to the Apis bull had to be made with oxen that were of uniform brown or white color; they could have no blemish on their hides. The Great Black One had to have clean, unblemished animals for the sacrifice to be acceptable.
The ancient Egyptians kept the Apis bull in Mennefer, the capital city and chief religious center in the north of the country. In this city, Per-aa Psammaticus built a grand court with columns of 12 cubits in height in which the bull was kept prior to being paraded in public for the people to see and behold the living Ausar. Psammaticus also built two stables that were connected to the court of the Apis bull. These two stables for the animal or animals had a vestibule where the people could come to see the Apis and the mother of the Apis.
The ancient Egyptians believed that it was necessary to honor the Apis bull outdoors to establish a connection between the people and the real living Ausar. During this great festival, which lasted for 7 days, multitudes of believers would come from far distant towns and villages to get a glimpse of the Apis bull.
Masses of people would gather in Mennefer from every possible place to honor the Apis, to see the Apis with their own eyes, and to be healed if possible by just touching those who had seen the bull. Those who were sick, infirmed, or otherwise afflicted with psychological or physical problems would congregate in the city for the 7-day festival. Priests and priestesses in multicolored clothes made of animal skins and linens would lead the sacred Apis bull in a solemn procession through the streets of Mennefer so that the people could see with their own eyes the god in the flesh. Parents would put their children forward, often lifting them high so they could see over the crowds, in the hope that their children would smell the bull. It was thought that if a child smelled the bull, that child would have the power of predicting the future. Such a gift would serve the child and his family well, thus the intense desire to see and smell the Apis bull.
The priests who kept the court and temple of the Apis bull also ran the oracle of Apis. Those people who wanted to consult the living image of Ausar could, with the proper permission, be allowed to ask the Apis bull for his opinion. If the bull were consulted, food would be offered to him, and if the food was accepted, then the omen was good; but if the bull rejected the food, then the omen was bad.
Because bulls did not live forever, the priests who attended the Apis had to be ready to search for another bull with the proper signs once the Apis died. Some have argued that the priests usually killed by drowning the Apis once it reached 25 years of age. A major funeral was held for the bull. It was then mummified, and the sarcophagus was taken by sledge through the town with the priests dressed in leopard skins wailing and sobbing to their god.
When the new bull was discovered, it was taken to the City of the Nile and kept for 40 days, during which time priestesses were the only ones who could go near the bull. When the time was completed, the bull was transported to Mennefer on a boat with a golden cabin made especially for the Apis. When the new Apis appeared, the people greeted it with as much joy as they had shown sorrow for the loss of the last Apis bull. All is restored and the Great Black One lives forever as Ausar lives forever.
Animals
Related Articles
Full text Article Apis
Ancient Egyptian deity, a manifestation of the creator god Ptah of Memphis, in the form of a black bull with a small white triangle on the forehead, | https://search.credoreference.com/content/topic/apis_egyptian_deity |
The Great Wall of China is one of the 7 wonders of the world and is the symbol of the Chinese Dynasty and spirit of the Chinese people in the ancient times. It is 5,660 km long from east to west of North China. It took more than 2 millenia for the Great Wall to be completed beginning from 7th Century BC.
The Forbidden City - one of the great architecture of the Ming and Qing Dynasties. It is a history of 600 years. Construction of the palace began in 1406.
The Summer Palace lies in the northwest suburb of Beijing. It demonstrates the characteristics of excellent horticultural skills from ancient China.
Back to the 9th - 12th Century with Dr Kajal and enjoy the discovery of one of the Wonders of the World, The City of the Gods, Ancient Angkor, Borobudur and Prambanan. | http://doctorkajal.com/photo_gallery.php |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
1. Field of the Invention
The present invention relates to a data transmission/reception method and apparatus thereof that is MPEG-2 based, transmitting and receiving input data, including at least video and audio data dependent upon the MPEG-2 standard. Wherein, the input data may also include “user data” containing “system data”, an “error correction code”, an “error detection code”, and other related connections. The audio data is not limited to “uncompressed audio data”, extending to “audio data, not dependent upon the MPEG-2 standard”.
Note that the MPEG-2 stands for “Moving Picture Experts Group 2”, and is a world-wide standard, in terms of image compression.
2. Description of the Related Art
The conventional MPEG-2 based transmission/reception of MPEG-2 based video data(hereafter, referred to as merely “video data”), uncompressed audio data, and user data are constructed in the following fashion: First, a transport stream is directly fabricated from a PES stream of the video data; another transport stream is then fabricated from a PES private stream of the uncompressed audio data; and yet another transport stream is fabricated from a PES private stream of the user data. Secondly, the fabricated transport streams are multiplexed sent and received.
“PES” stands for “Packetized Elementary Stream”, denoting a data stream such as packetized video/audio data, the format of which is defined in the MPEG-2 standard. The “PES stream” denotes a PES data stream, the format of which is defined in the MPEG-2 standard. The “transport stream” denotes a stream mainly used in a transmission system, the format of which is also defined in the MPEG-2 standard. The “PES private stream” denotes a user-usable data stream, defined in the MPEG-2 standard.
In addition, an error correction code and an error detection code, unique to a recording apparatus, may be attached as user data to video data. In this case, since the combination of the video data, the error correction code, and the error detection code is against the MPEG-2 standard, they are conventionally transmitted and received by being put into a PES private stream, and a transport stream is then fabricated with the PES private stream.
Furthermore, in a data transmission/reception apparatus handling both the 525/59.94 component signal and the 625/50 component signal, different transport streams are fabricated with respective PES private streams for the component signals. Wherein, the “525/59.94 component signal” denotes a component video signal dependent upon the NTSC(National Television System Committee) color system, with 525 lines and a field frequency of 59.94 Hz. More specifically, it includes three primary-color signals of R(Red), G(Green), and B(Blue). Alternatively, it includes a luminance signal(Y) and color difference signals(Cb and Cr). Note that hereafter the “525/59.94 component signal may be referred to as merely a “525 signal”. The “625/50 component signal” denotes a component video signal dependent upon the NTSC color system, with 625 lines and a field frequency of 50 Hz. Like the 525/59.94 component signal, the 625/50 component signal includes three primary-color signals of R(Red), G(Green), and B(Blue). Alternatively, it includes a luminance signal(Y) and color differential signals(Cb and Cr). Note that hereafter the “625/50 component signal may be referred to as simply a “625 signal”,
In the conventional technologies, the ratios of video data, uncompressed audio data, and user data to a frame of video data are not fixed. Moreover, their locations to the frame are also not fixed. In addition, detection of a transport header is made, however it is not protected.
Many earlier technologies relevant to the present invention are disclosed. For example, Laid-open Hei-7-30854 (hereafter, referred to as reference 1) describes an “image signal encoding apparatus” minimizing possible degradation of an encoded image quality, with a superior error-proof characteristic. Reference 1 describes: an image preprocessing unit that converts an image signal into an image signal with the format suitable for a low bit rate coding method; and an image coding unit that MPEG-based-encodes the converted image into the resulting encoded image data. A time-series data conversion unit then changes the time-series order of the encoded data into another, leading to decrease a possible encoding-error propagating area. Subsequently, a channel encoding unit attaches an error correction code, transmitting and recording the resultant data onto a transmission/recording medium. In regards to the conventional approaches, the possible encoding-error propagating area will be drastically reduced. This enables for successful fabrication of an image coding apparatus with a low bit rate coding and a high error-proof characteristic.
Laid-open Hei-5-119788 (hereafter, referred to as reference 2) discloses a “transmission/reception apparatus” exactly reproducing audio data and image data, which has external noise-proof and robust against a low transmission cable quality. According to the reference 2, a RF modulation circuit of a transmission unit 2PSK-modulates reproduced and EFM-encoded sound data, image data, and time data, digitally transmitting them to a reception unit, via a transmission line. A RF demodulation circuit of the reception unit 2PSK-demodulates the transmitted sound data. An EFM decoder then RFM-demodulates the resulting demodulated sound data, correcting for error and de-interleaving it. Since transmitted data is digital data, it can be safely transmitted even though the quality of the transmission line is low. In addition, even though an external noise may have negative influence on the data, it will be exactly reproduced by EFM-demodulating, correcting for error, and de-interleaving the influenced data by the aforementioned EFM-decoder.
Laid-open Hei-4-79588 (hereafter, referred to as reference 3) discloses a “digital transmitted data signal processing apparatus and recording/reproduction apparatus”, which can record an image and sound signals with a single format for both a high-speed recording and a normal-speed recording, on a magnetic tape by the following manner: First, the image and sound signals are compressed in their time axes. It is then compressed in terms of their bit length. Thirdly, a parity signal is attached to them. Lastly, they are subjected to modulation-processing, and then transmitted. According to the reference 3, the output signal of a compression circuit is received by a parity attachment circuit, in which the output signal is subjected to signal-processing such as attaching an error correction parity signal and outputting in serial order the resulting parity attached image and sound signals with a given transmission format, to a modulation circuit. The modulation circuit then modulates the serial signal in accordance with the characteristics of a transmission line, and the frequency band. For example, in the case of transmission via an electric radio wave, the signal is subjected to four-phase modulation (QPSK-modulation). A transmission circuit then outputs the resultant modulated signal to a transmission channel. Therefore, high-speed recording with a format identical to that of normal-speed recording, is allowed to be recorded onto the magnetic tape.
According to the aforementioned conventional technologies, for a MPEG-2 based transmission/reception of MPEG-2 based video data, uncompressed audio data, and user data, a problem exists where there is difficulty in identifying the uncompressed audio data and user data, since both the uncompressed audio data and the user data are PES private streams.
In addition, when an error correction code, an error detection code, and the other related connections unique to a recording apparatus, are attached to video data, they are combined into a PES private stream. A transport stream is then fabricated from the transmitted/received PES stream. In this case, a problem arises when the video data separated from a received data cannot be identified as MPEG-2 based video data, and when it is not able to be decoded.
Furthermore, since different transport streams are fabricated for the 525/59.94 component signal and the 625/50 component signal, respectively, corresponding different independent circuits are required.
Additionally, the ratios of video data, uncompressed audio data, user data to a frame of video data, and their locations to the frame are not fixed. Therefore, an identification circuit to identify the received data as video or uncompressed data is required.
Furthermore, since protection of a transport header is not made, it is impossible to decode compressed video data when the transport header has not been detected at least once, owing to a possible occurrence of a code error or other related errors during transmission. This problem may cause long time error propagation for the subsequent bits.
The aforementioned references 1 to 3 involve the following problems: First, according to the reference 1, no more than an image signal is processed. Thus, the reference 1 has a completely different technological idea from that of the present invention allowing to transmit/receive uncompressed audio data and user data as well as compressed video data. Secondly, according to the reference 2, not only image data but also sound data and time data is handled. However, this data is reproduced by the CD-I, and EFM-encoded. Therefore, The technological idea of reference 2 is quite different from the present invention handling MPEG based compressed video data. Lastly, according to the reference 3, the technology of compressing a digital image signal and a digital sound signal in their time axes, and bit-compressing them, is disclosed. However, no technology of MPEG-2-basis-compressing video data is disclosed. In addition, the compression approach of the reference 3 is quite different from that of the present invention.
Accordingly, the primary objective of the present invention is to provide a data transmission/reception method and apparatus, which will MPEG-2-basis-transmit and -receive digital video/audio/user data to and from a recording medium, such as an optical disk decoder, achieved with high efficiency and a low rate of error.
Further objectives of the present invention are as follows:
To provide a data transmission/reception apparatus for identifying audio data and user data.
To provide a data transmission/reception apparatus for successfully decoding video data even though an error correction code and an error detection code unique to a recording apparatus are attached to the video data.
To provide a data transmission/reception apparatus, which utilizes the same circuit for processing the 525/59.94 component signal and the 625/50 component signal.
To provide a data transmission/reception apparatus for identifying a received data as video data, audio data, or user data.
To provide a data transmission/reception apparatus for safely receiving a transport header even though the transport header cannot be detected owing to a possible occurrence of a code error during transmission.
According to an aspect of the present invention, a data transmission apparatus, which receives input data including at least MPEG-2 based video data and audio data, and transmitting the resultant transmission data, comprising: separation means for separating the input data into MPEG-2 based video data and audio data; first temporary memory circuit for storing the MPEG-2 based video data separated by the separation circuit, as the first data stored, and reading out the first data stored, as the first out-read data; second temporary memory circuit for storing the audio data separated from the separation means as the second data stored, and reading out the second data stored, as a second out-read data; combination circuit for combining the first out-read data and the second out-read data, and outputting the resultant combined data; PES private data attachment circuit for attaching a PES private data to the combined data, outputting the first attached data; PTS generation/attachment circuit for generation of a presentation time stamp PTS, attaching the presentation time stamp to the first attached data, outputting the resulting second attached data; PES header attachment circuit for attaching a PES header to the second attached data, outputting the resultant third attached data; transport header attachment circuit for attaching a transport header to the third attached data, outputting the resultant fourth attached data; a means for transmitting the fourth attached data, as transmission data.
As for the aforementioned data transmission apparatus, the received data may be made up of just MPEG-2 based video data and audio data. In this case, the third temporary memory circuit will not be necessary. In addition, the PTS generation/attachment circuit can also be omitted. Accordingly, the first attached data will be transmitted, as a second attached data, from the PES private data attachment circuit to the PES header attachment circuit.
According to an aspect of the present invention, a data reception apparatus, which receives transmission data, as received data, transmitted from the aforementioned data transmission apparatus, and outputting the resultant output data, comprising: transport header separation circuit for separating a transport header from the received data, outputting the resultant first separated data; PES header separation circuit for separating a PES header from the first separated data, outputting the resultant second separated data; PTS detection circuit for detecting a presentation time stamp PTS from the second separated data, outputting the resultant third separated data; PES private data separation circuit for separating a PES private data from the third separated data, outputting the resultant fourth separated data; separation means for separating a MPEG-2 based video data and audio data from the fourth separated data; first temporary memory circuit for storing the MPEG-2 based video data, as the first data stored, separated by the separation means, and reading out the first data stored, as the first out-read data; second temporary memory circuit for storing the audio data separated, as the second data stored, by the separation circuit, and reading out the second memory data, as a second out-read data; combination circuit for combining the first out-read data and the second out-read data together, and outputting the resultant combined data; means for outputting the combined data as output data.
As for the aforementioned data reception apparatus, when the data received by the data transmission apparatus is made up of only MPEG-2 based video data and audio data, the third temporary memory circuit can be omitted. In addition, the PTS detection circuit can also be omitted. Accordingly, the second attached data will be transmitted as the third attached data, from the PES header separation circuit to the PES private data separation circuit.
As an example, the aforementioned user data includes system data, an error correction code, and an error detection code, as in the following example:
Furthermore, letting LA, LB, LC, LD, and LE be: the length of the first PES stream made up of MPEG-2 based video data; the length of a second PES stream made up of the MPEG-2 based audio data; the length of a third PES stream made up of the aforementioned system data; the length of a fourth PES stream made up of the aforementioned error correction code; and the length of a fifth PES stream made up of the aforementioned error detection code, each of the LA, LB, LC, LD, and LE are preferably fixed for the 525/59.94 component signal and the 625/50 component signal.
Placing the first PES stream made up of MPEG-2 based video data; a second PES stream made up of the MPEG-2 based audio data; a third PES stream made up of the aforementioned system data; a fourth PES stream made up of the aforementioned error correction code; and a fifth PES stream made up of the aforementioned error detection code, on addresses PA, PB, PC, PD, and PE from the start of a frame respectively, the addresses PA, PB, PC, PD, and PE are preferably fixed for the 525/59.94 component signal and the 625/50 component signal.
Furthermore, the aforementioned error correction code and error detection code are attached for a data recording. They are preferably transmitted via a PES private stream.
Additionally, the locations of the aforementioned, MPEG-2 based video data, audio data, system data, error correction code, and error detection code are all preferably fixed to the frame synchronization. This can be attained by locking a transmission clock to a frame of the MPEG-2 based video data, and fixing the locations of the start and end of a frame, and the location of the end of a MPEG-2 based transport stream corresponding to a single frame for the 525/59.94 component signal and the 625/50 component signal.
The stream numbers for the MPEG-2 based video data, the audio data, the system data, the error correction code, and the error detection code are all preferably fixed. This can be attained by/with the transmission clock unlocking to a frame of the MPEG-2 based video data, starting a data transmission corresponding to a next frame at the beginning of a MPEG-2 transport stream of the 525/59.94 component signal and the 625/50 component signal just after the next frame starts.
A flag indicating each of the MPEG-2 based video data, the audio data, the system data, the error correction code, and the error detection code is preferably attached to the PES private data.
Furthermore, the transport header separation circuit preferably includes a transport header protection circuit to protect the transport header.
With the aforementioned configurations according to the present invention, the following results will be obtained:
For MPEG-2 based transmission/reception of video data, audio data (uncompressed audio data and compressed audio data not dependent upon the MPEG-2 standard), and user data, the audio data and the user data will be identified by transmitting a corresponding discriminant flag in the PES private data.
Video data dependent upon the MPEG-2 standard, in which an error correction code, an error detection code, and other related connections unique to a recording apparatus are attached to, will be directly decoded by a MPEG-2 decoder in the following method: First, separation is performed. Secondly, MPEG-2 based video data is put in a PES stream, while the error correction code, the error detection code, and the other related connections are put in a PES private stream. Thirdly, the PES and PES private streams are transmitted or received via another packet in the transport stream. Lastly, the resultant received data is subjected to error correction and error detection. This enables the MPEG-2 decoder to directly decode the MPEG-2 based video data.
The 525/59.94 component signal and the 625/50 component signal will be both processed through the same circuit. This can be realized by setting the frame frequency of the 625/50 component signal to be (5.005/6) times that of the 525/59.94 component signal, and the processing bit number per a frame of the former to be (6/5.005) times that of the latter, changing over between the two frame frequencies and processing bit numbers per a frame.
Received data will be identified as MPEG-2 based video data, audio data, or user data. This is achieved by fixing the occurred ratios of video data, audio data, and user data each to a frame of video data, and the location to the frame, for the 525/59.94 component signal and the 625/50 component signal.
The probability of an error occurring in the received data and its propagation will be drastically reduced by protecting the transport header. Protection enables for successful acquisition of the transport header, even though the possible-occurrence code transmission error prevents detection of the transport header.
BRIEF DESCRIPTION OF THE DRAWINGS
Other features and advantages of the invention will be made more apparent by the detailed description hereunder, taken in conjunction with the accompanying drawings, wherein:
FIG. 1
shows the configuration of a data transmission apparatus (the transmission section of a MPEG-2 digital interface apparatus) of an embodiment according to the present invention;
FIG. 2
shows the configuration of a data reception apparatus (the reception section of a MPEG-2 digital interface apparatus);
FIG. 3
shows the format of video/audio data in a CRC-OFF and 525 signals mode, stored in a video disk recorder;
FIG. 4
shows the format of video/audio data in a CRC-OFF and 625 signals mode, stored in the video disk recorder;
FIG. 5
shows the format of video/audio data in a CRC-ON and 525 signals mode, stored in the video disk recorder;
FIG. 6
shows the format of video/audio data in a CRC-ON and 625 signals mode, stored in the video disk recorder;
FIG. 7
shows the scanning order for recording/reproduction by the video disk recorder;
FIG. 8
shows a data transmission order in a video disk recorder interface;
FIG. 9
shows a format of a transport stream in the 525 signals mode;
FIG. 10
shows the alignment of video/audio data in the transport stream in the 525 signals mode;
FIG. 11
shows a PES stream of audio data in the CRC-OFF and 525 signals mode;
FIG. 12
shows a PES stream of video data in the CRC-ON and 525 signals mode;
FIG. 13
shows a transport stream in the 625 signals mode;
FIG. 14
shows the alignment of video/audio data in a transport stream in the 625 signals mode;
FIG. 15
shows a PES stream of audio data in the CRC-OFF and 625 signals mode;
FIG. 16
shows a PTS stream of video data in the CRC-OFF and 625 signals mode;
FIG. 17
shows a PES stream of video data in the CRC-ON and 525 signals mode;
FIG. 18
shows a PES stream for the CRCC in the CRC-ON and 525 signals mode;
FIG. 19
shows a PES stream of video data in the CRC-ON and 625 signals mode;
FIG. 20
shows a PES stream for a CRCC in the CRC-ON and 625 signals mode;
FIG. 21
shows the outline of a data transmission from/to a VRD, in the CRC-OFF mode, and in the CRC-ON mode;
FIG. 22
FIG. 2
shows an example configuration of a synchronous (transport header) protection circuit used in a transport header separation circuit of the data reception apparatus in ;
FIG. 23
shows an example format of a transport header; and
FIG. 24
shows an example format of a PES header.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Embodiments of the present invention will be described in detail hereafter with reference to the drawings.
FIGS. 1 and 2
FIG. 1
FIG. 2
FIG. 1
show a data transmission apparatus and a data reception apparatus of the embodiments according to the present invention, respectively. The data transmission apparatus shown in receives MPEG-2 based video data, uncompressed audio data, and CRCC error detection data, transmitting them as transmission data. The data reception apparatus shown in receives the data from the data transmission apparatus in , transmitting output data.
FIGS. 1 and 2
show example configurations of where uncompressed audio data will be processed. Compressed data not dependent upon the MPEG-2 standard and can be processed with these configurations. The CRCC error detection data, the system data, the error correction code, and the error detection code are all categorized in user data. The “CRCC” stands for “Cyclic Redundancy Check Code”, which is one of the error detection codes.
FIG. 1
30
31
32
33
34
35
36
37
38
39
400
41
As shown in , the data transmission apparatus is made up of a distribution circuit , the first to a third FIFO(First In First Out) circuits , , and , a FIFO control circuit , a multiplex circuit , a PES private data attachment circuit , a PTS generation/attachment circuit , a 300 frequency divider , a PES header attachment circuit , a transport header attachment circuit , and a whole control circuit .
30
31
32
30
33
30
34
31
33
31
33
34
30
35
The distribution circuit divides input data into MPEG-2 based video data, uncompressed audio data, and CRCC error detection data. The first FIFO circuit plays the role of the first temporary memory circuit. Specifically, it stores the MPEG-2 based video data (V), as the first data stored, reading out the first data stored(hereafter, the out-read data is referred to as the first out-read data). The second FIFO plays the role of a second memory circuit. Specifically, it stores the uncompressed data (A) as a second data stored, extracted by the distribution circuit , reading out the second data stored (hereafter, the out-read data is referred to as a second out-read data). The third FIFO circuit plays the role of the third memory circuit. Specifically, it stores the CRCC error detection data (C) extracted by the distribution circuit , reading out the third data stored (hereafter, the out-read data is referred to as the third out-read data). The FIFO control circuit controls the operations of the first to third FIFO circuits to . Specifically, the first to third FIFO circuits to and the FIFO control circuit are prepared to synchronize the out-read timing for the MPEG-2 based video data (V), the uncompressed audio data (A), and the CRCC error detection data (C) all extracted by the distribution circuit , being transferred into the multiplex circuit .
35
36
37
37
38
37
38
39
40
2
41
The multiplex circuit combines; the first out-read data, the second out-read data, and the third out-read data, outputting the resulting combined data. The PES private data attachment circuit attaches a PES private data to the combined data, outputting the first attached data. The PTS generation/attachment circuit generates a PTS(Presentation Time Stamp), attaching the PTS to the first attached data, then outputting the resulting second attached data. A frequency-divided clock of 90 kHz is supplied to the PTS generation/attachment circuit by the 300 frequency division circuit . The PTS generation/attachment circuit acts in synchronism with the frequency-divided clock signal. A reference clock signal of 27 MHz is supplied to the 300 frequency division circuit . The PES header circuit attaches a PES header to the second attached data, outputting the resultant third attached data. The transport header attachment circuit attaches a transport header to the third attached data, outputting the resultant fourth attachment data. The fourth attached data is then sent to a data reception apparatus shown in FIG. . The whole control circuit controls the entire circuit.
FIG. 2
51
52
53
54
55
56
57
58
60
61
As shown in , the data reception apparatus is comprised of a transport header detection circuit , a PES header detection circuit , a PTS detection circuit , a PES private data separation circuit , a distribution circuit , first to third FIFO circuits , , and , a combination circuit , and a whole control circuit .
51
52
53
53
59
55
The transport header detection circuit separates a transport header from a received data, outputting the resulting first separated data. The PES header detection circuit separates a PES header from the first separated data, outputting the resulting second separated data. The PTS detection circuit detects a PTS from the second separated data, outputting the resultant third separated data. The PTS detection circuit provides the detected signal(PTS) for the FIFO control circuit . The distribution circuit plays the role of separating the third separated data into a MPEG-2 based video data (V), a uncompressed audio data (A), and a CRCC error detection data (C).
56
55
57
55
58
55
59
56
58
60
70
61
The first FIFO circuit plays the role of the first temporary memory circuit. Specifically, it stores the MPEG-2 based video data distributed from the distribution circuit , as the first data stored, reading out the first data stored as the first out-read data. The second FIFO circuit plays the role of a second temporary memory circuit. Specifically, it stores the uncompressed audio data (A), as the second data stored, distributed from the distribution circuit , reading out the second data stored, as the second out-read data. The third FIFO circuit plays the role of the third temporary memory circuit. Specifically, it stores the CRCC error detection data as the third data stored, distributed from the distribution circuit , reading out the third data stored, as the third out-read data. The FIFO control circuit controls the operations of the first to third FIFO circuits to . The combination circuit combines the first out-read data, the second out-read data, and the third out-read data altogether, outputting the resultant combined data. The combined data is provided as output data for the video disk recorder(VDR) . The whole control circuit controls the operation of the aforementioned whole circuit.
FIGS. 3
FIG. 3
FIG. 4
FIG. 5
FIG. 6
6
to illustrate shuffled maps in terms of an example of recording data stored in the VDR. illustrates a format of single data frame in a CRC-OFF and 525 signals mode. shows a format of single frame data in the CRC-OFF and 625 signals mode. illustrates the same in a CRC-ON (meaning that the CRC is used) and 525 signals mode. shows the same in a CRC-ON and 625 signals mode. Wherein, CRC-OFF means that a CRCC(Cyclic Redundancy Check Code) is not used. On the other hand, the CRC-ON means that the CRCC is used.
FIGS. 3
6
In to , “SYNC” denotes a synchronization signal for recording; “SBID(Sync Block Identity Code)” denotes an identification code for recording an address in other related connections in every sync block (a recording unit); “SYSTEM DATA” denotes a user data such as a program data; “VE(Video Edit)” denotes a spare area for video data overflow recording; “AE(Audio Edit)” denotes a spare area for audio data overflow recording; “CRCC” denotes a cyclic redundancy code as described earlier; and “OUTER CORRECTION CODE” and “INNER CORRECTION CODE” both denote error correction codes, respectively.
FIGS. 3
FIGS. 3 and 4
FIGS. 5 and 6
FIGS. 5 and 6
6
Furthermore, in to , the vertical line (i.e., a shorter side) of the format is referred to as a “sync block”. A single sync block is made up of 188 bytes. In the 525 signals mode, a single frame is made up of 760 sync block(380×2). On the other hand, in the 625 signals mode, a single frame is made up of 912 sync blocks(456×2). The ratio of them is 5:6. As shown in , video data or audio data is made up of 166 bytes in the CRC-OFF mode. Otherwise, in the CRC-ON mode, it is made up of 164 bytes, as shown in . Note that the CRCC in the CRC-ON mode is made up of two bytes, as shown in .
FIG. 7
FIGS. 3
FIG. 7
6
In , the order of recording data (shown in to ) onto the VDR is shown. The order in the CRC-OFF mode, the CRC-ON mode, 525 signals mode, and 625 signals mode is also the same. As shown in , the whole 760-byte sync block is recorded in the order and orientation that several arrows show, in the 525 signals mode. Otherwise, the whole 912 sync block is recorded in the 625 signals mode.
FIG. 8
FIGS. 3
6
shows the order of transmitting data (shown in to ) from the VDR to an interface apparatus(not shown), and vice versa.
FIG. 3
FIG. 4
In the CRC-OFF and 525 signals mode shown in , data is transmitted in the following order: video data(166 bytes×320)->audio data(166 bytes×20)->video data(166 bytes×320)->audio data(166 bytes×20). In the CRC-OFF and 625 signals mode shown in , data is transmitted in the following order: video data(166 bytes×392)->audio data(166 bytes×24)->video data(166 bytes×392)->audio data(166 bytes×24).
FIG. 5
6
In the CRC-ON and 525 signals mode shown in , data is transmitted in the following order: [320 times repetition of both video data(164 bytes) and CRC(two bytes)]->[twenty times repetition of both audio data(164 bytes) and CRC(two bytes)]->[320 times repetition of both video data(164 bytes) and CRC(two bytes)]->[twenty times repetition of both audio data(164 bytes) and CRC(two bytes)]. In the CRC-ON and 625 signals mode shown in FIG. , data is transmitted in the following order: [392 times repetition of both video data(164 bytes) and CRC(two bytes)]->[twenty four times repetition of both audio data(164 bytes) and CRC(two bytes)]->[392 times repetition of both video data(164 bytes) and CRC(two bytes)]->[twenty four times repetition of both audio data(164 bytes) and CRC(two bytes)].
FIG. 1
FIG. 3
Next, the transmission operation of the data transmission apparatus (see ) in the CRC-OFF and 525 signals mode (see ) will be described hereafter.
20
FIGS. 3 and 8
First, video/audio data is received from the VDR . The video data, specifically, the video elementary stream dependent upon the MPEG-2 standard is received in a half frame unit(53,120 bytes unit) in such a manner shown in . The format of the video elementary stream is defined in the MPEG-2 standard. The audio data, specifically, the uncompressed data is received in a half frame unit(3320 bytes unit) in the following order in a single frame: the first half of the frame (video data (53120 bytes)->audio data(3320 bytes)), and then the second half of the frame (video data(53,120 bytes)->audio data(3320 bytes)).
30
31
32
33
Secondly, the received video/audio data is separated into video data (V) and audio data (A) by the division circuit . The video data is stored, as the first data stored, in the first FIFO circuit , while the audio data is stored, as the second data stored, in the second FIFO circuit . The third FIFO circuit is not used in the mode.
35
32
31
35
Thirdly, the video data and the audio data are combined together by the combination circuit . As describing more in detail, the second out-read data (audio data) read out from the second FIFO circuit is placed in a PES private stream, while the first out-read data (video data) read out from the first FIFO circuit is placed in a PES packet data byte. Wherein, the PES private stream denotes a data stream that a user can use privately, the format of which is defined in the MPEG-2 standard. The PES packet data byte denotes a byte data in the PES, the format of which is also defined in the MPEG-2 standard. In conclusion, the combination circuit combines the first and second out-read data (video and audio data) together, outputting the resultant combined data.
36
37
39
40
FIG. 2
The PES private data attachment circuit attaches a PES private data to the combined data into the first attached data. Wherein, the PES private data denotes user usable data, the format of which is defined in the MPEG-2 standard. The PTS generation/attachment circuit then attaches a PTS to the first attached data into a second attached data. Wherein, the PTS stands for “Presentation Time Stamp”, which is data indicating a present time, the format of which is defined in the MPEG-2 standard. The PES header attachment circuit attaches a PES header to the second attached data into a third attached data, namely a PES. Wherein, the PES header denotes a header data in the PES, the format of which is defined in the MPEG-2 standard. The PES stands for “Packetized Elementary Stream”, denoting a data stream in which packetized video/audio data is included. Its format is also defined in the MPEG-2 standard. The transport header attachment circuit partitions the PES (the third attached data) in every 184 bytes unit, placing each of them in a payload, and attaching a transport header into the resulting transport stream (a forth attached data). Wherein, the transport header denotes the header data in a transport stream, the format of which is defined in the MPEG-2 standard. The transport stream (the fourth attached data) is transmitted to the data reception apparatus shown in , via a transmission line (not shown).
FIG. 9
FIGS. 3
6
shows a transport stream. A single transport packet includes 188 bytes data, and is made up of four bytes of a transport header and 184 bytes of the payload. Wherein, the transport packet denotes a packet mainly used in a transmission system, the format of which is defined in the MPEG-2 standard. Wherein, the sync block length shown in to and the single transport packet length are the same being 188 bytes. However, the sync block length is not necessarily limited to 188 bytes, opposed to the fact that the single transport packet length must be 188 bytes.
FIG. 23
shows an example configuration of a four-byte transport header.
FIG. 10
FIG. 10
shows the configuration of the transport stream (layout of video and audio data packets). As shown in , a single frame is made up of 640 transport packets. Specifically, it is comprised of forty transport packets of audio data and 600 transport packets of video data. A packet of audio data and fifteen packets of video data are both repeated forty times from the beginning of the frame. Thus, the audio data transmission capacity is 7360 bytes (184×40), while the video data transmission capacity is 110,400 bytes (184×600).
As described above, the PES is made from the video/audio data before the transport stream is generated.
FIGS. 11 and 12
FIG. 11
FIG. 12
show the formats of the PES streams for audio data and video data, respectively. As shown in , the PES stream for audio data is comprised of 31 byte PES header, 6640 byte PES private stream, and 689 byte data of all “0's”. As shown in , the PES stream for video data is comprised of 31 byte PES header, 106,240 byte PES packet data byte, and 4,129 byte data of all “0's”.
Wherein, the PES stream for audio data uses the PES private stream, while the PES stream for video data uses the PES packet data byte. This emanates from the fact that the audio data (uncompressed audio data) does not depend upon the MPEG-2 standard, and is handled as a private stream. Note that the private stream denotes a user-usable data stream, the format of which is defined in the MPEG-2 standard.
FIG. 24
shows the configuration of a 31-byte PES header. Note that the configuration is just an example, and the scope and spirit of the present invention will not be limited by the configuration.
FIG. 24
FIG. 1
37
38
In , each PTS(Presentation Time Stamp) that a reference numeral “*1” is attached to is a time record indicating PES time. This is calculated in the following manner by the PTS generation/attachment circuit : First, a clock signal of 90 kHz locked in accordance with frame synchronization (30/1.001 Hz), is counted by a counter (not shown). The resulting count is then subjected to a modulo 233 arithmetic. The calculation result will be the time record, and be put in the PES header. Note that the clock frequency of 90 kHz will be generated by the 300 frequency-division circuit (in ) performing frequency-division of a video system clock of 27 MHz by 300.
FIG. 24
In , a PES private data that reference numeral “*2” is attached to is optional. Its data length will be a user-usable 128 bits, if the data is necessary. An example format of the data will be as follows:
1. For transmission of a video elementary stream:
The PES private data is optional. Leaving the data in the PES header, a series of “1”s is put in there;
2. For the transmission of a CRCC, audio data, video system code, and audio system code:
The PES private data is a series of 120-bits of “1”s at the beginning. In addition, the last eight bits are: “11111110” for the CRCC; “11111111” for the audio data; “11111100” for the video system code; and “11111101” for the audio system code.
FIGS. 11 and 12
As shown in , the PES stream is partitioned from the beginning of the PES header in every 184-byte unit, and placed in each payload of the transport stream.
20
The packetized transport data is transmitted along with a clock signal CK in a 8-bit parallel manner. The frequency of the clock signal CK is 3.605995 MHz (640×188×(30/1.001)). The clock signal CK can be generated by a PLL (Phase-Locked Loop) circuit (not shown). Otherwise, an asynchronous clock signal of 3.605995 or more can be used for the clock signal CK. For use of an asynchronous clock signal, a frame of 640 packets is transmitted in series before the transport packet of 184 bytes of “0”s along with a transport header is repeatedly transmitted filling until the beginning of the next frame. Since communication with the VDR is made using the clock signal locked to the frame synchronization, a synchronizing process, a clock conversion process by the FIFO circuit (located in the center of the entire circuit), and other related connections are necessary.
FIG. 2
FIG. 3
Next, the reception operation of the data reception apparatus (see ) in the CRC-OFF and 525 signals mode (see ) will be described hereafter.
70
First, a packetized transport data (transmission data) along with the clock signal CK is received in a 8-bit parallel manner. Wherein, as mentioned above, the frequency of the clock signal CK is 3.605995 MHz or more. When an asynchronous clock signal is used for the clock signal CK, communication with the VDR will be made in synchronization with the clock signal CK locked to the frame synchronization. Therefore, a synchronizing process, a clock conversion by the FIFO circuit (located in the center of the entire circuit), and other related connections, are necessary.
Thereafter, a video/audio data combination is made, as will be described hereafter.
51
51
23
First, the transport header separation circuit separates the transport header from the received data, outputting the resultant first separated data. When the transport header separation circuit separates the “sync byte” of 47H from the transport header(shown in FIG. ), synchronous protection is built against possible error. Wherein, the “sync byte” denotes a synchronous signal (in a byte unit).
FIG. 22
80
51
80
80
80
shows the configuration of a synchronous protection circuit prepared in the transport header separation circuit . Here, synchronization detection is allowed to be successfully made by having successively detected the “sync byte (47H)” m (m≧1) times. Specifically, supposing a situation where another “sync byte (47H)” has already been detected 188 bytes ago when the latest “sync byte” is detected, and has continued m (m≧1) times. In this case, a synchronous detection signal indicating that synchronous detection is successfully made, will be sent to the synchronous protection circuit . In addition, the aforementioned clock signal CK is also supplied to the synchronous protection circuit . The synchronous protection circuit then outputs a synchronous protection signal indicating synchronous protection has occurred.
80
81
82
83
84
85
86
87
88
81
81
83
83
82
85
85
81
83
85
FIG. 22
The synchronous protection circuit in is made up of the first and second counters and , the first and second decoders and , an AND gate , the first and second OR gates and , and a blocking gate . The first counter counts in synchronism with the clock signal CK, outputting the resulting first count signal, indicating the resulting first count. The first count of the counter is reset into a initial value “0” by the first reset signal application described later. The first count signal is sent to the first decoder . The first decoder outputs the first decoded signal of an active low, when the first count equals “187”. The first decoded signal is sent to the first counter as the first reset signal, via an AND gate . The AND gate outputs a protected synchronous signal. Accordingly, the first counter , the first decoder , and the AND gate act in combination as a base-188 counter.
86
88
85
88
83
82
82
88
82
82
84
87
85
81
FIG. 2
The aforementioned first decoded signal is sent to one of the input terminals of the first OR gate , and the blocking terminal of the blocking gate . The detected synchronous signal is sent to the other input terminal of the first OR gate and the input terminal of the blocking gate . Thus, when the first decoder sends the first decoded signal, and the detected synchronous signal of an active low is also sent, the first OR gate sends a second reset signal of an active low to the second counter . In response to the second reset signal, the second count of the second counter is reset into the initial value “0”. Incidentally, if the detected synchronous signal is not an active low when the first decoded signal is an active low, the blocking gate sends an enable signal of an active high to the counter . This causes the counter to count up the second count in synchronism with the clock signal CK. When the second count reaches n (n≧1), the second decoder sends a second decoded signal of an active low to one of the input terminals of the second OR gate . The decoded signal of the active low indicates that a pulling-into-synchronism mode has been entered. Thereafter, when either the detected synchronous signal or the first decode signal is activated, the AND gate outputs the first reset signal, resetting both the protected, latest synchronous signal and the first counter . Incidentally, shows the configuration for n=2.
80
Subsequent circuits of the synchronous protection circuit acts in synchronism with the protected, latest synchronous signal.
Note that when an asynchronous clock signal is used for the clock signal CK, the number of transport packets is unsettled. Therefore, a synchronous protection is not applied.
52
FIG. 24
FIG. 24
FIG. 23
Next, the PES header detection circuit separates a PES header from the first separated data, outputting the resultant second separated data. Wherein, after a frame synchronization, “packet start code prefix”(000001H) (see ) detected first in the case that the “payload start indicator”(000001H) in the transport header is set to 1, will be determined as a PES header for an audio data. And a next detected “packet start code prefix”(000001H) (see ) will be determined as a PES header for a video data. Alternatively, when the PID of the transport header is detected, and if it is identical with “1001H” as shown in , the data can be determined as audio data. Otherwise, if it is identical with “1000H”, the data can be determined as video data.
53
54
54
55
57
56
The PTS detection circuit detects and separates a PTS from the second separated data, outputting the resulting third separated data. The separation of the PTS is necessary for the FIFO circuits (detailed later) to read out in synchronism with the audio/video data. The PES private data separation circuit separates a PES private data from the third separated data, outputting the resultant fourth separated data. The PES private data separated by the PES private data separation circuit enables identification of the transmitted data. The distribution circuit then separates audio data and video data from the fourth separated data. The audio data is then stored in the second FIFO circuit , while the video data is stored in the first FIFO circuit . In this case, the third FIFO circuit is not used.
60
56
57
70
The combination circuit combines the first out-read data (video data) (V) read out from the first FIFO circuit and the second out-read data (audio data) (A) read out from the second FIFO circuit together, outputting the resulting combined data to the VDR .
59
56
57
53
60
60
70
The FIFO control circuit reads out video/audio data from the first and second FIFO circuits and in the timing corresponding to the PTS detected by the PTS detection circuit , combining them together by the combination circuit . The combination circuit sends the combined data in the following order, to the VDR .
The first half frame:
video data (53,120 bytes)-->audio data (3320 bytes);
The second half frame:
video data (53,120 bytes)-->audio data (3,320 bytes)
FIG. 1
FIG. 4
Next, the operation of the data transmission apparatus (see ) in the CRC-OFF and 625 signals mode shown in , will be described hereafter.
20
First, video/audio data is received from the VDR . As for video data, a video elementary stream dependent upon the MPEG-2 standard is received in a half frame unit (65,072 bytes unit). The audio data and uncompressed data is received in a half frame unit (3,984 bytes unit). More specifically, a frame of data is received in the following order:
The first half frame:
video data (65,072 bytes)-->audio data (3,984 bytes);
The second half frame:
video data (65,072 bytes)-->audio data (3,984 bytes)
30
31
32
33
Secondly, the distribution circuit again separates the received video/audio data back into video data (V) and audio data (A). The video data (V) is then stored, as the first data stored, in the first FIFO circuit . On the other hand, the audio data (A) is stored as the second data stored in the second FIFO circuit . In the mode, the third FIFO circuit is not used.
35
32
31
35
The multiplex circuit then combines the video/audio data together. Specifically, the second out-read data (audio data) read out from the second FIFO circuit is placed in the PES private stream, while the first out-read data (video data) read out from the first FIFO circuit is placed in the PES packet data byte. In conclusion, the multiplex circuit combines the first out-read data (video data) and the second out-read data (audio data), outputting the resultant combined data.
36
37
39
40
FIG. 2
The PES private data attachment circuit attaches a PES private data to the combined data into the first attached data. The PTS generation/attachment circuit then attaches a PTS to the first attached data into a second attached data. The PES header attachment circuit attaches a PES header to the second attached data into a third attached data, PES. The transport header attachment circuit then partitions the PES (the third attached data) into 184 bytes units, placing them in payloads. In addition, it attaches a transport header to each of them, into a transport stream (a fourth attached data). The transport stream (the fourth attached data) is sent to the data reception apparatus shown in , via a transmission line (not shown).
FIG. 13
shows the configuration of a transport stream. A single transport stream with 188 bytes of data, is made up of a four-byte transport header and a 184 byte payload.
FIG. 23
shows an example format of the 4-byte transport header.
FIG. 14
FIG. 14
shows the configuration of the transport stream including video and audio data. As shown in , a single frame is made up of 768 transport packets. Specifically, it is comprised of 48 transport packets of audio data and 720 transport packets of video data. A packet of audio data and fifteen packets of video data are both repeated fourteen eight times from the beginning of a frame. Thus, the audio data transmission capacity is 8,832 bytes (184×48), while the video transmission capacity is 132,480 bytes (184×720).
As described above, the video/audio data is put in a PES before being put in a transport stream.
FIG. 15
FIG. 16
FIG. 15
shows the configuration of a PES stream for audio data, while shows the configuration of a PES stream for video data. As shown in , the PES stream for audio data is comprised of a 31-byte PES header, a 7,968-byte PES private stream, and a 883-byte data of all “0's”.
Wherein, the PES stream for the audio data uses the PES private stream. Conversely, the PES stream for video data uses the PES packet data byte. This is due to the fact that uncompressed audio data is not based upon the MPEG-2 standard, and the audio data is handled as a private stream.
FIG. 24
shows an example configuration of a 31-byte PES header.
FIG. 24
FIG. 1
37
38
33
In , each PTS(Presentation Time Stamp) that a reference numeral “*1” is attached to is a time record indicating PES time. This is calculated in the following manner by the PTS generation/attachment circuit : First, a clock signal of 90 kHz locked in accordance with frame synchronization (30/1.001 Hz), is counted by a counter (not shown). The resulting count is then subjected to a modulo 2arithmetic. The calculation result will be the time record, and be put in the PES header. Note that the clock frequency of 90 kHz will be generated by the 300 frequency-division circuit (in ) performing frequency-division of a video system clock of 27 MHz by 300.
FIG. 24
In , a PES private data that reference numeral “(2” is attached to is optional. Its data length will be a user-usable 128 bits, if the data is necessary.
FIGS. 15 and 16
As shown in , the PES stream is partitioned from the beginning of the PES header in every 184-byte unit, and placed in each payload of the transport stream.
20
The packetized transport data is transmitted along with a clock signal CK in a 8-bit parallel manner. The frequency of the clock signal CK is 3.605995 MHz (640×188×(30/1.001). The clock signal CK can be generated by a PLL (Phase-Locked Loop) circuit (not shown). Otherwise, an asynchronous clock signal of 3.605995 or more can be used for the clock signal CK. For use of an asynchronous clock signal, a frame of 768 packets is transmitted in series before the transport packet of 184 bytes of “0”s along with a transport header is repeatedly transmitted filling until the beginning of the next frame. Since communication with the VDR is made using the clock signal locked to the frame synchronization, a synchronizing process, a clock conversion process by the FIFO circuit (located in the center of the entire circuit), and other related connections are necessary.
FIG. 2
FIG. 4
Next, the reception operation of the data reception apparatus (see ) in the CRC-OFF and 625 signals mode (see ) will be described hereafter.
70
First, a packetized transport data (transmission data) along with the clock signal CK is received in a 8-bit parallel manner. Wherein, as mentioned above, the frequency of the clock signal CK is 3.605995 MHz or more. When an asynchronous clock signal is used for the clock signal CK, communication with the VDR will be made in synchronization with the clock signal CK locked to the frame synchronization. Therefore, a synchronizing process, a clock conversion by the FIFO circuit (located in the center of the entire circuit), and other related connections, are necessary.
Thereafter, a video/audio data combination is made, as will be described hereafter.
51
51
23
80
51
80
FIG. 22
First, the transport header detection circuit separates the transport header from the received data, outputting the resultant first separated data. When the transport header detection circuit separates the “sync byte” of 47H from the transport header(shown in FIG. ), synchronous protection is built against possible error. Wherein, the “sync byte” denotes a synchronous signal (in a byte unit). shows the configuration of a synchronous protection circuit prepared in the transport header detection circuit . Since the synchronous protection circuit has been described above in detail, its explanation is omitted.
Subsequent circuits act in synch with the protected, latest synchronous signal.
Note that when an asynchronous clock signal is used for the clock signal CK, the number of transport packets is unsettled. Therefore, a synchronous protection is not applied.
52
FIG. 24
FIG. 24
FIG. 23
Next, the PES header detection circuit separates a PES header from the first separated data, outputting the resultant second separated data. Wherein, after a frame synchronization, “packet start code prefix”(000001H) (see ) detected first in the case that the “payload start indicator”(000001H) in the transport header is set to 1, will be determined as a PES header for an audio data. And a next detected “packet start code prefix”(000001H) (see ) will be determined as a PES header for a video data. Alternatively, when the PID of the transport header is detected, and if it is identical with “1001H” as shown in , the data can be determined as audio data. Otherwise, if it is identical with “1000H”, the data can be determined as video data.
53
54
54
55
57
56
The PTS detection circuit detects and separates a PTS from the second separated data, outputting the resulting third separated data. The separation of the PTS is necessary for the FIFO circuits (detailed later) to read out in synchronism with the audio/video data. The PES private data separation circuit separates a PES private data from the third separated data, outputting the resultant fourth separated data. The PES private data separated by the PES private data separation circuit enables identification of the transmitted data. The distribution circuit then separates audio data and video data from the fourth separated data. The audio data is then stored in the second FIFO circuit , while the video data is stored in the first FIFO circuit . In this case, the third FIFO circuit is not used.
60
56
57
70
The combination circuit combines the first out-read data (video data) (V) read out from the first FIFO circuit and the second out-read data (audio data) (A) read out from the second FIFO circuit together, outputting the resulting combined data to the VDR .
59
56
57
53
60
60
70
The FIFO control circuit reads out video/audio data from the first and second FIFO circuits and in the timing corresponding to the PTS detected by the PTS detection circuit , combining them together by the combination circuit . The combination circuit sends the combined data in the following order, to the VDR .
The first half frame:
video data (65,072 bytes)-->audio data (3984 bytes);
The second half frame:
video data (65,072 bytes)-->audio data (3,984 bytes)
FIG. 1
FIGS. 5 and 6
Next, the operations of the data transmission apparatus (see ) in the CRC-ON and 525 signals mode, and in the CRC-ON and 625 signals mode shown in , respectively, will be described hereafter.
20
30
31
32
33
First, video data/CRCC/audio data is received from the VDR . The division circuit separates the received video data/CRCC/audio data into video data (V), CRCC, and audio data (A). The video data (V) is then stored, as the first data stored, in the first FIFO circuit . The audio data (A) is stored as the second data stored in the second FIFO circuit . On the other hand, the CRCC is stored as the third data stored, in the third FIFO circuit .
FIG. 21
As shown in the format of the CRC-ON mode in , a half frame of video data includes 53,120 bytes in the 525 signals mode. Otherwise, it includes 65,072 bytes in the 625 signals mode. Specifically, it includes 320 times repetition of both video data (164 bytes) and then CRCC (two bytes), in the 525 signals mode. Otherwise, it includes 392 times the same in the 625 signals mode.
30
Subsequent process in terms of audio data or in other related connections, by the distribution circuit is the same as that in the CRC-OFF mode.
35
32
31
35
The multiplex circuit then combines the video/audio data together. Specifically, the second out-read data (audio data) read out from the second FIFO circuit is placed in the PES private stream, while the first out-read data (video data) read out from the first FIFO circuit is placed in the PES packet data byte. In conclusion, the combination circuit combines the first out-read data (video data) and the second out-read data (audio data), outputting the resultant combined data.
36
37
39
40
FIG. 2
The PES private data attachment circuit attaches a PES private data to the combined data into the first attached data. The PTS generation/attachment circuit then attaches a PTS to the first attached data into a second attached data. The PES header attachment circuit attaches a PES header to the second attached data into a third attached data, PES. The transport header attachment circuit then partitions the PES (the third attached data) into 184 bytes units, placing them in payloads. In addition, it attaches a transport header to each of them, into a transport stream (a fourth attached data). The transport stream (the fourth attached data) is sent to the data reception apparatus shown in , via a transmission line (not shown).
FIG. 17
FIG. 18
FIG. 19
FIG. 20
shows the format of the PES stream for video data in the 525 signals mode. shows the format of the PES stream for the CRCC in the 525 signals mode. Furthermore, shows the format of the PES stream for video data in the 625 signals mode. shows the format of the PES stream for the CRCC in the 625 signals mode.
FIG. 17
FIG. 18
FIG. 19
FIG. 20
As shown in , the PES stream for video data in the 525 signals mode is made up of a 31-byte PES header, a 104,960-byte PES packet data byte, and a 3,569-byte data of all “0's”. As shown in , the PES stream for the CRCC in the 525 signals mode is made up of a 31-byte PES header, a 1,280-byte PES private stream, and a 529-byte data of all “0's”. On the other hand, as shown in , the PES stream for video data in the 625 signals mode is made up of a 31-byte PES header, a 128,576-byte PES packet data byte, and a 1,665-byte data of all “0's”. As shown in , the PES stream for the CRCC in the 625 signals mode is made up of a 31-byte PES header, a 1,568-byte PES private stream, and a 609-byte data of all “0's”.
FIG. 2
5
6
Next, the operation of the data reception apparatus (see ) receiving input data in the CRC-ON and 525 signals mode (shown in FIGS. and ), and in the CRC-ON and 625 signals mode, will be described hereafter.
Since the data reception operation in the mode is identical to that of the CRC-OFF mode, its explanation is omitted here.
After the reception operation, the following processes of combining video/audio data will be performed.
51
52
FIG. 24
FIG. 24
FIG. 24
FIG. 23
The operation of separating the transport header by the transport header detection circuit is identical to that of the CRC-OFF mode. Accordingly, its explanation is omitted here. The PES header detection circuit separates the PES header in the following method: After a frame synchronization, a “packet start code prefix”(000001H) (see ) is detected first in a case where the “payload start indicator”(000001H) in the transport header is set to 1, will be determined as a PES header for an audio data. Secondly detected “packet start code prefix”(000001H) (see ) will be determined as a PES header for a video data, and a “packet start code prefix”(000001H) (see ) detected thirdly will be determined as a PES header of a CRCC. Alternatively, detecting the PID of the transport header, if it is identical with “1001H” shown in , the data can be determined as audio data. If it is identical with “1000H”, the data can be determined as video data. Otherwise, if it is identical with “1002H”, the data can be determined as a CRCC.
53
54
55
57
56
58
The PTS detection circuit detects and separates a PTS from the second separated data, outputting the resulting third separated data. The PES private data separation circuit separates the PES private data from the third separated data, outputting the resultant fourth separated data. The distribution circuit then separates audio data, video data, and a CRCC from the fourth separated data. The audio data is then stored in the second FIFO circuit , while the video data is stored in the first FIFO circuit . In addition, the CRCC is stored in the third FIFO circuit .
60
56
57
70
The combination circuit combines the first out-read data (video data) (V) read out from the first FIFO circuit , the second out-read data (audio data) (A) read out from the second FIFO circuit , and the third out-read data, (CRCC) (C) outputting the resultant combined data to the VDR .
59
56
56
57
53
60
60
70
The FIFO control circuit reads out video/CRCC/audio data from the first, second, and third FIFO circuits , , and in the timing corresponding to the PTS detected by the PTS detection circuit , combining them together by the combination circuit . The combination circuit sends the resultant combined data as output data to the VDR .
FIG. 21
As shown in the format in the CRC-ON mode in , a half frame of the output data includes 53,120 bytes in the 525 signals mode. Otherwise, it includes 65,072 bytes in the 625 signals mode. Specifically, it includes 320 times repetition of both video data (164 bytes) and then CRCC (two bytes), in the 525 signals mode. Otherwise, it includes 392 times the same in the 625 signals mode.
33
58
37
38
53
FIG. 1
FIG. 2
FIG. 2
Preferable embodiments according to the present invention have been described above. However, the present invention is not limited to the aforementioned embodiments. It should be understood that many different widely apparent modifications can be made without departing from the spirit and scope of the present invention. For example, input data can be made up of only video and audio data dependent upon the MPEG-2 standard. In this case, as described above, the third FIFO circuit in the data transmission apparatus shown in , and the third FIFO circuit in the data reception apparatus shown in can be omitted. Furthermore, the PTS is not essential in the present invention. Accordingly, the PTS generation/attachment circuit , the 300 frequency-division circuit in the data transmission apparatus, and the PTS detection circuit in the data reception circuit shown in can also be omitted.
As described above, the present invention will have the following results:
1) For MPEG-2 based transmission/reception of video data, audio data (uncompressed audio data and compressed audio data not dependent upon the MPEG-2 standard), and user data, the audio data and the user data will be identified by transmitting a corresponding discriminant flag in the PES private data;
2) Video data dependent upon the MPEG-2 standard, in which an error correction code, an error detection code, and other related connections unique to a recording apparatus are attached to, will be directly decoded by a MPEG-2 decoder in the following method: First, separation is performed. Secondly, MPEG-2 based video data is put in a PES stream, while the error correction code, the error detection code, and the other related connections are put in a PES private stream. Thirdly, the PES and PES private streams are transmitted or received via another packet in the transport stream. Lastly, the resultant received data is subjected to error correction and error detection. This enables the MPEG-2 decoder to directly decode the MPEG-2 based video data.
3) The 525/59.94 component signal and the 625/50 component signal will be both processed through the same circuit. This can be realized by setting the frame frequency of the 625/50 component signal to be (5.005/6) times that of the 525/59.94 component signal, and the processing bit number per a frame of the former to be (6/5.005) times that of the latter, changing over between the two frame frequencies and processing bit numbers per a frame.
4) Received data will be identified as MPEG-2 based video data, audio data, or user data. This is achieved by fixing the occurred ratios of video data, audio data, and user data each to a frame of video data, and the location to the frame, for the 525/59.94 component signal and the 625/50 component signal.
5) The probability of an error occurring in the received data and its propagation will be drastically reduced by protecting the transport header. Protection enables for successful acquisition of the transport header, even though the possible-occurrence code transmission error prevents detection of the transport header.
Note that as many different widely apparent embodiments of the present invention can be made without departing from the spirit and scope thereof, it is to be understood that the invention is not limited to the specific embodiments thereof; except as defined in the appended claims. | |
Cozy Grove Reviews
Cozy Grove's day-by-day mechanics can be frustrating to some, but is a definite welcome addition, allowing me to slowly unravel the story and giving me more playtime in the long run, completely enhancing my mornings.
My time with Cozy Grove has been very enjoyable despite some performance issues. Play sessions are short, sweet, and slightly structured, which really helps me feel like I’m allowed to enjoy the game at my own pace. Other games are hard to get back into if you let them sit for a while, but Cozy Grove will be waiting there to let you pick up right where you left off. The aesthetic of the entire game is right up my alley too, being slightly spooky with a dash of charm and humor, and I’m very glad it is releasing on Nintendo Switch.
Cozy Grove offers a whimsical and heart-warming island-life adventure that has completely hooked me in over the last couple of weeks. There’s just something incredibly rewarding about helping out the island folk, whilst the short nature of the charming array of daily tasks ensures that it never feels like a big commitment – it’s just something you can jump into here and there to spring a smile on your face. Of course, there’s no doubting that the style of play won’t be for everyone, whilst the simplicity of the experience might make Cozy Grove harder for some players to invest themselves in when compared to the likes of Animal Crossing. Those who do dive into its wonderful hand-drawn world are in for a delightful little experience though, and one that I can see myself coming back to for quite some time.
Although I found the daily game time to be very short, I recognize that it is precisely because of this concept that Cozy Grove can be a good choice for those who do not have time to engage in complex and long games. The progression is gentle: it's possible to advance the campaign without having to spend many hours on the island. In the end, this game is recommended for those looking for something to relax their minds.
Review in Portuguese | Read full review
Ghosts exist. They have unfinished business and need help. Fortunately for you, you’re a Spirit Scout. You’re trained to aid them and sent on assignments to get them to move on. Your latest assignment is the island of Cozy Grove. It’s dead there. Literally.
Cozy Grove is an incredible game full of charm and warmth. Its gorgeous art style and soothing music create a wonderfully serene ambience that makes for satisfying play sessions.
'Cozy Grove' is a cute and relaxing game. It only takes 30 minutes a day to paint warm colors on a white ghost island welcomed by ghost bears and imps. The game time flow is the same as real-time. In the daytime, the warm sunlight shines brightly, and at night, shining stars and lanterns light up the island that turned indigo. It’s time to heal ourselves without any contact on a calm and peaceful island where nothing is forced.
Review in Korean | Read full review
Cozy Grove definitely lives up to its namesake as a cozy gaming experience, one designed for short bursts of play, where playing a little each day allows you to get more out of it than longer play sessions. The basic gameplay loop is limited, but the charm of the game world and the basic premise provides a relaxing sense of achievement. While it doesn’t replace Animal Crossing as your next time-sink, it does enough to provide a lighter and less demanding alternative.
Cozy Grove manages to deliver an experience that captures you with the simplest elements. It may even be that some foods have no apparent function or that the missions get boring, but the game brings together the basic elements of simulation that give the cozy aspect that it wants to provide. Unfortunately, the mobile focus of the game and the lack of zeal in several aspects weigh heavily on the scale for the experience to be worthwhile on the Switch, so maybe you will have more fun on a smartphone.
Review in Portuguese | Read full review
In the end, Cozy Grove indeed has some good qualities, but its negative points are fundamental and destroy the joy of experiencing the game. Many problems in the depth of the gameplay, which has taken a repetitive and clichéd process, have become quite an obstacle to the relatively enjoyable game. So if you are looking for a good standalone game, Czory Grove is not it.
Review in Persian | Read full review
Cozy Grove is a nice and relaxing game - the only downside on Switch are the technical issues.
Review in German | Read full review
Once I found myself hitting my stride in Cozy Grove, it became a before-bed ritual.
With a beautiful painterly art style and a sumptuous soundtrack to boot, the developers behind Cozy Grove have sought to develop just that, a digital, cozy grove. A haven from the trials and tribulations of life where you can sit back and unwind. It’s games like these that will mean many a player will forever champion the indie scene. Even when some don’t always hit all the right notes.
In summary, Cozy Grove is a great time to sink some time into. Its cheerful atmosphere will put a smile on your face, you’ll be able to make progress in the game at your own pace, and there are natural stopping points that remind you that it’s ok to take a break.
Cozy Grove invites players to be productive, but at a slower, almost foreign, pace. There’s no rush — all goals are achievable if you spend an hour or two each day on the island. This may not be everyone’s cup of tea, but if you pour one while you slowly wake up to calming music and simple fetch quests, it’ll set a relaxed mood for the rest of the day. If you enjoyed Animal Crossing or Spiritfarer, you may like this cute, chill mash-up best played in spurts. If nothing else, at least check out the soundtrack — I guarantee it’ll soothe the soul.
After landing on the island of Cozy Grove, it is your job as a Spirit Scout to help its inhabitants with their many fetch quests. | https://opencritic.com/game/11178/cozy-grove/reviews?sort=popularity&page=2 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.