content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
What is a Tournament?
A tournament is a sporting event in which a team or an individual participates in a series of matches or games. The games may be the same or have different themes, but they are all played competitively and to determine who will be crowned winner. This competition was first recorded in the Middle Ages. The term tournament is derived from the French verb tornoier, which means “to tilt.” It is also a synonym for a “joust,” a type of military sport.
Tournaments are popular in sports, as they allow a large number of participants to compete against one another. The results of each match are added up to determine the overall champion. Tournaments are particularly common in sports and games that feature many small matches. Tournaments give a large group of participants the opportunity to compete against one another and to improve their skills.
Some tournaments have multiple stages, with the top teams progressing to the next stage. In professional team sports, for example, there is a regular season that acts as qualification for the post season, and a playoffs that is a single-elimination tournament. A group stage, also called a pool play tournament, involves a series of matches in which competitors are split into multiple groups. The winners of each group advance to the next stage, and the bottom teams are eliminated.
In a knockout tournament, each competitor plays one fixture in each round. The strongest team in each round advances to the final round, and the next two are given byes based on their strength. For example, in a four-team tournament, the fourth and third seeds would play each other in the first round. The winner of the first round would then play the second seed in the semifinals, and the winner would play the first seed in the final.
Once each round is completed, the final scores are calculated. This allows the top competitors to be determined without a lengthy round-robin tournament. In such a case, the remaining players are redistributed to other tables. In most cases, the playing continues until one player wins all the chips in play. Once a player reaches this stage, they are considered the winner.
In recent years, the structure of tournaments has changed considerably. The A-League, for example, switched from a round-robin system to a knockout format in 2011, bringing the field of teams to sixteen. This change, however, has a number of disadvantages. The new system relies on past performances of teams, not on province-level results.
The FIFA World Cup finals tournament has traditionally used a group-based format with four teams, with the top two teams progressing. The top two teams from each group then play-off for the championship. This type of tournament is also common in most international team events. However, the 1982 FIFA World Cup had two separate groups. And the UEFA Champions League, which took place in 1999 and 2000, also had two groups. | http://addyourpoint.com/what-is-a-tournament-34/ |
Rutabaga (scientific name – Brassica napus) is a root vegetable from the cruciferous vegetable family which is believed to have originated in the 17th century in Bohemia.
The roots can be prepared similarly to potatoes — roasted, baked, steamed, or sautéed, or they can be eaten pickled or raw.
Regarding organic compounds, this vegetable provides vitamin A (in the form of carotenoids), choline, calcium, magnesium, iron, phosphorus, manganese, zinc, potassium, thiamin, vitamin C, riboflavin, niacin, vitamin B5, and folate.
Also, it is a source of glucosinolates, compounds that are responsible for the pungent aroma and bitter taste of cruciferous vegetables. Also, it contains high amounts of fatty acids, like – omega-6 and omega-3 fatty acids in the correct proportion.
The leaves are also edible (they are full of minerals and vitamins), and can be cooked just like mustard greens and other edible greens.
This cruciferous vegetable is a remarkable source of sulfur-containing substances called glucosinolates.
Eating foods rich in glucosinolates can help reduce the risk of prostate cancer, according to a study done at the University of Washington Seattle Cancer Care Alliance.
It is a storehouse of dietary fiber, mainly insoluble fiber, a type of dietary fiber which does not break down within the digestive tract.
According to the Harvard School of Public Health, a high intake of dietary fiber protects against disease, plus, individuals who consume enough dietary fiber enjoy a reduced risk of colon cancer, constipation, and diabetes mellitus.
100g contains 1,8g of dietary fiber, that is about 7 percent of the daily recommended intake.
This vitamin is a potent antioxidant known to prevent disease and illness and enhance the immune system. Eating foods rich in vitamin C reduces the toxic effects of chemotherapy for some cancer patients, according to research done at the University of Kansas Medical Center.
100g of this vegetable has 18,8 mg vitamin C which is approximately 31 percent of the daily recommended intake.
Potassium is an essential mineral for the function of a few organs, including the kidneys, heart, muscular tissues, and brain. Also, it’s the 3rd most abundant mineral in the human body.
The World Health Organization recommends an intake of 3,510 mg a day, however, according to the data, most people are not meeting this recommendation. A deficiency in potassium may cause pain in the intestines, high blood pressure, type 2 diabetes, or swelling of the glands.
100g of this cruciferous has 326 mg potassium which is 9 percent of the daily recommended intake.
It is a highly nutritious cruciferous root vegetable which belongs to the Brassicaceae family, that also includes superfoods, such as – collards, kale, cabbage, broccoli, and brussels sprouts.
This vegetable is known as “Neep” in the Northern part of England and Scotland. Its greens are used in soups and stews, whereas their bulbous roots are usually chopped or diced and pickled.
It is a good source of folate (also known a vitamin B9), dietary fiber, protein, manganese, magnesium, potassium, omega-3 fatty acids, selenium, calcium, iron, copper, thiamin, riboflavin, vitamin C, vitamin B6, and phosphorus.
One cup of its leaves has more than 1/3 of the daily requirement for vitamin C as well as more than 33 percent of the daily intake of vitamin A (in the form of carotenoids), that is about 700 mcg for women and 900 mcg for men.
A regular diet rich in dietary fiber has been shown to reduce the prevalence in flare-ups of diverticulitis (pouches which form in the wall of the colon) by absorbing water in the large intestine and making bowel movements easier to pass.
Moreover, when the digested soluble fiber is combined with the liquid in the digestive tract that gives it a gel-like consistency, it increases the level of satiety after a meal, which in turn helps to maintain a healthy weight.
100g contains 1,8g of dietary fiber which is approximately 7% of the daily recommended intake.
Vitamin C is essential for many functions in the human body. Interestingly, unlike most animals, we are unable to synthesize this vitamin endogenously, hence, we need to get it daily from the diet.
Vitamin C also helps maintain the integrity of our bones, connective tissue, and blood vessel walls since it is involved in the production of collagen.
It is also an essential antioxidant which helps protect cells from damage caused by free radicals which we are regularly exposed to in the environment, like – cigarette smoke, air pollution, and ultraviolet light from the sun.
100g of this cruciferous has 21 mg of vitamin C which is about 35% of the daily recommended intake.
It is known as an essential trace material, meaning that it’s needed in a very small amount by the human body for sexual hormone stimulation, blood clotting, proper functioning of the brain, and formation of tissues.
A deficiency in this mineral can interfere with both the creation of specific key enzymatic reactions and important enzymes required for good health.
100g of this cruciferous vegetable has 0,1 mg manganese which is 7 percent of the daily recommended intake.
Rutabaga vs Turnip – Which Has A Better Nutritional Profile?
These vegetables vary in taste and appearance, but rutabagas are bigger and denser in numerous essential nutrients, especially vitamin B1, vitamin B6, phosphorus, and iron. | https://www.yourhealthremedy.com/medicinal-plants/rutabaga-vs-turnip/ |
Read the following passage and answer the questions.
An important difference between human beings and animals is the property of language. Animals have a rudimentary information process but this process does not have the sophistication and complexity of human language. If two dogs communicate, they pass on information but they can’t discuss details the way humans can. While humans are blessed to possess the language faculty, most of the time they don’t utilize it to its greatest potential. Perhaps this is because human beings tend to react rather than respond. And a lot of the message of languages is lost in this reaction. In the daily use of language, people forget the complex process involved in order to put even one word in place. The wonder of this process lies in the fact that it is involuntary in nature, the whole set of chain processes right from the command in the brain to the forming of words from the message required to the movement of the vocal cords and corresponding movements in the lungs and mouth takes place within seconds. Perhaps the whole suggestion of ‘think before you speak’ may lead to a silent world! In the world of daily interaction, language becomes a marker and a means of projecting identity. The people around us identify us with a certain style of using language and unknowingly, each language user follows this style by habit. It is not a bad idea to record one’s spoken communication from time to time, as this will assist in removing any unwanted elements that the speech may be expressing. Similarly, it is a good idea to step back once in a while and read one’s written communication objectively.
Q 11. The world will become a silent place if people will think:
(1) Too much
(2) Before listening
(3) Before responding
(4) Before speaking
Q 12. The process of language is a wonder because it is:
(1) A reaction
(2) A response
(3) Smooth
(4) Involuntary
Q 13. Which of the following forms is assumed by the language style of a person?
(1) A reaction
(2) A habit
(3) A response
(4) A thought
Q 14. When human beings react rather than respond:
(1) They lose the message
(2) They lose control
(3) They become emotional
(4) They can’t speak
Q1 5. Animals do not possess language because:
(1) The power of speech is missing
(2) The life breath is missing
(3) The level of complexity is missing
(4) The information-sharing is missing
End passage
Q 16. Consider the argument provided below: “Sound is impermanent because it is invisible”
Identify the fallacy involved in the above argument on the basis of Indian logic.
(1) Fallacy of irrelevant reason
(2) Fallacy of wrong assertion
(3) Fallacy of trivial reason
(4) Fallacy of contradictory reason
Q 17. The reasoning which would be helpful in finding new knowledge of facts about the world is:
(1) Speculative
(2) Inductive
(3) Deductive
(4) Analogical
Q 18. Which of the following principles a good communicator should follow? (1) He should stay organised
(2) He should avoid the use of visuals
(3) He should be authoritarian
(4) He must adjust to the medium
(5) He should prefer the method of story-telling
Choose the correct answer from the options given below:
(1) (1), (2) and (3)
(2) (2), (3) and (5)
(3) (2), (4) and (5)
(4) (1), (4) and (5)
Q 19. A person incurs 10 % loss by selling a watch for Rs. . At what price should the watch be sold to earn 10 % profit?
(1) Rs.
(2) Rs.
(3) Rs.
(4) Rs.
Q 20. The average age of a class of 59 students is 18 years. 1f the age of the teacher is included, and then the average increases by 3 months. The age of the teacher is:
(1) 28 years
(2) 30 years
(3) 33 years
(4) 35 years
Q 21. Below are given two sets in which Set I describe the types of listener involved in communication, while Set II indicates their characteristics:
| |
Set — I (Types of listener involved in Communication
| |
Set — Il (Characteristics)
| |
(a) Non-Listener
| |
(i) is engaged in information other than the one need
| |
(b) Marginal Listener
| |
(ii) receives information without processing the significance in the context of communication
| |
(c) Evaluative Listener
| |
(iii) looks into the relevance of the information
for understanding its implication
| |
(d) Active Listener
| |
(iv) pays heed to the communicated
information occasionally
Match the two sets and give your answer by choosing from the
(a) (b) (c) (d)
(1) (iv) (iii) (ii) (i)
(2) (iii) (iv) (i) (ii)
(3) (ii) (i) (iii) (iv)
(4) (i) (iv) (ii) (iii)
Q 22. In the context of a classroom teaching ‘Smiles or Frowns’ when used as non-verbal cues, tend to perform which of the following basic functions?
(1) Contradicting the verbal cue function
(2) Regulating the verbal cue function
(3) Substitute function
(4) Supplement function
Q 23. Which of the following elements a good classroom communication should adopt?
(1) Concreteness
(2) Courtesy
(3) Filibustering
(4) Fictionalisation
(5) Coherence
Choose the answer from the options given below: | https://www.examrace.com/NTA-UGC-NET/NTA-UGC-NET-Updates/NEWS-NTA-NET-Paper-1-26-June-Evening-Shift-Part-2.htm |
Table of Contents
The aspect of gun control has, for years, formed the basis for debate in many countries worldwide as it has become the most controversial and emotional issue. This debate usually revolves around whether the regulations on a person’s rights to firearms are perceived as an undue curtailment of liberty, as well as whether there is any connection between crimes and guns. In the recent past, there has been constant news about mass shootings, tragic accidents in malls, schools, and nightclubs due to insufficient gun control, and significant differences in legislation in different states in the US. For instance, about thirty thousand Americans in the US are killed with guns; homicides, suicides, and gun accidents account for more than 40,000 lives lost to gun-related cases (Lewis, 2018). There are over one million crimes committed every year which involve firearms.
with any paper
Therefore, the gun control debate is about how many regulations and what kind of regulations ought to be there. This issue has significantly polarized people regarding what could be the effective and best remedy. On one side of the debate, the proponents of gun control regulations have asserted that lives could be saved and crimes reduced with strict enforcement of gun control laws and regulations (Fleming et al., 2018). In contrast, the opponents believe that minimum restrictions on firearms will ensure that people have enough ways for self-defense and that we can build safer communities by having a wider distribution of firearms. While the proponents of gun control advocate for strengthening of legal measures, the opponents support the use of guns for protection and public safety.
Opponents of gun control
It is important to note that the gun control debate is a worldwide issue. According to the opponents of gun control laws, there is nothing wrong about an individual protecting him/herself, but all that should be done is to ensure that firearms used for protection should not get into the hands of the wrong people. This is, however, very intense in the US compared to any other part of the world. Those people against gun control are only concerned with violent crimes, and to them, gun control is not the solution to violence committed with firearms (Smith & Spiegler, 2020). However, they are in support of having strict laws and regulations against gun-related crimes as well as better enforcement of the laws. On the other hand, those in support of gun control hold the opinion that due diligence and background checks should be done so that guns do not end up in the wrong hands.
[sammple_3]
Additionally, those against gun control mainly assert that controlling firearms will not be the solution to various existing challenges due to guns, like mass shootings and crimes. However, an effective deterrent is to have the right to control guns (Whitehead et al., 2018). Therefore, law-abiding citizens, according to them, should be allowed to carry firearms for self-defence. Moreover, possession of guns by criminals cannot be deterred by having gun control laws and regulations. This is because strict laws that restrict the use of firearms by criminals are formulated cannot provide solutions to incidences such as mass shootings (Philpott‐Jones, 2018). For instance, irrespective of the laws and regulations, criminals always have the intent of disobeying the law. Thus, they will do so whenever they have a chance to use firearms in public. Therefore, for this reason, controlling guns is not an effective way of dealing with gun-related criminal incidences. However, most heinous acts, such as mass shootings, result from psychotic behavior; thus, there is a dire need to seek proper ways to tame such criminal activities.
Proponents of gun control
The debate about gun control is a far gone case; therefore, there is a need to enact laws and regulations requiring that people who own firearms are dully registered. And that a thorough background check on each individual possessing a gun is necessary. It will help ensure that firearms do not land in the hands of felons or mentally ill individuals. Therefore, the thought that individuals could use firearms in the fight for liberty is a far-fetched idea that requires a second thought (Burton et al., 2021). Thus, it is clear that gun control cannot be an effective way to solve these challenges; rather, it is necessary to enlighten the population through education on the risks of possessing guns and request them always to remit those firearms at will. It will significantly reduce deaths resulting from gun-related activities because gun licensing laws have resulted in a greater decrease in firearm homicide cases.
According to them, the second amendment does not present unlimited rights to own firearms, and more laws and regulations would significantly reduce deaths from gun-related activities. These laws will minimize the use of high-capacity magazines, which are usually used in mass shootings (Fleming et al., 2018). These laws will help protect women from domestic abuse and stalkers who turn out to be dangerous. These laws will help reduce the costs associated with gun-related violence because they provide grounds for background checks for firearm owners.
Conclusion
Gun control is a hot topic globally because of its impact on various aspects of life. From the debate, it is clear that gun control laws have both pros and cons in that strict laws and regulations on gun use significantly reduce homicide, facilitate the reduction of accidental injuries, reduce the risks of mass shootings and violence, crime reduction, it eradicates the sale of dangerous firearms. They also protect women from gender-based violence and abuse and reduce costs related to firearm violence. Legal firearms are rarely used in self-defense, and most gun owners support these laws. However, on the other hand, those opposed to gun control laws assert that it undermines people’s rights to live as they wish, infringe the rights to self-defense, these laws fuel the growth of the black market and could lead to a complete ban on ownership and that they cannot prevent criminals from breaking the law. Therefore, there is a need for concerted efforts to deliberate and come up with potential solutions to the issue of gun control; otherwise, this debate will continue for many years.
- Burton, A. L., Logan, M. W., Pickett, J. T., Cullen, F. T., Jonson, C. L., & Burton Jr, V. S. (2021). Gun owners and gun control: shared status, divergent opinions. Sociological inquiry, 91(2), 347-366.
- Fleming, A., McLean, D. S., & Tatalovich, R. (2018). Debating gun control in Canada and the United States: divergent policy frames and political cultures. World affairs, 181(4), 348-371.
- Lewis, J. S. (2018). The relationship between gun control strictness and mass murder in the united states: A National Study 2009-2015. International Social Science Review, 94(2), 1c-1c.
- Philpott‐Jones, S. (2018). Mass shootings, mental illness, and gun control. Hastings center report, 48(2), 7-9.
- Smith, J., & Spiegler, J. (2020). Explaining gun deaths: Gun control, mental illness, and policymaking in the American states. Policy studies journal, 48(1), 235-256.
- Whitehead, A. L., Schnabel, L., & Perry, S. L. (2018). Gun control in the crosshairs: Christian nationalism and opposition to stricter gun laws. Socius, 4, 2378023118790189. | https://essaywriter.org/examples/gun-control-debate |
The Western College of Veterinary Medicine has been conducting research using groups of beagles as the subjects of the study. Not only are these subjects cute, cuddly and playful, but they also provide hands-on learning opportunities for undergraduate students.
The most recent batch of beagles, all nine named after Peanuts characters, were part of an ongoing pet-nutrition study conducted by Lynn Weber, a professor at the WCVM. The study is being conducted with waves of different groups of beagles and seeks to discover the health benefits of a pulse-based diet as opposed to a grain-based diet.
Although graduate students and PhD candidates have a more direct role in the research and experimental aspects of the study, Weber has sought assistance along the way from undergraduate students, who have had the opportunity to apply their learning in ways that are not typically offered by veterinary clinics.
“All of these are experiences they couldn’t get anywhere else,” Weber said. “In vet clinics, because of liability issues, you’re not allowed to interact with the animals as much as you might think. You might spend all of your time up front at the desk or in the back cleaning kennels.”
Undergraduate students are tasked with responsibilities such as walking the dogs, portioning out their food and providing general care such as grooming. Students also provide assistance to master’s students during research trials by collecting and examining data from non-invasive tests.
Fiona Moser, an alumna who recently completed the animal bioscience program at the U of S, had the opportunity to work with the dogs. Moser asserts that working directly with animals provides practical knowledge that is crucial to her field of study.
“Although it is important to learn the standard curricular material in school, gaining hands-on experience outside of the classroom is so important, especially when working with animals,” Moser said, in an email to the Sheaf. “I think learning how to properly handle and care for animals is a critical skill to have that ensures an animal’s welfare.”
While lectures, textbooks and assignments are valuable sources of information for students, Andrea Geiger, an alumna who recently completed the animal bioscience program, discusses how working with the beagles was a valuable way to get a practical hands-on experience in a clinical setting.
“While I previously had a general understanding of animal physiology, working with the beagles provided an opportunity for a more in-depth examination of how the different body systems work together on a whole-animal model,” Geiger said, in an email to the Sheaf.
Although the first batch of beagles has since been adopted, students will have the chance to work with a new group of dogs this spring. Moser hopes that this upcoming batch will provide more experiential-learning opportunities for students and that the widespread attention given to the beagles will encourage students to be active in and engaged with the research taking place on campus. | https://thesheaf.com/2018/03/09/campus-research-beagles-provide-experiential-learning-opportunities-for-undergraduates/ |
Objectives: To describe and examine the theories, components, and effectiveness of self-management support interventions for individuals experiencing cancer-related fatigue. Methods: A systematic review was reported in accordance with the Preferred Reporting Items for Systematic Reviews and Meta-Analyses 2020 Statement. CINAHL, PubMed, Cochrane CENTRAL, and EMBASE were searched (from inception to June 2021) for randomised controlled trials examining self-management support interventions for managing cancer-related fatigue. Data were screened, extracted, and appraised by two authors. Data extraction was guided by the Self-management Support Taxonomy (i.e., a modified version of the Practical Reviews in Self-Management Support Taxonomy tailored to cancer). The Revised Cochrane Risk of Bias tool was used for study appraisal. A critical narrative synthesis was conducted. Results: Fifty-one papers representing 50 different studies (n = 7383) were identified. Most interventions were delivered post-treatment (40%) using in-person (i.e., ‘face-to-face’) encounters (40%), and were facilitated by health professionals (62%). A range of intervention approaches and self-management support strategies were used across studies. The average number of Self-management Support Taxonomy components used across studies was 6.1 (of 14). Thirty-one studies (62%) described a specific behavior change theory to guide their self-management support intervention development. Twenty-nine studies (n = 29/50; 58%) reported a positive intervention effect for fatigue immediately post-intervention. Of these 29 studies, 10 (34%) reported at least one sustained positive effect on fatigue over follow-up periods between two and 12 months. Conclusions: Self-management support that is delivered after cancer treatment, facilitated by health professionals, and incorporating at least one in-person contact appears to produce the most favourable fatigue and behavioral outcomes. However, further work is needed to better understand how individual self-management support strategies and the application of a behavioral theory influence behavior change. Program developers should guide self-management support with a behavioral theory, and describe their theory application in intervention development, implementation, and evaluation; ensure facilitators receive adequate support training; and seek the delivery preferences of cancer survivors. Future research should incorporate adequate follow-up to sufficiently evaluate the impact of programs on cancer-related fatigue and associated self-management behaviors. Findings from this review are relevant to all healthcare professionals, but are of most relevance to nurses as the largest cancer care workforce with a key role in delivering self-management support. | https://researchnow.flinders.edu.au/en/publications/self-management-support-for-cancer-related-fatigue-a-systematic-r |
Beauty Guides – What Defines Beauty?
Beauty is often defined as a subjective feature of objects which makes these objects enjoyable to see. These objects may include sunsets, landscapes, humans and beautiful works of art. In aesthetic terms, beauty is the central theme of aesthetics, another of the major branches of science. Philosophy of beauty generally divides beauty into two general categories, the physical and the mental. The physical aspect refers to the makeup of an object, its form and its composition. Mental beauty on the other hand refers to the aesthetic appreciation of beauty.
Beauty in the visual sense refers to the aesthetic appreciation of beauty. For Aristotle, beauty is a way of relating the value to objects by means of a comparison with the other things around us. According to the twentieth century aesthetician Paul Delbanco, beauty is largely determined by the power of imagination. According to him, beauty is a subjective standard, an internal idea of beauty that can be established by observation, experience and the influence of culture and tradition.
According to recent theories on beauty, the beauty standard does not have a clear cut definition. According to some, beauty is something that cannot be measured or otherwise quantified. For example, it may be argued that what makes a work of art beautiful is not the form or shape of the painting but the audience’s reaction to it. Another argument says that beauty is what makes a work of art beautiful for its own sake, independent of its form and shape. Still another defines beauty in terms of a relation between things, a set of qualities or a standard that exists between the perceiving subject and some reality.
It may be said that beauty is something that lies outside us. It is something that we conceive or feel in our mind, and not in any given external condition. We come across different kinds of beauty in nature, in music, art, literature, movies and sculpture. Beauty has been defined by many artists and scholars over the history of civilization. Some, like Ben Franklin, have associated beauty with religious ideals and other spiritual experiences. Others may argue that beauty is subjective, and it depends on the individual – something that we all have to do with as we grow older.
The definition of beauty has changed over time. For example, in early modern Europe beauty – generally seen in the beauty standards of the time – focused on the physical attributes of a person or thing, whereas beauty standards began to take human beauty into account in the late 19th century. Modern beauty standards are more concerned with changes in the status of women – issues like honor, social standing and beauty – as well as changes in the status of men and their ability to be successful and prosperous. Men were beginning to think more highly of themselves in the early part of the 20th century, so it became important to evaluate them as well. Thus, beauty standards took on a new importance in the changing times.
Today, there are hundreds of beauty guides all offering different definitions of beauty, often supported by scientific research. One of the best things about beauty standards is that they are universally agreed upon, allowing people from different cultures and traditions to agree on what beauty is and to look up to those who uphold these standards. So beauty standards are important to all of us. We just need to figure out what defines beauty for us. | http://gfkcustomresearchbrasil.com/beauty-guides-what-defines-beauty/ |
It Includes giving a woman medication, to stimulate healthy egg development. Generally, in an ovulatory month, we ovulate only one egg, but the goal of IVF is to stimulate the production of 10-15 eggs, to help couples increase their chances of conception.
This step of IVF Treatment Involves the harvesting of eggs. The egg retrieval process occurs under general anaesthesia in the IVF suite of the Medicover Fertility Clinics. A specialised suction mechanism is advanced into the ovaries, for the egg collection. Once the egg retrieval is completed, the embryologist looks them under a microscope to identify the number of eggs.
In this step, fertilisation of eggs and sperm are done. Once the eggs are retrieved, the mature eggs are placed in an incubator and are fertilized with sperm within a few hours. There are two ways to fertilize an egg, Conventional insemination where the sperm is placed in the dish containing egg, to allow them to fertilize on their own; or Intracytoplasmic Sperm Injection (ICSI) in which one sperm is injected into the cytoplasm of the egg using a needle.
It involves the observation of embryos by embryologists until it reaches the blastocyst stage. Once the sperm fertilises the egg, it becomes an embryo. The embryologist then puts the embryo into a special incubator, where the embryo is provided with proper condition to develop and grow. Proper monitoring of the embryo is done for 5-6 days, till the blastocyst stage.
The final step is Embryo Transfer. Once the embryo develops to the blastocyst stage, it is transferred into the uterus using a small tube called Catheter. It is usually done within 3-5 days of the fertilisation process. Once the embryo is transferred to the uterus, it is allowed to implant, and a blood test is carried on after two weeks to measure the hormone HCG (Human Chorionic Gonadotropin). HCG in the blood usually means a positive pregnancy. | https://www.medicoverfertility.in/female-fertility/ivf/ |
Women with polycystic ovary syndrome, or pcos, suffer from hormonal imbalances brought on by insulin resistance which causes the development of cysts on their ovaries. This can lead to such symptoms as weight gain, irregular periods, increased insulin in the bloodstream, extra hair growth on the face and body, and acne.
The origin of pcos can be hereditary, but little else is known about it. Although, it is often considered a reproductive disorder, those treating pcos as insulin resistance have shown to manage their symptoms more effectively.
Although pcos is aggravating your acne, it is still acne and can be treated as such. However, there are key lifestyle changes to be made that will facilitate your clearing.
Take a look at your dietary habits. How much sugar would you say you consume on any given day: bread, refined flour, and sugary drinks? With pcos and insulin resistance going hand in hand, having a balanced diet can help significantly. Meals should include a healthy balance of vegetables, fruits, whole grains, plant–based protein, lean meats, and healthy fats. Trade in that white bread for a hearty whole wheat variety! Select high fiber choices such as brown rice and whole grain breads and pasta. A balanced diet combined with exercise can help you maintain a healthy weight which is also shown to be important in alleviating symptoms. | https://www.acneclinic.co/project/pcos/ |
No products in the cart.
Call for Partners
We are seeking an institution that would be interested in partnering with us to help make the Rhoda Kellogg collection accessible to scholars, researchers and the public through archiving, cataloging and digitizing. Because the Golden Gate Kindergarten Association currently focuses its activities on the Phoebe Hearst Preschool, we are not able to adequately preserve, catalog, and disseminate the Rhoda Kellogg collection.
We are seeking one or more institutional and financial partners to help us:
- catalog and analyze the collection,
- digitize the most important works and make them available to students and scholars, an
- provide a permanent and archival-quality home for the physical works.
We are also interesting in finding other institutions or scholars who are active in this field and whom we might contact about this project. The collection is currently housed in a storage facility in New Haven, Connecticut.
For additional information please contact: | https://rhodakellogg.com/call-for-partners/ |
Use tab to navigate through the menu items.
Welcome
Critics have pronounced her “
hilarious
,” her interpretation and impersonation “
definitive
,” and that “
her striking visage, broad animated body movement…convey, not only the extremities of the human voice, but more importantly, the
dedication to her
art."
(The Syracuse Post Standard)
April trained at the Curtis Institute of Music with Todd Duncan and Boris Goldovsky.
April Woodall Returns as Florence Foster Jenkins! | https://www.aprilwoodall.com/ |
Learning New Cultures and Traditions
One of the most frightening scenarios around is being in a strange place with no knowledge of where to go, or what to do. This is why if you are planning on relocating to a different country, you will want to become familiar with the local customs so you can assimilate yourself as seamlessly as possible. Many countries have customs that are drastically different from those in the United States and you do not want to find yourself in a situation that is offensive, or worse illegal, in the country you are now living in.
The obvious first place to look is the internet. There is a wealth of information you can find from both a government website, and message boards written by local people. You can find everything you need to know about their culture with just a little research, without having to leave your home. Government websites will have an accurate portrayal of customs that are practiced by the country you are moving to at large. These include holidays, ceremonies, and possibly even body language that translates to their culture, such as what they do in the place of handshakes. Local message boards will give you information that is more specific to the area you are moving to. As we all know, customs in the Southern portion of the United States are a lot different than customs in the Pacific Northwest. The same is probably true of the country that you are moving to, so you do not want to skip this step. Finally, a website from a consulate of the United States can further help you translate body language, and help give you an idea of regulations and security issues.
What to Look for
You might be wondering what specific things to look for when you are researching the culture of your new country, so you are fully prepared of what to expect when you arrive. As already stated, customs, traditions, and etiquette are very important, so you know what is considered offensive and what is socially acceptable. These types of customs are different from region to region, and you will not want to be an “ugly American” that does not know or respect another culture. To go along with that, you should find out what the common religion is in that area. Many customs and traditions are based on the religion of the region and this can help give you a better understanding of the place you are going. Another thing to look out for are gender roles. In many places, the gender roles are a lot different than in the United States, and are taken very seriously. While you may not agree with how gender is perceived, it is important that you understand what you are going to find when you get there. Another thing to look for is the local cuisine. You should absolutely know what kind of foods are available in your new area, because you may not like, or be allergic to, a major food source. This way you will be well prepared, and can plan accordingly.
While you will not be able to learn everything there is to know from the internet, and no amount of research will fully prepare you for what you will see when you arrive, doing this work will at least give you an idea of what to expect. Reducing your culture shock, and learning about your region will help you assimilate better and you will be able to make friends and converse with neighbors much easier than if you did no research whatsoever. | https://www.internationalmovingcompanies.com/cultures-of-your-new-country/ |
(Granted, I was publishing articles during those eight years, so I wasn't a complete failure . . . I just felt like one.)
Today's topic is a reader question I got from Chas Hathaway some time ago:
Why is it exactly that it takes so long (2 yrs I've heard is average) for a book to get from submission to publication? Is it editing? Do they just have a lot of books to work with at the same time?
The really short answer is this: There are a lot of steps in the publishing pipeline, and each just takes time.
Now for the long answer . . . and this is assuming that a writer either already has a literary agent (getting one takes its own good time and has its own challenges) or doesn't need one, such as with the LDS market, which is so small that they don't use agents. (A literary agent would starve if trying to make a living in this market. It just isn't big enough for that, because all the money agents ever get is commissions on author royalties.)
We'll start with submission and then go into the actual pipeline:
Jane Writer (or her agent) submits to a publisher. This is usually not a full manuscript, but a query letter (which has the purpose of piquing the editor's interest) and some sample chapters.
The editor gets dozens of these submission packages on a regular basis and reads them when there are breaks between other publishing deadlines for books that are already under contract. Jane's submission might not even be looked at for a couple of weeks. Or months.
Eventually, the editor gets to the submission and if he or she decides the submission shows promise, contacts Jane Writer and requests either a partial (often the first 50 pages) or a full (the entire manuscript).
Again with the waiting game. With my publisher, if you reach this stage (having a full requested), two or three copies of the manuscript are made and given out to evaluators, along with a massive (seriously, like 15-page) form for them to fill out analyzing all kind of areas of the work.
When all of the evaluations are returned (so you're waiting on other people and whenever they decide to get to it), the editor reviews them. By this point, you can easily have seen three or more months pass since the original submission.
If you're one of the publisher's regular writers, your submission jumps to the front of the line and gets read first (which can still mean 3 months), but if you're new, you go to the back of the line and have to wait longer (I used to wait 8 or 9 months).
If the evaluations are positive enough, the editor reads the manuscript and decides whether to champion the book based on evals, the quality of the writing AND (here's the rub) on the overall marketability of the work.
That last one is the area that took me 8 years to figure out. I got really awesome rejection letters and even a phone call once from a managing editor with things like, "Your work is a cut above what we usually see" and, "We debated long and hard on this book, even with the president of the company," and the like, but the bottom line was that the stories weren't marketable enough for the audience I was writing for.
This is a business, and no matter how much they LOVE a piece, if they don't think they can sell enough copies to make a profit, they usually pass.
If the editor deems the manuscript worthy, it moves on to the committee: all the big wig decision-makers. This includes the company's head honchos, the marketing department, the managing editor, and more. My publisher's committee has a marathon meeting once a week. (You don't want to know what day it is for Covenant. It's a nightmare knowing it's committee day when you're waiting for an answer.)
Before my acceptance, I made it to committee many, many times, but didn't make it past that because of the marketability thing until an editor contacted me and basically said she knew I had the chops and that I'd be "an asset to the company" if we could just knock me over the line. She clued me in to the market, and my next submission was picked up. Yay!
Back to time lines: Jane Writer's book is accepted. She may have already spent 6-9 months, but she's still got a lot ahead of her:
1) First she does any rewrites needed based on the evaluations, the editor's feelings, etc.
2) Then there's the content edit, where plot holes get sewn up, character motivations are fixed, the plot arc is smoothed out. Basically, any big-picture issues are fixed. This can take 2-3 months. Or less. Or more.
3) Next is the actual line edit. This is where an editor takes a red pen and goes through the whole thing word by word, line by line. The point is to polish and clean up anything that might be clunky. Fix any incorrect punctuation or grammar. Smooth out awkward dialogue and sentences. Basically, make the writer shine. This can take several weeks or an entire month.
4) The author goes over the edit and approves or rejects every mark made. This normally takes at least a couple of weeks.
5) The editor reviews the author's changes. If needed, they discuss and talk about anything they disagree with to work out compromises. Depending on schedules, factor in a good week or two.
6) Corrections are then inputted into the file. Mark down a week or so, possibly more, depending on what else is in the pipeline and what other books get precedence.
7) Sometimes a second line edit is done, time permitting. I've even had a third done before. Repeat all the steps (and time) the other one(s) required.
8) Proofers go over the book to look for mistakes. They look for the obvious (spelling and punctuation) but also elements like plot consistency. (Did David's eyes change color? Oops, the author accidentally created an 8-day week. Wait, wasn't it raining a second ago? Now it's sunny.) Add a few of weeks for the proofers to do their job.
9) The author proofs the file. Often at this stage, I find mistakes that someone along the line has INSERTED into the text accidentally. I usually get a week or so to proof.
10) Changes are inputted into the file. (Days, a week, or more, depending on how many other files the worker has to get done.)
11) The file is set to the typesetter, where the book is formatted to look as it will in an actual book, instead of the way it does in a Word document (headers, page numbers, text the size of the book, chapter headings, title page, etc.). Typesetting can take half a month easily, and that's assuming there are no other books in the queue.
12) Proofers go through the typeset book, because typesetting can introduce NEW problems (like several lines of hyphenated words in a row which looks stupid, or a single word on a page, or whatever). Depending on how many proofers get it, add a couple of weeks.
13) The author gets to proof the final typeset version (commonly called the galleys). If you're lucky, you'll get more than a week to do this. At this stage, I'm always amazed that we still catch typos and other errors, no matter how many eyeballs have already been over it.
14) The final changes are inputted into the file. Again, this can take a week, depending on the schedule over at the publisher and how busy the disk-changer is.
15) During this time, the design department has been working on the cover, and you'll get to see it soon.
16) The marketing and PR departments have been working on ad placement, etc.
17) When the cover and the galleys are corrected and complete, the book is (yay!) sent to the printer. The printer is usually in another country, so this isn't like going to Kinko's where you get your order back overnight. Instead, books are often printed in Canada or China and then shipped back.
If your books are being printed in China like many picture books are, you may have to wait for the books to be shipped back by boat. I had a friend who published a picture book that was printed in China, and on the way back, the BOAT SANK. You never know what will delay your book's release!
Bottom line: the printing process alone can take a couple of months.
18) When the books are printed, they're sent to the warehouse. From there, orders to bookstores are filled and shipped. Depending on how close the bookstore is to the warehouse, this could take days to weeks.
Add all those numbers up (rough estimates, since you never know exactly how much ping-ponging is going to happen and how many edits you'll get):
Submission to acceptance: 3+ months
Revisions: 2+ months
Content Editing: 1-2 months
Line Editing: 1-2 months
First Round of Proofs: 1-2 months
Typesetting: 1-2 weeks
Final Proofing: 2 weeks
Printing: 2+ months
Warehousing & Shipping: 1 month
Those numbers add up to about 15 months. And that's assuming you get to move smoothly from one step to another. Sometimes you don't, because the pipelines gets bogged down with other projects being bumped up or having a crisis, so you were supposed to get your edit next week but don't for three weeks . . .
Plus, keep in mind that they're publishing maybe three dozen books a year, keeping that many balls in the air, all at different stages of development.
So does the one-or two-year schedule make a little more sense now? I've been lucky in that most of my books have had a turnaround of slightly under a year, but my last two were more like a year and a half.
One reason for the longer delay on my more recent books is that the month a book is released is a big decision. A lot of things factor into it. The publisher looks months and months into the future, filling slots in here and there with care. They make every decision carefully.
Spires of Stone, for example, came out September 2007. Covenant had four historical novels they wanted to release around the same time. But putting them all out the same month would have been shooting all of us in the foot: if historical fans are going to buy ONE book in a month, they'd have to pick between four of us, and three would lose. (And so would Covenant.)
The best thing to do would be to spread us out just a bit, in a way that would minimize competition and maximize potential sales.
If memory serves, they ended up doing two of those books in September and two in October, and they purposely pitted books against one another that they felt were as different from each other as possible.
As a result, Spires was released the same month as H. B. Moore's Land of Inheritance. My book had a more female, romancey audience, and hers had more readers that enjoyed grand, epic-type books. Plus, she had more male readers. We also have very different tones and styles, not to mention totally different time periods.
But (again, if memory serves), Jennie Hansen had a historical coming out too. They released it in October, because, like mine, her book was set in the 1800s. Had we shared a release date, we would have been in direct competition with one another, so they separated us. Wise move, methinks.
Other issues can help determine a release date, such as whether a book might be a good gift book for Mother's Day, in which case you might get an April or May release.
And if they think a particular book will get a lot of Christmas gift sales, it'll likely come out in September or October. | http://blog.annettelyon.com/2010/01/ |
Cadaveric kidneys for transplantation. A paradox of shortage in the face of plenty.
The number of cadaveric kidneys currently available for transplantation is insufficient; therefore, the Center for Disease Control (CDC) undertook a collaborative pilot project to increase the number of cadaveric kidneys available for transplantation. In phase one, a retrospective review of medical records of in-hospital deaths was done to determine the potential number of cadaveric kidney donors and to define the characteristics of potential donors. The medical records of 10,420 (43.1%) of the 24,164 patients who died in 67 acute-care hospitals in Georgia, Kansas, and Missouri were retrieved. In addition to determining suitability for donorship, criteria were developed to reflect the broadest range of criteria in use. By center-specific criteria there were 1.7 potential donors/100 in-hospital deaths, which could make available 109 kidneys/million population. By broad intercenter criteria there were 3.5 potential donors/100 in-hospital deaths, which could provide 232 kidneys/million population. During 1975, by center-specific criteria, kidneys from 19.3% of the suitable potential donors were retrieved. The small number of transplantable cadaveric kidneys retrieved was not attributable to lack of suitable organs but rather the failure to identify suitable donors, obtain consent, and retrieve the kidneys.
| |
Researchers at the University of Liverpool have been awarded a £1million grant to undertake a research project to find out how seabirds capture infrasound.
Infrasound is sound below 20 Hz, lower than humans can perceive. It is known that elephants and whales use infrasound for communication, and that songbirds may use it to avoid storms and there is some evidence that pigeons use it for navigation.
Now, scientists from the University’s School of Environmental Sciences want to find out whether the low frequency sound waves which create “hills” and “valleys” – or an infrasoundscape – help seabirds navigate as they travel millions of kilometres over their lifetime across a seemingly featureless ocean.
Researchers will compare the routes birds use based on the movement tracks of seabirds, based on millions of GPS positions, against atmospheric and oceanic infrasound, and meteorological and oceanographic maps. Infrasound stations that are part of the International Monitoring System, a global network installed by the Comprehensive Nuclear-Test-Ban Treaty Organisation will be used in the research. CTBTO monitors infrasound in order to detect nuclear explosions.
Liverpool Ecologist, Dr Samantha Patrick, from the University’s School of Environmental Sciences, said: “This is an innovative project that aims to shed some light on one of nature’s unsolved questions.. Navigation is essential to animals yet we still do not fully understand how species are able to move so widely. For example, Arctic terns travel from the Arctic to the Antarctic but how they find their way year after year is a mystery.”
Working with geophysicists, mathematicians and physiologists, this project will bring together expertise from across scientific fields. The development of novel data logging devices on seabirds which can detect infrasound and meteorological parameters will allow movement, infrasound and weather conditions to be captured allowing researchers to examine individual movement decisions at an intricate level.
Dr Patrick added: “The project aims to not only capture the use of infrasound, but will investigate whether birds can detect these signals using their inner ear and test the importance of such cues in the evolution of navigation.”
The project is funded by the Human Frontier Science Program through the Young Investigators’ Grants scheme.
Image below: The collection of seabird tracking data held in the Ocean wanderers database http://www.seabirdtracking.org/
Image below: A simulated ‘infrasoundscape’ from ocean waves (intensity scale in decibel [dB]), locations of a wandering albatross (red dots) on 25 February 2013 and sites of CTBTO atmospheric infrasound (blue Δ) and hydroacoustics (red Δ) facilities
You must be logged in to post a comment.
All recent news
Liverpool leads new national encephalitis study
Liverpool Guild of Students designated as Hate Crime Reporting Centre
Free festival explores climate change, ‘fake news’ and more
Staying safe in the city
An open letter from UUK and UCEA to staff impacted by the latest UCU pensions and pay disputes
Researchers @LivUni have been awarded £2.6 million to lead a national study looking at new treatment for autoimmune #encephalitis
Read more here👉http://bit.ly/32fe9z3
#worldencephalitisday
Front page of our News site this morning 📰
Researchers are leading a study looking at new treatment for autoimmune #encephalitis, an award-winning line-up for our #LivOpenHouse festival, and how oceans are moderators of #ClimateChange. | https://news.liverpool.ac.uk/2017/04/05/researchers-to-explore-how-seabirds-navigate-using-infrasound/ |
Seminars and Conferences. ...
Trade Shows. ...
Executive Retreats and Incentive Programs. ...
Golf Events. ...
Company or Organization Milestones. ...
Team-Building Events. ...
Product Launch Events. ...
Board Meetings and Shareholder Meetings.
Here are some examples/list of the different types of corporate/business events that planning companies and corporate entertainment providers can help turn into memorable successes.
Business Dinners. ...
Networking Events. ...
Product Launches. ...
Holiday Parties. ...
Seminars. ...
Charity Events. ...
Trade Shows.
Let's take a look at the six most common types of business meetings, including:
Status Update Meetings.
Decision-Making Meetings.
Problem-Solving Meetings.
Team-Building Meetings.
Idea-Sharing Meetings.
Innovation Meetings. | https://brooklynguesthouses.co.za/Pages/Corporate-Events.asp |
The most common form of judicial dispute resolution is litigation. A dispute is brought when one party takes legal action against another party. In the United States, litigation is facilitated by the government in federal, state, and local courts. The procedure is very formal and is subject to rules, such as rules of evidence and procedure, which are determined by the legislator. The results will be decided by an impartial judge and/or jury on the basis of the factual issues of the case and the right of application. The court`s judgment is binding and not advisory; However, both parties have the right to appeal the judgment to a higher court. The settlement of judicial disputes is generally adversarial in nature, i.e. . B involving antagonistic parties or conflicting interests seeking a result more favourable to their position. In addition, arbitrators and mediators are often lawyers. Instead of hiring a lawyer to represent each party in a SETTLEMENT proceeding, some parties agree to hire a single lawyer to act as an impartial third party to guide the solution and ensure that all proposed solutions are legal. Sometimes a court requires you to try to reach an agreement on dispute resolution before hearing your case.
For example, in civil cases brought before the district court or in family disputes concerning the custody of a child. The centre does not deal with family law litigation, although it can help older Victorians who are considering transferring assets or property to family members. Lawyers help their clients resolve issues and resolve disputes with other parties. Litigators, mediators, arbitrators and dispute resolution design experts work in the public sector and in private practice. You can work as a litigator in a criminal or civil firm, or even as a lawyer for a company or non-profit organization. Due to the antagonistic nature of litigation, employees often choose to resolve disputes privately. In fact, the involvement of lawyers does not always signal the end of a cooperative relationship. The duration of the exchange or familiarity with exchange partners are important factors that affect the law firm`s willingness to resolve disputes. This effect depends on whether or not a cooperative standard is developed during the cooperation. Participation of expert lawyers in assisting in any form of dispute, which is often essential as the parties receive expert advice on the way forward and how best to resolve the dispute. Alternative Dispute Resolution (ADR) is a widely used term when it comes to dispute resolution.
ADR in itself is not a form of resolution, it is the resolution of a dispute without litigation. Therefore, points 1, 2 and 3 discussed above are all forms of ADR. What can complicate dispute resolution is the method by which the dispute is resolved, since the different forms of settlement must take into account a number of factors, which are mainly cost, access, confidentiality and timeliness. The Victoria Dispute Resolution Centre offers a free telephone service that works with you to try to resolve your dispute. The center will talk to you about your problem, discuss options, suggest negotiation strategies and arrange mediation if necessary. Call (03) 9603 8370 or 1800 658 528 (domestic caller). Litigation – Litigation is a formal legal process that uses the civil law system available to resolve a dispute. When a case is heard (issuing a claim form to the court), you and your lawyer must follow a set of rules applied by the courts, and the court will determine the path and pace of the dispute by applying a set of timelines for the parties to take action and ultimately prepare the case for a final hearing. Litigation can be complex and time-consuming. While a person can represent themselves (they are expected to act in Small Claims Court), it makes sense to hire a lawyer to handle the litigation to ensure that complex legal processes are managed effectively. Due to the people and time involved in litigation (lawyers, lawyers, courts, experts and judges), litigation can become very expensive.
While most disputes are often settled before a final hearing, where a judge decides the outcome of the case, some disputes cannot be resolved in court, with the end result being a full hearing before a judge. With the exception of most family proceedings, not all proceedings are private and legally binding upon completion (subject to appeal), so both parties must respect the outcome. The Uk legal system is complex and steeped in history, with a set of rules and jurisdictions to follow. This is a specialty that requires expert advice and guidance. Dispute resolution procedures can be divided into two main types: restorative justice: a process designed to deal with a claim or other dispute, where stakeholders jointly identify and address impacts, needs and obligations, and create an action plan to move forward. Whichever area of law you choose, you should be familiar with dispute resolution, sometimes referred to as “ADR” or “Alternative Dispute Resolution,” but here at Texas A&M Law we call it “Aggie Dispute Resolution.” Dispute resolution procedures include negotiations, mediation and arbitration. Today, the vast majority of disputes are resolved outside the courtroom through dispute resolution. Summary Jury Trials (SJT): In this adversarial dispute resolution procedure, each party presents their case to a jury in an abbreviated form. The jury then makes a decision that is only advisory, unless the parties request that it be an enforceable decision. A summary jury trial gives the parties a taste of a possible verdict if the case comes to court.
SJTs are available in limited jurisdictions. . | https://xofoundation.org/what-is-dispute-resolution-in-law/ |
In May 2018, the Government of the Democratic Republic of the Congo (DRC) announced an outbreak of Ebola in the Northwestern Equateur Province. At first, the outbreak appeared to be confined to remote areas, but soon cases were confirmed in Mbandaka, a city of nearly 1.2 million people, heightening the risks of a more rapid spread of this highly contagious disease.
UNICEF and partners responded immediately, dispatching community health workers and shipping supplies, and installing handwashing stations at schools among other measures to improve water quality, sanitation and hygiene, all critical for Ebola prevention.
Early response was initially successful, quelling the outbreak in 11 weeks, but Ebola was reported in eastern DRC in August. By early January 2019, the country's conflict-ridden North Kivu and Ituri provinces has become the epicenter of the second deadliest and second largest Ebola epidemic in history. More than 600 probable Ebola cases have been reported, one-third of them children, with 368 deaths and 207 recoveries. Children are at a higher risk of dying from the disease than adults. One in ten Ebola cases is under the age of 5.
According to the World Health Organization (WHO), the Ebola virus disease (EVD), formerly known as Ebola hemorrhagic fever, is a severe, often fatal illness in humans. The virus is transmitted to people from wild animals and spreads in the human population through human-to-human transmission.
Human-to-human transmission of EVD comes from direct contact with the blood and other bodily fluids of those infected. The virus is relatively robust and can survive until transmission on materials contaminated with those fluids, such as bedding and clothing.
Can Ebola be cured or treated?
The average EVD case fatality rate is around 50%. Case fatality rates have varied from 25% to 90% in past outbreaks. Symptoms include fever, severe headache and in some cases, hemorrhaging. Treatment includes giving intravenous fluids (IV), balancing electrolytes (body salts) and maintaining oxygen status and blood pressure. Early intervention can significantly improve the chances of a patient's survival.
Yes. WHO is coordinating with the DRC Ministry of Health, Doctors Without Borders / Médecins Sans Frontières (MSF), UNICEF and other partners to vaccinate those who are at high risk of infection in the affected health zones. UNICEF will play a leading role in providing information to the communities affected by the outbreak.
Ebola was first discovered in 1976 in former Zaire, or what is now the DRC, near the Ebola River. Dr. Peter Piot of Belgium and his colleagues were the first to identify Ebola.
Who is most at risk for getting Ebola?
For most people, the risk of getting Ebola is low. The risk increases if you travel to Africa or visit or work in areas where Ebola virus outbreaks have occurred.
UNICEF played a major role in responding to previous outbreaks, including the epidemic in West Africa in 2014–2016, the deadliest outbreak ever, which killed more than 11,000 people. As part of its emergency response, UNICEF delivered more than 8,000 metric tons of critical medical supplies and worked with local communities, religious leaders and traditional healers to raise awareness of safe health practices. The West African outbreak, which spread from Guinea to Sierra Leone and Liberia, was a complicated, harrowing emergency that resulted in more cases and more deaths than all previous outbreaks combined. As the crisis abated, UNICEF helped the survivors heal, especially the children who were directly affected.
Learn more about UNICEF's work to protect children and their families in the DRC from Ebola.
When it comes to protecting children, UNICEF has a 70-year history of being in the right place at the right time. Help UNICEF respond when emergency strikes.
The second deadliest Ebola outbreak in history has claimed 398 lives and left more than 400 children orphaned or on their own.
The DRC Ministry of Health, UNICEF, World Health Organization and other partners worked jointly to stop the deadly outbreak in 11 weeks.
A vaccination campaign launches amid escalating risks of rapid spread as new cases are reported in the city of Mbandaka.
UNICEF hails a victory against the disease, but thousands of children still need care.
"I lost my husband. Some of them lost their parents. We all got affected one way or another." | https://www.unicefusa.org/mission/survival/ebola |
As a military historian, sometimes it has fallen upon me to comment as intelligently as I can on debates as to who is the greatest general . I am, overall, someone who has a hard time ranking people in an easy list (at least at this stage of my life—it was easier for me to do when I was younger, I suppose). Rather, I tend to think of people in tiers or categories with some level of flexibility overall. At any rate, what I would like to discuss today are the ways in which I view military greatness and its implications for greatness in any human endeavor, for my view of greatness is the same whether one is great in war or in any other field.
Let us first note, before we get carried away into other discussions, that greatness here refers to excellence in skill. There are many times when greatness in skill leads to a morally horrendous result. It is therefore necessary to distinguish ahead of time between that which shows skill in warfare and that which shows exemplary moral conduct. There are many leaders, in military life as well as many other fields, whose excellence is worthy of emulation even if their morals are dubious. In such cases it is necessary to seek the sources of their skill without falling into their moral errors, for if we do we will suffer the same judgment as they. Nevertheless, it is also true that even those who are immoral may be examples in some small area of technical competence, and therefore a knowledge of their life and behavior (even if it is highly blameworthy) is of some benefit, so long as there are enough warning messages attached to the lesson of their lives.
That said, there are many ways that a military leader can be great. Most people focus on tactics and so leaders like Alexander “The Great” and Robert E. Lee and Hannibal are often given very high scores by many fans of military leaders. And tactics are perhaps the easiest aspect of warfare to study (all you need is a fondness for battle maps, and most of us who are interested in military history gain this fondness as children; I know I did at least), so it is no surprise that it should acquire so many fans. And tactics is probably the easiest of the aspects of war to judge. You look at battles and count how many wins, draws, and losses someone has. The more wins, the better of a tactical general they are. If they have a few losses, you then start to make excuses about being overwhelmingly outnumbered, and try to excuse away the losses to preserve a strong record of tactical brilliance.
And that is not to denigrate tactical brilliance. After all, winning battles is worthwhile and notable, and it is one of the ways that one achieves military greatness. Traditionally, the great tactical leaders have been SP personalities, those whose thought process was short term and focused on excellence in visible and easily recognized fields. The tactician of the business world is the salesman, focused on doing what is necessary (tactically) to ensure that he meets his quota. Such a person is not concerned with long term strategic goals, but rather winning battle after battle. And there is a place for that—though it is not in overall command of a war effort (or a business effort).
Even though I am not personally a skilled person at logistics, one of my favorite areas to study as a military historian is logistical warfare. Some great generals, like Nathanael Greene and George Washington, as well as Fabius during the Second Punic War, made their great contributions to military history simply by not losing their army. A logistical general, even a surpassingly great one, may not be great at tactics (Nathanael Greene never won a single battle as a tactician, and George Washington was only indifferent as a tactical general), but where they win is in preserving their army to fight another day. A logistical general is particularly useful when one is fighting at a disadvantage tactically (i.e. you are fighting a better trained army) but have a strong amount of political will, with the knowledge that the survival of your army means the survival of your cause, but the destruction of your army would mean the loss of your cause. Because of the vital importance of survival to ultimate victory, I give very high marks to leaders who were able to preserve their army in difficult circumstances (see Zachary Taylor) and I dock points on those generals whose failures as logistical leaders led to the defeat of their military efforts (see Robert E. Lee).
In today’s business world, it is the bean-counters (accountants and the like) who are the great logistical people. Logistics-minded people are “guardians,” and they tend to be in middle management as well as many of the ranks of professionals who are more interested in a steady and reliable paycheck than in greatness. Logistical generals are best suited not for command, but for being the chief of staff, or being the secretary of defense, able to preserve the supply resources of an army without being tested in their areas of weakness. In less well-developed armies, though, a logistical general (as long as he has enough help or at least passable abilities in strategy and tactics) can make an effective leader of a main army. After all, logistics is not sexy, but someone has to do it for one’s efforts to be successful in the long run. And logistics is all about the long run.
Another rather under-appreciated skill in military leadership is that of diplomacy. After all, many wars are not about one nation fighting against another but about stopping someone with a coalition. And to successfully win as a coalition, one requires strong diplomatic generals who are able to work with people from other nations, with different political systemd and different leadership cultures. To pull of the task of leading a successful coalition against a foe, a la Eisenhower or Marlborough or Wellington, is a highly important skill, and those leaders who can do it well are worthy of being enshrined as great. It is my experience that such leaders are somewhat rarer than tactical leaders, but some leaders are both sound on tactics and diplomacy (see Wellington and Marlborough). Other leaders are good political leaders of some tactical brilliance (like Robert E. Lee). In this case, sometimes political and diplomatic skill is combined with other abilities.
In the business world, most diplomatic leaders (if they are not working in diplomacy) tend to be in more counselor or caretaker sort of positions (like teaching) where their enthusiastic cheering of others can help encourage and inspire others to succeed. Again, such people (unless they have other abilities) might not be best for overall command, but they do very well in frontline leadership roles where interpersonal contact is vitally important. It is my experience that such types of people are often very treasured but are too rare to serve where they are needed, and often not pushy or ambitious enough to get themselves in the places where they can do the most good, and where power hungry guardians or artisans end up without having talent to effectively work with different people.
Finally, let us discuss my own (personal) favorite types of leaders. These are the strategic geniuses. They are similar to the tacticians in that they tend to see everything as a map. But unlike the short-sighted tactician, a strategist sees a cosmic scope and looks toward the long-term. They are not fighting to win the battle, but rather determining if the war is worth fighting at all. They are marshalling the armies and plotting several steps ahead of the tactician. Great strategi leaders tend to have a vision that inspires loyal and talented subordinates, a vision that can be extremely successful. Winfield Scott, for example, was an etremely talented strategic general with a strong diplomatic second suit (though he was a little weaker when it came to domestic politics) while also being a relatively sound tactician. Sherman and Thomas were both sound strategic generals, Thomas being the better tactician of the two, and Sherman with the better political relationship with his superior, Grant. And in the end the three of them (along with others) made a very successful military team.
In the business world, the strategic people are best suited to think tanks, to determining vision and long term mission plans. Such tasks are often very high level, and strategic intelligence is especially necessary in a world where massive mistakes can cost others for decades. Unfortunately, strategic intelligence is something that is often unappreciated (and may even be considered threatening) by the insecure who dislike the strategists coolness and distance from the mundane, and for their disdain from traditional approaches and concern for what works. But a sufficiently moral strategist ought to find plenty of support from those who appreciate his talent while able to present a friendlier face to others, or work out the short term tactics that follow from the long-term strategies. A strategist was born to command, but few opportunities are easily available for such people.
The larger point is that the road to greatness first lies in knowing one’s self, one’s strengths and weaknesses, and finding people to work with who are willing and able to collaborate who are strong where one is weak and vice versa, so that the whole burden does not lie on any one person alone. Then one goes about finding or creating the opportunity to succeed, cultivating relationships and building networks, so that when the need arises one is able to take immediate advantage of the situation. Again, there needs to be a team approach that is focused not on creating clones, but rather on creating a well-balanced team that is strong in all areas, even though its members have their own different strengths and weaknesses. When such a body of people is joined togther in a common effort and led by those who are genuinely interested in the well being of all, such a group is unstoppable under heaven. What is striking is how unusual it is for people to be able to recognize the same will and the same mission in the many related endeavors where greatness can be found. | https://edgeinducedcohesion.blog/2011/09/02/many-roads-to-greatness/ |
Take a moment to think back to your time as a student and recall some of your favorite courses. Very likely, those courses were well organized, assignments were clear, lectures and classroom discussions were focused and interesting, and the professor conveyed a compassion for teaching. How can you create such an environment in your own courses?
Effective classroom management entails meticulous planning but also a readiness to switch gears and move away from the script when necessary; it requires firm control but also a willingness to relinquish that control to take advantage of a teachable moment; it requires leadership but also a sense of compassion and understanding of your students.
Consider these techniques as you develop your classroom management style:
Begin to establish an effective environment on the first day of class:
- Introduce yourself. Explicitly state the way you would like to be addressed.
- Consider offering an ice breaker to relax students and encourage interaction.
- Teach something; immediately begin to engage students in the course.
- Take class time to review the syllabus and emphasize important aspects. In fact, use the syllabus to begin building student engagement even before you meet with students by ensuring that it articulates learning outcomes, class format, and expected behavior. During those first few hectic add/drop weeks, students appreciate an instructor who clearly and concisely presents a course overview.
- Expect some students to come in late. They’re getting lost, too!
- Consider setting community rules (e.g., regarding phones, laptops, talking, sleeping, eating, late arrivals, and early departures) with the students ; they will appreciate the democratic approach.
Interact with students right away: Learn names; anonymity discourages student engagement. Using props (name cards, photos, index cards), taking attendance, and handing back papers and homework can help you to connect a name with a face.
Be prepared to respond to challenges:
- What will you do if students consistently arrive unprepared? Students spend only about half the time preparing for class as faculty expect. When faculty expect students to study more and arrange class to this end, students are more productive (National Survey of Student Engagement, 2004). Try these approaches:
- Give weekly quizzes, reflection papers or homework
- Clarify concepts and helping with problem solving
- Grade class participation
- Flip the classroom
- How will you handle disruptive students? We need to be ready when disruptions occur, so plan ahead how you might respond to various situations. Consider the following:
- Ignore the situation for the time being, but think about possible approaches after class
- Use the disruption as an opportunity to talk about community rules as a class
- Suggest a meeting with the student after class
- Calm the situation
- Ask the student to leave
- Put a positive spin on the disruption
- How can you encourage quiet or shy students to become engaged?
- Encourage participation
- Call on students by name
- Introduce active learning exercises
- Give “think time” before expecting students to respond to your questions
- Call on groups
- Establish a comfortable environment. Is your classroom warm and welcoming?
- Should you post your lectures, slides, in-class materials, etc., online? Weigh the pros and cons, decide on a strategy and then stick with it:
- Pros—Posting class materials can save time, give students more opportunities to interact with the material, and make information accessible to everyone.
- Cons— Posting may reduce attendance and class interaction, and it appears to encourage a passive approach to learning.
Engage, Engage, Engage: Don’t let down once the course gets underway. Continue to focus on the following strategies: | https://cetl.uconn.edu/classroom-management/ |
A current challenge for optical communications is to expand the capacities of optical backbone network to cope with the possible future explosive expansion of information communications traffic. Various approaches are being taken to the challenge. One of the approaches is to carry out research and development regarding an improvement in usage efficiency of an optical frequency band.
In optical networks, optical frequency bands are used in accordance with the Dense Wavelength Division Multiplexing (DWDM) system standardized by the Telecommunication Standardization sector of the International Telecommunication Union (ITU-T). In the DWDM system, the entire available optical frequency band is divided into narrow segments by a grid with constant width, called a wavelength grid, and optical signals in one wavelength channel are allocated within a grid spacing (ITU-T recommendation G.694.1).
In a flexible frequency grid that is standardized by ITU-T recommendation G.694.1, the minimum channel spacing is set at 12.5 GHz instead of 50 GHz used conventionally, and a frequency slot width is variable by 12.5 GHz. This makes it possible to allocate a frequency slot of different widths to each optical path; accordingly, it becomes possible to minimize an optical bandwidth to be allocated to an optical path.
That is to say, the flexible frequency grid enables to allocate an optical bandwidth only as needed. Specifically, for example, it is only necessary in the flexible frequency grid to allocate an optical bandwidth of 12.5 GHz if the required optical bandwidth is equal to 12.5 GHz and to allocate an optical bandwidth of 50 GHz if it is equal to 50 GHz. In contrast, in a fixed grid before the introduction of the flexible frequency grid, if the frequency slot width is set at 50 GHz, an optical bandwidth of 50 GHz is allocated equally to each optical path regardless of a required optical bandwidth. Even though a required optical bandwidth is 12.5 GHz, for example, the optical bandwidth to be allocated is 50 GHz; accordingly, a bandwidth by 37.5 GHz is allocated in vain. In contrast, the flexible frequency grid makes it possible to reduce such unnecessary allocation of the bandwidth, so it enables the optical frequency band usage efficiency to improve.
However, even though the flexible frequency grid is used, an unused frequency region can arise, and a fragmentation of the optical bandwidth allocation may arise. It is considered that an optical path with four slots in width is intended to be generated and there are ten empty slots as a whole in the optical frequency band of an optical fiber, for example. If the ten empty slots are composed of five pairs of empty slots each of which includes two consecutive slots, it is impossible to generate an optical path with four slots in width. That is to say, despite the fact that there are sufficient empty slots in total, it is impossible to secure consecutive empty slots because the respective empty slots are disposed in fragments. As a result, the situation may occur where it is impossible to allocate to an optical path a wide optical bandwidth with which high-capacity or long-distance communications can be achieved. This is called a fragmentation of an optical frequency, which is made easier to arise as the center optical frequency of the optical path or the number of slots of the optical bandwidth is changed more repeatedly.
Patent Literature 1 discloses a technology to solve the above-mentioned problem that the fragmentation of the optical frequency arises.
In a method for eliminating the fragmentation of an optical spectrum in an optical network described in Patent Literature 1, first, optical signals are allocated to a plurality of frequency slots. This allocation is performed based on a first-fit algorithm of searching first unoccupied consecutive frequency slots closest to a selected frequency slot. In this case, a frequency slot dependency map is created based on the allocation of a plurality of optical signals to a plurality of frequency slots. The frequency slot dependency map relates groups including one or more frequency slots allocated to different optical signals interdependently.
If an optical signal departure event that an optical signal is dropped from an optical network occurs, a frequency slot occupied by the optical signal is released as a result. The optical signal departure event and the release of frequency slots cause fragmentation of the optical spectrum of the optical network.
In the method for eliminating fragmentation of optical spectrum described in Patent Literature 1, the fragmentation of the optical spectrum is eliminated by reallocating optical signals to different frequency slots based on the frequency slot dependency map. That is to say, by using the frequency slot dependency map after an optical signal departure event, frequency slots of one or more optical signals depending on a frequency slot of a dropped optical signal are determined. Based on that information, an optical signal is reallocated to a frequency slot released by the departure of the dropped optical signal (defragmentation).
There are related technologies described in Patent Literature 2 and Patent Literature 3.
| |
The studios are the places where light and dark areas can be arranged by controlling the light. Education programs are usually conducted in these controlled environments, ie in studios. The program made at the studio is a static program by its structure. Fluent content is not enough to get rid of being static. In addition to this, the format must also be designed correctly. Studio education programs' decor design includes lighting, color, perspective, front and end credits, illustrations and animation. In other words, all the technical and aesthetic components such as space, material, lighting, colour, perspective and graphic make up the decor. These components should be designed to provide an attractive and aesthetic visual. The decor design should represent the basic idea of the program, should be designed in relation to the program content, and make the program's basic idea visible in all aspects. Lighting makes the decor visible, adds the third dimension to the image and creates meaning and atmosphere. The correct and effective use of lighting is important to contribute to the visual and aesthetic integrity of the program. In this study, the decor designs of two different educational programs from Open Education Faculty are examined.
Open and dıstance educatıon program, decor design, environment, lighting, colour, chart, studio.
By subscribing to E-Newsletter, you can get the latest news to your e-mail. | http://kesitakademi.com/index.jsp?mod=makale_ing_ozet&makale_id=1252 |
S'pore had more such attacks than any other country in Asia-Pacific last year: Report
Microsoft has warned that Singapore suffered from more drive-by download attacks than any other country in the Asia-Pacific region last year.
In these attacks, hackers install malware on their unsuspecting victims' computers.
The tech giant released its annual security threat report yesterday.
It said that although the region saw a 27 per cent decline in these drive-by download attacks - in which malware is unwittingly downloaded when a user visits a website or fills in a form - Singapore recorded a more than twofold increase of such attacks last year.
Compared with 2018, Singapore experienced a 138.5 per cent rise in these attacks, through which hackers steal passwords or financial information from their victims.
Microsoft's assistant general counsel of its digital crimes unit in Asia, Miss Mary Jo Schrade, said Singapore is an attractive target for these criminals due to its excellent financial standing in the region.
"We usually see cyber criminals launch such attacks to steal financial information or intellectual property, and this is a key reason why regional financial hubs, such as Singapore and Hong Kong, recorded the highest volume of such threats," said Miss Schrade, who is also the unit's regional lead.
These drive-by downloads take place when an unsuspecting user visits - or "drives by" - a website infected with malicious code.
Cyber criminals take advantage of vulnerable or outdated apps, browsers, or even operating systems. Even without the user attempting to click or download anything, the malicious code can get downloaded into the user's device.
Said Miss Schrade: "This unintentional download of the malicious code can result in the exploitation of vulnerabilities in Web browsers, applications or even in the device's operating system. This can be hosted on legitimate websites and it can be difficult for even an experienced user to identify a compromised site from a list of search results."
While such attacks can be hard to detect, users can take several precautions to protect themselves.
Experts advise users to make sure that they install an antivirus program and the latest security updates on their computers, mobile phones, tablets and other similar devices.
TARGETING VULNERABILITIES
This unintentional download of the malicious code can result in the exploitation of vulnerabilities in Web browsers, applications or even in the device's operating system.
The Straits Times
We have been experiencing some problems with subscriber log-ins and apologise for the inconvenience caused. Until we resolve the issues, subscribers need not log in to access ST Digital articles. But a log-in is still required for our PDFs. | |
Nagpo Gujor (The Nine Black Ingredient Compound) is an herbal amulet used in Traditional Tibetan Medicine for energetic protection from external pathogens and contagious diseases. It is worn against the skin and periodically sniffed through the black wrapping, often combined with recitation of Shakyamuni Buddha's mantra (OM MUNI MUNI MAHAMUNI SHAKYAMUNI YE SOHA).
This preparation of Nagpo Gujor was made according to the traditional process, including proper empowerment with ancient healing mantras, by monks at H.E. Dodrupchen Rinpoche's monastery in Sikkim, India. I personally wore one of Dodrupchen Rinpoche's Nagpo Gujor amulets during my five-month clinical residency in Kathmandu, and despite interacting with hundreds of very sick patients per week, I never got sick.
Please note that this product is NEVER to be used internally. This is an amulet, not a pill to be taken internally.
Nagpo Gujor (9-Ingredient Black Amulet)
This pill should be kept dry and it should never be ingested. It's best to replace every 1-2 years to ensure potency of the ingredients. Keep out of the reach of children.
This product is intended for use as a talisman only, and is not intended to prevent, treat, or cure any disease. As always, these statements have not been evaluated by the FDA. | https://www.shrimala.com/product-page/nagpo-gujor |
For the article on the war itself, see World War I.
The causes of World War I, which began in central Europe in July 1914, included many intertwined factors, such as the conflicts and hostility of the four decades leading up to the war. Militarism, alliances, imperialism, and nationalism played major roles in the conflict as well. However, the immediate origins of the war lay in the decisions taken by statesmen and generals during the July Crisis of 1914, casus belli for which was the assassination of Archduke Franz Ferdinand of Austria and his wife by Gavrilo Princip, an irredentist Serb.
The crisis came after a long and difficult series of diplomatic clashes between the Great Powers (Italy, France, Germany, Great Britain, Austria-Hungarian Empire and Russia) over European and colonial issues in the decade before 1914 that had left tensions high. In turn these diplomatic clashes can be traced to changes in the balance of power in Europe since 1867. The more immediate cause for the war was tensions over territory in the Balkans. Austria-Hungary competed with Serbia and Russia for territory and influence in the region and they pulled the rest of the Great Powers into the conflict through their various alliances and treaties.
The topic of the causes of World War I is one of the most studied in all of world history. Scholars have differed significantly in their interpretations of the event.
Contents
- 1 Background
- 2 Overview
- 3 Domestic political factors
- 4 International relations
- 5 Technical/Military Factors
- 6 Specific events
- 7 Historiography
- 8 See also
- 9 References
- 10 Further reading
- 11 External links
Background
From the time of the Balkan Wars, which had increased the size of Serbia, it had been the opinion of leading Austrian officials (most notably the Foreign Minister, Count Leopold von Berchtold) that Austria would have to wage a "preventive war" to greatly weaken or destroy Serbia as a state in order to maintain the dual monarchy which held extensive Serb-populated Balkan territories. Between January 1913 and January 1914, Chief of the General Staff Count Franz Conrad von Hötzendorf advocated a preventive war against Serbia twenty-four times.
Serbia expanded its territory at the expense of the Ottoman Empire and Bulgaria under the terms of the Treaty of Bucharest. Regarding the expansion of Serbia as an unacceptable increase in the power of an unfriendly state and in order to weaken Serbia, the Austrian government threatened war in the autumn of 1912 if Serbs were to acquire a port from the Turks. Austria appealed for German support, only to be rebuffed at first.
In November 1912 Russia, humiliated by its inability to support Serbia during the Bosnian crisis of 1908 or the First Balkan War, announced a major reconstruction of its military.
On November 28, in partial reaction to the Russian move, German Foreign Secretary Gottlieb von Jagow told the Reichstag, the German parliament, that “If Austria is forced, for whatever reason, to fight for its position as a Great Power, then we must stand by her”. As a result, British Foreign Secretary Sir Edward Grey responded by warning Prince Karl Lichnowsky, the German Ambassador in London, that if Germany offered Austria a “blank cheque” for war in the Balkans, then “the consequences of such a policy would be incalculable”. To reinforce this point, R. B. Haldane, the Germanophile Lord Chancellor, met with Prince Lichnowsky to offer an explicit warning that if Germany were to upset the balance of power in Europe by trying to destroy either France or Russia as powers, Britain would have no other choice but to fight the Reich.
With the recently announced Russian military reconstruction and certain British communications, the possibility of war was a prime topic at the German Imperial War Council of 8 December 1912 in Berlin, an informal meeting of some of Germany's top military leadership called on short notice by the Kaiser. Attending the conference were Wilhelm II, Admiral Alfred von Tirpitz - the Naval State Secretary, Admiral Georg Alexander von Müller, the Chief of the German Imperial Naval Cabinet (Marinekabinett), General von Moltke - the Army’s Chief of Staff, Admiral August von Heeringen - the Chief of the Naval General Staff and (probably) General Moriz von Lyncker, the Chief of the German Imperial Military Cabinet. The presence of the leaders of both the German Army and Navy at this War Council attests to its importance. However, Chancellor Theobald von Bethmann-Hollweg and General Josias von Heeringen, the Prussian Minister of War, were not invited.
Wilhelm II called British balance of power principles “idiocy,” but agreed that Haldane’s statement was a “desirable clarification” of British policy. His opinion was that Austria should attack Serbia that December, and if “Russia supports the Serbs, which she evidently does…then war would be unavoidable for us, too,” and that would be better than going to war after Russia completed the massive modernization and expansion of their army that they had just begun. Moltke agreed. In his professional military opinion “a war is unavoidable and the sooner the better”. Moltke “wanted to launch an immediate attack”.
Both Wilhelm II and the Army leadership agreed that if a war were necessary it were best launched soon. Admiral Tirpitz, however, asked for a “postponement of the great fight for one and a half years” because the Navy was not ready for a general war that included Britain as an opponent. He insisted that the completion of the construction of the U-boat base at Heligoland and the widening of the Kiel Canal were the Navy’s prerequisites for war. As the British historian John Röhl has commented, the date for completion of the widening of the Kiel Canal was the summer of 1914. Though Moltke objected to the postponement of the war as unacceptable, Wilhelm sided with Tirpitz. Moltke “agreed to a postponement only reluctantly.”
Historians more sympathetic to the government of Wilhelm II often reject the importance of this War Council as only showing the thinking and recommendations of those present, with no decisions taken. They often cite the passage from Admiral Müller’s diary, which states: “That was the end of the conference. The result amounted to nothing.” Certainly the only decision taken was to do nothing.
Historians more sympathetic to the Entente, such as British historian John Röhl, sometimes rather ambitiously interpret these words of Admiral Müller (an advocate of launching a war soon) as saying that "nothing" was decided for 1912-13, but that war was decided on for the summer of 1914. Röhl is on safer ground when he argues that even if this War Council did not reach a binding decision - which it clearly did not - it did nonetheless offer a clear view of their intentions, or at least their thoughts, which were that if there was going to be a war, the German Army wanted it before the new Russian armaments program began to bear fruit. Entente sympathetic historians such as Röhl see this conference in which "The result amounted to nothing” as setting a clear deadline when a war was to begin, namely the summer of 1914.
With the November 1912 announcement of the Russian Great Military Programme, the leadership of the German Army began clamoring even more strongly for a “preventive war” against Russia. Moltke declared that Germany could not win the arms race with France, Britain and Russia, which she herself had begun in 1911, because the financial structure of the German state, which gave the Reich government little power to tax, meant Germany would bankrupt herself in an arms race. As such, Moltke from late 1912 onwards was the leading advocate for a general war, and the sooner the better.
Throughout May and June 1914, Moltke engaged in an “almost ultimative” demand for a German “preventive war” against Russia in 1914. The German Foreign Secretary, Gottlieb von Jagow, reported on a discussion with Moltke at the end of May 1914:
“Moltke described to me his opinion of our military situation. The prospects of the future oppressed him heavily. In two or three years Russia would have completed her armaments. The military superiority of our enemies would then be so great that he did not know how he could overcome them. Today we would still be a match for them. In his opinion there was no alternative to making preventive war in order to defeat the enemy while we still had a chance of victory. The Chief of the General Staff therefore proposed that I should conduct a policy with the aim of provoking a war in the near future.”
The new French President Raymond Poincaré, who took office in 1913, was favourable to improving relations with Germany. In January 1914 Poincaré became the first French President to dine at the German Embassy in Paris. Poincaré was more interested in the idea of French expansion in the Middle East than a war of revenge to regain Alsace-Lorraine. Had the Reich been interested in improved relations with France before August 1914, the opportunity was available, but the leadership of the Reich lacked such interests, and preferred a policy of war to destroy France. Because of France’s smaller economy and population, by 1913 French leaders had largely accepted that France by itself could never defeat Germany.
In May 1914, Serbian politics were polarized between two factions, one headed by the Prime Minister Nikola Pašić, and the other by the radical nationalist chief of Military Intelligence, Colonel Dragutin Dimitrijević, known by his codename Apis. In that month, due to Colonel Dimitrigjevic’s intrigues, King Peter dismissed Pašić’s government. The Russian Minister in Belgrade intervened to have Pašić’s government restored. Pašić, though he often talked tough in public, knew that Serbia was near-bankrupt and, having suffered heavy casualties in the Balkan Wars and in the suppression of a December 1913 Albanian revolt in Kosovo, needed peace. Since Russia also favoured peace in the Balkans, from the Russian viewpoint it was desirable to keep Pašić in power. It was in the midst of this political crisis that politically powerful members of the Serbian military armed and trained three Bosnian students as assassins and sent them into Austria-Hungary.
OverviewSee also: Assassination of Archduke Franz Ferdinand and July Crisis
Although the chain of events unleashed by the assassination triggered the war, the war's origins go deeper, involving national politics, cultures, economics, and a complex web of alliances and counterbalances that had developed between the various European powers since 1870.
Some of the most important long term or structural causes are:
- The growth of nationalism across Europe
- Unresolved territorial disputes
- Intricate system of alliances
- The perceived breakdown of the balance of power in Europe
- Misperceptions of intent – e.g., the German belief the United Kingdom would remain neutral
- Convoluted and fragmented governance
- Delays and misunderstandings in diplomatic communications
- Arms races of the previous decades
- Previous military planning
- Imperial and colonial rivalry for wealth, power and prestige
- Economic and military rivalry in industry and trade – e.g., Pig War (Serbia)
The various categories of explanation for World War I correspond to different historians' overall methods. Most historians and popular commentators include causes from more than one category of explanation to provide a rounded account of the causes of the war. The deepest distinction among these accounts is that between stories which find it to have been the inevitable and predictable outcome of certain factors, and those which describe it as an arbitrary and unfortunate mistake.
In attributing causes for the war, historians and academics had to deal with an unprecedented flood of memoirs and official documents, released as each country involved tried to avoid blame for starting the war. Early releases of information by governments, particularly those released for use by the "Commission on the Responsibility of the Authors of the War" were shown to be incomplete and biased. In addition some documents, especially diplomatic cables between Russia and France, were found to have been doctored. Even in later decades however, when much more information had been released, historians from the same culture have been shown to come to differing conclusions on the causes of the war.
Domestic political factors
German domestic politics
Left wing parties, especially the Social Democratic Party of Germany (SPD) made large gains in the 1912 German election. German government at the time was still dominated by the Prussian Junkers who feared the rise of these left wing parties. Fritz Fischer famously argued that they deliberately sought an external war to distract the population and whip up patriotic support for the government. Russia was in the midst of a large scale military build-up and reform which was to be completed in 1916-17.
Other authors argue that German conservatives were ambivalent about a war, worrying that losing a war would have disastrous consequences, and even a successful war might alienate the population if it were lengthy or difficult.
French domestic politics
The situation in France was quite different from that in Germany but yielded the same results. More than a century after the French Revolution, there was still a fierce struggle between the left-wing French government and its right-wing opponents, including monarchists and "Bonapartists." A "good old war" was seen by both sides (with the exception of Jean Jaurès) as a way to solve this crisis thanks to a nationalistic reflex. For example, on July 29, after he had returned from the summit in St. Petersburg, President Poincaré was asked if war could be avoided. He is reported to have replied: "It would be a great pity. We should never again find conditions better."
The left-wing government thought it would be an opportunity to implement social reforms (income tax was implemented in July 1914) and the right-wing politicians hoped that their connections with the army's leaders could give them the opportunity to regain power. Russian bribery under Poincaré's careful direction of the French press from July 1912 to 1914 played a role in creating the proper French political environment for the war. Prime Minister and then President Poincaré was a strong hawk. In 1913 Poincaré predicted war for 1914. In 1920 at the University of Paris, thinking back to his own student days, Poincaré remarked "I have not been able to see any reason for my generation living, except the hope of recovering our lost provinces (Alsace-Lorraine; Poincaré was born in Lorraine)."
Changes in Austria
In 1867, the Austrian Empire fundamentally changed its governmental structure, becoming the Dual Monarchy of Austria-Hungary. For hundreds of years, the empire had been run in an essentially feudal manner with a German-speaking aristocracy at its head. However, with the threat represented by an emergence of nationalism within the empire's many component ethnicities, some elements, including Emperor Franz Joseph, decided that a compromise would have to be made in order to preserve the power of the German aristocracy. In 1867, the Ausgleich was agreed upon which made the Magyar elite in Hungary almost equal partners in the government of Austria-Hungary.
This arrangement fostered a tremendous degree of dissatisfaction amongst many in the traditional German ruling classes. Some of them considered the Ausgleich to have been a calamity because it often frustrated their intentions in the governance of Austria-Hungary. For example, it was extremely difficult for Austria-Hungary to form a coherent foreign policy that suited the interests of both the German and Magyar elite.
Throughout the fifty years from 1867 to 1914, it proved difficult to reach adequate compromises in the governance of Austria-Hungary, leading many to search for non-diplomatic solutions. At the same time a form of social Darwinism became popular amongst many in the Austrian half of the government which emphasised the primacy of armed struggle between nations, and the need for nations to arm themselves for an ultimate struggle for survival.
As a result, at least two distinct strains of thought advocated war with Serbia, often unified in the same people.
In order to deal with political deadlock, some reasoned that more Slavs needed to be brought into Austria-Hungary in order to dilute the power of the Magyar elite. With more Slavs, the South Slavs of Austria-Hungary could force a new political compromise in which the Germans would be able to play the Magyars against the South Slavs. Other variations on this theme existed, but the essential idea was to cure internal stagnation through external conquest.
Another fear was that the South Slavs, primarily under the leadership of Serbia, were organizing for a war against Austria-Hungary, and even all of Germanic civilization. Some leaders, such as Conrad von Hötzendorf, argued that Serbia must be dealt with before it became too powerful to defeat militarily.
A powerful contingent within the Austro-Hungarian government was motivated by these thoughts and advocated war with Serbia long before the war began. Prominent members of this group included Leopold von Berchtold, Alexander von Hoyos, and Johann von Forgách. Although many other members of the government, notably Franz Ferdinand, Franz Joseph, and many Hungarian politicians did not believe that a violent struggle with Serbia would necessarily solve any of Austria-Hungary's problems, the hawkish elements did exert a strong influence on government policy, holding key positions.
Samuel R. Williamson has emphasized the role of Austria-Hungary in starting the war. Convinced Serbian nationalism and Russian Balkan ambitions were disintegrating the Empire, Austria-Hungary hoped for a limited war against Serbia and that strong German support would force Russia to keep out of the war and weaken its Balkan prestige.
International relations
ImperialismSee also: New Imperialism
Some scholars have attributed the start of the war to imperialism. Countries such as the United Kingdom and France accumulated great wealth in the late 19th century through their control of trade in foreign resources, markets, territories, and people. Other empires, Germany, Austria-Hungary, Italy, and Russia all hoped to do so as well in economic advantage. Their frustrated ambitions, and British policies of strategic exclusion created tensions. In addition, the limits of natural resources in many European nations began to slowly alter trade balance, and make national industries seek new territories rich in natural resources. Commercial interests contributed substantially to Anglo-German rivalry during the scramble for tropical Africa. This was the scene of sharpest conflict between certain German and British commercial interests. There have been two partitions of Africa. One involved the actual imposition of political boundaries across the continent during the last quarter of the nineteenth century; the other, which actually commenced in the mid-nineteenth century, consisted of the so-called 'business' partition. In southern Africa the latter partition followed rapidly upon the discoveries of diamonds and gold in 1867 and 1886 respectively. An integral part of this second partition was the expansion in the interior of British capital interests, primarily the British South Africa Company and mining companies such as De Beers. After 1886 the Witwatersrand goldfields prompted feverish activity among European as well as British capitalists. It was soon felt in Whitehall that German commercial penetration in particular constituted a direct threat to Britain's continued economic and political hegemony south of the Limpopo. Amid the expanding web of German business on the Rand, the most contentious operations were those of the German-financed N.Z.A.S.M. or Netherlands South African Railway Company, which possessed a railway monopoly in the Transvaal.
Rivalries for not just colonies, but colonial trade and trade routes developed between the emerging economic powers and the incumbent great powers. Although still argued differently according to historical perspectives on the path to war, this rivalry was illustrated in the Berlin-Baghdad Railway, which would have given German industry access to Iraqi oil, and German trade a southern port in the Persian Gulf. A history of this railroad in the context of World War I has arrived to describe the German interests in countering the British Empire at a global level, and Turkey's interest in countering their Russian rivals at a regional level. As stated by a contemporary 'man on the ground' at the time, Jastrow wrote "It was felt in England that if, as Napoleon is said to have remarked, Antwerp in the hands of a great continental power was a pistol leveled at the English coast, Bagdad and the Persian Gulf in the hands of Germany (or any other strong power) would be a 42-centimetre gun pointed at India." On other side, "...public opinion in Germany was feasting on visions of Cairo, Baghdad, and Tehran, and the possibility of evading the British blockade through outlets to the Indian Ocean." Britain's initial strategic exclusion of others from northern access to a Persian Gulf port in the creation of Kuwait by treaty as a protected, subsidized client state showed political recognition of the importance of the issue. If outcome is revealing, by the close of the war this political recognition was re-emphasized in the military effort to capture the railway itself, recounted with perspective in a contemporary history: "On the 26th Aleppo fell, and on the 28th we reached Muslimieh, that junction on the Baghdad railway on which longing eyes had been cast as the nodal point in the conflict of German and other ambitions in the East." The Treaty of Versailles explicitly removed all German ownership thereafter, which without Ottoman rule left access to Mesopotamian and Persian oil, and northern access to a southern port in British hands alone.
Rivalries among the great powers were exacerbated starting in the 1880s by the scramble for colonies which brought much of Africa and Asia under European rule in the following quarter-century, it also created great Anglo-French and Anglo-Russian tensions and crises that prevented a British alliance with either until the early twentieth century. Otto von Bismarck disliked the idea of an overseas empire, but pursued a colonial policy to court domestic political support. This started Anglo-German tensions since German acquisitions in Africa and the Pacific threatened to impinge upon British strategic and commercial interests. Bismarck supported French colonization in Africa because it diverted government attention and resources away from continental Europe and revanchism. In spite of all of Bismarck's deft diplomatic maneuvering, in 1890 he was forced to resign by the new Kaiser (Wilhelm II). His successor, Leo von Caprivi, was the last German Chancellor who was successful in calming Anglo-German tensions. After his loss of office in 1894, German policy led to greater conflicts with the other colonial powers.
The status of Morocco had been guaranteed by international agreement, and when France attempted to greatly expand its influence there without the assent of all the other signatories Germany opposed it prompting the Moroccan Crises, the Tangier Crisis of 1905 and the Agadir Crisis of 1911. The intent of German policy was to drive a wedge between the British and French, but in both cases produced the opposite effect and Germany was isolated diplomatically, most notably lacking the support of Italy despite Italian membership in the Triple Alliance. The French protectorate over Morocco was established officially in 1912.
In 1914, there were no outstanding colonial conflicts, Africa essentially having been claimed fully, apart from Ethiopia, for several years. However, the competitive mentality, as well as a fear of "being left behind" in the competition for the world's resources may have played a role in the decisions to begin the conflict.
Web of alliances
A loose web of alliances around the European nations (many of them requiring participants to agree to collective defense if attacked):
- Treaty of London, 1839, about the neutrality of Belgium
- German-Austrian treaty (1879) or Dual Alliance
- Italy joining Germany and Austria in 1882
- Franco-Russian Alliance (1894)
- The "Entente Cordiale" between Britain and France (1904) which left the northern coast of France undefended, and the separate "entente" between Britain and Russia (1907) forming the Triple Entente
This complex set of treaties binding various players in Europe together before the war sometimes is thought to have been misunderstood by contemporary political leaders. The traditionalist theory of "Entangling Alliances" has been shown to be mistaken; The Triple Entente between Russia, France and the United Kingdom did not in fact force any of those powers to mobilize because it was not a military treaty. Mobilization by a relatively minor player would not have had a cascading effect that could rapidly run out of control, involving every country. The crisis between Austria-Hungary and Serbia could have been a localized issue. This is how Austria-Hungary's declaration of war against Serbia resulted in Britain declaring war on Germany:
- June 28, 1914: Serbian irredentists assassinate Archduke Franz Ferdinand of Austria.
- July 23: Austria-Hungary, following their own secret enquiry, sends an ultimatum to Serbia, containing several very severe demands. In particular, they gave only forty-eight hours within which to comply. Whilst both Great Britain and Russia sympathised with many of the demands, both agreed the timescale was far too short. Both nevertheless advised Serbia to comply.
- July 24: Germany officially declares support for Austria's position.
- July 24: Sir Edward Grey, speaking for the British government, asks that Germany, France, Italy and Great Britain, "who had no direct interests in Serbia, should act together for the sake of peace simultaneously."
- July 25: The Serbian government replies to Austria, and agrees to most of the demands. However, certain demands brought into question her survival as an independent nation. On these points they asked that the Hague Tribunal arbitrate.
- July 25: Russia enters a period preparatory to war and mobilization begins on all frontiers. Government decides on a partial mobilization in principle to begin on July 29.
- July 25: Serbia mobilizes its army; responds to Austro-Hungarian demarché with less than full acceptance; Austria-Hungary breaks diplomatic relations with Serbia.
- July 26: Serbia reservists accidentally violate Austro-Hungarian border at Temes-Kubin.
- July 26: Russia having agreed to stand aside whilst others conferred, a meeting is organised to take place between ambassadors from Great Britain, Germany, Italy and France to discuss the crisis. Germany declines the invitation.
- July 27: Sir Edward Grey meets the German ambassador independently. A telegram to Berlin after the meeting states "Other issues might be raised that would supersede the dispute between Austria and Serbia…as long as Germany would work to keep peace I would keep closely in touch."
- July 28: Austria-Hungary, having failed to accept Serbia's response of the 25th, declares war on Serbia. Mobilisation against Serbia begins.
- July 29: Russian general mobilization is ordered, and then changed to partial mobilization.
- July 29: Sir Edward Grey appeals to Germany to intervene to maintain peace.
- July 29: The British Ambassador in Berlin, Sir Edward Goschen, is informed by the German Chancellor that Germany is contemplating war with France, and furthermore, wishes to send its army through Belgium. He tries to secure Britain's neutrality in such an action.
- July 30: Russian general mobilization is reordered at 5:00 P.M.
- July 31: Austrian general mobilization is ordered.
- July 31: Germany enters a period preparatory to war.
- July 31: Germany sends an ultimatum to Russia, demanding that they halt military preparations within twelve hours.
- July 31: Both France and Germany are asked by Britain to declare their support for the ongoing neutrality of Belgium. France agrees to this. Germany does not respond.
- August 1 (3 A.M.): The King of Great Britain personally telegraphs the Tsar of Russia.
- August 1: French general mobilization is ordered.
- August 1: German general mobilization is ordered.
- August 1: Germany declares war against Russia.
- August 1: The Tsar responds to the king's telegram, stating "I would gladly have accepted your proposals had not the German ambassador this afternoon presented a note to my Government declaring war."
- August 2: Germany and The Ottoman Empire sign a secret treaty. entrenching the Ottoman-German Alliance
- August 3: Germany, after France declines (See Note) its demand to remain neutral, declares war on France. Germany states to Belgium that she would "treat her as an enemy" if she did not allow free passage of German troops across her lands.
- August 3: Britain, expecting German naval attack on the northern French coast, states that Britain would give "all the protection in its powers."
- August 4: Germany invades Belgium according to the modified Schlieffen Plan.
- August 4 (midnight): Having failed to receive notice from Germany assuring the neutrality of Belgium, Britain declares war on Germany.
- August 6: Austria-Hungary declares war on Russia.
- August 23: Japan, honouring the Anglo-Japanese Alliance, declares war on Germany.
Note: French Prime Minister Rene Viviani merely replied to the German ultimatum that "France will act in accordance with her interests." Had the French agreed to remain neutral, the German Ambassador was authorized to ask the French to temporarily surrender the Fortresses of Toul and Verdun as a guarantee of neutrality.
Arms Race
As David Stevenson has put it, "A self-reinforcing cycle of heightened military preparedness…was an essential element in the conjuncture that led to disaster…The armaments race…was a necessary precondition for the outbreak of hostilities". David Herrmann goes further, arguing that the fear that "windows of opportunity for victorious wars" were closing, "the arms race did precipitate the First World War". If Archduke Franz Ferdinand had been assassinated in 1904 or even in 1911, Herrmann speculates, there might have been no war; it was "the armaments race…and the speculation about imminent or preventive wars" which made his death in 1914 the trigger for war.
The naval strength of the powers in 1914 Country Personnel Large
Naval Vessels (Dreadnoughts)
Tonnage Russia 54,000 4 328,000 France 68,000 10 731,000 Britain 209,000 29 2,205,000 TOTAL 331,000 43 3,264,000 Germany 79,000 17 1,019,000 Austria-Hungary 16,000 4 249,000 TOTAL 95,000 21 1,268,000 (Source: Ferguson 1999, p. 85)
Some historians see the German naval build-up as the principal cause of deteriorating Anglo-German relations.
The overwhelming British response, however, proved to Germany that its efforts were unlikely to equal the Royal Navy. In 1900, the British had a 3.7:1 tonnage advantage over Germany; in 1910 the ratio was 2.3:1 and in 1914, 2.1:1. Ferguson argues that "so decisive was the British victory in the naval arms race that it is hard to regard it as in any meaningful sense a cause of the First World War". This ignores the fact that the Kaiserliche Marine had narrowed the gap by nearly half, and that the Royal Navy had long intended to be stronger than any two potential opponents; the United States Navy was in a period of growth, making the German gains very ominous. Technological changes, with oil- rather than coal-fuelled ships, decreasing refuelling time while increasing speed and range, and with superior armour and artillery also would favour the growing and newer German fleet.
The Russian Tsar had originally proposed The Hague peace conference of 1899 and the second conference of 1907 for the purpose of disarmament, which was supported by all the signatories except for Germany. Germany also did not want to agree to binding arbitration and mediation. The Kaiser was concerned that the United States would propose disarmament measures, which he opposed.Main article: World War I naval arms race
Motivated by Wilhelm II’s enthusiasm for an expanded German navy, Grand Admiral Alfred von Tirpitz championed four Fleet Acts from 1898 to 1912 and from 1903[dubious ] to 1910, the Royal Navy embarked on its own massive expansion to keep ahead of the Germans. This competition came to focus on the revolutionary new ships based on the Dreadnought, which was launched in 1906.
In 1913, there was intense internal debate about new ships due to the growing influence of John Fisher's ideas and increasing financial constraints. It is now generally accepted by historians that in early-mid 1914 the Germans adopted a policy of building submarines instead[dubious ] of new dreadnoughts and destroyers, effectively abandoning the two power standard, but kept this new policy secret so that other powers would be delayed in following suit.
Although the naval race as such was abandoned by the Germans before the war broke out, it had been one of the chief factors in the United Kingdom joining the Triple Entente and therefore important in the formation of the alliance system as a whole.
Technical/Military Factors
Over by Christmas
Both sides believed, and publicly stated, that the war would end soon. The Kaiser told his troops that they would be "home before the leaves have fallen from the trees", and one German officer stated that he expected to be in Paris by Sedantag, about six weeks away; the country only stockpiled enough potassium nitrate for gunpowder for six months. Russian officers similarly expected to be in Berlin in six weeks, and those who suggested that the war would last for six months were considered pessimists. Von Moltke and his French counterpart Joseph Joffre were among the few who expected a long war, but neither adjusted his nation's military plans for such an event; the new British Secretary of State for War Lord Kitchener was the only leading official on either side to both expect a long war ("three years" or longer, he told an amazed colleague) and act accordingly, immediately building an army of millions of soldiers who would fight for years.:158-159
Some authors such as Niall Ferguson argue that the belief in a swift war has been greatly exaggerated since the war. He argues that the military planners, especially in Germany, were aware of the potential for a long war, as shown by the Willy-Nicky telegraphic correspondence between the emperors of Russia and Germany. He also argues that most informed people considered a swift war unlikely. However, it was in the belligerent governments' interests to convince their populaces that the war would be brief through skillful use of propaganda, since such a message encouraged men to join the offensive, made the war seem less serious and promoted general high spirits.
Primacy of the offensive and war by timetableSee also: Cult of the offensive
Military theorists of the time generally held that seizing the offensive was extremely important. This theory encouraged all belligerents to strike first in order to gain the advantage. The window for diplomacy was shortened by this attitude. Most planners wanted to begin mobilization as quickly as possible to avoid being caught on the defensive.
Some historians assert that mobilization schedules were so rigid that once it was begun, they could not be cancelled without massive disruption of the country and military disorganization and so diplomatic overtures conducted after the mobilizations had begun were ignored. However in practice these timetables were not always decisive. The Tsar ordered general mobilization canceled on July 29 despite his chief of staff's objections that this was impossible. A similar cancellation was made in Germany by the Kaiser on August 1 over the same objections, although in theory Germany should have been the country most firmly bound by its mobilization schedule. Barbara Tuchman offers another explanation in the Guns of August—that the nations involved were concerned about falling behind their adversaries in mobilization. According to Tuchman, war pressed against every frontier. Suddenly dismayed, governments struggled and twisted to fend it off. It was no use. Agents at frontiers were reporting every cavalry patrol as a deployment to beat the mobilization gun. General staffs, goaded by their relentless timetables, were pounding the table for the signal to move lest their opponents gain an hour's head start. Appalled upon the brink, the chiefs of state who would be ultimately responsible for their country's fate attempted to back away but the pull of military schedules dragged them forward.
von Schlieffen Plan
Germany's strategic vulnerability, sandwiched between its allied rivals, led to the development of the audacious (and incredibly expensive) Schlieffen Plan. Its aim was to knock France instantly out of contention, before Russia had time to mobilize its gigantic human reserves. It aimed to accomplish this task within 6 weeks. Germany could then turn her full resources to meeting the Russian threat. Although Count Alfred von Schlieffen initially conceived the plan before his retirement in 1906, Japan's defeat of Russia in the Russo-Japanese War of 1904 exposed Russia's organizational weakness and added greatly to the plan's credibility.
The plan called for a rapid German mobilization, sweeping through the Netherlands, Luxembourg, and Belgium, into France. Schlieffen called for overwhelming numbers on the far right flank, the northernmost spearhead of the force with only minimum troops making up the arm and axis of the formation as well as a minimum force stationed on the Russian eastern front.
Schlieffen was replaced by Helmuth von Moltke, and in 1907–08 Moltke adjusted the plan, reducing the proportional distribution of the forces, lessening the crucial right wing in favor of a slightly more defensive strategy. Also, judging Holland unlikely to grant permission to cross its borders, the plan was revised to make a direct move through Belgium and an artillery assault on the Belgian city of Liège. With the rail lines and the unprecedented firepower the German army brought, Moltke did not expect any significant defense of the fortress.
The significance of the Schlieffen Plan is that it forced German military planners to prepare for a pre-emptive strike when war was deemed unavoidable; otherwise Russia would have time to mobilize, and Germany would be crushed by Russia's massive army. On August 1, Kaiser Wilhelm II briefly became convinced that it might be possible to ensure French and British neutrality and cancelled the plan despite the objections of the Chief of Staff that this could not be done and resuming it only when the offer of a neutral France and Britain was withdrawn.
It appears that no war planners in any country had prepared effectively for the Schlieffen Plan. The French were not concerned about such a move because they were confident that their offensive, Plan XVII, would break the German center and cut off the German right wing moving through Belgium and because German forces were expected to be tied down by an early Russian offensive in East Prussia.
British security issues
In explaining why neutral Britain went to war with Germany, Paul Kennedy, in The Rise of the Anglo-German Antagonism, 1860-1914, claimed that it was critical for war that Germany become economically more powerful than Britain, but he downplayed the disputes over economic trade imperialism, the Baghdad Railway, confrontations in Eastern Europe, high-charged political rhetoric and domestic pressure-groups. Germany's reliance time and again on sheer power, while Britain increasingly appealed to moral sensibilities, played a role, especially in seeing the invasion of Belgium as a necessary military tactic or a profound moral crime. The German invasion of Belgium was not important because the British decision had already been made and the British were more concerned with the fate of France. Kennedy argues that by far the main reason was London's fear that a repeat of 1870—when Prussia and the German states smashed France—would mean Germany, with a powerful army and navy, would control the English Channel, and northwest France. British policy makers insisted that would be a catastrophe for British security.
Specific events
Franco–Prussian War (1870–1871)
Many of the direct origins of World War I can be seen in the results and consequences of the Franco-Prussian War. This conflict brought the establishment of a powerful and dynamic Germany, causing what was seen as a displacement or unbalancing of power: this new and prosperous nation had the industrial and military potential to threaten Europe, and particularly the already established European powers. Germany’s nationalism, its natural resources, its economic strengths and its ambitions sparked colonial and military rivalries with other nations, particularly the Anglo-German naval arms race.
A legacy of animosity grew between France and Germany following the German annexation of parts of the formerly French territory of Alsace-Lorraine. The annexation caused widespread resentment in France, giving rise to the desire for revenge, known as revanchism. French sentiments wanted to avenge military and territorial losses, and the displacement of France as the pre-eminent continental military power. French defeat in the war had sparked political instability, culminating in a revolution and the formation of the French Third Republic. Bismarck was wary of this during his later years and tried to placate the French by encouraging their overseas expansion. However, anti-German sentiment remained. A Franco–German colonial entente that was made in 1884 in protest of an Anglo–Portuguese agreement in West Africa proved short-lived after a pro-imperialist government under Jules Ferry in France fell in 1885.
War in Sight crisis
France quickly recovered from its defeat in the Franco-Prussian war. France paid its war remunerations and began to build its military strength again. Bismarck allowed the idea that Germany was planning a preventative war against France to be leaked through a German newspaper so that this recovery could not be realized. However, the Dreikaiserbund sided with France rather than with Germany, forcing Bismarck to back down.
Austrian-Serbian tensions and Bosnian Annexation CrisisMain articles: May Overthrow, Pig War (Serbia), and Bosnian crisis
On night between June 10/11 1903, a group of Serbian officers assassinated unpopular King Alexander I of Serbia. The Serbian parliament elected Peter Karađorđević as the new king of Serbia. The consequence of this dynastic change had Serbia relying on Russia and France rather than on Austria-Hungary, as had been the case during rule of Obrenović dynasty. Serbian desire to relieve itself of Austrian influence provoked the Pig War, an economic conflict, from which Serbia eventually came out as the victor.
Austria-Hungary, desirous of solidifying its position in Bosnia-Herzegovina, annexed the provinces on October 6, 1908. The annexation set off a wave of protests and diplomatic maneuvers that became known as the Bosnian crisis, or annexation crisis. The crisis continued until April 1909, when the annexation received grudging international approval through amendment of the Treaty of Berlin. During the crisis, relations between Austria-Hungary, on the one hand, and Russia and Serbia, on the other, were permanently damaged.
After an exchange of letters outlining a possible deal, Russian Foreign Minister Alexander Izvolsky and Austro-Hungarian Foreign Minister Alois Aehrenthal met privately at Buchlau Castle in Moravia on September 16, 1908. At Buchlau the two agreed that Austria-Hungary could annex the Ottoman provinces of Bosnia and Herzegovina, which Austria-Hungary occupied and administered since 1878 under a mandate from the Treaty of Berlin. In return, Austria-Hungary would withdraw its troops from the Ottoman Sanjak of Novibazar and support Russia in its efforts to amend the Treaty of Berlin to allow Russian war ships to navigate the Straits of Constantinople during times of war. The two jointly agreed not to oppose Bulgarian independence.
While Izvolsky moved slowly from capital to capital vacationing and seeking international support for opening the Straits, Bulgaria and Austria-Hungary moved swiftly. On October 5, Bulgaria declared its independence from the Ottoman Empire. The next day, Austria-Hungary annexed Bosnia-Herzegovina. On October 7, Austria-Hungary announced its withdrawal from the Sanjak of Novi Pazar. Russia, unable to obtain Britain's assent to Russia's Straits proposal, joined Serbia in assuming an attitude of protest. Britain lodged a milder protest, taking the position that annexation was a matter concerning Europe, not a bilateral issue, and so a conference should be held. France fell in line behind Britain. Italy proposed that the conference be held in Italy. German opposition to the conference and complex diplomatic maneuvering scuttled the conference. On February 20, 1909, the Ottoman Empire, acquiesced to the annexation and received ₤2.2 million from Austria-Hungary.
Austria-Hungary began releasing secret documents in which Russia, since 1878, had repeatedly stated that Austria-Hungary had a free hand in Bosnia-Herzegovina and the Sanjak of Novibazar. At the same time, Germany stated it would only continue its active involvement in negotiations if Russia accepted the annexation. Under these pressures, Russia agreed to the annexation, and persuaded Serbia to do the same. The Treaty of Berlin then was amended by correspondence between capitals from April 7 to April 19, 1909, to reflect the annexation.
The Balkan Wars (1912–1913)Main articles: First Balkan War and Second Balkan War
The Balkan Wars in 1912-1913 led to increased international tension between Russia and Austria as well as a strengthening of Serbia and a weakening of Turkey and Bulgaria which might otherwise have kept Serbia in check thus disrupting the balance of power in Europe in favor of Russia.
Russia initially agreed to avoid territorial changes, but later in 1912 supported Serbia's demand for an Albanian port. An international conference was held in London in 1912-1913 where it was agreed to create an independent Albania, however both Serbia and Montenegro refused to comply. After an Austrian, and then an international naval demonstration in early 1912 and Russia's withdrawal of support Serbia backed down. Montenegro was not as compliant and on May 2, the Austrian council of ministers met and decided to give Montenegro a last chance to comply and, if it would not, then to resort to military action. However, seeing the Austrian military preparations, the Montenegrins requested the ultimatum be delayed and complied.
The Serbian government, having failed to get Albania, now demanded that the other spoils of the First Balkan War be reapportioned and Russia failed to pressure Serbia to back down. Serbia and Greece allied against Bulgaria, which responded with a preemptive strike against their forces beginning the Second Balkan War. The Bulgarian army crumbled quickly when Turkey and Romania joined the war.
The Balkan Wars strained the German/Austro-Hungarian alliance. The attitude of the German government to Austrian requests of support against Serbia was initially both divided and inconsistent. After the German Imperial War Council of 8 December 1912, it was clear that Germany was not ready to support Austria-Hungary in a war against Serbia and her likely allies.
In addition, German diplomacy before, during, and after the Second Balkan War was pro-Greek and pro-Romanian and in opposition with Austria-Hungary's increasingly pro-Bulgarian views. The result was tremendous damage to Austro-German relations. Austrian foreign minister Leopold von Berchtold remarked to German ambassador Heinrich von Tschirschky in July 1913 that "Austria-Hungary might as well belong ‘to the other grouping’ for all the good Berlin had been".
In September 1913, it was learned that Serbia was moving into Albania and Russia was doing nothing to restrain it while the Serbian government would not guarantee to respect Albania's territorial integrity and suggested there would be some frontier modifications. In October 1913, it was decided by the council of ministers that Serbia be sent a warning followed by an ultimatum, that Germany and Italy be notified that there would be some action and asked for support, and that spies be sent to ascertain if there was an actual withdrawal. Serbia responded to the warning with defiance and the Ultimatum was dispatched on October 17 and received the following day demanding that Serbia evacuate Albanian territory within eight days. Serbia complied, and the Kaiser made a congratulatory visit to Vienna to try to fix some of the damage done earlier in the year.
The conflicts demonstrated that a localized war in the Balkans could alter the balance of power without provoking general war and reinforced the attitude in the Austrian government. This attitude had been developing since the Bosnian annexation crisis that ultimatums were the only effective means of influencing Serbia and that Russia would not back its refusal with force. They also dealt catastrophic damage to the Habsburg economy.
HistoriographyMain article: Historiography of the Causes of World War I
During the period immediately following the end of hostilities, Anglo-American historians argued that Germany was solely responsible for the start of the war. However, academic work in the English-speaking world in the later 1920s and 1930s blamed participants more equally.
Since 1960, the tendency has been to reassert the guilt of Germany, i.e., “The Berlin War Party,” although some historians have argued for shared guilt or pointed to the Entente.
See also
- American entry into World War I
- Causes of World War II
- European Civil War
- History of the Balkans
References
- ^ Henig, Ruth B. (2002). The origins of the First World War. London: Routledge. ISBN 0-415-26205-4.
- ^ Lieven, D. C. B. (1983). Russia and the origins of the First World War. New York: St. Martin's Press. ISBN 0-312-69608-6.
- ^ a b c Fromkin, David. Europe's last summer: who started the Great War in 1914?. New York : Knopf : 2004.. p. 102. ISBN 978-0375411564.
- ^ a b c d e f g h i j k l m n o p Fromkin, David. Europe's last summer: who started the Great War in 1914?. New York : Knopf : 2004.. pp. 88–92. ISBN 978-0375411564.
- ^ The Kaiser and His Court: Wilhelm II and the Government of Germany by John C. G. Röhl; Translated by Terence F. Cole, Cambridge University Press; 288 pages. p. 257.
- ^ a b c d e f g h i j k Röhl, John C G. 1914: Delusion or Design. Elek. pp. 29–32. ISBN 0236154664.
- ^ a b Fromkin, David. Europe's last summer: who started the Great War in 1914?. New York : Knopf : 2004.. pp. 80–82. ISBN 978-0375411564.
- ^ Howard, Michael “Europe on the Eve of the First World War’ pages 21-34 from The Outbreak of World War I edited by Holger Herwig, Boston: Houghton Mifflin, 1997 page 26
- ^ a b c d e Fromkin, David. Europe's last summer: who started the Great War in 1914?. New York : Knopf : 2004.. pp. 124–25. ISBN 978-0375411564.
- ^ Dedijer, Vladimir. The Road to Sarajevo, Simon and Schuster, New York, 1966, p 398
- ^ Van Evera, Stephen. "The Cult of the Offensive and the Origins of the First World War." (Summer 1984), p. 62.
- ^ Fischer, Fritz. "War of Illusions: German Policies from 1911 to 1914." trans. (1975), p. 69.
- ^ Sagan, Scott D. 1914 Revisited: Allies, Offense, and Instability (1986)
- ^ Albertini (1965) page viii
- ^ * Fischer, Fritz Germany's Aims In the First World War, W. W. Norton; 1967 ISBN 0-393-05347-4
- ^ a b Ferguson, Niall The Pity of War Basic Books, 1999 ISBN 0-465-05712-8
- ^ Michael Balfour, The Kaiser and his Times, Houghton Mifflin (1964) p. 434
- ^ Owen, Robert Latham. The Russian Imperial Conspiracy, 1892-1914, A and C Boni, New York, 1927, pp 78-81
- ^ Albertini, Luigi. Origins of the War of 1914, Oxford University Press, London, 1953, Vol II, pg. 197
- ^ Owen, Robert Latham. The Russian Imperial Conspiracy, 1892-1914, A and C Boni, New York, 1927, pp 93
- ^ Wank, Soloman (1997). "The Habsburg Empire". In Karen Barkey and Mark von Hagen. After Empire: Multiethnic Societies and Nation-Building. Oxford: Oxford University Press.
- ^ Garland, John (1997). "The Strength of the Austro-Hungarian Monarchy in 1914 (Part 1)". New Perspective. http://www.users.globalnet.co.uk/~semp/strength1.htm. Retrieved May 15, 2010.
- ^ Williamson, Samuel R. (1991). Austria-Hungary and the Origins of the First World War. St. Martin's Press. p. 15. ISBN 0-312-05239-1.
- ^ Bridge, F.R. (2002). "The Foreign Policy of the Monarchy". In Mark Cornwall. The Last years of Austria-Hungary. Exeter: University of Exeter Press. p. 26.
- ^ Fellner, Fritz (1995). "Austria-Hungary". In Keith Wilson. Decisions for War. New York: St. Martin's Press.
- ^ a b Leslie, John (1993). Elisabeth Springer and Leopold Kammerhofer. ed. "The Antecedents of Austria-Hungary’s War Aims". Wiener Beiträge zur Geschichte der Neuzeit 20: 307–394.
- ^ Sked, Alan (1989). The Decline and Fall of the Habsburg Empire 1815-1918. Burnt Mill: Longman Group. p. 254.
- ^ Williamson, Samuel R. (1991). Austria-Hungary and the Origins of the First World War. St. Martin's Press. ISBN 0-312-05239-1.
- ^ Bukharin, N., (1972), Imperialism and World Economy, (London).
- ^ Sean McMeekin, 'The Berlin-Baghdad Express: The Ottoman Empire and Germany's bid for world power. 2010, ISBN 978-0-674-05739-5
- ^ Jastrow, 1917. page 97 in 'The War and the Bagdad Railway'
- ^ AF Pollard, 1919. 'A Short History of the Great War' accessible at
- ^
- ^ Pollard, 1919. 'A Short History of the Great War' chapter 19, p204. available at
- ^ How War Came About Between Great Britain and Germany; H E Legge
- ^ Albertini, Luigi. Origins of the War of 1914, Oxford University Press, London, 1953, Vol II pp 461-462, 465
- ^ The Treaty of Alliance Between Germany and Turkey August 2, 1914
- ^ a b Taylor, A. J. P. (1954). The Struggle For Mastery In Europe 1848-1918. Oxford University Press. p. 524. ISBN 0-19-881270-1.
- ^ Ferguson 1999, p. 82.
- ^ Ferguson 1999, pp. 83–85.
- ^ Lambert, Nicholas A. "British Naval Policy, 1913-1914: Financial Limitation and Strategic Revolution" The Journal of Modern History, 67, no.3 (1995), pages 623-626.
- ^ Tuchman, Barbara (1962). The Guns of August. New York: Random House.
- ^ Taylor, A. J. P. "War by Timetable: How the First World War Began" (London, 1969)
- ^ Trachtenberg, Marc "The Meaning of Mobilization in 1914" International Security Vol. 15, No. 3 (1990-1991), 141.
- ^ a b Stevenson, David "War by Timetable? The Railway Race before 1914" Past and Present, 162 (1999), 192. Also see Williamson Samuel R. Jr. and Ernest R. May "An Identity of Opinion: Historians and July 1914" The Journal of Modern History 79, (June 2007), 361-362, or Trachtenberg, Marc "The Meaning of Mobilization in 1914" International Security Vol. 15, No. 3 (1990-1991), 140-141.
- ^ Tuchman, Barbara (1962). The Guns of August. New York: Macmillan. p. 72. ISBN 627515.
- ^ Kennedy, Paul The Rise of the Anglo-German Antagonism, 1860-1914, Allen & Unwin, 1980 ISBN 0-04-940060-6, pp 457–62.
- ^ Paul M. Kennedy, The Rise of the Anglo-German Antagonism, 1860-1914 (1980) pp 464-70
- ^ Albertini, Luigi. Origins of the War of 1914, Enigma Books, New York, 2005, Vol I, p 218-219
- ^ Albertini, Luigi. Origins of the War of 1914, Enigma Books, New York, 2005, Vol I, p 277
- ^ Albertini, Luigi. Origins of the War of 1914, Enigma Books, New York, 2005, Vol I, p 287
- ^ Williamson, Samuel R. Jr., Austria-Hungary and the Origins of the First World War, 125-140.
- ^ Williamson, Samuel R. Jr., Austria-Hungary and the Origins of the First World War, 143-145.
- ^ Williamson, Samuel R. Jr., Austria-Hungary and the Origins of the First World War, 147-149.
- ^ Williamson, Samuel R. Jr., Austria-Hungary and the Origins of the First World War, 151-154.
Further reading
- Albertini, Luigi. The Origins of the War of 1914, trans. Isabella M. Massey, 3 vols., London, Oxford University Press, 1952
- Barnes, Harry Elmer The Genesis Of The World War; An Introduction To The Problem Of War Guilt, New York, Knopf, 1929 OCLC 3300340
- Barnes, Harry Elmer In Quest Of Truth And Justice: De-bunking The War Guilt Myth, New York: Arno Press, 1972 ,1928 ISBN 0-405-00414-1
- Carter, Miranda Three Emperors: Three Cousins, Three Empires and the Road to the First World War. London, Penguin, 2009. ISBN 978-0-670-91556-9
- Engdahl, F.William, A Century of War: Anglo-American Oil Politics and the New World Order (1994) ISBN 0-7453-2310-3
- Evans, R. J. W. and Hartmut Pogge Von Strandman, eds. The Coming of the First World War (1990), essays by scholars from both sides ISBN 0-19-822899-6
- Fay, Sidney The Origins Of The World War, New York: Macmillan, 1929, 1928 OCLC 47080822.
- Ferguson, Niall The Pity of War Basic Books, 1999 ISBN 0-465-05712-8
- Fischer, Fritz From Kaiserreich to Third Reich: Elements of Continuity in German history, 1871-1945, Allen & Unwin, 1986 ISBN 0-04-943043-2
- Fischer, Fritz. Germany's Aims In the First World War, W. W. Norton; 1967 ISBN 0-393-05347-4
- Fischer, Fritz. War of Illusions:German policies from 1911 to 1914 Norton, 1975 ISBN 0-393-05480-2
- French Ministry of Foreign Affairs, The French Yellow Book: Diplomatic Documents (1914)
- Hawk, Mike Europe's Last Summer: Who Started The Great War in 1914?, Knopf 2004 ISBN 0-375-41156-9
- Gilpin, Robert. War and Change in World Politics Cambridge University Press, 1981 ISBN 0-521-24018-2
- Hamilton, Richard and Herwig, Holger. Decisions for War, 1914-1917 Cambridge University Press, 2004 ISBN 0-521-83679-4
- Henig, Ruth The Origins of the First World War (2002) ISBN 0-415-26205-4
- Hillgruber, Andreas Germany and the Two World Wars, Harvard University Press, 1981 ISBN 0-674-35321-8
- Rolf Hobson. Imperialism at Sea: Naval Strategic Thought, the Ideology of Sea Power, and the Tirpitz Plan (2002) ISBN 0-391-04105-3
- Joll, James. The Origins of the First World War (1984) ISBN 0-582-49016-2
- Keiger, John F.V. France and the Origins of the First World War, St. Martin's Press, 1983 ISBN 0-312-30292-4
- Kennedy, Paul The Rise of the Anglo-German Antagonism, 1860-1914, Allen & Unwin, 1980 ISBN 0-04-940060-6.
- Kennedy, Paul M. (ed.). The War Plans of the Great Powers, 1880-1914. (1979) ISBN 0-04-940056-8
- Knutsen, Torbjørn L. The Rise and Fall of World Orders Manchester University Press, 1999 ISBN 0-7190-4057-4
- Kuliabin A. Semin S.Russia - a counterbalancing agent to the Asia. “Zavtra Rossii”, #28, 17 July 1997
- Lee, Dwight E. ed. The Outbreak of the First World War: Who Was Responsible? (1958) OCLC 66082903, readings from, multiple points of view
- Lenin, Imperialism, the Highest Stage of Capitalism Progress Publishers, Moscow, (1978)
- Leslie, John (1993). “The Antecedents of Austria-Hungary’s War Aims,” Wiener Beiträge zur Geschichte der Neuzeit Elisabeth Springer and Leopold Kammerhofer (Eds.), 20: 307-394.
- Leuer, Eric A. Die Mission Hoyos. Wie österreichisch-ungarische Diplomaten den ersten Weltkrieg begannen, Centaurus Verlag, Freiburg i.Br., 2011 ISBN 978-3862260485
- Lieven, D.C.B Russia and the Origins of the First World War, St. Martin's Press, 1983 ISBN 0-312-69608-6
- Sean M. Lynn-Jones, and Stephen Van Evera (eds.) Military Strategy and the Origins of the First World War (2nd ed., Princeton UP, 1991) ISBN 0-691-02349-2
- Mayer, Arno The Persistence of the Old Regime: Europe to the Great War Croom Helm, 1981 ISBN 0-394-51141-7
- Pollard, A.F. 1919. 'A Short History of the Great War' accessible at
- Ponting, Clive (2002). Thirteen Days. Chatto & Windus.
- Remak, Joachim The Origins of World War I, 1871-1914, 1967 ISBN 0-03-082839-2
- Ritter, Gerhard “Eine neue Kriegsschuldthese?” pages 657-668 from Historische Zeitschrift Volume 194, June 1962, translated into English as “Anti-Fischer: A New War-Guilt Thesis?” pages 135-142 from The Outbreak of World War One: Causes and Responsibilities, edited by Holger Herwig, 1997
- Schroeder, Paul W. (2000) Embedded Counterfactuals and World War I as an Unavoidable War (PDF file)
- Snyder, Jack. “Civil—Military Relations and the Cult of the Offensive, 1914 and 1984,” International Security 9 #1 (1984)
- Steiner, Zara Britain and the Origins of the First World War Macmillan Press, 1977 ISBN 0-312-09818-9
- Stevenson, David. Cataclysm: The First World War As Political Tragedy (2004) major reinterpretation ISBN 0-465-08184-3
- Stevenson, David. The First World War and International Politics (2005)
- Strachan, Hew. The First World War: Volume I: To Arms (2004): the major scholarly synthesis. Thorough coverage of 1914; Also: The First World War (2004): a 385pp version of his multivolume history
- Taylor, A.J.P. War by Time-Table: How The First World War Began, Macdonald & Co., 1969 ISBN 0-356-04206-5
- Tuchman, Barbara. The Guns of August, New York. The Macmillan Company, 1962. Describes the opening diplomatic and military manoeuvres.
- Turner, L. C. F. Origins of the First World War, New York: W. W. Norton & Co., 1970. ISBN 0-393-09947-4
- Stephen Van Evera, "The Cult of the Offensive and the Origins of the First World War," in International Security 9 #1 (1984)
- Wehler, Hans-Ulrich The German Empire, 1871-1918, Berg Publishers, 1985 ISBN 0-907582-22-2
- Weikart, Richard, From Darwin to Hitler: Evolutionary ethics, Eugenics and Racism in Germany. 2004 ISBN 1-4039-6502-1
- Williamson, Samuel R. Austria-Hungary and the Origins of the First World War, St. Martin's Press, 1991 ISBN 0-312-05239-1
- Williamson, Jr., Samuel R. and Ernest R. May. "An Identity of Opinion: Historians and July 1914," Journal of Modern History, June 2007, Vol. 79 Issue 2, pp 335–387 in JSTOR comprehensive historiography
External links
Categories:
- Overview of Causes and Primary Sources
- Russia - Getting Too Strong for Germany by Norman Stone
- The Origins of World War One: An article by Dr. Gary Sheffield at the BBC History site.
- Kuliabin A. Semine S. Some of aspects of state national economy evolution in the system of the international economic order.- USSR ACADEMY OF SCIENCES FAR EAST DIVISION INSTITUTE FOR ECONOMIC & INTERNATIONAL OCEAN STUDIES Vladivostok, 1991
- The Evidenc in the Case: A Discussion of the Moral Responsibility for the War of 1914, as Disclosed by the Diplomatic Records of England, Germany, Russia by James M. Beck
- Concept Map of the Causes of WWI
- Causes of war
- Causes of World War I
Wikimedia Foundation. 2010. | https://en-academic.com/dic.nsf/enwiki/11862402 |
More than 1,000 students from seven tribal college and universities participated in #RealCollege Survey
Native American students studying at tribal colleges and universities located in remote, rural, reservation communities experienced food and housing insecurity and homelessness at much greater rates than other college students, according to the Tribal Colleges and Universities #RealCollege Survey report published today. The #RealCollege survey, led by the Hope Center for College, Community, and Justicehttp://hope4college.com/ at Temple University with the support of the American Indian College Fund, the national survey has been an ongoing, five-year effort to research food and housing security of college students nationwide.
The national survey was completed by 1,050 students at seven tribal colleges and universities located in seven states across the Midwest, Southwest, and Great Plains regions to ensure that tribal colleges and universities (TCUs) and agencies and organizations that serve them better understand the basic needs TCU students face.
A remarkable 29% of TCU student survey respondents were homeless at some point in the prior 12 months, almost 62% were food insecure in the prior 30 days, and 69% faced housing insecurity in the prior 12 months. These rates are substantially higher than those observed for non-TCUs. The Hope Center reports that 39% of national survey participants experience food insecurity, 46% experience housing insecurity, and 17% experience homelessness.
Yet despite the significant housing and food insecurity challenges TCU students experienced, they also reported greater academic success as compared to similarly situated students at other institutions. TCU students reported receiving grades of A’s and B’s, with college students at other institutions reporting receiving grades of C’s and lower in previous surveys, according to the report.
Cheryl Crazy Bull, President and CEO of the American Indian College Fund, said, “We are not surprised by the findings of this important study of TCU students’ food and housing insecurities. These experiences reflect the challenges that all our students must overcome to fulfill their dreams of better lives for themselves and their communities. We could despair, but we are committed to continuing our work to bring resources to students and to tribal colleges so these barriers can be removed. We also realize the dramatic rise of Covid 19 and the critical implications for rural, reservation communities makes it even more critical that we help vulnerable students and their families find the resources they need with the support of allies, policy makers, and funders.”
It has long been clear that Native students face the highest rates of inequity in higher education because of systemic and structural barriers. The crisis of basic needs insecurity at Tribal Colleges and Universities, rendered quantitatively visible in this report, deserves immediate attention. We all have a responsibility to act in support of these students, said Dr. Sara Goldrick-Rab, founding director of the Hope Center and the leading expert on basic needs insecurity among college students.
The Tribal Colleges and Universities #RealCollege Survey response rate of 1,050 students represents about 21.4% of the total number of students contacted for the survey, which was higher than the 8.4% national response rate in the fall survey of other institutions, according to the Hope Center.
There are many interconnected reasons TCU students face greater basic needs insecurity than other groups, such as limited economic opportunities in remote, rural reservation communities, a minimum wage that has not kept up with cost of living increases, higher rates of poverty among American Indians and Alaska Natives as compared to other groups, financial aid increases lagging behind the cost of living increases, many students who are parents or are supporting other family members in Native communities where it is tradition for extended families to live together and support one another, and a limited social safety net, to name a few.
You can also download the report from the College Fund’s web site.
About The Hope Center-http://hope4college.com/The Hope Center for College, Community, and Justice is redefining what it means to be a student-ready college with a national movement centering #RealCollege students’ basic needs. We believe that students are humans first. Their basic needs for food, affordable housing, transportation, and childcare, and their mental health are central conditions for learning.
Our projects have a three-part life cycle. First, using rigorous research, we develop and evaluate creative approaches to solving challenges of practice, policy, and public perception. Second, our scientists work closely with thinkers and doers to ensure that effective implementations are enacted and scaled. Third, we spur systemic change by igniting a fire to engage others in taking advantage of what we have learned. Maximum impact is our ultimate goal. | https://collegefund.org/research/new-study-shows-hunger-homelessness-hinder-tcu-students/ |
Upon completion of general education courses, students will have intellectual and practical skills. These skills will be practiced extensively across the general education curriculum and include:
- Written Communication: Develop and express ideas in writing, learning to work in many genres and styles, and with many different writing technologies, and mixing texts, data, and images.
- Quantitative Reasoning: Apply numeric, symbolic and geometric skills to formulate and solve quantitative problems.
- Inquiry & Analysis: Explore issues, objects or works through the collection and analysis of evidence that results in informed conclusions or judgments and break complex topics or issues into parts to gain a better understanding of them.
- Oral communication: Prepare purposeful presentations designed to increase knowledge, to foster understanding, or to promote change in the listeners' attitudes, values, beliefs, or behaviors.
- Critical Thinking: Comprehensive exploration of issues, ideas, artifacts, and events before accepting or formulating an opinion or conclusion.
- Creative Thinking: Combine or synthesize existing ideas, images, or expertise in original ways and the experience of thinking, reacting, and working in an imaginative way characterized by a high degree of innovation, divergent thinking, and risk taking.
- Information Literacy: Know when there is a need for information, to be able to identify, locate, evaluate, and effectively and responsibly use and share that information for the problem at hand.
- Technical literacy: Use, manage, understand, and assess technology.
- Problem solving: Design, evaluate and implement a strategy to answer an open-ended question or achieve a desired goal.
- Teamwork: Belong to teams where effort, manner of interacting with others, and the quantity and quality of contributions are valued. | https://www.csupueblo.edu/general-education-board/gen-ed-student-learning-outcomes.html |
dependent variable (Y) variable you wish to explain or predict.
The primary product of regression analysis is a mathematical equation
which can be used to predict values of the dependent variable,
give the values of the independent variables. Also associated
with regression are measures of precision and accuracy, commonly
referred to hypothesis testing. The method of Ordinary Least Squares
is based upon a number of statistical assumptions such as...
(1) The model is linear in its parameters
(2) The residuals (errors) are homoscedastic (reflect constant
variance)
(3) The residuals are not correlated with one another over time
(4) The independent variables and the residuals from the model
are uncorrelated
(5) The data is derived from a normally distributed population
Problems such as multicollinearity
(extreme correlation) among the explanatory variables cause difficulties
in computing the least squares estimates. The presence of multicollinearity
prevents the mathematical procedure from isolating and measuring
the contribution of each independent variable on the dependent
variable.
Included in the broad category of regression analysis are techniques
like Poisson Regression, Two Stage Least Squares, Three Stage
Least Squares, Logistic Regression, Probit Regression, Tobit Regression,
Zellner Estimation, Almon Polynomial Distributed Lags, Stepwise
Regression, Nonlinear Regression, Weighted Least Squares, and
Factor Analysis. | http://forecastingsolutions.com/ols.html |
Bees in the wild keep leaving their hives after a while. Even with pollen on them, they keep flying away from their nest and with no bees anywhere near me, I have empty bee hives around my world. To watch them leave, make a flat world in creative, place a beehive, and spawn bees and flowers. Eventually they'll leave the nests forever as they wander through the void of land. This bug works in creative and in survival as I saw them leave their hives both in a flat world and in my survival only world.
Attachments
Issue Links
- is duplicated by
-
MCPE-67783 Bees do not climb into the hive
- Resolved
-
MCPE-77170 Bees Lose home and wander. | https://bugs.mojang.com/browse/MCPE-60252 |
The Friends of Twinsburg Parks is a 501(c)(3) organization that actively supports the mission of the Twinsburg Parks & Recreation Commission and the Twinsburg community through fundraising, volunteerism, advocacy, and promotion. We are guided by our shared values—conservation, environmental sustainability, education, community engagement, recreation, health and wellness—to serve, preserve and enhance the Twinsburg community through a vibrant park system.
Acquisition and preservation of open space to ensure the continuation of our natural ecosystem, secure our cultural heritage and develop park facilities.
Construction and maintenance of safe indoor and outdoor facilities for passive and active recreational use. | https://www.friendsoftwinsburgparks.org/about.html |
Looking for press releases, newsletters, press mentions, articles or other stories about what's going on at Harris YMCA. Use the filters below to locate the most recent news about our branch.
News and Press
December 07, 2018
YMCA of Greater Charlotte Announces Investment from Cotty Family to Impact Youth Literacy and Health
Harris YMCA awarded $800,000 by the Cotty family to transform outcomes for Charlotte area youth. | https://www.ymcacharlotte.org/branches/harris/news-press |
The following glossary of technical terms (mostly offices and dignities) is based primarily on definitions given in the Oxford Dictionary of Byzantium, ed. A. P. Kazhdan (New York – Oxford 1991) and in N. Oikonomides, Les listes de préséance byzantines des IXe et Xe siècles (Paris 1972). It is intended as a general guide for the non-specialist user. The handbooks tend to define many offices by talking of the surviving evidence, the dating and the position of each office within the hierarchy. They give less information about the specific duties of the official, which are often unclear and seem to vary over time. There is evidence in the database to help answer such questions, but we leave its exploitation to others.
official in control of navigation.
supplementary tax imposed on a village.
commander of foreign military contingents.
sum of taxes due by the taxpayer on a piece of land.
fiscal designation for a peasant who owned little or no land and no plough animals (pl. aktemones).
initially a fiscal official; later the title of a physician.
communal tax liability paid for poorer neighbours or taxpayers who fled the land.
monastic official, presumably in charge of a monastery’s vineyards.
lector, member of the minor clergy.
fiscal official in charge of cadaster revisions.
term referring to someone involved with salaries partly paid in kind rather than with cash.
dignity ranking between a patrikios and a magistros.
official in charge of imperial responses and letters sent abroad.
deputy official in various government departments.
official who had held in the past the post of eidikos.
official in charge of a monastery’s warehouse (apotheke).
leader of a group of monasteries.
generic term denoting a magnate or powerful official, a foreign ruler, and technical term for governor of a city/region or head of a department.
monk in charge of official visitors’ quarters at a monastery.
tagma (regiment) created by Alexios I in 1090/91.
subordinate treasury official, probably dealing with fiscal/economic matters.
courtier in charge of protocol at imperial banquets (also called atriklines).
title for rulers of cities/regions in the Islamic world (lit. father of the king).
empress; title used for the wife of the reigning emperor.
office of uncertain nature, perhaps identical with sebastophoros.
title used for the reigning emperor.
complex of buildings comprising a courtyard.
one of the principal imperial titles, used to distinguish the main emperor from co-emperors.
commander in chief of the army.
unleavened bread used in the eucharist by the Latin and Armenian churches, and the subject of much controversy between Byzantines (the Orthodox church uses leavened bread) and Latins from the 11th c.
official at a monastery in charge of wine or the wine-cellar.
office of protector of the emperor (lit. father of the emperor).
principal title of the Byzantine emperor, sometimes used for foreign rulers too in Byzantine sources.
imperial title used to distinguish the main emperor from co-emperors.
official dealing with financial matters; all-purpose agent of the emperor.
principal title of a Byzantine empress.
ecclesiastical official in charge of books, librarian (lit. keeper of books).
fiscal designation for a peasant who owned one ox (pl. boidatoi).
amount of land that can be ploughed by one ox (pl. boidotopia).
pliers-like instrument used for the impression of the dies on a lead blank in order to produce a seal.
official inspector under the eparch, in charge of controlling product quality, certified with a seal (boulla).
inventory of possessions, often precious objects belonging to a monastery or church.
religious spiritual leader of Islam.
beneficiary of a charistike, that is the grant of a monastery to an individual for a restricted period of time; the charistikarios held administrative power over the monastery’s estates and gained financially from his position.
ecclesiastical official in charge of archival documents; at Constantinople, principal assistant to the patriarch.
subaltern official with archival and fiscal duties; also ecclesiastical office similar to chartophylax.
gold coin issued after the coinage reform of Alexios I and taking its name from the form of the depicted emperor’s labarum (pl. chichata).
measure of calculation indicating a quantity of one thousand units, often 1,000 modioi (pl. chiliades).
assistant bishop in rural areas, subject to the local bishop.
fiscal or juridical entity comprising a rural settlement.
official with duties related to precious objects.
official in imperial goldsmiths’ workshop.
generic term for various types of documents bearing the emperor’s gold seal; they usually pertain to the grant of privileges.
state workshop producing gold embroidery for the costumes of the emperor and high-ranking officials.
low-ranking official under the protasekretis.
leader of a circus faction or a choir leading acclamations of the emperor; also leader of the mob.
fiscal designation of uncertain nature for peasants (perhaps those settled on imperial domains and paying their taxes to the fisc).
basic tax on land due to the state treasury.
unarmed man appointed to follow a military contingent and help wounded soldiers.
title ranked immediately below that of emperor; also epithet applied to high-ranking ecclesiastics, aristocrats and to the emperor.
subordinate church official (priest, deacon).
deputy official in any institution (lit. second).
tax on money borrowed but not used for its stated purpose.
rare term, presumably a dignity (lit. most illustrious).
teacher of sacred or profane subjects, often one attched to the patriarchate.
subordinate official employed in a government department.
subaltern judge, layman or ecclesiastic.
title often conferred on judges, anagrapheis, chartoularioi and notarioi.
monk in charge of a monastery’s cellar (see also bagenares and kellarites).
term designating various ecclesiastical and lay officials; in military hierarchy, the commander of a tagme.
the wife of a doux (also feminine form of the family name Doux).
category of peasants of disputed nature (agricultural slaves and freedmen holding land from their masters, or peasants working on estates?).
unofficial (?) title denoting close links with a high ranking official, usually the emperor (see also oikeios).
military commander of a region.
type of fast warship carrying 100 to more than 200 men.
the imperial post and transportation system of staging posts with fresh horses.
legal term referring to prominent officials in the army, government and church, often using their position to profit at the expense of weaker neighbours.
head of the imperial treasury and storehouse (eidikon – see epi tou eidikou).
deputy or representative of various lay or ecclesiastical officials and government departments.
title of a cleric (usually a priest) participating in the tribunal attached to Hagia Sophia (Constantinople).
sacristan, responsible for preparing the church and maintaining discipline during services.
literary genre, description usually of a building or a work of art.
official collecting certain customs duties and supervising the circulation of goods.
piece of jewellery worn around the neck usually bearing Christian imagery and often containing a relic.
literary genre, a panegyric or speech of praise of a person.
charge or tax on pasture land or on the right of pasturage.
ecclesiastical administrative unit encompassing a group of parishes in one or more villages, dependent on a larger ecclesiastical centre (bishopric or metropolis); often used to designate an entire bishopric too, as part of a metropolis.
official document, usually containing an imperial act.
city official, usually referring to the prefect or governor of Constantinople.
official responsible for the management of state-supervised stables supplying horses and mules to the army.
high-ranking official often with juducial functions; also the lay administrator of a monastery, responsible for its economic management.
courtier responsible for the empress’s banquets (see also epi tes trapezes of the Augousta [e1419]).
official in charge of the imperial treasury.
courtier responsible for imperial banquets (see also epi tes trapezes [e1097]).
official of the emperor’s bodyguard (hetaireia) perhaps a subordinate of the hetaireiarches.
courtier in charge of the emperor’s private banquets.
ecclesiastical official in charge of the treasury and religious foundations of the patriarchate of Constantinople.
courtier in charge of banquets (see also epi tes basilikes trapezes [e1560]).
senior official responsible for foreigners in the empire, especially at Constantinople.
official in charge of receiving and answering petitions on behalf of the emperor.
perhaps head of the imperial private treasury (see eidikos) or official responsible for the land of the fisc.
court official in charge of the Chrysotriklinos (golden hall in the Great Palace of Constantinople) with unknown functions.
head of the imperial treasury and storehouse (eidikon – see eidikos).
official of the private treasury of the emperor.
category of professional judges, presumably sitting in tribunal at the hippodrome of Constantinople.
one of the emperor’s private secretaries (lit. in charge of the imperial inkstand – see also kanikleios).
courtier serving in the emperor’s bedchamber (see also koitonites).
commander of the manglabitai, a unit of the emperor’s bodyguard.
official in the emperor’s private treasury and wardrobe.
official in a department perhaps responsible for crown estates.
military official or palace guard (see also pantheotes).
official of the patriarchate of Constantinople.
official in a government department.
official of the imperial stables.
official in the state warehouse and treasury (vestiarion).
official in charge of a particular section, department or institution within the palace, goverment or church administration.
presumably identical to pinkernes, a courtier in charge of the emperor’s wine (cup-bearer).
fiscal term referring to an imperial estate (pl. episkepseis).
administrator of an imperial domain (episkepsis).
overseer of a monastery or a government department.
lay administrator of a monastery, in charge of its economic management.
free peasant-taxpayer often synonymous with paroikos.
fiscal official in charge of individual tax payments and reductions (see also exisotes).
rare term, probably an epithet rather than a dignity (lit. most favoured).
high-ranking judge in imperial tribunal perhaps with some fiscal duties.
head of a guild or, in the ecclesiastical administration, official of the patriarchate.
fiscal official in charge of individual payments and reductions (see also epoptes).
member of a unit of the imperial guard, the exkoubitoi, under the domestikos of the exkoubitoi.
fiscal term denoting a tax exemption.
copper coin worth 1/24 of a miliaresion, discarded after the coinage reform of Alexios I (pl. folles).
semi-official title (lit. son-in-law of the emperor) used by the husbands of the emperor’s female relatives (daughters, sisters, nieces, etc.).
head of a district of Constantinople under the eparch or the demarchoi.
fiscal department dealing with land assessment, taxpayers’ lists and payment collection.
head of the genikon logothesion.
obscure official whose duties were probably related to cereal production.
measuring of land for tax purposes, land survey.
title used for venerable elderly monks.
official in a gerotropheion (see also gerokomos).
high-ranking title used among the southern Slavs.
monastic official (lit. fisherman) in charge of fish supplies (?).
official in charge of parts of the imperial palace, under the papias.
superior of a monastery (abbess/abbot).
austere form of asceticism based on unconditional devotion to God (lit. tranquillity).
unit of the emperor’s bodyguard initially largely made of foreigners and from the mid-11th c. of noble young men.
commander of the hetaireia, in charge of security at the imperial palace.
member (?) of the hetaireia.
official responsible for ordinations in the chancery of the patriarchate of Constantinople.
liturgical book containing the ordinary elements of the schedule of daily prayer for monks (the hours).
official in charge of state granaries.
head of the school of philosophy in Constantinople.
rare term, presumably an epithet rather than a dignity.
title used for church prelates.
monastic official in charge of weaving.
wedding gift of a man to his wife, usually equal to bewteen half and a third of the dowry (see also theoretron).
term referring to different types of documents, including petitions addressed to the emperor and patriarchal decrees.
official in charge of drafting documents at the patriarchate or other ecclesiastical institutions.
imperial dignity, perhaps to be equated with protospatharios.
unspecified year within the 15-year taxation cycle.
official at the patriarchate of Constantinople; also a courtier responsible for the emperor’s provisioning and apartments.
title reserved for the emperor’s closest male relatives; also bestowed upon important foreign rulers.
dignity held by officials in both the army and the civil administration.
one of the emperor’s private secretaries (see also epi tou kanikleiou).
wife of a kanikleios or an epi tou kanikleiou (?).
lead singer in a church choir and monastic officer in charge of the choir (precentor).
ecclesiastical tax paid by laity for the bishop’s maintenance.
fortress, citadel, or city in general (pl. kastra).
commander of a stronghold (kastron), responsible for its maintenance and for order.
initially commander of a military unit, then governor of a major province (11th c.), and later (after c.1100) minor local official.
an hegoumenos” who had been previously ordained.
title used by the heads of the Armenian and Georgian churches, as well as some Armenian bishops.
cellarer; monk in charge of a monastery’s cellar (see also bagenares and docheiarios).
army or naval officer; also a civil official serving in the vestiarion.
unit of weight equal to 100 pounds (pl. kentenaria); sometimes used to denote a quantity of 100 pounds of gold or gold coins.
property that reverted to the fisc following its abandonment for more than 30 years by its tax-paying owner.
mountain pass and territorial unit, often part of a theme.
generic term referring to various officials, mostly in the church hierarchy.
judge dealing with falsification of documents, supervision of visitors in Constantinople, family law and disputes between tenants and landlords.
courtier serving in the emperor’s bedchamber (see also epi tou koitonos).
boiled wheat with sugar, dried raisins, nuts, etc. distributed to the congregation usually following the commemoration of the dead.
official with various functions; also a low-ranking officer in the army or navy.
official serving in the genikon, perhaps dealing with precious metals and mines.
head of the stables of Constantinople and Malagina, in charge of provisioning for animals during military campaigns.
probably a civil official with judicial and police duties under a strategos.
fiscal official responsible for state warehouses, controlling imports and exports and collecting duties.
honorific title for dignitaries attached to the emperor’s household.
imperial title bestowed upon chamberlains of the patriarchate of Constantinople.
manager of imperial estates; also official in state workshops.
high-ranking dignity bestowed upon members of the imperial family and important generals.
professional judge; also a judge appointed to adminster a province.
official probably in charge of the management of imperial estates (see also kourator).
originally a type of monastery made of scattered cells associated to a central complex, but increasingly used to denote any large, usually rural, monastery.
official under the koiaistor, with notarial duties.
financial official serving in various government departments, in the provincial administration and in monasteries or private estates.
high-ranking official at the head of a government department.
monk in charge of the kitchen and preparation of food at a monastery (lit. cook).
head of a school or a workshop.
subordinate of an official or individual in a relation of personal dependence.
official employed on special occasions, sometimes with policing duties or as a guide for foreign envoys.
the Holy Towel, a piece of cloth allegedly bearing the imprint of Christ’s face and kept at Edessa before it was taken to Constantinople in 944 where it was kept in the Great Palace (Pharos chapel).
member of a unit of the imperial bodyguard under the epi tou manglabiou.
one of the teachers (didaskaloi) in the patriarchal school of Constantinople.
wife of a megas droungarios.
epithet attached to several officials heading their department or institution.
supreme military commander, second only to the emperor.
commander of the fleet stationed in Constantinople.
title perhaps referring to the patriarch of Constantinople (lit. greatest shepherd).
official in a state factory or workshop; perhaps related to agricultural estates too.
high-ranking military commander, perhaps identical to a tourmarches.
semi-official title bestowed upon a high-ranking official entrusted with the administration of the empire.
small monastery subordinate to a larger independent establishment and under the jurisdiction of the latter’s hegoumenos (pl. metochia).
silver coin equal to 1/12 of the nomisma, suppressed after the coinage reform of Alexios I.
obscure official perhaps in the provincial administration, especially of the theme of Anatolikon.
unit of measurement of varying quantity, used for both wheat and land, and also for the capacity of ships (pl. modioi).
dependency of a monastery with a lesser status than that of a metochion.
term usually applied to the women who brought spices to the tomb of Christ; title used for women with certain duties at the Holy Sepulchre in Jerusalem (lit. unguent-bearer).
high-ranking official with notarial and judicial duties.
probably an assistant of a mystikos.
official with duties presumably related to those of mystikos and mystographos.
ship’s captain responsible for commissioning a ship, hiring the crew, and for shipping tolls.
palace official in charge of the emperor’s washbasin.
high-ranking dignity above that of kouropalates and below kaisar, initially reserved for members of the imperial family and later expanded to include supreme military commanders.
the standard Byzantine gold coin known as hyperpyron from the late 11th c. (pl. nomismata).
office created in the 1040s for the head of the school of law at Constantinople, held by important canonists later on.
official (physician?) at a hospital.
scribe or secretary in a government department.
commander of the tagma of the noumera.
an imperial edict, a new (novel) law.
term related to the honorific title doulos.
official in the genikon, perhaps dealing with the administration of imperial domains.
regular yearly secondary tax, perhaps in kind.
official in charge of managing the estates and finances of an ecclesiastical foundation; steward of a monastery.
fiscal and economic term referring to an estate.
liturgical book containing the hymns for every day of the year except for Lent, Easter and Pentecost.
fiscal designation for a peasant who owned a donkey.
high-ranking lay official in Costantinople, and ecclesiastical official in the provinces (lit. head of an orphanage).
palace official responsible for introducing dignitaries to the emperor, and also title usually held by notarioi or protonotarioi.
monastic official whose duties remain obscure.
office related to the rental fees paid to property owners.
fair usually held on a major feastday or on that of the local patron saint.
title created by Alexios I and bestowed upon members of noble families.
honorific title (feminine form of pansebastos sebastos).
military officer or palace guard; also a dignity (see also epi tou pantheou).
title often used by the patriarch of Alexandria (pope).
official responsible for the maintenance of palace buildings and for access to the palace precinct.
official in charge of the distribution and handover of estates to individuals.
semi-official title for imperial favourites.
official in charge of the emperor’s bedchamber.
low-ranking military officer or official of the fisc.
official responsible for commercial shipping, toll payment and the import of goods by sea.
deputy sacristan (see also ekklesiarches).
dependent peasant, usually on estates of large landowners (pl. paroikoi).
female dignity for most senior attendant of the empress.
initially high-ranking dignity held by important governors and generals but then depreciated before disappearing in the 12th c.
delimitation of the boundaries of a property.
territorial unit for fiscal purposes.
cape-like vestment worn by priests and bishops, chasuble.
unit of measurement equal to ¼ of a modios and used for both wheat and land.
courtier in charge of the emperor’s wine (cup-bearer); see also epikerniou.
obscure official, with duties perhaps identical or similar to those of an ek prosopou.
imperial or patriarchal letter transmitting orders.
title designating a daughter born to a reigning emperor (lit. born in the purple).
title designating a son born to a reigning emperor (lit. born in the purple).
court official involved in palace ceremony.
civil adminstrator of a province, sometimes combining the offices of doux and katepano; the praitor of Constantinople was a judiciary official.
one of the main prisons of Constantinople, within the Great Palace compound.
inventory of estates belonging to individuals or institutions (usually monasteries), listing the taxes due and any exemptions, the land held (in the form of a periorismos) and the households of paroikoi living on the estates.
fiscal official involved with tax collection and perhaps with the measurement of land.
head of various groups of military, court, civil or church officials.
initially high-ranking dignity (10th c.) that was later widely granted before disappearing in the later 12th c.; also ecclesiastical title used for bishops.
head of a bureau (sekreton).
estate supervisor; also a provincial official with fiscal or administrative duties.
grant of part of the tax revenue of a specific property and of its dependent households.
introduction to a literary text, letter or document.
special fiscal charge paid by paroikoi, perhaps for contributions to the revenues of high provincial officers.
administrative order, usually short imperial act.
dignity atttested primarily in the 11th c. and related to anthypatos.
rare term, probably referring to a high-ranking military commander.
cleric presiding over a tribunal of priests.
head of the college of asekretis and of the imperial chancery, responsible for producing chrysobulls.
head of the officials in various government departments.
head of a kouratoreia (imperial estate).
dignity introduced in the 12th c. after the decline of kouropalates.
head of the college of mandatores.
office related to that of a mystikos.
high-ranking honorific title related to nobelissimos.
head of the college of notarioi; the duties of a protonotarios of a theme involved the provisioning of the army and fleet.
head of the priests of a church, parish or diocese.
head of the presbyters of a church or monastery.
high-ranking title related to that of propedros.
head proedros of the judges.
leader of a choir in a church.
head of a group of monasteries and hermitages; also head of any professional group (lit. first).
high-ranking title usually bestowed upon close relatives of the emperor.
initially high-ranking title that was devalued in the 11th c.
head of the officials in charge of the imperial stables (see strator).
high-ranking official of the patriarchate; also honorary title given to metropolitans.
most senior metropolitan in a patriarchate or archbishopric (after the patriarch or archbishop).
title related to that of vestarches.
title related to that of vestes.
high-ranking title bestowed upon important aristocrats.
head of the imperial bodyguard (see vestiarites).
military officer with policing duties; also a teacher in some Constantinopolitan schools.
singer in a church choir.
judge ruling according to Islamic religious law.
high-ranking courtier involved with the administration of the imperial palace.
official of the patriarchate of Constantinople in charge of relations with the imperial court.
remuneration to title holders and high officials distributed annually.
lay official involved with financial control in government departments; also a high-ranking official at the patriarchate of Constantinople.
wife of a sebastos or female version of the latter title.
title created by Alexios I and bestowed upon the emperor’s closest male relatives.
an office in the 10th c., it became an honorific title in the 11th.
high-ranking honorific title usually bestowed upon members of the imperial family.
generic term for a civil official with primarily financial duties, and also for officials of the patriarchate.
bureau or department of the government, used for departments of the patriarchate too (pl. sekreta).
court official in charge of ceremonial, royal castles and finances (in the kingdom of Jerusalem).
official document bearing a seal.
signature in the form of a cross, usually by witnesses of official acts.
tunic with long sleeves usually made of silk.
sacristy at a church or monastery where vessels and other valuables were kept.
church official responsible for the vessels and vestments of a shrine.
high-ranking official with judicial duties.
annual grant from the emperor to ecclesiastical institutions, in either cash or tax revenues.
title bestowed upon low-ranking officials.
dignity bestowed upon courtiers accompanying the emperor.
term used for patriarchal monasteries to designate their independence from the local bishop or metropolitan.
commander-in-chief of the navy, admiral.
military governor with financial and judicial responsibilities.
hereditary fiscal obligation attached to a property.
soldier; also a category of soldier-peasants.
official of the stratiotikon, a department dealing with the taxes of soldiers’ households.
high-ranking official heading the stratiotikon (see stratiotikos).
official in the imperial stables under the protostrator.
assistant to the eparch in his dealings with the guilds.
assembly of monks or clergy, most notably of the hegoumenoi and monks of Athos on particular feastdays, to discuss affairs of their monasteries.
high-ranking official of the patriarchate of Constantinople, nominated by the emperor.
notary responsible for registering transactions and certifying documents.
notary with a legal education, in charge of preparing documents.
military contingent usually attached to a theme, although the term is also used in the more general sense of regiment.
official with police duties acting for a magistrate.
high-ranking military officer in command of 1,000 men.
official in charge of the Chalke prison, within the Great Palace complex at Constantinople.
two types of coin of that name are known, a lightweight gold nomisma before the coinage reform of Alexios I and thereafter a small lead and later copper coin (pl. tetartera).
territorial unit initially administered by a military commander and then by a civil governor.
wedding gift of a man to his first wife, in addition to the hypobolon [n120], that remained her property after the termination of the marriage; usually equal to at least one twelfth of the dowry.
official perhaps serving under the thesmophylax.
judicial official of the tribunal of the Hippodrome.
lieutenant of the military commander of a tagma, a theme or the navy, in charge of a small district or fortress.
military commander with fiscal and judicial authority in his area of jurisdiction; also commander of a naval unit and a coastal area.
concave electrum and billon coin also known as scyphate (pl. trachea).
the refectory of a monastery.
monk in charge of setting the table at a monastery and waiting on his fellow monks.
military (?) official under the head of one of the prisons of Constantinople.
ceremonial or reception hall in a palace or mansion.
processional chant sung at the beginning of the eucharist.
charter containing the administrative and liturgical regulations to be observed by a monastic community (pl. typika).
high-ranking title that was devalued by the end of the 11th c.
high-ranking title bestowed upon important generals.
official of the emperor’s vestiarion.
head of a xenodocheion, a guest-house for travellers, the poor or the sick, often attached to a monastery.
fiscal designation for a peasant who owned a pair of oxen (pl. zeugaratoi).
tax paid by paroikoi zeugaratoi to either their landowner or to the state.
amount of land that can be ploughed by one pair of oxen. | https://pbw2016.kdl.kcl.ac.uk/ref/glossary/ |
This is a continuation of International Application No. PCT/JP2018/028656 filed on Jul. 31, 2018 which claims priority from Japanese Patent Application No. 2017-155164 filed on Aug. 10, 2017. The contents of these applications are incorporated herein by reference in their entireties.
BACKGROUND
The present disclosure relates to a front-end module and a communication device that process radio-frequency signals.
There is a demand that the carrier aggregation (CA) scheme involving simultaneous use of different frequency bands finds application to front-end modules having multi-band and multi-module features.
Japanese Unexamined Patent Application Publication (Translation of PCT Application) No. 2016-501467 discloses an antenna interface circuitry that simultaneously transmits and simultaneously receives signals in different frequency bands through two antennas. More specifically, the antenna interface circuitry includes a first antenna interface circuit coupled to a first antenna and a second antenna interface circuit coupled to a second antenna. The first antenna interface circuit includes a first quadplexer for first and second bands. The second antenna interface circuit includes a second quadplexer for the first and second bands. It has been pointed out that this configuration enables simultaneous transmission of signals in a first band and signals in a second band (two uplinks).
When, for example, the antenna interface circuitry that is disclosed in Japanese Unexamined Patent Application Publication (Translation of PCT Application) No. 2016-501467 and is capable of two uplinks performs simultaneous transmission, first-band transmission signals transmitted through the first antenna interface circuit may flow through the two antennas and may leak into the second antenna interface circuit, in which the transmission signals may interfere with second-band transmission signals transmitted through the second antenna interface circuit and may consequently cause intermodulation distortion in the second quadplexer.
In particular, when the first band and the second band are in the same (frequency) band group and signals in the first band and signals in the second band are transmitted simultaneously, leakage transmission signals in the first band attenuate between the two antennas but do not attenuate in the second antenna interface circuit. As a result, the reception sensitivity in the second band may degrade due to intermodulation distortion components resulting from interference between the leakage signals and transmission signals in the second band.
BRIEF SUMMARY
The present disclosure provides a front-end module and a communication device capable of mitigating degradation of reception sensitivity by reducing intermodulation distortion in a CA mode that involves simultaneous transmission of signals in two frequency bands.
According to an aspect of the present disclosure, a front-end module supports a carrier aggregation (CA) mode that involves simultaneous transmission of signals in a first frequency band and signals in a second frequency band. The first frequency band and the second frequency band are different frequency bands belonging to a first frequency band group. The front-end module includes: a first circuit that selectively transmits signals in the first frequency band when the CA mode is selected; a second circuit that selectively transmits signals in the second frequency band when the CA mode is selected; and a first switch disposed between each of two or more antennas and each of the first and second circuits to switch between connections formed between each of the two or more antennas and each of the first circuit and the second circuit. The first circuit includes a first multiplexer including: (1) a first transmitting filter connected to a first common terminal and to a first transmission terminal, a pass band of the first transmitting filter being a first transmission band included in the first frequency band; (2) a first receiving filter connected to the first common terminal and to a first reception terminal, a pass band of the first receiving filter being a first reception band included in the first frequency band; (3) a second transmitting filter connected to the first common terminal and to a second transmission terminal, a pass band of the second transmitting filter being a second transmission band included in the second frequency band; and (4) a second receiving filter connected to the first common terminal and to a second reception terminal, a pass band of the second receiving filter being a second reception band included in the second frequency band. The second circuit includes a second multiplexer including: (1) a third transmitting filter connected to a second common terminal and to a third transmission terminal, a pass band of the third transmitting filter being the first transmission band; (2) a third receiving filter connected to the second common terminal and to a third reception terminal, a pass band of the third receiving filter being the first reception band; (3) a fourth transmitting filter connected to the second common terminal and to a fourth transmission terminal, a pass band of the fourth transmitting filter being the second transmitting band; and (4) a fourth receiving filter connected to the second common terminal and to a fourth reception terminal, a pass band of the fourth receiving filter being the second reception band. The first circuit further includes an impedance variable circuit connected to the second transmission terminal to cause, in the CA mode, reflection of signal components in the second transmission band that are transmitted from the first switch toward the first multiplexer.
When supporting the CA mode involving simultaneous transmission of transmission signals in two frequency bands (the first frequency band and the second frequency band) belonging to the same frequency band group, the front-end system is to be capable of transmitting, in the CA mode, transmission signals in the two frequency bands through respective signal paths. More specifically, transmission signals and reception signals in the first frequency band are transmitted through the first circuit, and transmission signals and reception signals in the second frequency bands are transmitted through the second circuit. Isolation between a transmission signal in the first frequency band and a transmission signal in the second frequency band may be provided solely by the two or more antennas and the first switch. It is difficult to provide additional isolation through, for example, a wave separator used to separate signals into signals in one frequency band group and signals in another frequency band group. Thus, insufficiently attenuated signal components in the second transmission band may enter the first circuit through the first switch and the two or more antennas and may consequently interfere with signals in the first transmission band that are transmitted through the first circuit. The interference may cause intermodulation distortion, and as a result, the reception sensitivity in the first frequency band may degrade.
As a workaround, the impedance variable circuit that causes, in the CA mode, reflection of signal components in the second transmission band is connected to the second transmission terminal of the first multiplexer. In the CA mode, some signal components in the second transmission band may flow from the second circuit and may enter the first circuit. However, this configuration enables more signal components in the second transmission band to be reflected off the first multiplexer. This enables a reduction in the amount of intermodulation distortion that would occur when signals in the first frequency band and signals in the second frequency band are simultaneously transmitted.
The impedance variable circuit may include a second switch, a reflection circuit, and a matching circuit. The second switch includes: a third common terminal connected to the second transmission terminal; a first selection terminal; and a second selection terminal. When the CA mode is selected, the third common terminal is electrically connected to the first selection terminal and is not electrically connected to the second selection terminal. The reflection circuit is connected to the first selection terminal. When the third common terminal is electrically connected to the first selection terminal, the reflection circuit causes reflection of signal components in the second transmission band that are transmitted from the first switch toward the third common terminal. The matching circuit is connected to the second selection terminal. When the third common terminal is electrically connected to the second selection terminal, the matching circuit transmits or absorbs signal components in the second transmission band.
In the CA mode, this configuration forms a connection between the reflection circuit and the first multiplexer via the second transmission terminal. With the second transmission terminal being viewed from the first common terminal side, the impedance involves as much reflection as would occur in the open state. Although some signal components in the second transmission band may flow from the second circuit and may enter the first circuit, this configuration enables more signal components in the second transmission band to be reflected off the first multiplexer. This enables a reduction in the amount of intermodulation distortion that would occur when signals in the first frequency band and signals in the second frequency band are simultaneously transmitted.
The front-end module may further include: a reception amplifier circuit and a fourth switch. The reception amplifier circuit includes an input terminal and an output terminal. With the input terminal being connected to the first reception terminal, the reception amplifier circuit amplifies reception signals in the first reception band. The fourth switch includes a fourth common terminal, a third selection terminal, and a fourth selection terminal. The fourth common terminal is connected to the output terminal. The matching circuit is a 50-ohm resistor connected to the second selection terminal. The first transmission terminal may be a transmission terminal for the first transmission band in the CA mode. The third selection terminal may be a reception terminal for the first reception band in the CA mode. The fourth selection terminal may be a reception terminal for the first reception band in a non-CA involving transmission and reception of signals in the first frequency band or transmission and reception of signals in the second frequency band. The second reception signal may be a reception terminal for the second reception band in the non-CA mode.
The front-end module configured as described above is thus applicable to the following system. In the non-CA mode, the second circuit serves as a main path, and the first circuit serves as a sub-path (a diversity path). In the CA mode (two uplinks), the second circuit serves as a transmission path for signals in the second frequency band, and the first circuit serves as a transmission path for signals in the first frequency band. In the CA mode, the second transmission terminal, which is 50-ohm terminated in the non-CA mode, may be efficiently used as a terminal for reflecting signals in the second frequency band.
The front-end module may further include a fifth switch that includes a fifth common terminal, a fifth selection terminal, and a sixth selection terminal. The fifth common terminal is connected to the second reception terminal. The reflection circuit may be a transmission amplifier circuit connected to the second selection terminal to amplify transmission signals in the second transmission band. The first transmission terminal may be a transmission terminal for the first transmission band in the CA mode and in a non-CA mode that involves transmission and reception of signals in the first frequency band or transmission and reception of signals in the second frequency band. The first reception terminal may be a reception terminal for the first reception band in the CA mode and in the non-CA mode. The fifth selection terminal may a reception terminal for the second reception band in the non-CA mode. The sixth selection terminal may be a reception terminal for the second reception band in the CA mode.
The front-end module configured as described above is thus applicable to the following system. In the non-CA mode, the first circuit serves as a main path, and the second circuit serves as a sub-path (a diversity path). In the CA mode (two uplinks), the first circuit serves as a transmission path for signals in the first frequency band, and the second circuit serves as a transmission path for signals in the second frequency band. In the CA mode, the second transmission terminal, which serves as a terminal for transmission signals in the second frequency band in the non-CA mode, may be efficiently used as a terminal for reflecting signals in the second frequency band.
The first circuit may further include: a third switch disposed between the first switch and the first multiplexer; and a first phase shifter disposed between the third switch and the first multiplexer to shift a phase of a signal component in the second transmission band.
When the third switch is disposed between the first switch and the first multiplexer to switch between each of the first and second frequency bands and another frequency band, the aforementioned intermodulation distortion caused by interference of two different transmission signals would also occur between the terminals of the third switch.
As a workaround, the first phase shifter is disposed between the third switch and the first multiplexer to shift the phase of each signal in the second transmission band. This configuration creates a phase difference between a second-transmission-band signal component flowing from the second circuit into the first circuit and a second-transmission-band signal component reflected off the first multiplexer and bouncing back to the third switch. Consequently, the two signals in the second transmission band cancel each other. The occurrence of intermodulation distortion in the third switch is suppressed accordingly.
The first circuit may further include a third switch disposed between the first switch and the first multiplexer. The reflection circuit may include a resistance element and a second phase shifter connected between the first selection terminal and the resistance element.
When the third switch is disposed between the first switch and the first multiplexer to switch between each of the first and second frequency bands and another frequency band, the aforementioned intermodulation distortion caused by interference of two different transmission signals would also occur between the terminals of the third switch.
As a workaround, the reflection circuit connected to the second transmission terminal via the second switch includes the second phase shifter. Through adjustment of phase shifts provided by the second phase shifter, this configuration enables optimization of the reflection coefficient for signals in the second transmission band at the second transmission terminal. Although some signals in the second transmission band may flow from the second circuit and may enter the first circuit, this configuration enables more signal components in the second transmission band to be reflected off the first multiplexer. The occurrence of intermodulation distortion in the first multiplexer is suppressed accordingly.
The second phase shifter creates a phase difference between a second-transmission-band signal flowing from the second circuit into the first circuit via the first switch and a second-transmission-band signal reflected off the first multiplexer and bouncing back to the third switch. Consequently, the two signals in the second transmission band cancel each other. The occurrence of intermodulation distortion in the third switch is suppressed accordingly.
The frequency at which intermodulation distortion occurs in the first multiplexer due to interference between a signal in the first transmission band and a signal in the second transmission band may be included in the first reception band.
In the CA mode, insufficiently attenuated transmission signals in the second transmission band may enter the first circuit through the first switch and the two or more antennas and may consequently interfere with transmission signals in the first transmission band that are transmitted through the first circuit. The interference may cause intermodulation distortion. When the first reception band includes the frequency at which the intermodulation distortion occurs, the intermodulation distortion components may pass through the first receiving filter, and as a result, the reception sensitivity in the first reception band may degrade.
Although some signals in the second transmission band may flow from the second circuit and may enter the first circuit via the first switch, this configuration enables more components in the second transmission band to be reflected off the first multiplexer. The occurrence of intermodulation distortion in the first multiplexer is suppressed accordingly. This mitigates degradation of reception sensitivity in the first reception band.
The front-end module may further include a first wave separator disposed between the first switch and the first multiplexer to separate signals into signals in the first frequency band group and signals in the second frequency band group different from the first frequency band group.
When a multi-band system capable of transmitting signals in different frequency band groups in a selective manner is operated in the CA mode to simultaneously transmit signals in two different frequency bands belonging to the same frequency band group, this configuration enables a reduction in the amount of intermodulation distortion caused by interference between a signal in one frequency band and a signal in the other frequency band.
The first frequency band may be long term evolution (LTE) Band 1 (the first transmission band: 1,920 to 1,980 MHz; the first reception band: 2,110 to 2,170 MHz). The second frequency band may be LTE Band 3 (the second transmission band: 1,710 to 1,785 MHz; the second reception band: 1,805 to 1,880 MHz). The frequency at which third-order intermodulation distortion occurs due to interference between a signal in the first transmission band and a signal in the second transmission band may be included in the first reception band.
In a system supporting the CA mode (two uplinks) for Band 1 and Band 3, the occurrence of third-order intermodulation distortion in the first multiplexer is suppressed accordingly. This mitigates degradation of reception sensitivity in Band 1.
According to another aspect of the present disclosure, a communication device includes: a radio-frequency signal processing circuit that processes radio-frequency signals transmitted or received via two or more antennas; and any one of the aforementioned front-end modules disposed between the radio-frequency signal processing circuit and each of the two or more antennas to transmit the radio-frequency signals.
Thus, a communication device that enables a reduction in the amount of intermodulation distortion associated with two different transmission signals and mitigates degradation of reception sensitivity is provided.
Other features, elements, characteristics, and advantages of the present disclosure will become more apparent from the following detailed description of embodiments of the present disclosure with reference to the attached drawings.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
FIG. 1
is a circuit configuration diagram of a front-end module in Example 1;
FIG. 2
is a circuit configuration diagram of a front-end module in Comparative Example;
FIG. 3A
is a graph illustrating reflection characteristics, with a transmission terminal included in a quadplexer in Example 1 and corresponding to Band 3 being 50-ohm terminated;
FIG. 3B
is a graph illustrating reflection characteristics, with the transmission terminal included in the quadplexer in Example 1 and corresponding to Band 3 being open-ended;
FIG. 4
is a circuit configuration diagram of a front-end module in Example 2;
FIG. 5
is a circuit configuration diagram of a front-end module in Example 3;
FIG. 6A
is a circuit configuration diagram of a first circuit of a front-end module in Modification 1;
FIG. 6B
is a circuit configuration diagram of a first circuit of a front-end module in Modification 2; and
FIG. 7
is a schematic configuration diagram of a communication device according to an embodiment.
DETAILED DESCRIPTION
Hereinafter, embodiments of the present disclosure will be described in detail by citing examples with reference to the accompanying drawings. The following embodiments are general or specific examples. Details such as values, shapes, materials, constituent components, and arrangements and connection patterns of the constituent components in the following embodiments are provided merely as examples and should not be construed as limiting the present disclosure. Of the constituent components in the following embodiments, constituent components that are not mentioned in independent claims are described as optional constituent components. The sizes and the relative proportions of the constituent components illustrated in the drawings are not necessarily to scale.
Embodiments
Other Embodiments
1
1. Configuration of Front-End Module in Example 1
FIG. 1
FIG. 1
FIG. 1
1
1
5
1
4
4
6
is a circuit configuration diagram of a front-end module in Example 1. illustrates the front-end module and an antenna unit in Example 1. The front-end module illustrated in includes front-end circuits A and B and a switch .
5
5
5
The antenna unit includes a main antenna A and a sub-antenna B.
6
5
4
4
5
4
4
6
6
5
4
5
4
6
5
4
5
4
The switch is a first switch disposed between the antenna unit and each of the front-end circuits A and B to switch between connections formed between the antenna unit and each of the front-end circuits A and B. The switch in this example is a double-pole, double-throw (DPDT) switch. The switch is thus capable of switching between the state in which the main antenna A is connected to the front-end circuit A and the state in which the main antenna A is connected to the front-end circuit B. The switch is also capable of switching between the state in which the sub-antenna B is connected to the front-end circuit A and the state in which the sub-antenna B is connected to the front-end circuit B.
4
10
21
22
43
51
30
40
61
The front-end circuit B is a first circuit including a diplexer B, switches , , and , a phase shifter , a quadplexer B, an impedance variable circuit , and a reception amplifier circuit .
4
10
23
70
44
The front-end circuit A is a second circuit including a diplexer A, a switch module , a quadplexer A, and a switch .
4
The following describes constituent components of the front-end circuit B.
10
6
The diplexer B is a first wave separator including a common terminal, a low-band terminal, and a middle-band terminal. The common terminal is connected to the switch . The first wave separator separates signals into signals in a low-band group (a second frequency band group) and signals in a middle-band group (a first frequency band group).
21
210
210
10
FIG. 1
The switch is a single-pole, n-throw (SPnT) switch that includes a common terminal and selection terminals. The common terminal is connected to the low-band terminal of the diplexer B and each of the selection terminals is connected to the transmission path for a corresponding band in the low-band group. The transmission paths provided for the respective bands and connected to the selection terminals are not illustrated in .
22
6
30
22
220
221
220
10
221
30
FIG. 1
The switch is a third switch disposed between the switch and the quadplexer B. The switch is an SPnT switch that includes a common terminal , a selection terminal , and other selection terminals. The common terminal is connected to the middle-band terminal of the diplexer B. The selection terminal is connected to the path on which the quadplexer B is disposed. Each of the other selection terminals is connected to the transmission path for a corresponding band in the middle-band group. Some of the transmission paths provided for the respective bands and connected to the corresponding selection terminals are not illustrated in .
30
30
30
30
30
a
b
a
b
The quadplexer B is a first multiplexer including transmitting filters T and T and receiving filters R and R.
30
31
32
b
The transmitting filter T is a second transmitting filter connected to a common terminal (a first common terminal) and to a transmission terminal (a second transmission terminal). The pass band of the second transmitting filter is the transmission band of a band Bb (a second transmission band).
30
31
33
b
The receiving filter R is a second receiving filter connected to the common terminal and to a reception terminal (a second reception terminal). The pass band of the second receiving filter is the reception band of the band Bb (a second reception band).
30
31
34
a
The transmitting filter T is a first transmitting filter connected to the common terminal and to a transmission terminal (a first transmission terminal). The pass band of the first transmitting filter is the transmission band of a band Ba (a first transmission band).
30
31
35
a
The receiving filter R is a first receiving filter connected to the common terminal and to a reception terminal (a first reception terminal). The pass band of the first receiving filter is the reception band of the band Ba (a first reception band).
61
35
61
The reception amplifier circuit includes an input terminal and an output terminal. With the input terminal being connected to the reception terminal , the reception amplifier circuit amplifies reception signals in the reception band of the band Ba.
43
430
431
432
430
61
The switch is a fourth switch including a common terminal (a fourth common terminal), a selection terminal (a third selection terminal), and a selection terminal (a fourth selection terminal). The common terminal is connected to the output terminal of the reception amplifier circuit .
51
22
30
The phase shifter is a first phase shifter disposed between the switch and the quadplexer B to shift the phase of each signal in the transmission band of the band Bb.
40
41
32
41
410
32
411
412
410
411
412
The impedance variable circuit includes a switch connected to the transmission terminal , a reflection circuit, and a matching circuit. The switch is a second switch including: a common terminal (a third common terminal) connected to the transmission terminal ; a selection terminal (a first selection terminal); and a selection terminal (a second selection terminal). When the CA mode is selected, the second switch is set to the state in which the common terminal is electrically connected to the selection terminal and is not electrically connected to the selection terminal .
40
6
410
In the CA mode, the impedance variable circuit configured as described above can reflect signal components in the band Bb that are transmitted from the switch toward the common terminal .
The CA mode referred to in the present embodiment involves, in addition to simultaneous reception of signals in two frequency bands, simultaneous transmission of signals in two frequency bands.
411
411
4
10
410
31
410
411
Although the reflection circuit is connected to the selection terminal , the reflection circuit in Example 1 is regarded as an open circuit with nothing connected to the selection terminal . Thus, the reflection circuit functions in such a manner that signals in the transmission band of the band Bb that are transmitted through the front-end circuit B from the diplexer B toward the common terminal are reflected off the common terminal when the common terminal is electrically connected to the selection terminal .
42
42
412
410
412
The matching circuit includes a resistance element for 50-ohm termination. The resistance element is connected to the selection terminal . Thus, the matching circuit functions in such a way as to transmit or absorb signals in the transmission band of the band Bb when the common terminal is electrically connected to the selection terminal .
4
The following describes constituent components of the front-end circuit A.
10
6
The diplexer A is a wave separator including a common terminal, a low-band terminal, and a middle-band terminal. The common terminal is connected to the switch . The wave separator separates signals into signals in the low-band group (the second frequency band group) and signals in the middle-band group (the first frequency band group).
23
10
10
23
FIG. 1
The switch module is a double-pole, n-throw (DPnT) switch module including two common terminals and a plurality of selection terminals. One of the two common terminals is connected to the low-band terminal of the diplexer A, and the other common terminal is connected to the middle-band terminal of the diplexer A. The one common terminal is connected to a duplexer that is included in the switch module and provided for bands in the low-band group. Each of the selection terminal is connected to the transmission path for a corresponding band in the middle-band group. Some of the transmission paths provided for the respective bands and connected to the corresponding selection terminals are not illustrated in .
70
70
70
70
70
a
b
a
b
The quadplexer A is a second multiplexer including transmitting filters T and T and receiving filters R and R.
70
71
72
b
The transmitting filter T is a fourth transmitting filter connected to a common terminal (a second common terminal) and to a transmission terminal (a fourth transmission terminal). The pass band of the fourth transmitting filter is the transmission band of the band Bb.
70
71
73
b
The receiving filter R is a fourth receiving filter connected to the common terminal and to a reception terminal (a fourth reception terminal). The pass band of the fourth receiving filter is the reception band of the band Bb.
70
71
74
a
The transmitting filter T is a third transmitting filter connected to the common terminal and to a transmission terminal (a third transmission terminal). The pass band of the third transmitting filter is the transmission band of the band Ba.
70
71
75
a
The receiving filter R is a third receiving filter connected to the common terminal and to a reception terminal (a third reception terminal) The pass band of the third receiving filter is the reception band of the band Ba.
44
440
441
442
440
75
The switch includes a common terminal and selection terminals and . The common terminal is connected to the reception terminal .
1
The front-end module in Example 1 has a configuration applicable to both the carrier aggregation (CA) mode involving simultaneous transmission and simultaneous reception of radio-frequency signals in two or more (frequency) bands and a non-CA mode involving transmission and reception of radio-frequency signals in one band alone.
1
Specifically, the front-end module in Example 1 is configured to support the CA mode (two uplinks) involving simultaneous transmission of signals in a first frequency band and signals in a second frequency band. The first and second frequency bands are different frequency bands belonging to the first frequency band group including two or more frequency bands. In Example 1, the middle-band group is the first frequency band group, the band Ba is the first frequency band belonging to the middle-band group, and the band Bb is the second frequency band belonging to the middle-band group.
1
4
4
When the front-end module is operated in the non-CA mode, the front-end circuit A serves as a main path for both transmission and reception of signals in the band Ba and transmission and reception of signals in the band Bb, and the front-end circuit B serves as a sub-path (e.g., a diversity circuit) for both transmission and reception of signals in the band Ba and transmission and reception of signals in the band Bb.
74
4
441
440
44
432
430
43
4
For transmission and reception of signals in the band Ba in the non-CA mode, the transmission terminal of the front-end circuit A serves as a transmission terminal (Ba Tx) for the band Ba, and the selection terminal connected to the common terminal of the switch serves as a reception terminal (Ba PRx) for the band Ba. The selection terminal connected to the common terminal of the switch of the front-end circuit B serves as a diversity reception terminal (Ba DRx) for the band Ba.
72
4
73
4
33
4
412
41
For transmission and reception of signals in the band Bb in the non-CA mode, the transmission terminal of the front-end circuit A serves as a transmission terminal (Bb Tx) for the band Bb, and the reception terminal of the front-end circuit A serves as a reception terminal (Bb Rx) for the band Bb. The reception terminal of the front-end circuit B serves as a diversity reception terminal (Bb DRx) for the band Bb, and the selection terminal of the switch serves as a terminal for 50-ohm termination for transmission signals in the band Bb.
1
4
4
4
4
72
4
73
4
34
4
431
430
43
442
440
44
4
33
4
When the front-end module is operated in the CA mode (two uplinks) for the bands Ba and Bb, the front-end circuit B serves as a main path for transmission and reception of signals in the band Ba, and the front-end circuit A serves as a main path for transmission and reception of signals in the band Bb. Thus, the front-end circuit B selectively transmits signals in the band Ba and the front-end circuit A selectively transmits signals in the band Bb. In this case, the transmission terminal of the front-end circuit A serves as a transmission terminal (Bb Tx) for the band Bb, and the reception terminal of the front-end circuit A serves as a reception terminal (Bb Rx) for the band Bb. The transmission terminal of the front-end circuit B serves as a transmission terminal (Ba Tx ULCA) for the band Ba, and the selection terminal connected to the common terminal of the switch serves as a reception terminal (Ba PRx ULCA) for the band Ba. The selection terminal connected to the common terminal of the switch of the front-end circuit A serves as a diversity reception terminal (Ba DRx ULCA) for the band Ba. The reception terminal of the front-end circuit B serves as a diversity reception terminal (Bb DRx) for the band Bb.
70
30
4
4
As described above, all of the transmission terminals and the reception terminals of the quadplexer A and all of the transmission terminals and the reception terminals of the quadplexer B are used when both the CA mode (two uplinks) and the non-CA mode are supported. It is thus required that each of the front-end circuits A and B includes a quadplexer for the bands Ba and Bb, which are to be subjected to CA.
1
40
51
The distinctive features of the front-end module in Example 1 include the impedance variable circuit and the phase shifter .
40
51
500
500
Actions and effects caused by the impedance variable circuit and the phase shifter will be described based on the following description of the configuration of a front-end module in Comparative Example and problems associated with the front-end module .
500
2. Configuration of Front-End Module in Comparative Example
FIG. 2
FIG. 2
FIG. 2
500
500
5
500
504
504
6
is a circuit configuration diagram of the front-end module of Comparative Example. illustrates the front-end module and an antenna unit T in Comparative Example. The front-end module illustrated in includes front-end circuits A and B and the switch .
5
5
5
5
The antenna unit T includes main antennas M and L and the sub-antenna B.
500
1
500
1
504
504
500
1
500
FIG. 2
The difference between the front-end module illustrated in and the front-end module in Example 1 is in the configuration of the impedance variable circuit. The front-end module also differs from the front-end module in that no phase shifter is disposed in the front-end circuit B and that no diplexer is disposed in the front-end circuit A. Configurations common to the front-end module in Comparative Example and the front-end module in Example 1 will be omitted from the following description, which will be given while focusing on distinctive features of the front-end module .
6
5
504
5
504
6
5
504
5
504
The switch is capable of switching between the state in which the main antenna M is connected to the front-end circuit A and the state in which the main antenna M is connected to the front-end circuit B. The switch is also capable of switching between the state in which the sub-antenna B is connected to the front-end circuit A and the state in which the sub-antenna B is connected to the front-end circuit B.
504
10
21
22
43
30
42
61
The front-end circuit B includes the diplexer B, the switches , , and , the quadplexer B, the resistance element , and the reception amplifier circuit .
504
23
70
44
The front-end circuit A includes the switch module , the quadplexer A, and the switch .
42
32
The resistance element is a resistance element for 50-ohm termination and is connected to the transmission terminal .
221
22
31
30
The selection terminal of the switch is connected to the common terminal of the quadplexer B.
23
5
6
23
70
The switch module is a double-pole, n-throw (DPnT) switch module including two common terminals and a plurality of selection terminals. One of the two common terminals is connected to the main antenna L for a low band, and the other common terminal is connected to the switch . The one common terminal is connected to a duplexer that is included in the switch module and provided for bands in the low-band group. One of the selection terminals is connected to the quadplexer A for the bands Ba and Bb in the middle-band group. Each of the other selection terminals is connected to a duplexer for a corresponding band in the middle-band group other than the bands Ba and Bb.
504
504
5
6
23
10
504
504
In the CA mode (two uplinks) involving simultaneous transmission of transmission signals in two bands, namely, the bands Ba and Bb belonging to the same frequency band group (the middle-band group), it is required that transmission signals and reception signals in the band Ba are transmitted through one signal path and transmission signals and reception signals in the band Bb are transmitted through another signal path. For example, transmission signals and reception signals in the band Ba are transmitted through the front-end circuit B, and transmission signals and reception signals in the band Bb are transmitted through the front-end circuit A. Isolation between a transmission signal in the band Ba and a transmission signal in the band Bb may be provided solely by the antenna unit T and the switch . It is difficult to provide additional isolation through, for example, the switch module and the diplexer B used to separate signals into signals in one frequency band group and signals in another frequency band group. Thus, insufficiently attenuated transmission signals in the band Bb may enter the front-end circuit B and may consequently interfere with transmission signals in the band Ba that are transmitted through the front-end circuit B. The interference may cause intermodulation distortion, and as a result, the reception sensitivity in the frequency band including the frequency at which the intermodulation distortion occurs may degrade.
431
43
Assume that the band Ba is long term evolution (LTE) Band 1 (the first transmission band: 1,920 to 1,980 MHz; the first reception band: 2,110 to 2,170 MHz) and the band Bb is LTE Band 3 (the second transmission band: 1,710 to 1,785 MHz; the second reception band: 1,805 to 1,880 MHz). With Band 1 and Band 3 belonging to the same frequency band group (the middle-band group), the reception band of Band 1 in this example case includes the frequency at which third-order intermodulation distortion occurs due to interference between a transmission signal in Band 1 and a transmission signal in Band 3. Due to the occurrence of third-order intermodulation distortion, the reception sensitivity associated with reception signals output to the selection terminal of the switch may degrade.
1
3. Actions and Effects Caused by Front-End Module in Example 1
500
1
30
32
32
10
4
4
5
6
30
30
Unlike the front-end module of the Comparative Example described above, the front-end module in Example 1 is configured to form a connection between the reflection circuit and the quadplexer B via the transmission terminal in the CA mode (two uplinks) for the bands Ba and Bb. With the transmission terminal being viewed from the diplexer B side, the impedance state involves a large amount of reflection. Some transmission signal components in the band Bb may flow from the front-end circuit A and may enter the front-end circuit B through the antenna unit and the switch . However, the aforementioned configuration enables more radio frequency components in the band Bb to be reflected off the quadplexer B. This enables a reduction in the amount of intermodulation distortion that would occur in the quadplexer B when signals in the band Ba and signals in the band Bb are simultaneously transmitted.
FIG. 3A
FIG. 3B
32
30
32
30
is a graph illustrating reflection characteristics that were exhibited when the transmission terminal included in the quadplexer B in Example 1 and corresponding to Band 3 was 50-ohm terminated. is a graph illustrating reflection characteristics that were exhibited when the transmission terminal included in the quadplexer B in Example 1 and corresponding to Band 3 was open-ended.
FIG. 3A
FIG. 3B
1
410
412
41
30
31
1
410
411
41
30
31
More specifically, illustrates reflection characteristics that were exhibited through a simulation conducted on the front-end module in Example 1 when the common terminal and the selection terminal of the switch were electrically connected to each other. The reflection characteristics were exhibited, with the quadplexer B being viewed from the common terminal . illustrates reflection characteristics that were exhibited through a simulation conducted on the front-end module in Example 1 when the common terminal and the selection terminal of the switch were electrically connected to each other. The reflection characteristics were determined, with the quadplexer B being viewed from the common terminal .
FIGS. 3A and 3B
Referring to , LTE Band 1 was used as the band Ba, and LTE Band 3 was used as the band Bb.
FIG. 3A
41
40
1
30
31
411
As illustrated in , the return loss in the transmission band (B3Tx) of Band 3 is sufficiently high (more negative) when the matching circuit is selected through the switch in the impedance variable circuit of the front-end module in Example 1. This indicates that transmission signals in Band 3 flow through the quadplexer B from the common terminal toward the selection terminal and are absorbed.
FIG. 3B
41
40
1
41
30
31
As illustrated in , the return loss obtained in the transmission band (B3Tx) of Band 3 when the reflection circuit is selected through the switch in the impedance variable circuit of the front-end module in Example 1 is less sufficient (less negative) than the return loss obtained when the matching circuit is selected through the switch . This indicates that more transmission signal components in Band 3 are reflected without necessarily flowing into the quadplexer B through the common terminal .
30
30
1
40
30
30
The quadplexer B includes a nonlinear element, which gives rise to occurrence of intermodulation distortion in the quadplexer B. As a workaround, the front-end module in Example 1 may be operated in the CA mode in the state in which the reflection circuit in the impedance variable circuit is selected. This enables a reduction in transmission signal components in Band 3 that flow into the quadplexer B, and the occurrence of intermodulation distortion in the quadplexer B is suppressed accordingly. This configuration eliminates or reduces, for example, the possibility that the reception sensitivity in Band 1 (the band Ba) will degrade due to the occurrence of third-order intermodulation distortion.
1
51
22
30
30
22
The front-end module in Example 1 is also characterized in that the phase shifter is disposed between the switch and the quadplexer B. Intermodulation distortion between a signal in Band 1 (the band Ba) and a signal in Band 3 (the band Bb) would occur not only in the quadplexer B but also in the switch .
40
31
30
22
51
4
6
51
51
22
22
In the CA mode, the impedance variable circuit causes, as described above, reflection of waves in Band 3 (the band Bb), which in turn flow from the common terminal of the quadplexer B toward the switch . The phase shifter enables the reflected waves to cancel transmission waves in Band 3 that flow into the front-end circuit B through the switch . More specifically, the phase shifter performs phase adjustment to create a phase difference between a transmission wave in Band 3 and a reflected wave (ideally, the phase shifter shifts these signals into opposite phases). This enables a reduction in the transmission waves in Band 3 that flow into the switch . The occurrence of intermodulation distortion in the switch is suppressed accordingly. This configuration eliminates or reduces, for example, the possibility that the reception sensitivity in Band 1 will degrade due to the occurrence of third-order intermodulation distortion.
2
4. Configuration of Front-End Module in Example 2
FIG. 4
FIG. 4
FIG. 4
2
2
5
2
4
4
6
is a circuit configuration diagram of a front-end module in Example 2. illustrates the front-end module and the antenna unit T in Example 2. The front-end module illustrated in includes a front-end circuit C, the front-end circuit B, and the switch .
5
5
5
5
The antenna unit T includes the main antennas M and L and the sub-antenna B.
2
1
4
2
1
2
FIG. 4
The front-end module illustrated in differs from the front-end module in Example 1 in that no diplexer is disposed in the front-end circuit C. Configurations common to the front-end module in Example 2 and the front-end module in Example 1 will be omitted from the following description, which will be given while focusing on distinctive features of the front-end module .
6
5
4
5
4
6
5
4
5
4
The switch is capable of switching between the state in which the main antenna M is connected to the front-end circuit C and the state in which the main antenna M is connected to the front-end circuit B. The switch is also capable of switching between the state in which the sub-antenna B is connected to the front-end circuit B and the state in which the sub-antenna B is connected to the front-end circuit C.
4
23
70
44
The front-end circuit C includes the switch module , the quadplexer A, and the switch .
23
5
6
23
70
The switch module is a double-pole, n-throw (DPnT) switch module including two common terminals and a plurality of selection terminals. One of the two common terminals is connected to the main antenna L for a low band, and the other common terminal is connected to the switch . The one common terminal is connected to a duplexer that is included in the switch module and provided for bands in the low-band group. One of the selection terminals is connected to the quadplexer A for the bands Ba and Bb in the middle-band group. Each of the other selection terminals is connected to a duplexer for a corresponding band in the middle-band group other than the bands Ba and Bb.
5
5
In Example 2, signals in the low-band group and signals in the middle-band group are not transmitted and received through the same main antenna. Instead, signals in the low-band group are transmitted and received through the main antenna L for the low band, and signals in the middle-band group are transmitted and received through the main antenna M for the middle band.
This configuration suppresses, for example, interference between signals in different frequency band groups.
2
40
30
51
22
22
The front-end module in Example 2 may be operated in the CA mode in the state in which the reflection circuit in the impedance variable circuit is selected. This suppresses the occurrence of intermodulation distortion in the quadplexer B. Furthermore, the phase shifter performs phase adjustment to create a phase difference between a transmission wave in the band Bb and a reflected wave in the band Bb. This enables a reduction in transmission waves in the band Bb that flow into the switch . The occurrence of intermodulation distortion in the switch is suppressed accordingly. This configuration eliminates or reduces the possibility that the reception sensitivity in the band Ba will degrade due to the occurrence of intermodulation distortion.
3
5. Configuration of Front-End Module in Example 3
1
3
Unlike the front-end module in Example 1 configured to suppress the occurrence of intermodulation distortion in the sub-path, a front-end module in Example 3 is configured to suppress the occurrence of intermodulation distortion in the main path as will be described below.
FIG. 5
FIG. 3
FIG. 5
3
3
5
3
4
4
6
3
1
is a circuit configuration diagram of the front-end module in Example 3. illustrates the front-end module and the antenna unit in Example 1. The front-end module illustrated in includes a front-end circuit D, a front-end circuit E, and the switch . The following description will be given while focusing on features of the front-end module in Example 3 that are different from the features of the front-end module in Example 1.
6
5
4
4
5
4
4
The switch is a first switch disposed between the antenna unit and each of the front-end circuits D and E to switch between connections formed between the antenna unit and each of the front-end circuits D and E.
4
10
23
52
70
90
45
The front-end circuit E is a first circuit including the diplexer A, the switch module , a phase shifter , the quadplexer A, an impedance variable circuit , and a switch .
4
10
21
22
43
30
42
The front-end circuit D is a second circuit including the diplexer B, the switches , , and , the quadplexer B, and the resistance element .
4
The following describes constituent components of the front-end circuit E.
10
6
The diplexer A is a first wave separator including a common terminal, a low-band terminal, and a middle-band terminal. The common terminal is connected to the switch . The first wave separator separates signals into signals in the low-band group (the second frequency band group) and signals in the middle-band group (the first frequency band group).
23
10
10
23
70
52
The switch module is a third switch, which is a double-pole, n-throw (DPnT) switch including two common terminals and a plurality of selection terminals. One of the two common terminals is connected to the low-band terminal of the diplexer A, and the other common terminal is connected to the middle-band terminal of the diplexer A. The one common terminal is connected to a duplexer that is included in the switch module and provided for bands in the low-band group. One of the selection terminals is connected to the quadplexer A for the bands Ba and Bb in the middle-band group via the phase shifter . Each of the other selection terminals is connected to a duplexer for a corresponding band in the middle-band group other than the bands Ba and Bb.
70
70
70
70
70
a
b
a
b
The quadplexer A is a first multiplexer including the transmitting filters T and T and the receiving filters R and R.
70
71
74
a
The transmitting filter T is a first transmitting filter connected to the common terminal (a first common terminal) and to the transmission terminal (a first transmission terminal). The pass band of the first transmitting filter is the transmission band of the band Ba (a first transmission band).
70
71
75
a
The receiving filter R is a first receiving filter connected to the common terminal and to the reception terminal (a first reception terminal). The pass band of the first receiving filter is the reception band of the band Ba (a first reception band).
70
71
72
b
The transmitting filter T is a second transmitting filter connected to the common terminal and to the transmission terminal (a second transmission terminal). The pass band of the second transmitting filter is the transmission band of the band Bb (a second transmission band).
70
71
73
b
The receiving filter R is a second receiving filter connected to the common terminal and to the reception terminal (a second reception terminal). The pass band of the second receiving filter is the reception band of the band Bb (a second reception band).
45
450
451
452
450
73
The switch is a fifth switch including a common terminal (a fifth common terminal); a selection terminal (a fifth selection terminal), and a selection terminal (a sixth selection terminal). The common terminal is connected to the reception terminal .
52
23
70
The phase shifter is a first phase shifter disposed between the switch module and the quadplexer A to shift the phase of each signal in the transmission band of the band Bb.
90
46
72
46
460
72
461
462
460
461
462
The impedance variable circuit includes a switch connected to the transmission terminal , a reflection circuit, and a matching circuit. The switch is a second switch including: a common terminal (a third common terminal) connected to the transmission terminal ; a selection terminal (a first selection terminal); and a selection terminal (a second selection terminal). When the CA mode is selected, the second switch is set to the state in which the common terminal is electrically connected to the selection terminal and is not electrically connected to the selection terminal .
90
6
460
In the CA mode, the impedance variable circuit configured as described above can reflect signal components in the band Bb that are transmitted from the switch toward the common terminal .
461
461
4
10
460
460
461
Although the reflection circuit is connected to the selection terminal , the reflection circuit in Example 3 is regarded as an open circuit with nothing connected to the selection terminal . Thus, the reflection circuit functions in such a manner that signals in the transmission band of the band Bb that are transmitted through the front-end circuit E from the diplexer A toward the common terminal are reflected when the common terminal is electrically connected to the selection terminal .
62
462
460
462
62
62
The matching circuit includes a transmission amplifier circuit connected to the selection terminal . Thus, the matching circuit functions in such a way as to transmit or absorb signals in the transmission band of the band Bb when the common terminal is electrically connected to the selection terminal . In the non-CA mode, the transmission amplifier circuit amplifies reception signals in the transmission band of the band Bb. In the CA mode, however, the transmission amplifier circuit does not perform amplification.
4
The following describes constituent components of the front-end circuit D.
10
6
The diplexer B is a wave separator including a common terminal, a low-band terminal, and a middle-band terminal. The common terminal is connected to the switch . The wave separator separates signals into signals in the low-band group (the second frequency band group) and signals in the middle-band group (the first frequency band group).
21
210
210
10
The switch is an SPnT switch that includes the common terminal and selection terminals. The common terminal is connected to the low-band terminal of the diplexer B and each of the selection terminals is connected to the transmission path for a corresponding band in the low-band group.
22
6
30
22
220
221
220
10
221
30
The switch is disposed between the switch and the quadplexer B. The switch is an SPnT switch that includes the common terminal , the selection terminal , and other selection terminals. The common terminal is connected to the middle-band terminal of the diplexer B. The selection terminal is connected to the path on which the quadplexer B is disposed. Each of the other selection terminals is connected to the duplexer for a corresponding band in the middle-band group.
30
30
30
30
30
a
b
a
b
The quadplexer B is a second multiplexer including the transmitting filters T and T and the receiving filters R and R.
30
31
34
a
The transmitting filter T is a third transmitting filter connected to the common terminal (a second common terminal) and to the transmission terminal (a third transmission terminal). The pass band of the third transmitting filter is the transmission band of the band Ba.
30
31
35
a
The receiving filter R is a third receiving filter connected to the common terminal and to the reception terminal (a third reception terminal). The pass band of the third receiving filter is the reception band of the band Ba.
30
31
32
b
The transmitting filter T is a fourth transmitting filter connected to the common terminal and to the transmission terminal (a fourth transmission terminal). The pass band of the fourth transmitting filter is the transmission band of the band Bb.
30
31
33
b
The receiving filter R is a fourth receiving filter connected to the common terminal and to the reception terminal (a fourth reception terminal). The pass band of the fourth receiving filter is the reception band of the band Bb.
42
34
The resistance element is a resistance element for 50-ohm termination and is connected to the transmission terminal .
61
33
61
The reception amplifier circuit includes an input terminal and an output terminal. The input terminal is connected to the reception terminal . The reception amplifier circuit amplifies reception signals in the reception band of the band Bb.
43
430
431
432
430
61
The switch includes the common terminal and the selection terminals and . The common terminal is connected to the output terminal of the reception amplifier circuit .
3
The front-end module in Example 3 has a configuration applicable to both the CA involving simultaneous transmission and simultaneous reception of radio-frequency signals in two or more (frequency) bands and a non-CA mode for transmission and reception of radio-frequency signals in one band alone.
3
Specifically, the front-end module in Example 3 is configured to support the CA mode (two uplinks) involving simultaneous transmission of signals in the first transmission band and signals in the second transmission band. The first and second frequency bands are different frequency bands belonging to the first frequency band group including two or more frequency bands. In Example 3, the middle-band group is the first frequency band group, the band Ba is the first frequency band belonging to the middle-band group, and the band Bb is the second frequency band belonging to the middle-band group.
3
4
4
When the front-end module is operated in the non-CA mode, the front-end circuit E serves as a main path for both transmission and reception of signals in the band Ba and transmission and reception of signals in the band Bb, and the front-end circuit D serves as a sub-path (e.g., a diversity circuit) for both transmission and reception of signals in the band Ba and transmission and reception of signals in the band Bb.
74
4
75
4
34
4
35
For transmission and reception of signals in the band Ba in the non-CA mode, the transmission terminal of the front-end circuit E serves as a transmission terminal (Ba Tx) for the band Ba, and the reception terminal of the front-end circuit E serves as a reception terminal (Ba Rx) for the band Ba. The transmission terminal of the front-end circuit D serves as a terminal for 50-ohm termination for transmission signals in the band Ba, and the reception terminal serves as a diversity reception terminal (Ba DRx) for the band Ba.
72
4
451
450
45
432
430
43
4
For transmission and reception of signals in the band Bb in the non-CA mode, the transmission terminal of the front-end circuit E serves as a transmission terminal (Bb Tx) for the band Bb, and the selection terminal connected to the common terminal of the switch serves as a reception terminal (Bb PRx) for the band Bb. The selection terminal connected to the common terminal of the switch of the front-end circuit D serves as a diversity reception terminal (Bb DRx) for the band Bb.
3
4
4
4
4
32
4
431
430
43
74
4
75
4
452
450
45
4
35
4
When the front-end module is operated in the CA mode (two uplinks) for the bands Ba and Bb, the front-end circuit E serves as a main path for transmission and reception of signals in the band Ba, and the front-end circuit D serves as a main path for transmission and reception of signals in the band Bb. Thus, the front-end circuit E selectively transmits signals in the band Ba and the front-end circuit D selectively transmits signals in the band Bb. In this case, the transmission terminal of the front-end circuit D serves as a transmission terminal (Bb Tx ULCA) for the band Ba, and the selection terminal connected to the common terminal of the switch serves as a reception terminal (Bb PRx ULCA) for the band Bb. The transmission terminal of the front-end circuit E serves as a transmission terminal (Ba Tx) for the band Ba, and the reception terminal of the front-end circuit E serves as a reception terminal (Ba Rx) for the band Ba. The selection terminal connected to the common terminal of the switch of the front-end circuit E serves as a diversity reception terminal (Bb DRx ULCA) for the band Bb. The reception terminal of the front-end circuit D serves as a diversity reception terminal (Ba DRx) for the band Ba.
70
30
4
4
As described above, all of the transmission terminals and the reception terminals of the quadplexer A and all of the transmission terminals and the reception terminals of the quadplexer B are used when both the CA mode (two uplinks) and the non-CA mode are supported. It is thus required that each of the front-end circuits D and E includes a quadplexer for the bands Ba and Bb, which are to be subjected to CA.
3
90
52
The distinctive features of the front-end module in Example 3 include the impedance variable circuit and the phase shifter .
3
70
72
72
10
4
4
5
6
70
The front-end module in Example 3 is configured to form a connection between the reflection circuit and the quadplexer A via the transmission terminal in the CA mode (two uplinks) for the bands Ba and Bb. With the transmission terminal being viewed from the diplexer A side, the impedance state involves a large amount of reflection. Some transmission signal components in the band Bb may flow from the front-end circuit D and may enter the front-end circuit E through the antenna unit and the switch . However, the aforementioned configuration enables more radio frequency components in the band Bb to be reflected off the quadplexer A. This enables a reduction in the amount of intermodulation distortion that would occur when signals in the band Ba and signals in the band Bb are simultaneously transmitted.
70
70
3
90
70
The quadplexer A includes a nonlinear element, which gives rise to occurrence of intermodulation distortion in the quadplexer A. The front-end module in Example 3 may be operated in the CA mode in the state in which the reflection circuit in the impedance variable circuit is selected. This suppresses the occurrence of intermodulation distortion in the quadplexer A. This configuration eliminates or reduces, for example, the possibility that the reception sensitivity in the band Ba will degrade due to the occurrence of third-order intermodulation distortion.
3
52
23
70
70
23
The front-end module in Example 3 is also characterized in that the phase shifter is disposed between the switch module and the quadplexer A. Intermodulation distortion between a signal in the band Ba and a signal in the band Bb would occur not only in the quadplexer A but also in the switch module .
90
71
70
23
52
4
6
52
52
23
23
In the CA mode, the impedance variable circuit causes, as described above, reflection of waves in the band Bb, which in turn flow from the common terminal of the quadplexer A toward the switch module . The phase shifter enables the reflected waves to cancel transmission waves in the band Bb that flow into the front-end circuit E through the switch . More specifically, the phase shifter performs phase adjustment to create a phase difference between a transmission wave in the band Bb and a reflected wave (ideally, the phase shifter shifts these signals into opposite phases). This enables a reduction in transmission waves in the band Bb that flow into the switch module . The occurrence of intermodulation distortion in the switch module is suppressed accordingly. This configuration eliminates or reduces the possibility that the reception sensitivity in the band Ba will degrade due to the occurrence of intermodulation distortion.
4
6. Configuration of Front-End Circuit B in Modification 1
FIG. 6A
4
1
1
is a circuit configuration diagram of the front-end circuit B of a front-end module in Modification 1. The difference between the front-end module in Modification 1 and the front-end module in Example 1 is only in the configuration of the impedance variable circuit. Configurations common to the front-end module in Modification 1 and the front-end module in Example 1 will be omitted from the following description, which will be given while focusing on distinctive features of the front-end module in Modification 1.
80
41
32
41
410
32
411
412
410
411
412
An impedance variable circuit includes the switch connected to the transmission terminal , a reflection circuit, and a matching circuit. The switch is a second switch including: the common terminal (a third common terminal) connected to the transmission terminal ; the selection terminal (a first selection terminal); and the selection terminal (a second selection terminal). When the CA mode is selected, the second switch is set to the state in which the common terminal is electrically connected to the selection terminal and is not electrically connected to the selection terminal .
81
47
81
411
81
4
10
410
410
411
The reflection circuit includes a matching circuit and a resistance element . With the matching circuit being viewed from the selection terminal , the impedance of the matching circuit is extremely lower than 50Ω or extremely higher than 50Ω. Thus, the reflection circuit functions in such a manner that signals in the transmission band of the band Bb that are transmitted through the front-end circuit B from the diplexer B toward the common terminal are reflected when the common terminal is electrically connected to the selection terminal .
42
42
412
410
412
The matching circuit includes the resistance element for 50-ohm termination. The resistance element is connected to the selection terminal . Thus, the matching circuit functions in such a way as to transmit or absorb signals in the transmission band of the band Bb when the common terminal is electrically connected to the selection terminal .
30
32
32
10
4
4
6
30
The front-end module in Modification 1 is configured to form a connection between the reflection circuit and the quadplexer B via the transmission terminal in the CA mode (two uplinks) for the bands Ba and Bb. With the transmission terminal being viewed from the diplexer B side, the impedance state involves a large amount of reflection. Some transmission signal components in the band Bb may flow from the front-end circuit A and may enter the front-end circuit B through the switch . However, the aforementioned configuration enables more radio frequency components in the band Bb to be reflected off the quadplexer B. This enables a reduction in the amount of intermodulation distortion that would occur when signals in the band Ba and signals in the band Bb are simultaneously transmitted.
4
7. Configuration of Front-End Circuit B in Modification 2
FIG. 6B
4
1
22
30
1
is a circuit configuration diagram of the front-end circuit B of a front-end module in Modification 2. The front-end module in Modification 2 differs from the front-end module in Example 1 in that no phase shifter is disposed between the switch and the quadplexer B. Another difference between these front-end modules is in the configuration of the impedance variable circuit. Configurations common to the front-end module in Modification 2 and the front-end module in Example 1 will be omitted from the following description, which will be given while focusing on distinctive features of the front-end module in Modification 2.
4
10
21
22
43
30
85
61
The front-end circuit B in Modification 2 is a first circuit including the diplexer B, the switch (not illustrated), the switch , the switch (not illustrated), the quadplexer B, an impedance variable circuit , and the reception amplifier circuit .
85
41
32
41
410
32
411
412
410
411
412
The impedance variable circuit includes the switch connected to the transmission terminal , a reflection circuit, and a matching circuit. The switch is a second switch including: the common terminal (a third common terminal) connected to the transmission terminal ; the selection terminal (a first selection terminal); and the selection terminal (a second selection terminal). When the CA mode is selected, the second switch is set to the state in which the common terminal is electrically connected to the selection terminal and is not electrically connected to the selection terminal .
82
47
82
411
47
30
31
82
10
410
31
30
82
22
The reflection circuit includes a phase shifter and the resistance element . The phase shifter is a second phase shifter connected between the selection terminal and the resistance element . With the quadplexer B side being viewed from the common terminal , the impedance is shifted from 50Ω owing to the phase shifter acting on transmission waves in the band Bb that are transmitted from the diplexer B toward the common terminal . Consequently, waves in the band Bb that are reflected off the common terminal may be increased. This enables a reduction in intermodulation distortion components that would be generated in the quadplexer B when signals in the band Ba and signals in the band Bb are simultaneously transmitted. Furthermore, the phase shifter produces phase shifts in the reflected waves, which in turn cancel transmission waves in the band Bb. The occurrence of intermodulation distortion in the switch is suppressed accordingly. This configuration eliminates or reduces the possibility that the reception sensitivity in the band Ba will degrade due to the occurrence of intermodulation distortion.
9
8. Configuration of Communication Device
9
The present disclosure embraces not only the front-end modules in Examples 1 to 3 and Modifications 1 and 2, but also a communication device including any one of these front-end modules.
FIG. 7
FIG. 7
9
9
1
5
7
8
is a schematic configuration diagram of the communication device according to an embodiment. The communication device illustrated in includes the front-end module , the antenna unit , a radio-frequency signal processing circuit (radio-frequency integrated circuit (RFIC)) , and a baseband signal processing circuit (baseband integrated circuit (BBIC)) .
1
1
The front-end module according to the present embodiment is the front-end module in Example 1.
7
5
8
7
7
8
1
The radio-frequency signal processing circuit performs signal processing such as down-conversion on radio-frequency reception signals input from the antenna unit through a reception-side signal path and outputs the resultant reception signals to the baseband signal processing circuit . The radio-frequency signal processing circuit is, for example, a radio-frequency integrated circuit (RFIC). The radio-frequency signal processing circuit performs signal processing such as up-conversion on transmission signals input from the baseband signal processing circuit and outputs the resultant radio-frequency signals to the front-end module .
8
1
8
The baseband signal processing circuit is a circuit that process signals of frequencies lower than the frequencies used by the radio-frequency signals in the front-end module . The signals processed by the baseband signal processing circuit are used, for example, to display an image or to enable a telephone conversation through a speaker.
1
7
1
7
FIG. 7
Although the connection relationship between the front-end module and the radio-frequency signal processing circuit is not explicitly illustrated in , components such as a switch circuit, a low-noise amplifier circuit, and a power amplifier circuit are disposed, as appropriate, between the front-end module and the radio-frequency signal processing circuit .
9
2
3
1
9
5
8
The communication device may include the front-end module in Example 2, the front-end module in Example 3, the front-end module in Modification 1, or the front-end module in Modification 2 in place of the front-end module in Example 1. It is not always required that the communication device includes the antenna unit or the baseband signal processing circuit (baseband integrated circuit (BBIC)) .
Thus, a front-end system supporting the CA mode (two uplinks) is provided with a communication device that enables a reduction in the amount of intermodulation distortion associated with two different transmission signals and mitigates degradation of reception sensitivity.
Effects
1
1
4
4
6
5
4
4
4
30
4
70
4
41
410
41
30
41
410
411
412
411
410
411
6
410
412
410
412
The front-end module in Example 1 supports the CA mode involving simultaneous transmission of signals in the band Ba and signals in the band Bb. The bands Ba and Bb belong to the middle-band group. The front-end module includes: the front-end circuit B that selectively transmits signals in the band Ba when the CA mode is selected; the front-end circuit A that selectively transmits signals in the band Bb when the CA mode is selected; and the switch disposed between the antenna unit and each of the front-end circuits A and B. The front-end circuit B includes the quadplexer B for the bands Ba and Bb. The front-end circuit A includes the quadplexer A for the bands Ba and Bb. The front-end circuit B further includes the switch , the reflection circuit, and the matching circuit. The common terminal of the switch is connected to the transmission terminal that is included in the quadplexer B and corresponds to the band Bb. When the CA mode is selected, the switch is set to the state in which the common terminal is electrically connected to the selection terminal and is not electrically connected to the selection terminal . The reflection circuit is connected to the selection terminal . When the common terminal is electrically connected to the selection terminal , the reflection circuit causes reflection of signal components in the band Bb that are transmitted from the switch toward the common terminal . The matching circuit is connected to the selection terminal . When the common terminal is electrically connected to the selection terminal , the matching circuit transmits or absorbs signal components in the band Bb.
30
31
4
4
30
In the CA mode, this configuration forms a connection between the reflection circuit and the quadplexer B via the transmission terminal for the band Bb. With the transmission terminal for the band Bb being viewed from the common terminal side, the impedance thus involves a large amount of reflection accordingly. Some signal components in the band Bb may flow from the front-end circuit A and may enter the front-end circuit B. However, the aforementioned configuration enables more signal components in the band Bb to be reflected off the quadplexer B. This enables a reduction in the amount of intermodulation distortion that would occur when signals in the band Ba and signals in the band Bb are simultaneously transmitted.
1
22
6
30
51
22
30
The front-end module in Example 1 may further include: the switch disposed between the switch and the quadplexer B to shift the phase of each transmission signal component in the band Bb; and the phase shifter disposed between the switch and the quadplexer B to shift the phase of each transmission signal component in the band Bb.
4
4
30
22
22
This configuration creates a phase difference between a band-Bb transmission signal component flowing from the front-end circuit A into the front-end circuit B and a band-Bb transmission signal component reflected off the quadplexer B and bouncing back to the switch . Consequently, the two signals in the band Bb cancel each other. The occurrence of intermodulation distortion in the switch is suppressed accordingly.
3
3
4
4
6
5
4
4
4
70
4
30
4
46
460
46
70
46
460
461
462
461
460
461
6
460
462
460
462
The front-end module in Example 3 supports the CA mode involving simultaneous transmission of signals in the band Ba and signals in the band Bb. The bands Ba and Bb belong to the middle-band group. The front-end module includes: the front-end circuit E that selectively transmits signals in the band Ba when the CA mode is selected; the front D that selectively transmits signals in the band Bb when the CA mode is selected; and the switch disposed between the antenna unit and each of the front-end circuits D and E. The front-end circuit E includes the quadplexer A for the bands Ba and Bb. The front-end circuit D includes the quadplexer B for the bands Ba and Bb. The front-end circuit E further includes the switch , the reflection circuit, and the matching circuit. The common terminal of the switch is connected to the transmission terminal that is included in the quadplexer A and corresponds to the band Bb. When the CA mode is selected, the switch is set to the state in which the common terminal is electrically connected to the selection terminal and is not electrically connected to the selection terminal . The reflection circuit is connected to the selection terminal . When the common terminal is electrically connected to the selection terminal , the reflection circuit causes reflection of signal components in the band Bb that are transmitted from the switch toward the common terminal . The matching circuit is connected to the selection terminal . When the common terminal is electrically connected to the selection terminal , the matching circuit transmits or absorbs signal components in the band Bb.
70
71
4
4
70
In the CA mode, this configuration forms a connection between the reflection circuit and the quadplexer A via the transmission terminal for the band Bb. With the transmission terminal for the band Bb being viewed from the common terminal side, the impedance thus involves a large amount of reflection accordingly. Some signal components in the band Bb may flow from the front-end circuit D and may enter the front-end circuit E. However, the aforementioned configuration enables more signal components in the band Bb to be reflected off the quadplexer A. This enables a reduction in the amount of intermodulation distortion that would occur when signals in the band Ba and signals in the band Bb are simultaneously transmitted.
3
23
6
70
52
23
70
The front-end module in Example 3 may further include: the switch module disposed between the switch and the quadplexer A; and the phase shifter disposed between the switch module and the quadplexer A to shift the phase of each transmission signal component in the band Bb.
4
4
70
23
23
This configuration creates a phase difference between a band-Bb transmission signal component flowing from the front-end circuit D into the front-end circuit E and a band-Bb transmission signal component reflected off the quadplexer A and bouncing back to the switch module . Consequently, the two signals in the band Bb cancel each other. The occurrence of intermodulation distortion in the switch module is suppressed accordingly.
The front-end modules and the communication device according to the embodiments above have been described so far by citing examples and modifications thereof. However, the front-end module and the communication device according to the present disclosure are not limited to the examples and modifications thereof. The present disclosure embraces other embodiments implemented by varying combinations of constituent components of the examples and modifications above, other modifications achieved through various alterations to the examples above and modifications thereof that may be conceived by those skilled in the art within a range not departing from the spirit of the present disclosure, and various types of apparatuses including the front-end module and the communication device disclosed herein.
In each of the front-end modules and the communication devices according to the examples and modifications thereof, the paths forming connections between the circuit elements and the signal paths illustrated in the drawings may also include, for example, other radio-frequency circuit elements and wiring.
INDUSTRIAL APPLICABILITY
The present disclosure may be widely used as front-end modules having multi-band and multi-mode features for the adoption of the carrier aggregation scheme and may be included in communication devices such as mobile phones.
While embodiments of the disclosure have been described above, it is to be understood that variations and modifications will be apparent to those skilled in the art without necessarily departing from the scope and spirit of the disclosure. The scope of the disclosure, therefore, is to be determined solely by the following claims. | |
The UKHLS commenced in 2009 with an initial sample of 39,802 households in England, Scotland, Wales and Northern Ireland. Unlike the other studies covered by this guide, which are birth cohort studies by design, UKHLS is a panel study. UKHLS expands on and incorporates the British Household Panel Survey which began in 1991 with 5,500 households. The primary objective of UKHLS is to obtain longitudinal data on domains such as health, work, education, income, family and social life, to help inform policies and interventions. Data is collected annually and all individuals in the household are followed, also after they leave the household, and similarly any new household members get to join the study. A total of 10 annual sweeps have been completed with sweep 11 under way. One person completes the household questionnaire. Each person aged 16 or older completes the individual adult interview, including a self-completion questionnaire. Young people aged 10 to 15y are asked to respond to a paper self-completion questionnaire. Information on children under 10 is obtained from parents. A range of measures are collected from participants, including behaviours and attitudes, life events, employment, and health and wellbeing. Biomedical and objective health measures have been obtained in some sweeps. The most recent survey (as of the time of writing) completed in 2016-2018 (wave 8) involved a total number of 26,083 households and 35,417 individuals.
Physical activity overview (Young people: 10 to 15y)
Using the young person questionnaire (ages 10-15), leisure time activity was measured at waves 1, 2, 4, 6, 8, 9 and 10. Waves 1, 2, 4, 6, 8 and 9 asked the number of days in a normal week individuals played sports or other keep-fit activities. Waves 2, 4, 6 8 and 9 collected information on type of exercise participants engaged in; while waves 2, 4, 6, 8 and 10 collected information on attending classes outside of school including dance and sport. Active travel was collected at waves 1, 2, 4, 6, and 8 on the main method of travel to school (walk, bike, bus/tube, car, train, other). Sedentary behaviour (hr/day) engaging in a range of activities such as television watching, pc use, and gaming was measured in all sweeps (waves 1, 2, 3, 4, 5, 6, 7, 8, 9, and 10); finally, domestic activity (hr/week) will be included for the first time in Understanding society at wave 10.
Physical activity overview (Adults: 16y+)
In the mainstage questionnaire (ages 16+), leisure time was measured at waves 2, 5, 7 and 8. Waves 2 and 5 collected information on frequency of specific sports in the past 12 months. Waves 7 and 8 asked questions, derived from the IPAQ , on vigorous and moderate physical activities in the last 7 days. Occupational activities were captured at waves 2 and 5, asking individuals to rate how physically active their occupation is (very, fairly, not very, not at all). Method of active travel was measured at waves 1, 2, 3, 4, 6, 8. At waves 1, 2, 3, 4, 8, participants were asked about their mode of transport to work (cycling or walking); while in waves 1, 3, 6, 8, and 10 participants were asked how frequently they cycle (weekly to yearly). Domestic activities (hr/week) were measured at wave 1; sedentary behaviour (hr/day) while watching television was measured at waves 3, 6, and 9.
UKHLS is well designed for comparability of variables across time, with typically the exact same question wording and response scale used at different waves, providing direct comparability. For example, in adulthood, specific sports frequency at waves 2 and 5 are directly comparable. Similarly, waves 7 and 8 ask about past week vigorous and moderate exercise are directly comparable. To compare across all waves of LTPA (2, 5, 7, and 8), specific sports from waves 2 and 5 may be categorised by intensity and compared on the weekly/ non-weekly level. Generally, elsewhere, in regards to occupation, active travel, domestic, and sedentary behaviour each variable should have a corresponding variable in a following wave with which direct comparisons can be undertaken.
Data access
Understanding Society data are freely accessible to bona fide researchers by applying through the UK Data Service. More information on Understanding Society is available on the Understanding Society website.
Learn about the other studies covered by this guide and their measurement of physical activity:
- 1946 National Survey of Health and Development (NSHD)
- 1958 National Child Development Study (NCDS)
- 1970 British Cohort Study (BCS70)
- Avon Longitudinal Study of Parents and Children (ALSPAC)
- Millennium Cohort Study (MCS)
Explore the measures by physical activity domain and their cross-study comparability:
- Summary of cross-study comparisons
- Leisure time physical activity
- Occupational activity
- Active travel
- Domestic activities
- Sedentary behaviour
Further information:
- Acknowledgements and copyright information for this guide
- References for this guide
- Download the full guide as a PDF
- Electronic appendix: Index of all documented measures
This page is part of the CLOSER resource: ‘Physical activity across age and study: a guide to data in six CLOSER studies’. | https://www.closer.ac.uk/cross-study-data-guides/physical-activity-measures-guide/ukhls-physical-activity/ |
Minimising environmental impact coordinating the airbus approach to global environmental industrial footprint a new procedure to paint the a380 is in. This aluminium-glass-fibre laminate is lighter and has better corrosion and impact resistance than whether the a380 project would powered airbus a380,. Managing change in the delivery of complex projects: configuration management, asset information and such as the a380, “total lifecycle impact of the.
“perceived failures” in the projects_ airbus a380 the impact of the a380 project on the financial performance of eads, retrieved 15mar14from: https. The impact of the a380 project on the financial performance of eads will help paint the picture of the a380 project impact on the short run financial. Free essay: acknowledgements we would like to express our gratitude to the department for affording us the time and research facilities without which this. The greatest proportion of our carbon emissions come from the consumption of jet fuel, so our selection of aircraft and how we operate present the best opportunities for reducing our environmental impact.
Project quality management wwwpm4devcom project quality management quality management is the process for ensuring that all project activities necessary to design, plan and implement a project are. This shortage of worker was also affecting the delivery of the a380 as airbus has not realized the financial impact on the company by case solution/ analysis. This is a list of megaprojects and long-lasting impact on the megaprojects require care in the project development process to reduce any possible optimism.
Impact of technology changes on maintenance costs 10 september 2014 copyright project based learning lean/6-sigma mentoring our services our people. View this research paper on project management involved in formation of airbus a380 the report investigates factors that led to the a380 project impact of. Airbus a380 superjumbo airliner share impact resistant thermoplastics are used on the wing leading edge project overview.
Composite materials in the airbus a380 impact bird strike impact strength for being reviewed on the a3xx project. The impact of the a380 project on the financial performance of eads surrounding the airbus a380 project impact of a project in the computer. What impact will airbus have on air travel the good thing that a third of the project was funded by eu the impact of the a380 on air travel remains to.
The impact of the a380 project on the financial performance of eads more about the a380 project essay example the result of boeing 777 project case study. In 1999, the european aircraft manufacturer airbus initiated the a380 project to manufacture the world's first double-decker aircraft with a. Forbes 400 america's richest impact partners it could probably better divert resources from the money-losing a380 project to one of its many.
The airline joined the project in cooperation with the a380 minimizes environmental impact thanks to its reduced fuel burn that generates the lowest carbon. Essays - largest database of quality sample essays and research papers on project management of airbus a380. Wwwfzthaw-hamburgde.
Airbus said that from 2020, it would be producing six a year of the a380 superjumbo, bringing total losses on the project to more than €8bn (£71bn. The legal risks which will cause an impact on the project are identified and assessed how the legal risks can the a380 transport project and logistics ltd-h m. Strategic portfolio management is was there an emphasis on properly staffing the a380 with trained project what will be the impact of the. A380 family a380 family japanese project wins airbus award for diversity the three finalist projects were evaluated on the basis of the impact of their.
2018. | http://pkhomeworkwyat.macrophytes.info/the-impact-of-the-a380-project.html |
Date: Dec 19, 2020
I've enjoyed reading this book and thought of using it as reference from time to time. The content has simple format: term, description, images that demonstrate the term, and references. However, I want to refer to it in form of checklist so I can keep track of which methods I have tried and which are not. Thus, I put together this checklist.
<aside> 💡 - You can duplicate this note and use the checklist for your own reference, if you want to.
ctrl+f(or
cmd+fin macOS).
</aside>
The checklist includes brief description of each term and omits all images from the book. This way, the checklist can stay lean and easily accessible as quick reference. If you want to read the full content, you can get the book from amazon:
Get the book from Amazon: https://www.amazon.com/gp/product/B0785R9K78
[ ] 001. A/B Testing
Comparing two versions of a design to see which performs better against a predetermined goal.
[ ] 002. AEIOU
A framework for structuring field observations. This can be used to guide any ethnographic or observational method.
[ ] 003. Affinity Diagramming
The visible clustering of observations and insights into meaningful categories and relationships.
[ ] 004. Artifact Analysis
A systematic examination of the material, aesthetic, and interactive qualities of objects. It asks what objects say about people and their culture, time, and place rather than focusing on what people say about the products and systems they use.
[ ] 005. Automated Remote Research
Using web-based tools to reveal statistically relevant data for usability enhancements. It enables design teams to leverage web-based tools to collect statistically significant information about what people are doing on your website or web application.
[ ] 006. Behavioral Mapping
Systematic visual documentation of location-based human activity. This is used to document observable human activities and personal characteristics, interactions, time spent at fixed locations or in transit, and details of environmental context.
[ ] 007. Bodystorming
Brainstorming and spontaneous prototyping through dynamic physical experience and role-play.
[ ] 008. Brainstorm Graphic Organizers
Visual structures of new ideas and concepts. Brainstorming creates a judgment-free zone to express creative ideas and explore new concepts.
[ ] 009. Business Origami
Paper-prototyping interactions and value exchanges among people, artifacts, and environments. Business origami is a service design activity where stakeholders build a physical representation of a system and then prototype future or alternative states.
[ ] 010. Card Sorting
Participant sorting of concepts, terms, or features into meaningful categories and relationships using printed cards. This can be used to explore how participants group items into categories and relate concepts to one another, whether for digital interface design or a table of contents.
[ ] 011. Case Studies
In-depth investigation of single instances to gain detailed knowledge using multiple sources. This is useful for understanding existing phenomena for comparison or inspiration and to study the effects of change, new programs, or innovations. | https://www.notion.so/wzulfikar/36dd006a158f4b03a1b42d21156f567d |
The tongue twister “prosopography” literally means “descriptions of persons”; it is a learned neologism derived from the Greek prosōpon = “face, mask, dramatic character, person” and graphein = “write.” In current use, the word means two interrelated things: (1) an auxiliary discipline collecting and organizing all evidence relating to the individuals who make up (regularly large) groups of historical persons and establishing the connections among them; and (2) an analytical approach that makes use of those collections. Originally, prosopography was a way of study that was very specific to classics. Meanwhile, it has also been applied with increasing success to other branches of historical research. The following bibliography focuses on general collections, reference works, and comprehensive studies. Much of the practical work on details is published in numerous articles of scholarly journals (e.g., Zeitschrift für Papyrologie und Epigraphik).
Origins, History, Significance
To humanists of the 16th century, prosopograpy simply meant a work offering a series of literary portraits of famous persons (e.g., Göbler 1537). Later, the word was used for an ample index of persons mentioned in a single work or text corpus (Groen van Prinsterer 1823). It acquired its modern meaning not before the late 19th century. At that point, the Berlin Academy commissioned lexicons to collect all available information on persons: one for all Athenian citizens (Prosopographia Attica; see Greece: Reference Works) and one for the high dignitaries of the Roman Empire (Prosopographia Imperii Romani; see Roman Empire; for the early history, see W. Eck in Cameron 2003, pp. 11–22, and T. D. Barnes in Keats-Rohan 2007, pp. 71–82). In substance, these were works of a new type though they retained the old name “prosopography.” They became increasingly desirable as archaeological excavations and scholarly surveys produced masses of monumental inscriptions and papyri containing a huge amount of new information on persons. Meanwhile, prosopography has developed an international and multilingual identity, treating nearly all epochs and sectors of classics and many fields beyond. The primary concern was and is to organize knowledge about historically attested persons. Two broad patterns can be discerned: the prosopography of elites and works that include all persons of an area for a certain time. The collections provide the groundwork for social, administrative, and military history, and make visible the social profile of classes, patterns of careers, and personal networks, particularly within elites. Furthermore, attempts have been made to use these data to interpret political history presupposing that personal relations are the key for understanding, but the results have not always been conclusive (see Controversies in Approaches to Roman Republican Prosopography). Stone 1971 provides a critical evaluation of what prosopography is; the present state of the art is represented in Cameron 2003 and Keats-Rohan 2007; for introductions, see Hornblower and Spawforth 2016, and Fossey 1991. The task of gathering and organizing data is still not finished. Particularly for the Hellenistic age and the Roman Empire, much new evidence comes to light every year. Hence, a steady supplementation is needed, which complicates the use of printed reference works. In the meantime, computers, databases, and the Internet increasingly offer new and better ways to make knowledge accessible. The transition to information technology (IT) and Internet-based work has begun, but is not yet finished. It appears that the possibilities of IT have facilitated the considerable growth of a new interest in prosopography outside of classics.
Cameron, Averil, ed. 2003. Fifty years of prosopography: The later Roman Empire, Byzantium and beyond. Proceedings of the British Academy 118. Oxford: Oxford Univ. Press.
An instructive collection of papers on the history of prosopographical research and the state of the discipline, originating from a conference in 2000 on the occasion of the 50th anniversary of The Prosopography of the Later Roman Empire project (see Late Antiquity: General); mainly referring to Late Antiquity and Byzantium.
Fossey, John M. 1991. The study of ancient Greek prosopography. Chicago: Ares.
An introduction to Greek prosopography offering an extensive bibliography.
Göbler, Justinus. 1537. Prosopographiarum libri quatuor in quibus personarum illustrium descriptiones aliquot seu imagines ex optimis quibusdam authoribus per Justinum Goblerum selectae continentur. Moguntiae (= Mainz).
The first work titled “prosopography.” In Latin.
Groen van Prinsterer, G. 1823. Prosopographia platonica: Sive expositio judicii, quod Plato tulit de iis, qui in scriptis ipsius aut loquentes inducuntur, aut quavis de causa commemorantur. Lugduni Batavorum (= Leiden), The Netherlands: Luchtmans.
A prosopography in the old sense: a study (continuous text) compiling what Plato said on persons he mentioned. In Latin. Reprinted 1975 (Amsterdam: Hakkert).
Hornblower, Simon, and Anthony J. S. Spawforth. 2016. Prosopography. In the Oxford Classical Dictionary. Digital ed. Edited by Sander Goldberg. New York: Oxford Univ. Press.
DOI: 10.1093/acrefore/9780199381135.013.5382
A useful summary of what prosopography means, markedly influenced by the controversy on prosopography of the Roman Republic (see Controversies in Approaches to Roman Republican Prosopography). Originally published in 1996, in the Oxford Classical Dictionary, 3d ed., edited by Simon Hornblower and Antony Spawforth, 1262-1263 (Oxford and New York: Oxford Univ. Press).
Keats-Rohan, K. S. B., ed. 2007. Prosopography approaches and applications: A handbook. Prosopographica et Genealogica 13. Oxford: Unit for Prosopographical Research, Linacre College, Univ. of Oxford.
A collection of articles on what prosopography is, on its history, and on current projects. It also gives guidance on how to proceed in prosopographical works. It gives a good overview of the current state of the field even outside of classics.
Modern History Research Unit, Univ. of Oxford. Prosopography Research.
Offers an online bibliography that in major part refers to research outside of classics.
Stone, Lawrence. 1971. Prosopography. Daedalus 100:46–79.
An influential and often-quoted article on prosopography. Its information on the origins and the use of prosopography in classics is incomplete.
Users without a subscription are not able to see the full content on this page. Please subscribe or login.
How to Subscribe
Oxford Bibliographies Online is available by subscription and perpetual access to institutions. For more information or to contact an Oxford Sales Representative click here.
Article
- Academy, The
- Acropolis of Athens, The
- Aeschylus
- Aeschylus’s Oresteia
- Aesthetics, Greek and Roman
- Africa, Roman
- Agriculture in the Classical World
- Alcibiades
- Alexander of Aphrodisias
- Alexander the Great
- Amicitia
- Ammianus Marcellinus
- Anaxagoras
- Ancient Classical Scholarship
- Ancient Greek and Latin Grammarians
- Ancient Skepticism
- Antonines, The
- Aphrodite
- Apollodorus
- Apollonius of Rhodes
- Appendix Vergiliana
- Apuleius
- Apuleius's Platonism
- Ara Pacis Augustae
- Aratus
- Archaeology, Greek
- Archaeology, Roman
- Architecture, Etruscan
- Architecture, Greek
- Architecture, Roman
- Arena Spectacles
- Aristophanes
- Aristophanes’ Clouds
- Aristophanes’ Lysistrata
- Aristotle
- Aristotle, Ancient Commentators on
- Aristotle's Categories
- Aristotle's Ethics
- Aristotle’s Metaphysics
- Aristotle's Philosophy of Mind
- Aristotle's Politics
- Art and Archaeology, Research Resources for Classical
- Art, Etruscan
- Art, Greek
- Art, Late Antique
- Artemis
- Athena
- Athenaeus of Naucratis
- Athenian Agora
- Athenian Economy
- Attic Middle Comic Fragments
- Augustine
- Augustus
- Aulus Gellius
- Ausonius
- Bacchylides
- Banking in the Roman World
- Bilingualism and Multilingualism in the Roman World
- Biography, Greek and Latin
- Boethius
- Britain, Roman
- Caecilius Statius
- Caere/Cerveteri
- Callimachus of Cyrene
- Carthage, Punic
- Cato the Censor
- Catullus
- Christianity, Early
- Chronicles
- Cicero
- Cicero's Pro Archia
- Cicero's Rhetorical Works
- Cities in the Roman World
- Classical Architecture in Europe and North America since 1...
- Classical Architecture in Renaissance and Early Modern Eur...
- Classical Art History, History of Scholarship of
- Classics and Cinema
- Classics and Dance
- Classics and Opera
- Classics and the Victorians
- Claudian (Claudius Claudianus)
- Cleisthenes
- Cleopatra
- Codicology/Paleography, Greek
- Colonization in the Roman Empire
- Colonization in the Roman Republic
- Columella
- Constantine
- Corpus Tibullianum Book Three
- Countryside, Roman
- Crete, Ancient
- Critias of Athens
- Death
- Death and Burial in the Roman Age
- Declamation
- Democritus
- Demography, Ancient
- Demosthenes
- Dio, Cassius
- Diodorus Siculus
- Diogenes Laertius
- Dionysus
- Donatus
- Doxography, Ancient
- Drama, Latin
- Economy, Roman
- Education
- Egypt, Hellenistic and Roman
- Emotions
- Empedocles
- Ennius
- Epictetus
- Epicureanism
- Epigraphy, Greek
- Epigraphy, Latin
- Eratosthenes of Cyrene
- Etruscans
- Euripides
- Euripides’ Bacchae
- Euripides’ Electra
- Euripides’ Trojan Women
- Fabius Pictor
- Family, Roman
- Federal States, Greek
- Festus
- Fragments, Greek Old Comic
- Frontiers of the Roman Empire
- Galen
- Gardens, Greek and Roman
- Geography
- Gracchi Brothers, The
- Greek and Roman Logic
- Greek Colonization
- Greek Inscribed Epigram
- Greek New Comic Fragments
- Greek Originals and Roman Copies
- Greek Prehistory Through the Bronze Age
- Greek Vase Painting
- Hellenistic Tragedy
- Heracles
- Heraclitus
- Herculaneum (Modern Ercolano)
- Herculaneum Papyri
- Heritage Management
- Hermes
- Herodas
- Herodotus
- Hesiod
- Historia Augusta
- Historiography, Greek
- Historiography, Latin
- History, Greek: Archaic to Classical Age
- History, Greek: Hellenistic
- History of Modern Classical Scholarship (Since 1750), The
- History, Roman: Early to the Republic
- History, Roman: Imperial, 31 BCE–284 CE
- History, Roman: Late Antiquity
- Homer
- Homeric Hymns
- Homo novus/New man
- Horace
- Horace's Epistles and Ars Poetica
- Horace’s Epodes
- Horace’s Odes
- Horace’s Satires
- Imperialism, Roman
- Intertextuality in Latin Poetry
- Jews and Judaism
- Juvenal
- Lactantius
- Land-Surveyors
- Language, Ancient Greek
- Languages, Italic
- Latin Paleography, Editing, and the Transmission of Classi...
- Latin Poetry, Epigrams and Satire in
- Law, Greek
- Law, Roman
- Lexicography, Greek
- Lexicography, Latin
- Linguistics, Indo-European
- Literary Criticism, Ancient
- Literary Letters, Greek
- Literary Letters, Roman
- Literature, Hellenistic
- Literature, Neo-Latin
- Livy
- Looting and the Antiquities Market
- Lucan
- Lucilius
- Lucretius
- Lysias
- Macedonia
- Magic in the Ancient Greco-Roman World
- Maps
- Marcus Aurelius's Meditations
- Marcus Cornelius Fronto
- Marcus Manilius
- Maritime Archaeology of the Ancient Mediterranean
- Marius and Sulla
- Martial
- Mechanics
- Menander of Athens
- Metaphysics, Greek and Roman
- Metrics, Greek
- Middle Platonism
- Military, Greek
- Military, Roman
- Miltiades of Cimon
- Minor Socratics
- Mosaics, Greek and Roman
- Mythography
- Mythology
- Narratology and the Classics
- Neoplatonism
- Nepos, Cornelius
- Nonnus
- Novel, Roman
- Novel, The Greek
- Numismatics, Greek and Roman
- Optimates/Populares
- Orosius
- Orpheus and Orphism
- Ovid
- Ovid’s Exile Poetry
- Ovid’s Love Poetry
- Ovid's Metamorphoses
- Painting, Greek
- Panaetius of Rhodes
- Pantheon
- Papyrology: Literary and Documentary
- Parmenides
- Parthenon
- Pausanias
- Performance Culture, Greek
- Perikles (Pericles)
- Petronius
- Philo of Alexandria
- Philodemus of Gadara
- Philoponus
- Philosophy, Greek
- Philosophy of Language, Ancient
- Philosophy, Presocratic
- Philosophy, Roman
- Philostratus, Lucius Flavius
- Pindar
- Plato
- Plato’s Apology of Socrates
- Plato's Laws
- Plato's Metaphysics
- Plato’s Phaedo
- Plato’s Philebus
- Plato’s Sophist
- Plato’s Theaetetus
- Plato's Timaeus
- Plautus
- Plautus’s Amphitruo
- Plautus’s Miles Gloriosus
- Pliny the Elder
- Pliny the Younger
- Plotinus
- Plutarch's Moralia
- Poetic Meter, Latin
- Poetry, Greek: Elegiac and Lyric
- Poetry, Greek: Epigrams
- Poetry, Greek: Iambos
- Poetry, Greek: Pre-Hellenistic
- Poetry, Latin: From the Beginnings through the End of the ... | https://www.oxfordbibliographies.com/view/document/obo-9780195389661/obo-9780195389661-0077.xml |
Dance artists Jay Hirabayashi and Barbara Bourget are inducted into the Dance Collection Danse Hall of Fame in Toronto
In 1986, Vancouver dance artists Jay Hirabayashi and Barbara Bourget founded the Kokoro Dance Theater Society, and now, after 35 years of sustained dance performance, they will be inducted into the Dance Collection Danse Hall of Fame, a Toronto organization dedicated preserving Canada’s dance heritage.
The Kokoro Dance company takes its name from the Japanese word Kokoro, meaning heart, soul and spirit, and is mainly inspired by the Japanese dance form butohdescribed as a “dance of darkness” that explores the boundaries between the realms of life and death.
Hirabayashi is the son of Gordon Hirabayashi, known for challenging the U.S. government over the internment of Japanese Americans during World War II, and to honor his parents Gordon and Esther, young Hirabayashi played butoh in their memory.
He also thanks his parents for his introduction to dance. “My earliest memory of dancing was watching my mother square dancing when I was six or seven,” he recalls. “My mum loved to dance and she took my sisters and me to see the Bolshoi Ballet when we were kids.”
But Hirabayashi’s dancing career was not guaranteed, as he only started dancing lessons to rehabilitate one of his legs after an operation. “I have always been athletically active and found my first dance lessons to be physically and mentally challenging,” he said. “Although I started very late at the age of 30, I was asked to join the Paula Ross Dance Company after only one year of study at Paula’s studio.”
He moved from modern dance to ballet and contact improvisation. “I learned that ballet was the technical basis of modern dance, so I started taking ballet lessons to learn how to turn better and to develop a certain grace and fluidity in my movement,” he said. he tells. “For me, skiing is always an improvisation where you have to deal with changing terrain. Contact improvisation is similar in that you have to make spontaneous choices when dancing with a partner or solo with the floor as your partner.
Then, in 1980, Hirabayashi saw a poster for a presentation by Harupin-ha, directed by Koichi and Hiroko Tamano, of Ankoku Butoh – Dance of Darkness. “We had never heard of butoh, so we went to see the show and we never forgot that show,” Hirabayashi said. “Tamano’s solo took our breath away and stopped time.”
When Hirabayashi and Bourget formed Kokoro Dance, they wanted to explore and develop their own form of butoh. “Butoh is not a specific technique,” he described. “It’s a search for its own original and unique way of moving.”
In 1995, Hirabayashi traveled to Japan to study with butoh pioneer Kazuo Ohno. “He would talk to us for an hour and then ask us to get up and dance what he was talking about,” Hirabayashi recalled. “He gave no instructions or corrections.”
Hirabayashi had to search inside himself to follow Ohno’s instructions. “He told us not to imitate his way of moving and not to use any technique,” Hirabayashi said. “He would look at us for ten or fifteen minutes and then stop us and tell us he didn’t think we understood what he was talking about.”
Ohno patiently continued to verbalize his subject and asked the dance students to try again. “This pattern would repeat for the rest of the class and subsequent classes,” Hirabayashi said. “These were the hardest classes I’ve ever taken because we were totally on our own while trying to move in a way we’ve never done before.”
Eventually, Hirabayashi discovered his own style. “Butoh is about as far away from mainstream contemporary dance as you can get,” he said. “butoh is the only dance aesthetic we have discovered that recognizes that to change time and space in your audience, you must change time and space within yourself.
Despite this artistic development, Hirabayashi and Bourget struggled to build their dance company and career for many years. “When we started Kokoro Dance, Barbara and I had four kids to raise and we had no funding,” he said. “We both had to take turns caring for the kids while juggling multiple part-time jobs to support our dancing careers.”
Hirabayashi reports encountering systemic racism in Canadian government arts funding systems. “The Canada Council for the Arts has based its funding on peer review,” he said. “They would send reviewers to our performance, who would then write reviews which formed the basis for determining where our work deserved funding. However, in 1986, there was not a single dance company funded by the Canada Council for the Arts that did not have an English or French name.
At the time, he says, there were no other butoh companies and no real peers to evaluate the work of Kokoro Dance. “It took us six years to get our first company grant from the Canada Council for the Arts,” he says, “and we only got that first grant when we asked that no artistic director of a dance company funded by the Canada Council for the Arts is allowed to evaluate us and send someone from any other performing arts discipline instead.
Today, Hirabayashi is honored to be inducted into the DCD Hall of Fame. “We understood when we created Kokoro Dance that there was an ecology of systems that we had to initiate if we were to survive as butoh artists,” he said. “If we were going to have dancers work with us, we had to start teaching.”
He predicted decades ago that Kokoro Dance would be a long-term project without necessarily immediate results. “If we were to give our dancers opportunities to grow, we had to perform whenever there was an opportunity and if there were no opportunities, we had to create our own opportunities,” he said. he declares. “If we wanted to survive, we had to build an audience, so we performed outside of the normal dance milieu.”
Kokoro Dance now has a more diverse audience than most other dance companies. “We’ve played the Vancouver International Children’s Festival, we’ve done hundreds of school shows, we’ve played the Vancouver International Jazz Festival, the Vancouver Folk Music Festival and the alternative rock and political activist festival Under the Volcano,” said said Hirabayashi. “When we realized there was a growing number of BIPOC and LGBTQ+2S artists who deserved equity but were marginalized within their respective small communities, we launched the Vancouver International Dance Festival by putting focus on showcasing these marginalized artists.”
Hirabayashi and Bourget have created over 200 dance works and plan to create, perform and teach in the future. “We will be leading the 28e annual intensive Wreck Beach Butoh performances in July and also performing at the Powell Street Festival on July 31,” he said. “In September, we will be participating in the National Association of Japanese Canadians Gei: Art Symposium in Victoria, BC, September 15-18, along with over 100 other Japanese Canadian artists.
And that’s not all: in March 2023, Kokoro Dance will present the 23rd Vancouver International Dance Festival, including performances by Hirabayashi and Bourget of their own work. | https://kmjazz.com/dance-artists-jay-hirabayashi-and-barbara-bourget-are-inducted-into-the-dance-collection-danse-hall-of-fame-in-toronto/ |
It’s déjà vu all over again! On Monday, the SEC announced settled charges against Pearson plc, an NYSE-listed, educational publishing and services company based in London, for failure to disclose a cybersecurity breach. You might recall that just a few months ago, the SEC announced settled charges against another company for failure to timely disclose a cybersecurity vulnerability that led to a leak of data, with disclosure ultimately spurred by imminent media reports. Is there a trend here? In this instance, it wasn’t just a vulnerability—there was an actual known breach and exfiltration of private data. Nevertheless, Pearson decided not to disclose it and framed its cybersecurity risk factor disclosure as purely hypothetical. The SEC viewed that disclosure as misleading and imposed a civil penalty on Pearson of $1 million. The case serves as yet another reminder of the dangers of risk disclosures presented as hypothetical when those risks have actually come to fruition—a presentation that has now repeatedly drawn scrutiny in the context of cybersecurity disclosure.
Can hypothetical risk factors be misleading?
In In re Alphabet Securities Litigation., the State of Rhode Island, as lead plaintiff, filed a Rule10b-5 action against Google LLC, its holding company Alphabet, Inc., and certain executives, alleging that the defendants failed to timely disclose certain cybersecurity defects and vulnerabilities. The district court granted defendants’ motion to dismiss the complaint, but on appeal, a three-judge panel of the 9th Circuit reversed in part, holding that the complaint “plausibly alleged” that the decision to omit information about these cybersecurity vulnerabilities “significantly altered the total mix of information available for decision-making by a reasonable investor” and that scienter—intent to deceive, manipulate or defraud—was adequately alleged. Importantly, the Court held that the complaint contained a plausible allegation that Alphabet’s omission was materially misleading: its risk factor discussion of cybersecurity was framed in the hypothetical, while, it was alleged, the “hypothetical” events had in fact already come to fruition. The case serves as a reminder of a couple of now-familiar themes: companies need to regularly review their risk factor disclosures, even when—or perhaps especially when—they are incorporating them by reference to ensure that they have been appropriately updated to reflect actual events that may have made the risks described as merely hypothetical no longer so. It’s also notable that this case represents the second recent instance of allegations of failure to disclose the discovery of a material cybersecurity “vulnerability”—in the absence of a cyberattack—with disclosure ultimately compelled by the publication of an article exposing the defects. It’s another reminder that companies need to be vigilant for potential disclosure obligations about cybersecurity that might arise outside the context of cyberattacks and hacks—in the more-difficult-to-assess context of cybersecurity vulnerabilities. | https://cooleypubco.com/tag/hypothetical-risk-disclosure/ |
Screening tests are typically the first assessment completed and are used to determine if further diagnostic testing might be needed. Because screening tests are the first step towards diagnosis, they are designed to be more likely to overestimate the true incidence of a disease. Designed to be different from diagnostic tests in that they might demonstrate more positive results than a diagnostic test. This can lead to both true positives as well as false positives. Once a screening test is found to be positive, a diagnostic test is then completed to confirm the diagnosis. Next we will discuss the assessment of diagnostic tests.
Many screening tests are available for physicians and advanced chiropractic practitioners to utilize in their practice. For some tests, there is quite a bit of research demonstrating the benefit of such tests on early diagnosis and treatment. Dr. Alex Jimenez presents appropriate assessment and diagnostic tools used in office to further clarify and appropriated diagnostic assessments.
Three Spine Abnormalities That Chiropractic Helps El Paso, TX.Sometimes there are abnormalities of the spine and it causes a misalignment of the natural curvatures or some curvatures may be exaggerated. These unnatural curvatures of the spine are characterized by three health conditions called lordosis, kyphosis, and scoliosis....
4 Benefits Of Scoliosis Screening From A ChiropractorIt is estimated that scoliosis affects anywhere from 2 to 3 percent of children and adults in the United States. That is roughly six to nine million people. While it seems to develop most commonly within specific age ranges for boys and girls, it can also develop in...
Diagnosis and Management of Rheumatoid ArthritisAbout 1.5 million people in the United States have rheumatoid arthritis. Rheumatoid arthritis, or RA, is a chronic, autoimmune disease characterized by pain and inflammation of the joints. With RA, the immune system, which protects our well-being by attacking foreign...
How Arthritis Can Affect the KneeArthritis is characterized as the inflammation of one or multiple joints. The most common symptoms of arthritis include pain and discomfort, swelling, inflammation, and stiffness, among others. Arthritis may affect any joint in the human body, however, it commonly...
The Basic Science of Human Knee Menisci Structure, Composition, and FunctionThe knee is one of the most complex joints in the human body, consisting of the thigh bone, or femur, the shin bone, or tibia, and the kneecap, or patella, among other soft tissues. Tendons connect the bones to the muscles while ligaments connect the bones of the knee...
Evaluation of Patients Presenting with Knee Pain: Part II. Differential DiagnosisThe knee is the largest joint in the human body, where the complex structures of the lower and upper legs come together. Consisting of three bones, the femur, the tibia, and the patella which are surrounded by a variety of soft tissues, including cartilage, tendons...
Evaluation of Patients Presenting with Knee Pain: Part I. History, Physical Examination, Radiographs, and Laboratory Tests
Knee pain is a common health issue among athletes and the general population alike. Although symptoms of knee pain can be debilitating and frustrating, knee pain is often a very treatable health issue. The knee is a complex structure made up of three bones: the lower section of the thighbone, the upper region of the shinbone, and the kneecap.
Powerful soft tissues, such as the tendons and ligaments of the knee as well as the cartilage beneath the kneecap and between the bones, hold these structures together in order to stabilize and support the knee. However, a variety of injuries and/or conditions can ultimately lead to knee pain. The purpose of the article below is to evaluate patients with knee pain.
Abstract
<
What is a Quadriceps Tendon Rupture?
The tendons are powerful soft tissues which connect the muscles to the bones. One of these tendons, the quadriceps tendon, works together with the muscles found at the front of the thigh in order to straighten the leg. A quadriceps tendon rupture can affect an individual’s quality of life.
A quadriceps tendon rupture can be a debilitating injury and it usually requires rehabilitation and surgical interventions to restore knee function. These type of injuries are rare. Quadriceps tendon ruptures commonly occur among athletes who perform jumping or running sports.
Quadriceps Tendon Rupture Description
The four quadriceps muscles come together above the kneecap, or patella, to form the quadriceps ten
What is Knee Plica Syndrome?
The knee is a made up of a variety of complex soft tissues. Enclosing the knee joint is a fold at its membrane known as the plica. The knee is encapsulated by a fluid-filled structure called the synovial membrane. Three of these capsules, known as the synovial plicae, develop around the knee joint throughout the fetal stage and are absorbed before birth.
However, during one research study in 2006, researchers found that 95 percent of patients undergoing arthroscopic surgery had remnants of their synovial plicae. Knee plica syndrome occurs when the plica becomes inflamed, generally due to sports injuries. This often takes place in the center of the kneecap, known as medial patellar plica syndrome.
What are the Symptoms of Knee Plica Syndrome?
The m
What is Chondromalacia Patellae?
Chondromalacia
Sports injuries like chondromalacia patellae are frequently regarded as an overuse injury. Taking some time off from participating in physical activities and exercise may produce superior outcomes. In the instance that the individual’s health issues are due to improper knee alignment, rest may not offer pain relief. Symptoms of runner’s knee include knee pain and grinding sensations.
What Causes Chondromalacia
What is Osgood-Schlatter Disease?
Osgood-Schlatter disease is a common cause of knee pain in growing adolescents. It is characterized by the inflammation of the site below the knee where the tendon from the kneecap, or the patellar tendon, attaches to the shinbone, or tibia. Osgood-Schlatter disease occurs during growth spurts when muscles, bones, tendons, and other tissues shift rapidly.
Physical activities can place additional stress on the bones, muscles, tendons and other complex structures of young athletes. Children and adolescents who participate in running and jumping sports have a higher chance of developing this condition. However, less active children and adolescents may also experience this well-known health issue.
In the majority of instances, Osgood-Schlatte
What Is Sinding-Larsen-Johansson Syndrome?
Sinding-Larsen-Johansson, or SLJ, syndrome is a debilitating knee condition that most commonly affects teens during periods of rapid growth. The kneecap, or patella, is attached to the shinbone, or tibia, from the patellar tendon. The tendon connects to an expansion plate at the bottom of the kneecap throughout growth.
Repetitive stress on the patellar tendon can make the growth plate within the knee become inflamed and irritated. SLJ mainly develops in children and adolescents between the ages of 10 and 15 because that is when most people experience growth spurts. SLJ is most common in young athletes due to excess or repetitive strain in the knee.
Causes of SLJ Syndrome
The large mus
What is Patellar Tendinitis?
Patellar tendinitis is a common health issue characterized by the inflammation of the tendon which joins the kneecap, or patella, to the shinbone, or tibia. The knee pain associated with this problem may range from mild to severe depending on the circumstances of the knee injury.
Patellar tendinitis, or jumper’s knee, is a well-known sports injury among athletes who play in basketball and volleyball. Among recreational volleyball players, an estimated 14.4 percent of them have jumper’s knee, where the incidence is even higher for professional athletes. An estimated 40 to 50 percent of elite volleyball players have patellar tendinitis.
Causes of Patellar Tendinitis
Patellar tendinitis is caused by repeti
Rectus Femoris Strain Management
The rectus femoris muscle attaches to the pelvis and just below the knee as it is one of four muscles found at the front part of the thigh. It functions by extending the knee and flexing the hip. The rectus femoris muscle is made up of fibers which adapt to quick action. Rectus femoris muscle strain is caused by forceful movements, such as kicking a ball or when beginning to sprint, and it is particularly vulnerable to stress and pressure. | https://www.elpasobackclinic.com/category/chiropractic-examination/screening-tests/ |
Publisher:
Emerald Group Publishing Limited
Guest editorial
Article Type: Guest editorial From: Journal of Documentation, Volume 70, Issue 6
Introduction to the Nigel Ford festschrift
Following his recent retirement from the Information School at the University of Sheffield, this issue of the Journal of Documentation acts as a festschrift to recognize Nigel Ford's contributions to research in library and information science. He is best known for his work on understanding the effect of selected individual differences, in particular, cognitive style on how people search for information, and on the intersection between how people learn and how they use information to learn. But his life's work has had considerable breadth as well as depth, as he started with a keen interest in artificial intelligence from which he developed his thinking about the impact of new technologies on information behaviour, and in cataloguing and classification, a knowledge that he loved to impart to students.
After taking a first degree in French Language and Literature at the University of Leeds, Nigel came to the Postgraduate School of Librarianship and Information Science (as it then was) at the University of Sheffield in 1971 to undertake the MA Librarianship programme. On successful completion of the course, he went to work as a Tutor Librarian at Edge Hill College of Higher Education (as it then was), before returning to Sheffield as a lecturer in 1981. He was appointed Professor of Information Science in 2001 and retired in 2014.
Even before taking up his position in Sheffield, Nigel had started to consider the relationship between research in educational psychology and issues in information science (Ford, 1979), and this provided the platform for his subsequent empirical and theoretical studies of information seeking and information behaviour, e.g. Ford and Ford (1993), Ford (1995, 2000) and Whittle et al. (2007). Much of this work was conducted in educational contexts of various sorts, and Nigel thus made a significant contribution to the emergence and development of educational informatics, which he described as the bringing together of “educational computing and information science to better harness the increasing wealth of resources accessible via the Internet for the purposes of learning” in the first major review of the field (Ford, 2008).
His research has appeared in some 150 publications that have attracted over 4,000 citations in Google Scholar. These publications include 15 that have appeared in this journal, making him one of the most productive contributors in terms of numbers of articles. These Journal of Documentation articles provide a flavour of the breadth of his interests, covering as they do topics such as serendipity and information seeking, web search behaviour, methodological issues and the role of creativity, e.g. Ford (1999), Ford et al. (2002), Foster and Ford (2003), Madden et al. (2007) and Gorrell et al. (2011). He is also the author of six books on aspects of the web, e.g. Ford (2011) and of artificial intelligence, e.g. Ford (1987) (which was subsequently translated into German and Japanese).
The papers in this festschrift have been contributed by Nigel's ex-students and colleagues, both in Sheffield and elsewhere. The study of cognitive styles has been a long-standing interest for Nigel and this forms the focus of two of the papers here. Goodale et al. (“Cognitive styles within an exploratory search system for digital libraries”) demonstrate that the cognitive styles of users strongly affect how they explore, search and interact with a digital library of cultural heritage materials; perhaps surprisingly, the extensive results suggest that users respond positively to functionality that supports activities in which they are cognitively weak. Chen (“Cognitive styles and the use of electronic journals in a mobile context”) compares how people with different cognitive styles (holists or serialists) use mobile devices to access electronic journals. Four papers then discuss other aspects of information behaviour. Foster and Ellis (“Serendipity and its study”) provide a synthesis of the literature on serendipity and discuss how the topic can be investigated, particularly in the information studies context. Hepworth et al. (“Research and practice: a critical reflection of approaches that underpin research into people's information behaviour”) discuss the underlying philosophical assumptions that influence the way that information behaviour research is conducted and that information services are designed and developed. Birdi (“Genre fiction readers: a quantitative exploration of provided construct ratings”) discusses the results obtained in a repertory grid study of the characteristics of the readers of ten fiction genres, including minority ethnic fiction. Heinström et al. (“Spanning information behaviour across the stages of a learning task – where do personality and approach to studying matter?”) explore the effects of personality and of study approaches on students’ learning-related information behaviour, and show that students’ individual traits do indeed influence their behaviour. Next, two papers suggest novel approaches to studies in experimental information retrieval. Ruthven (“Relevance behaviour in TREC”) argues that the extensive sets of relevance judgements associated with document test-collections such as TREC could be used to answer a range of relevance-related questions from the information seeking community and to better understand the results of system evaluation by the information retrieval community. Wildemuth et al. (“Untangling search task complexity and difficulty in the context of interactive information retrieval studies”) then review over 100 previous studies of interactive information retrieval as a prelude to providing guidelines for experimentalists to test, observe or control the complexity and difficulty of search tasks. Finally, Benson and Willett (“The Information School at the University of Sheffield, 1963-2013”) describe the historical development of the Sheffield School where Nigel spent so much of his career.
While Ford is one of the co-authors of this paper, he was unaware that the paper had been contributed for his festschrift or, indeed that there was such a festschrift. | https://www.emerald.com/insight/content/doi/10.1108/JD-08-2014-0114/full/html |
The U.S. Department of Education today urged America’s colleges and universities to remove barriers that can prevent the estimated 70 million citizens with criminal records from pursuing higher education, including considering the chilling effect of inquiring early in the application process whether prospective students have ever been arrested.
The Department made the recommendation in a new resource guide, Beyond the Box: Increasing Access to Higher Education for Justice-Involved Individuals, which encourages alternatives to inquiring about criminal histories during college admissions and provides recommendations to support a holistic review of applicants.
“We believe in second chances and we believe in fairness,” U.S. Secretary of Education John B. King Jr. said. “The college admissions process shouldn’t serve as a roadblock to opportunity, but should serve as a gateway to unlocking untapped potential of students. As nation we must work to make that commonplace. We must ensure that more people, including those who were involved in the criminal justice system in their past but paid their debt to society, have the chance at higher education opportunities that lead to successful, productive lives, and ultimately create stronger, safer communities.”
“Too many Americans are denied opportunities to lead fulfilling and productive lives because of a past arrest or conviction - including opportunities to access a quality education," said Attorney General Loretta E. Lynch. “Expanding access to higher education for justice-involved individuals can help them step out of the shadow of their pasts and embark on the path to a brighter future. I commend the Department of Education for its commitment to expanding opportunities for returning citizens, and I look forward to continuing to work with them - and with our partners across the Obama Administration - to give every deserving American a meaningful and fair second chance.”
King made the announcement at UCLA, part of the University of California system, which does not inquire about criminal justice involvement on its admissions applications.
“I wholeheartedly support Secretary King’s ‘Beyond the Box’ initiative, and I believe there are better ways to ensure campus safety than stigmatizing those who are trying to better their lives through higher education,” University of California President Janet Napolitano said. “The University of California represents opportunity, not punishment. UC campuses don’t ask applicants for admission to provide information about past criminal convictions, and our admissions directors see no need to do so.”
“Opportunity, hope, and second chances are integral to the American character," said Los Angeles Mayor Eric Garcetti. “In Los Angeles, where I re-established an Office of Re-entry to assist men and women who were formerly incarcerated, we are making great strides toward ensuring those who have paid for their mistakes can fully rejoin our communities. I am pleased that the Department of Education is working to expand this mission to include access to higher education.”
Evidence suggests that requesting criminal justice information may deter potentially well-qualified applicants from enrolling in postsecondary education and training. For example, a 2015 Center for Community Alternatives study showed that two-thirds of individuals with felony convictions who started applications for admission to State University of New York schools never finished the application process- in part to the onerous requirements for detailing their convictions. By contrast, the attrition rate on applications for all applicants was only 21 percent.
Campus safety is absolutely paramount in this process. The Departments of Justice and Education remain committed to helping schools ensure a safe learning environment while also opening educational opportunities to citizens who may have been involved in the criminal justice system in the past. The resource guide released today includes a variety of recommendations on how institutions might consider campus safety and applicants’ criminal justice history without unduly discouraging or rejecting otherwise-qualified candidates. All postsecondary institutions that qualify for federal student financial aid are required by law to disclose campus crime statistics and security information, which is made available to the public through a searchable online database.
Some of the nation’s largest colleges and university systems do not collect criminal justice information as part of the application process, while others like New York University review past criminal involvement only after preliminary admissions decisions have been made. Possibly because of the chilling effect from these questions in the admissions process, limited data and research exists about the potential links between criminal justice history and campus safety. However, the research that does exist suggests that colleges and universities that admit students with a criminal justice history have no greater crime than those that do not.
The resource guide mentions other promising practices and recommendations, including:
Delaying the request for – or consideration of – criminal justice involvement until after an admission decision has been made to avoid a chilling effect on potential applicants whose backgrounds may ultimately be deemed irrelevant by the institution;
Transparently and clearly informing potential students as early as possible in the application process on how to respond to the inquiry about criminal pasts;
Ensuring that the questions are narrowly focused, avoiding overly broad requests about criminal history;
Giving all prospective students the opportunity to explain criminal justice involvement and preparedness for postsecondary study; and,
Providing admissions personnel and counselors training on the effective use of criminal history data.
In addition, the report offers strategies for ensuring postsecondary persistence and completion for admitted students, among them:
Providing well-informed academic and career guidance;
Informing students of available support services;
Recruiting peer mentors and college coaches to work with justice-involved students;
Supporting student groups for justice-involved youths;
Providing justice-involved students access to meaningful work opportunities;
Incorporating student feedback when determining support services for justice-involved students;
Offering justice-involved individuals financial aid counseling; and,
Establishing partnerships with the community.
The report recommends a self-assessment for colleges and universities where the institutions determine whether criminal history information is necessary for admissions, and if so, ensure that staff are trained on how to review criminal justice information.
Today’s announcement is another example of the Obama Administration’s commitment to expanding educational opportunity as a key part of efforts to reduce recidivism, and combat the impact of mass incarceration on communities.
Last July, the Education Department announced the Second Chance Pell Pilot program to test new models to allow incarcerated Americans to receive Pell Grants and pursue a postsecondary education with the goal of helping them get jobs, support their families, and turn their lives around. In November, the Department also announced up to $8 million in Adult Reentry Education Grants to support educational attainment and reentry success for individuals who have been incarcerated.
These initiatives are through the Federal Interagency Reentry Council and the White House’s My Brother’s Keeper Initiative, the Administration has made great strides toward improving the life outcomes of Americans who may have come into contact with the justice system by increasing access to education, employment and housing. The release of the Beyond the Box resource guide for postsecondary institutions responds to recommendations put forth by the President’s My Brother’s Keeper Task Force, which was designed to eliminate unnecessary barriers to giving justice-involved individuals a second chance.
| |
Indigenous peoples of the Papua region have been experiencing a lot of injustice for a long time. This is including injustice to access truthful information, especially about the condition of the forests, land, and development programs. This injustice of information brings indigenous peoples into situations where they suffer losses and caught in a weak position in the conflicts of natural resource management.
Besides balancing the strengths, strong and up to date data and basic information are important for planning and implementing good forest management in the Papua region. “Portrait of the Forest and the People of Papua Bioregion” is expected to be accessible to everyone, the community, the government, and the private sector so that they have the same view in seeing the reality and facts of forest conditions and their changes. And the most important is the indigenous peoples and their territories. Until 2013, the area of natural forests in the Papua Bioregion (Papua, West Papua, and Aru Islands) reached 30 million hectares or 85% of the land area. The existence of these natural forests continues to experience pressure. In 2013, 31% or 11.2
a million hectares of natural forests were in licensing concessions, which are the License to Commercially Utilize Timber in Natural Forest or IUPHHKA-HA or HPH, License to Run Business of Industrial Plantation or IUPHHK-HTI or HTI, plantations, and mining. The largest natural forest is in the concession area of 4.7 million hectares, followed by a mining area of 3.6 million hectares, plantation area of 448 thousand hectares, HTI area of 299 thousand hectares, and the rest in overlapping of licensing areas of 1.9 million hectares. In 2009 to 2013, the loss of natural forest
in Papua was 612,997 hectares, or with the rate of 153,249 hectares per year, or equivalent to more than twice the area of Jakarta. The largest deforestation occurred in Papua Province, covering an area of 490 thousand hectares (80%), followed by West Papua Province with the deforested area of 102 thousand hectares (17%), and the Aru Islands with 20 thousand hectares (3%).
The government is making efforts to protect natural forests in Indonesia through a moratorium scheme on the utilization of forest areas in natural forests and peatlands. In 2013, in Papua alone, there were around 20.8 million hectares of forest area inside the moratorium area, of which 18.8 million hectares were still natural forests. However, in the moratorium area, deforestation still occurred more than 227 thousand hectares or with the rate 57 thousand hectares per year. The high rate of deforestation in the moratorium area is caused by the large number of illegal activities in utilizing forest resources in Papua. For example, the conversion of natural forests into plantations, illegal logging, illegal company activities, forest fires, and infrastructure development. | https://fwi.or.id/en/state-of-bioregion-papua/ |
CROSS REFERENCE TO RELATED APPLICATIONS
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
This application claims priority under 35 U.S.C. 119(e) of U.S. provisional patent application Ser. No. 62/368,070 filed on Jul. 28, 2016 entitled ELECTRIC MACHINE WITH STATOR HAVING PHASE SHIFT WINDINGS; U.S. provisional patent application Ser. No. 62/368,104 filed on Jul. 28, 2016 entitled ELECTRIC MACHINE WITH STATOR HAVING EVEN SLOT DISTRIBUTION; and U.S. provisional patent application Ser. No. 62/373,223 filed on Aug. 10, 2016 entitled ELECTRIC MACHINE WITH STATOR WINDINGS HAVING OVER-UNDER END LOOPS; the disclosures of each of which are hereby incorporated herein by reference.
The present invention relates to electric machines.
Electric machines are used for several different purposes in modern vehicles. For example, electric machines are commonly employed as starters, alternators, traction motors and for other purposes. In these applications, the electric machine may act as a motor, generator or be selectively operable as either a motor or a generator.
There is an increasing demand for electric machines used in vehicle applications, as well as other non-vehicular applications, for an electric machine with reduced size and increased efficiency.
Improvements in electric machine design which allow for cost efficient manufacture while meeting the increasingly stringent demands of modern vehicular applications are desirable.
The present invention provides an electric machine having a winding pattern with end loops that alter the relative position of the individual windings of a phase having a plurality of parallel windings and which allows for the cost efficient manufacture of a compact and efficient electric machine.
The invention comprises, in one form thereof, a multi-phase electric machine that includes a stator operably coupled with a rotor wherein the rotor is rotatable relative to the stator. The stator includes a stator core defining a central opening and a plurality of axially extending slots which circumscribe the central opening. A plurality of windings are mounted on the stator core wherein the plurality of windings define a plurality of phases and wherein, for each phase, the plurality of windings include at least two parallel windings. The stator assembly defines a standard pitch between each pole of each phase, the pitch being a common circumferential spacing between corresponding slots of each pole. Each of the parallel windings includes at least one position change end loop, wherein each of the parallel windings has one of the position change end loops at the same location, wherein the position change end loops define a non-standard pitch to thereby change the relative positions of the parallel windings in the slots.
In some embodiments, each phase includes at least three windings connected in parallel. In such an embodiment having at least three windings, the position change end loops may be arranged such that a first set of position change end loops is disposed between a selected pole and an adjacent pole and wherein a first winding of the first set of position change end loops is disposed at one of the clockwise and counterclockwise ends of the pole at the selected pole and is disposed at the other of the clockwise and counterclockwise ends of the pole at the adjacent pole, the remaining windings of the first set of position change end loops each being shifted one by one slot.
In some embodiments the windings may be arranged such that the first winding defines a pitch that is greater than the standard pitch between the first and second poles and the remaining windings each define a pitch that is one less than the standard pitch between the selected and adjacent poles. In such an embodiment, the first winding may extend over the remaining windings between the selected and adjacent poles. When such an embodiment has exactly three windings per phase, the first winding may define a pitch that is two slots greater than the standard pitch between the selected and adjacent poles.
In some embodiments having three windings wherein the first winding moves from one end of the selected pole to the opposite end of the adjacent pole, the first winding defines a pitch that is less than the standard pitch between the selected and adjacent poles and the remaining windings each define a pitch that is one greater than the standard pitch between the selected and adjacent poles. In such an embodiment, the remaining windings may extend over the top of the first winding between the selected and adjacent poles. When such an embodiment includes exactly three windings per phase, the first winding may define a pitch that is two slots less than the standard pitch between the selected and adjacent poles.
In some embodiments of the electric machine, at each set of position change end loops, the windings defining a greater pitch extend over the windings defining a lesser pitch. In such an embodiment, the windings may define a phase shift wherein for each pole, there are a greater number of slots than windings. Such an embodiment may also include windings wherein each winding includes a plurality of position change end loops.
In the various embodiments described above, the electric machine may be a three phase electric machine.
Corresponding reference characters indicate corresponding parts throughout the several views. Although the exemplification set out herein illustrates an embodiment of the invention, in one form, the embodiment disclosed below is not intended to be exhaustive or to be construed as limiting the scope of the invention to the precise form disclosed.
FIG. 6
20
20
20
22
24
26
26
28
30
illustrates an electric machine . In the illustrated embodiment, electric machine is an automotive alternator capable of operating as a motor or as a generator, however, alternative embodiments may take the form of an electric machine that is solely operable as a motor or solely operable as a generator. Electric machine includes a rotor mounted on a shaft which both rotate relative to stator . Stator has a stator core and a plurality of windings .
28
32
30
34
32
34
32
38
28
Stator core may be formed out of a stack of laminations and defines a plurality of slots . Windings include axially extending segments that are disposed within slots and end turns 36 with each end turn 36 connecting a pair of slot segments . Axially extending slots circumscribe central opening of stator core .
The illustrated embodiment is a three phase electric machine with six turns. Additionally, each phase includes three windings arranged in parallel. In other words, each winding extends about the full circumference of the stator core six times and there are three such windings for each phase. To achieve this arrangement two separate wires or filars are used for each winding whereby a total of six separate wires or filars are used for each phase. Each of the individual wires form three turns about the stator and is connected in series with another one of the wires to thereby form one of the three windings of each phase.
One parameter that may be used to describe a winding arrangement is slots per pole per phase. This is equal to the number of slots per pole in each slot group of the winding if each such slot were filled solely by windings of one phase. For example, in the illustrated embodiment, there are 18 slot segments in each slot group and each slot holds 6 slot segments therefore the illustrated arrangement has 3 slots per pole per phase. The illustrated embodiment, however, has what is known as a phase shift and some slots hold slot segments of two different phases.
The use such phase shifting can reduce what is known as the skin effect. As a general rule, when the conductors in a particular slot carry different phase currents, the skin effect in such conductors will be less than if all of the conductors in the slot carried the same phase current. While such phase shifting reduces the skin effect, the use of such phase shifting can make it more difficult to electrically balance the windings.
To avoid or minimize a re-circulating current in the winding, it is desirable for the winding to be electrically balanced this is particularly true for a winding having a plurality of wires connected in parallel. Providing an electrically balanced stator can be particularly difficult if phase shifting is employed and each phase is formed by an odd number of windings arranged in parallel.
The illustrated embodiment provides a stator winding pattern which provides an electrically balanced stator with phase shifting and an odd number of windings arranged in parallel for each phase. As mentioned above, the illustrated winding pattern includes six turns and three separate windings for each phase. The pattern has three slots per pole per phase but windings occupy four physical slots for each pole or slot group. In each slot group, the two center slots each have six conductors which are all from the same phase. The two outer slots each have three conductors from one phase and three additional conductors from a different phase. To electrically balance the stator, each slot of the slot group needs to have an equal number of conductors from each of the three windings. It is also desirable for each of the different radial layers to have an equal number of conductors from each of the three windings.
FIGS. 1-5
This radial balancing, however, is less important than the balancing between slots. The exemplary winding pattern can be used to provide an electrically balanced stator and is further described below with the aid of .
FIG. 1
FIG. 2
20
20
20
illustrates three separate wires X, Y, Z that are connected in series with the three separate wires A, B, C illustrated in . More specifically, wire A is connected in series with wire Z to form a first winding, wire B is connected in series with wire X to form a second winding and wire C is connected in series with wire Y to form a third winding. The first, second and third windings are then connected in parallel to form one phase of electric machine . Electric machine is a three phase electric machine and two additional phases having the same winding arrangement are also employed with electric machine .
FIG. 3
32
1
2
6
As can be seen in , each phase of the stator assembly defines 16 poles with each pole being formed by four physical slots. Six wires fit within each axially extending stator slot . As used herein, the radially outermost wire is in layer , layer being the next radially inward wire position and so on with the radially innermost wire position being layer .
FIG. 3
FIGS. 4 and 5
FIG. 4
15
3
As can also be seen in , as well as , each of the poles is formed by a group of four slots wherein the two central slots are each completely filled with windings (six windings in the illustrated embodiment) and two outer slots that are only half filled with windings from a particular phase (three windings in the illustrated embodiment) to thereby form a 3-6-6-3 winding pattern. As used herein, and as labelled in for slot and slot , starting at the outer slot on the counterclockwise side of each slot group forming a pole and moving clockwise, the slots are referred to as slot AA, slot BB, slot CC and slot DD. In other words, slots BB and CC form the central slots and slots AA and DD form the outer slots.
The distance between slot AA of one pole and slot AA of the adjacent poles is 9 slots. Similarly, the distance between slot BB of one pole and slot BB of the adjacent poles is 9 slots and so on, this distance between corresponding slots of the slot groups forming adjacent poles defines the standard pitch of the electric machine. In the illustrated embodiment, the standard pitch is 9 slots.
FIGS. 1 and 2
FIGS. 1 and 2
Returning to , the wiring diagrams label any pitch between slot segments that is non-standard. The location of the number indicating the non-standard pitch also indicates at which axial end of the stator the end loop forming the non-standard pitch is located. It is also noted that the wiring diagrams of also indicate in which layer position the wires are located.
FIGS. 3-5
FIGS. 3-5
FIG. 4
FIG. 4
1
2
3
4
5
6
2
3
As most easily seen in , the windings in slot AA are positioned in the radial outermost layers, i.e., layers , and while the windings in slot DD are positioned in the radial innermost layers, i.e., layers , and . When all of the phases have this same pattern, slot AA of one phase will correspond and overlap with slot DD of an adjacent phase allowing the outer slots to be completely filled with windings. illustrate the windings of only one phase except for the space between poles and of . This portion of illustrates the location of the windings from a second phase (indicated by filled-in wire outlines) and the location of the windings from a third phase (indicated by the hollow wire outlines). This clearly shows how the outer slots of each phase overlap such that each outer slot includes windings from two different phases.
1
3
5
2
4
6
It is further noted that while the outer slots of the illustrated embodiment have windings wherein the windings from one phase are all positioned in the radially outer most layers and the windings from the other phase are all positioned in the radially innermost layers, other configurations are also possible. For example, the windings from the different phases could alternate. In the illustrated embodiment this could be achieved by having windings in layers , and in slot AA and in layers , and in slot DD. Such an arrangement, however, would be more difficult to manufacture than the illustrated embodiment and would require a more complex winding pattern.
To control the position of the windings in the outer slots, special end loops referred to herein as phase shift end loops are used. In the illustrated embodiment, each phase includes three windings that are connected in parallel. With each winding being formed by two continuous wires that joined together at their ends to thereby form one long filar that forms one of the parallel windings. The number of parallel windings is one less than the number of physical slots used to form each pole. Thus, for each wrap or turn the windings make about the stator core, the three windings can be used to fill each central slot, BB, CC and one of the outer slots, AA, BB as depicted in the illustrated embodiment. By forming all three windings with a phase shift end loop at a particular spot between two poles wherein the phase shift end loops are all one slot different than the standard pitch end loops, the wires can be shifted from the three most counterclockwise slots of each pole to the three most clockwise slots of each pole or visa versa.
FIG. 1
FIG. 4
3
4
15
3
16
4
3
4
1
2
3
4
5
6
For example, in , at the point where wires X, Y and Z transition from layer to layer , all three end loops have a 10 pitch end loop that function as phase shift end loops. In other words, after completing two wraps or turns, the wires X, Y, Z have a phase shift end loop. This is also seen in wherein at pole in layer , wire X is in slot AA, wire Y is in slot BB and wire Z is in slot CC as a result of the 10 pitch phase shift end loops, wire X is in slot BB, wire Y is slot CC and wire Z is in slot DD at pole in layer . In the illustrated example, these phase shift end loops occur at the point where the windings transition from layer to layer . This is necessary to maintain the pattern wherein the windings are in slot AA in layers , and and are in slot DD in layers , and . If an alternating pattern were employed for the two different phases in the outer slots, a larger number of phase shift end loops would be required.
FIGS. 2 and 4
FIG. 2
FIG. 4
3
4
16
3
1
4
Wires A, B and C also have phase shift end loops as can be seen with reference to . After completing one wrap or turn, wires A, B, C have a phase shift end loop. This can be seen in where the wires A, B, C transition from layer to layer . This is also seen in wherein at pole in layer , wire B is in slot AA, wire C is in slot BB and wire A is in slot CC as a result of the 10 pitch phase shift end loops, wire B is in slot BB, wire C is slot CC and wire A is in slot DD at pole in layer .
To provide an electrically balanced winding pattern, each of the parallel windings needs to be in each slot central slot, BB, CC, an equal number of times and needs to be in each outer slot, AA, DD, an equal number of times. For the illustrated embodiment, the fill ratio between the central slots, BB, CC and the outer slots AA, DD is 2:1 and, thus, each winding needs to be disposed in the central slots twice as many times as it is disposed in the outer slots. Position change end loops which shuffle the relative position of the windings in pole slots are used to achieve this balance.
FIGS. 1, 4 and 5
8
9
1
8
9
8
9
8
9
In the illustrated example, each set of wires A, B, C and X, Y, Z are subject to position change end loops to alter the relative position of the wires at three locations for a total of six such locations. Turning first to , it can be seen that wires X, Y and Z are subject to three position changes. At the interval between poles and when wires X, Y and Z are in layer , a set of position change end loops are used to alter the relative positions of wires X, Y and Z. At this location, the end loop wire X has a pitch of 11 slots while the end loops for wires Y and Z each have a pitch of 8 slots. As a result, wire X moves from slot AA at pole to slot CC at pole , wire Y moves from slot BB at pole to slot AA at pole and wire Z moves from slot CC at pole to slot BB at pole .
8
9
3
3
8
9
8
9
8
9
FIGS. 1 and 5
Wires X, Y, Z are subject to another position change at the interval between pole and when the wires are in layer . See . This position change involves wire X having a position change end loop with a pitch of 7 slots, wire Y having a position change end loop with a pitch of 10 slots and wire Z having a position change end loop with a pitch of 10 slots. As a result, in layer , wire X moves from slot CC at pole to slot AA at pole , wire Y moves from slot AA at pole to slot BB at pole and wire Z moves from slot BB at pole to slot CC at pole .
16
1
4
5
4
16
5
1
16
1
16
1
16
1
FIGS. 1 and 4
Wires X, Y, Z are subject to a third position change at the interval between poles and as the wires shift from layer to layer . See . This position change involves wire X having a position change end loop with a pitch of 11 slots, wire Y having a position change end loop with a pitch of 8 slots and wire Z having a position change end loop with a pitch of 8 slots. Each of these position change end loops also move wires X, Y, Z from layer at pole to layer at pole . Thus, wire X moves from slot BB at pole to slot DD at pole , wire Y moves from slot CC at pole to slot BB at pole and wire Z moves from slot DD at pole to slot CC at pole . To provide an electrically balanced winding pattern, each of the parallel windings needs to be in each central slot BB an equal number of times, in each central slot CC an equal number of times, in each outer slot AA an equal number of times and in each outer slot DD an equal number of times. For a stator having more slots per pole per phase, the same pattern applies for the parallel wires to be electrically balanced.
FIGS. 2 and 3
2
3
15
16
2
15
3
16
15
16
15
16
15
16
Wires A, B, C are also subject to position change end loops. More specifically, and as can be seen in , at the point where wires A, B, C shift from layer to layer , the end loops extending between poles and are position change end loops. This position change involves wire A having a position change end loop with a pitch of 11 slots, wire B having a position change end loop with a pitch of 8 slots and wire C having a position change end loop with a pitch of 8 slots. Each of these position change end loops also move wires A, B, C from layer at pole to layer at pole . Thus, wire A moves from slot AA at pole to slot CC at pole , wire B moves from slot BB at pole to slot AA at pole and wire C moves from slot CC at pole to slot BB at pole .
7
8
4
7
8
7
8
7
8
Wires A, B, C are subject to a second position change at the interval between poles and in layer . This position change involves wire A having a position change end loop with a pitch of 7 slots, wire B having a position change end loop with a pitch of 10 slots and wire C having a position change end loop with a pitch of 10 slots. Thus, wire A moves from slot DD at pole to slot BB at pole , wire B moves from slot BB at pole to slot CC at pole and wire C moves from slot CC at pole to slot DD at pole .
7
8
6
7
8
7
8
7
8
Wires A, B, C are subject to a third position change at the interval between poles and in layer . This position change involves wire A having a position change end loop with a pitch of 11 slots, wire B having a position change end loop with a pitch of 8 slots and wire C having a position change end loop with a pitch of 8 slots. Thus, wire A moves from slot BB at pole to slot DD at pole , wire B moves from slot CC at pole to slot BB at pole and wire C moves from slot DD at pole to slot CC at pole .
FIGS. 1 and 2
FIGS. 1 and 2
FIG. 1
FIG. 2
As mentioned above, the wiring diagrams in label any pitch between slot segments that is non-standard. The location of the number indicating the non-standard pitch also indicates at which axial end of the stator the end loop forming the non-standard pitch is located. also show from which axial end of the stator the beginning and end of wires A, B, C, X, Y, Z extend. As can be seen in , the position change end loops for wires X, Y, Z are all at the same axial end of the stator assembly as the start and finish lead ends of wires X, Y, Z with the phase shift end loops being positioned on the opposite axial end of the stator assembly. Similarly, as can be seen in , the position change end loops for wires A, B, C are all at the same axial end of the stator assembly as the start and finish lead ends of wires A, B, C with the phase shift end loops being positioned on the opposite axial end of the stator assembly. The start and finish lead ends and position change end loops of wires A, B, C, X, Y, Z are all on the same axial end of the stator assembly while the phase change end loops of wires A, B, C, X, Y, Z are all on the opposite side of the stator assembly.
It is additionally noted that when position change end loops are used with the wires, the individual wire having the largest pitch will be extended further axially than the wires with the shorter pitches and will have an end loop that extends over the shorter pitch and axially shorter end loops. In other words, if three wires have position change end loops with two wires having a pitch of 8 and one having a pitch of 11, the wire having a pitch of 11 will be extended axially further from the stator core than the two wires with the pitch of 8 and the end loop of the wire having a pitch of 11 will extend over the other two wires having a pitch of 8 to thereby avoid spatial conflicts between the wires.
While the described position change end loops are used to electrically balance the windings, it is noted that the wires A, B, C, X, Y, Z are not individually electrically balanced but once they are serially connected in pairs, the three resulting parallel windings are electrically balanced. In other words, each winding is formed by a series connection between two individual unbalanced wires to form a balanced winding. This is further discussed below with reference to Tables 3 and 4.
6
15
6
16
6
15
6
16
6
15
6
16
1
16
1
1
The wires are connected together at their finish ends. Thus, the end of wire A extending from layer at pole is connected in series with the end of wire Z extending from layer at pole ; the end of wire B extending from layer at pole is connected in series with the end of wire X extending from layer at pole ; and the end of wire C extending from layer at pole is connected in series with the end of wire Y extending from layer at pole . The start leads of each of the wires are connected with an external circuit member. For example, start leads A, B and C may all be attached to a neutral connection with start leads X, Y and Z all being attached to a regulator, inverter or other circuit member. The start leads of the A, B and C wires all extend from layer of pole and are conductively coupled together, similarly, the start leads of the X, Y and Z wires all extend from layer of pole and are conductively coupled together. As a result the first winding (formed by the series connected pair of wires A and Z), the second winding (formed by the series connected pair of wires B and X), and the third winding (formed by the series connected pair of wires C and Y) are arranged in parallel. It is further noted that in the illustrated embodiment, each of the series connections, i.e., between A and Z, between B and X and between C and Y, is also a reversing connection with one of the wires extending in a clockwise direction about the stator from the series connection and the other wire extending in a counterclockwise direction about the stator from the series connection.
As can be understood with reference to the tables presented below, the winding pattern described above and shown in figures provides an electrically balanced stator assembly.
20
Table 1 presented below provides a detailed summary of the winding pattern for wires A, B, C of the winding pattern for wires X, Y, Z of a single phase of three phase electric machine .
TABLE 1
Winding Pattern for Wires A, B, C
Slot
Slot
Slot
Slot
Slot
Turn
Layer
Group
AA
BB
CC
DD
Start
1
1
16
A
B
C
Layer Change
1
2
1
A
B
C
1
2
2
A
B
C
1
2
3
A
B
C
1
2
4
A
B
C
1
2
5
A
B
C
1
2
6
A
B
C
1
2
7
A
B
C
1
2
8
A
B
C
1
2
9
A
B
C
1
2
10
A
B
C
1
2
11
A
B
C
1
2
12
A
B
C
1
2
13
A
B
C
1
2
14
A
B
C
1
2
15
A
B
C
Layer and Position
2
3
16
B
C
A
Change
Slot Shift and
2
4
1
B
C
A
Layer Change
2
4
2
B
C
A
2
4
3
B
C
A
2
4
4
B
C
A
2
4
5
B
C
A
2
4
6
B
C
A
2
4
7
B
C
A
Position Change
2
4
8
A
B
C
,
2
4
9
A
B
C
2
4
10
A
B
C
2
4
11
A
B
C
2
4
12
A
B
C
2
4
13
A
B
C
2
4
14
A
B
C
2
4
15
A
B
C
Layer Change
3
5
16
A
B
C
Layer Change
3
6
1
A
B
C
3
6
2
A
B
C
3
6
3
A
B
C
3
6
4
A
B
C
3
6
5
A
B
C
3
6
6
A
B
C
3
6
7
A
B
C
Position Change
3
6
8
B
C
A
3
6
9
B
C
A
3
6
10
B
C
A
3
6
11
B
C
A
3
6
12
B
C
A
3
6
13
B
C
A
3
6
14
B
C
A
Finish
3
6
15
B
C
A
20
Table 2 presented below provides a detailed summary of the winding pattern for wires X, Y, Z of a single phase of three phase electric machine .
TABLE 2
Winding Pattern for Wires X, Y, Z.
Slot
Slot
Slot
Slot
Slot
Turn
Layer
Group
AA
BB
CC
DD
Start
1
1
1
X
Y
Z
1
1
2
X
Y
Z
1
1
3
X
Y
Z
1
1
4
X
Y
Z
1
1
5
X
Y
Z
1
1
6
X
Y
Z
1
1
7
X
Y
Z
1
1
8
X
Y
Z
Position Change
1
1
9
Y
Z
X
1
1
10
Y
Z
X
1
1
11
Y
Z
X
1
1
12
Y
Z
X
1
1
13
Y
Z
X
1
1
14
Y
Z
X
1
1
15
Y
Z
X
Layer Change
1
2
16
Y
Z
X
Layer Change
2
3
1
Y
Z
X
2
3
2
Y
Z
X
2
3
3
Y
Z
X
2
3
4
Y
Z
X
2
3
5
Y
Z
X
2
3
6
Y
Z
X
2
3
7
Y
Z
X
2
3
8
Y
Z
X
Position Change
2
3
9
X
Y
Z
2
3
10
X
Y
Z
2
3
11
X
Y
Z
2
3
12
X
Y
Z
2
3
13
X
Y
Z
2
3
14
X
Y
Z
2
3
15
X
Y
Z
Slot Shift and
2
4
16
X
Y
Z
Layer Change
Layer Change and
3
5
1
Y
Z
X
Position Change
3
5
2
Y
Z
X
3
5
3
Y
Z
X
3
5
4
Y
Z
X
3
5
5
Y
Z
X
3
5
6
Y
Z
X
3
5
7
Y
Z
X
3
5
8
Y
Z
X
3
5
9
Y
Z
X
3
5
10
Y
Z
X
3
5
11
Y
Z
X
3
5
12
Y
Z
X
3
5
13
Y
Z
X
3
5
14
Y
Z
X
3
5
15
Y
Z
X
Layer Change and
3
6
16
Y
Z
X
Finish
20
Table 3 provides a summary of the slot locations for each of wires A, B, C, X, Y, Z of a single phase of three phase electric machine and illustrates how each of these individual wire are unbalanced.
TABLE 3
Slot Totals by Wire
Slot AA
Slot BB
Slot CC
Slot DD
Total for A
16
16
1
15
Total for B
1
31
16
0
Total for C
0
1
31
16
Total for X
15
1
16
16
Total for Y
16
31
1
0
Total for Z
0
16
31
1
20
Table 4 provides a summary of the slot locations for each of the parallel windings which are formed by a series connection between a pair of the individual wires for a single phase of three phase electric machine . More specifically by joining wires A and Z into a single elongate filar, by joining wires B and X into a single elongate filar and by joining wires C and Y into a single elongate filar. Table 4 also demonstrates that the three resulting windings are electrically balanced.
TABLE 4
Slot Totals by Winding
Slot AA
Slot BB
Slot CC
Slot DD
A and Z
16 + 0
16 + 16
1 + 31
15 + 1
B and X
1 + 15
31 + 1
16 + 16
0 + 16
C and Y
0 + 16
1 + 31
31 + 1
16 + 0
As can be seen from Table 4, the central to outer slot ratio for the windings is 2:1 but, as can be understood with reference to Table 3, the ratio between central slot and outer slot for the individual wires A, B, C, X, Y, Z are not 2:1. Table 4 shows how each individual unbalanced wire can be connected in series with another individual unbalanced wire to form a balanced winding.
FIGS. 7A through 9C
FIGS. 7A-9C
illustrate end loops that can be used to achieve the winding pattern described above. It is first noted that show the end loops of three wires as those end loops extend from a selected pole (pole A) to the next adjacent pole (pole B).
FIGS. 7A-7C
FIG. 7B, 7C
FIGS. 7B, 7C
50
50
illustrate the situation where three wires each define a standard pitch between the two poles. This is the most common arrangement of the end loops for the depicted electric machine. In this situation with all of the wires having a standard pitch, the wires maintain their same relative position in the two poles A, B. illustrate this by showing fourth slot of poles A and B. It is noted that while this empty slot is shown on the left of the wires in , it will be on the right side of the wires at other locations.
FIGS. 7A-7C
50
50
When the wires undergo a phase shift and all of the wires have phase shift end loops, the pitch of each of the wires will differ from the standard pitch by one slot and the arrangement of the wires will look the same as depicted in with each wire of the three wires defining the same pitch. For example, if the wires had an empty slot at the left end at pole A and it was desired to shift the wires so that there was an empty slot on the right end of pole B without changing the relative positions of the three wires, the wires would all be given a pitch of 8 (one less than the standard pitch). Alternatively, the wires could all be given a pitch of 10 (one more than the standard pitch) to move them from the three left slots of pole A to the three right slots of pole B without changing their relative positions.
FIGS. 8A-8C
FIGS. 9A-9C
FIGS. 8A-8C
FIGS. 9A-9C
and illustrate situations wherein each of the wires have a position change end loop. illustrate the situation where one wire has a pitch less than the standard pitch and two wires have a pitch greater than the standard pitch while illustrate the situation where one wire has a pitch greater than the standard pitch and the other two wires have a pitch less than the standard pitch. In each of these situations, the wires defining a greater pitch extend over the top of the wires having a less than standard pitch.
FIGS. 8A-8C
FIGS. 8B and 8C
FIGS. 8A-8C
52
52
54
50
50
Turning specifically to , the set of position change end loops depicted in these figures a first wire moves from the right end of the wires at pole A to the left end of the wires at pole B. To accomplish this, first wire has a pitch of 7, two less than the standard pitch while the remaining wires each have a pitch of 10, one more than the standard pitch. This maintains the three wires, as a whole, in the same slots of poles A and B while rearranging the individual wires within those slots. In other words, the empty slot of the pole is at the same side of pole A and pole B. illustrate the empty slot being at the left end but the depicted arrangement of the wires in will also maintain the empty slot at the right end of the poles.
FIGS. 8A-8C
FIGS. 8A-8C
52
54
52
52
54
54
While the depicted electric machine has three parallel windings per phase, alternative embodiments may include a lesser or larger number of parallel windings. To move one winding from the leading end of wires (at pole A) to the trailing end of the wires (at pole B) as depicted in , the appropriate end winding, e.g., winding , is given a pitch that is equal to the standard pitch minus the number of remaining windings . In the case of this will be 9-2 or 7 while the remaining wires are given a pitch that is equal to the standard pitch plus one or 9+1=10. Another way to state this formula is that winding will have a pitch equal to the standard pitch, plus one and minus the total number of windings, or, (9+1)−3=7. The remaining windings are all shifted one slot to make room for winding and, as mentioned above, have a pitch that is equal to the standard pitch plus 1. By giving the remaining windings all the same pitch, these remaining wires maintain their positions relative to each other.
FIGS. 8B and 8C
FIGS. 7A-7C
54
52
54
As can be most easily seen in , the remaining wires extend a greater axial distance away from the stator core and over wire . It also noted that similar to the wires of , the remaining wires have staggered apexes and a radially extending center section proximate the apex that allows them to overlap each other.
FIGS. 8A-8C
FIG. 1
FIG. 2
FIG. 5
3
4
7
8
4
8
9
3
It is noted that, for the exemplary embodiment, the 7 and 10 pitch end loops depicted in are employed with wires X, Y, Z in the middle of layer () and with wires A, B, C in the middle of layer (). These sets of end loops are also present in , between poles and , layer for wires A, B, C and between poles and , layer for wires X, Y. Z.
FIGS. 9A-9C
FIGS. 9B and 9C
FIGS. 9A-9C
56
56
58
50
50
Turning now to , this set of end loops moves a first wire from the left end of the wires at pole A to the right end of the wires at pole B. To accomplish this, first wire has a pitch of 11, two more than the standard pitch while the remaining wires each have a pitch of 8, one less than the standard pitch. This maintains the three wires, as a whole, in the same slots of poles A and B while rearranging the individual wires within those slots. In other words, the empty slot of the pole is at the same side of pole A and pole B. illustrate the empty slot being at the left end but the depicted arrangement of the wires in will also maintain the empty slot at the right end of the poles.
FIGS. 9A-9C
FIGS. 9A-9C
56
58
56
58
56
58
58
To move one winding from the trailing end of wires (at pole A) to the leading end of the wires (at pole B) as depicted in , the appropriate end winding, e.g., winding , is given a pitch that is equal to the standard pitch plus the number of remaining windings . In the case of this will be 9+2 or 11 while the remaining wires are given a pitch that is equal to the standard pitch minus one or 9−1=8. Another way to state this formula is that winding will have a pitch equal to the standard pitch, minus one and plus the total number of windings, or, (9−1)+3=11. The remaining windings are all shifted one slot to make room for winding and, as mentioned above, have a pitch that is equal to the standard pitch minus 1. By giving the remaining windings all the same pitch, these remaining wires maintain their positions relative to each other.
FIGS. 9B and 9C
FIGS. 8A-8C
FIGS. 9A-9C
FIGS. 7A-7C
FIGS. 8A-8C
56
58
54
58
As can be most easily seen in , the first wire extends a greater axial distance away from the stator core and over the two remaining wires . In both and it is the wires that have a larger pitch that extend over the top of the wires that have a shorter pitch. This arrangement is one that minimizes the spatial conflicts between the wires involved in the position change end loops. It also noted that similar to the wires of and the remaining wires of , remaining wires have staggered apexes and a radially extending center section proximate the apex that allows them to overlap each other.
FIGS. 9A-9C
FIG. 1
FIG. 2
FIG. 1
FIG. 2
1
6
4
5
2
3
It is noted that, for the exemplary embodiment, the 8 and 11 pitch end loops depicted in are employed with wires X, Y, Z in the middle of layer () and with wires A, B, C in the middle of layer (). An additional set of end loops that have 8 and 11 pitches but which also transition between layers are found at the transition between layers and for wires X, Y, Z () and at the transition between layers and for wires A, B, C ().
FIGS. 9A-9C
FIGS. 8A-8C
It is noted that while the end loops depicted in are used twice with each wire (four times with each winding) and the end loops depicted in are used once with each wire (twice with each winding), other combinations of such end loops could also be employed to obtain electrically balanced windings.
FIGS. 10A and 10B
FIGS. 9A-9C
FIGS. 10A, 10B
62
60
62
62
60
62
2
Turning now to , these two figures illustrate an arrangement similar to that of , but in , two of the wires have a standard pitch of 9 and remain the same relative slot positions in both poles. The other wire defines a pitch of 12 and moves from a position on the left end of pole A to a position on the right end of pole B. Thus, this arrangement not only alters the relative position of the three wires but also shifts all three wires within the poles from the three trailing slot positions (at pole A) to the three leading slot positions (at pole B) (a phase shift end loop). This is accomplished by having wires retain the same slots in pole A and pole B by using a standard pitch with these two wires and having wire leapfrog over wires by providing it with a pitch that is equal to the standard pitch, plus the number of wires over which it must leapfrog () plus one to move it into an empty slot, in other words, 9+2+1=12.
Similarly, the wires could be shifted from the leading slot positions to the trailing slot positions by providing the leading wire at pole A with a pitch of 6 (9−2−1=6) and the other two wires with a pitch of 9. In all of these situations, it will be most convenient to have the wires with the larger pitch extend over the top of the wires with the smaller pitch.
62
FIGS. 7A-7C
The depicted wires have a configuration similar to the wires shown in and have staggered apexes and a radially extending center section proximate the apex that allows them to overlap each other.
FIGS. 10A and 10B
FIGS. 1-6
FIGS. 10A and 10B
FIGS. 10A, 10B
FIGS. 10A, 10B
It is noted that the windings depicted in are not employed in the exemplary embodiment of , however, the depicted electric machine could be modified to include windings similar to that shown in if desired. The use of the end loops shown in provide both a phase shifting and positioning changing function and thus the use of a single set of end loops as depicted in could be used to replace both a set of position change end loops and a set of phase shift end loops with a single set of end loops that combine both of these functions.
FIGS. 8A-8C, 9A-9C and/or 10A, 10B
It is additionally noted, that while the depicted electric machine includes end loops that all have a cascaded arrangement, it would also be possible to employ interlaced/interleaved end loops (either continuous or hairpin) between poles which require only standard pitches for each of the wires and employ end loops as depicted in where appropriate.
While this invention has been described as having an exemplary design, the present invention may be further modified within the spirit and scope of this disclosure. This application is therefore intended to cover any variations, uses, or adaptations of the invention using its general principles.
BRIEF DESCRIPTION OF THE DRAWINGS
The above mentioned and other features of this invention, and the manner of attaining them, will become more apparent and the invention itself will be better understood by reference to the following description of an embodiment of the invention taken in conjunction with the accompanying drawings, wherein:
FIG. 1
is a partial winding diagram showing three wires defining a part of an individual phase.
FIG. 2
FIG. 1
is a partial winding diagram showing three wires that are connected in series with the wires depicted in to form an individual phase.
FIG. 3
FIGS. 1 and 2
is a top view of a stator diagram illustrating the arrangement of the wires of .
FIG. 4
FIG. 3
is a detail view of a portion of the stator diagram of .
FIG. 5
FIG. 3
is another detail view of a portion of the stator diagram of .
FIG. 6
is a cross sectional view of an electric machine.
FIG. 7A
is a side view showing three standard pitch end loops.
FIG. 7B
is a top view showing three standard pitch end loops.
FIG. 7C
is a perspective view showing three standard pitch end loops.
FIG. 8A
is a side view showing position change end loops with two end loops extending over a third end loop.
FIG. 8B
FIG. 8A
is a top view showing the end loops of .
FIG. 8C
FIG. 8A
is a perspective view showing the end loops of .
FIG. 9A
is a side view showing position change end loops with one end loop extending over two other end loops.
FIG. 9B
FIG. 9A
is a top view showing the end loops of .
FIG. 9C
FIG. 9A
is a perspective view showing the end loops of .
FIG. 10A
is a top view showing one end loop extending over two other end loops.
FIG. 10B
FIG. 10A
is a perspective view showing the end loops of . | |
This webinar is FREE for DRI members and non-members
Despite long standing discussion about how to increase diversity in the ranks of neutrals, there is an absence of quantifiable data about the demographics profile of mediators and arbitrators chosen by insurers and lawyers. The absence of this critical data point makes increasing diversity and inclusiveness amongst mediators and arbitrators difficult. Most everyone agrees there needs to be more diversity, but we lack data to measure the problem and any progress we hope to make. DRI’s initiative seeks to increase the appointment of mediators and arbitrators in underrepresented demographic categories. The increased appointments are measured by the creation of and use of quantitative data to set milestones for insurers’, affinity bar associations’, and lawyers’ journeys in learning about how to design opportunities for mediator and arbitrators who are not members of a candidates’ pool for mediators and arbitrators, whose membership is dependent upon prior experiences with insurers and lawyers. Lack of experiences with insurers and lawyers can be barriers to mediators and arbitrators without opportunities for these experiences.
Join us as we talk with world renowned alternative dispute resolution expert, Kenneth R. Feinberg, former Special Master of the 9/11 Victim Compensation Fund, as he discusses lessons learned about voice and cultural considerations through his practice as a distinguished neutral.
Then hear from Chris Kwok, JAMS Mediator, Arbitrator, Referee/Special Master, Hearing Officer, Tom Maroney, Partner, Maroney O’Connor LLP, Chair, DRI’s Alternative Dispute Resolution Committee and Maria Volpe, Professor of Sociology, Director of the Dispute Resolution Program at John Jay College of Criminal Justice - City University of New York, and Director of the CUNY Dispute Resolution Center and Dean Martinez, CEO of DRI about this initiative.
Finally, engage in a lively discussion with our panel of experts as we have a facilitated dialog about this initiative and the importance of growing the diversity of perspective, experience, and voice in alternative dispute resolution. This esteemed group is sure to bring value to how you consider and make neutral selections in your practice.
Presenters:
Opening Remarks
Douglas Burrell, Partner, Drew, Eckl, & Farnham LLP and DRI’s President-Elect
Introduction of Keynote Speaker
Krista Glenn, Chief Claims Officer, IAT Insurance Group
Lessons Learned About Voice and Cultural Considerations
Kenneth R. Feinberg is one of the nation’s leading experts in alternative dispute resolution, having served as Special Master of the 9/11 Victim Compensation Fund, the Department of Justice Victims of State Sponsored Terrorism Fund, the Department of the Treasury’s TARP Executive Compensation Program and the Treasury’s Private Multiemployer Pension Reform program. He was also Special Settlement Master of the Agent Orange Victim Compensation Program. In 2010, Mr. Feinberg was appointed by the Obama Administration to oversee compensation of victims of the BP oil spill in the Gulf of Mexico. Most recently, he has served as Administrator of the New York State Dioceses’ Independent Reconciliation and Compensation Funds (along with dioceses in four other states), the One Orlando Fund, the GM Ignition Switch Compensation Program, and the One Fund Boston Compensation Program arising out of the Boston Marathon bombings. He was the Court-appointed Settlement Master in the Ford/Chrysler Diesel Emissions class action litigation in San Francisco and serves in a similar capacity in the Monsanto Roundup mass tort litigation. He has been appointed mediator and arbitrator in thousands of complex disputes over the past 35 years.
Mr. Feinberg was appointed in June of 2007 as the Distribution Agent in In Re: United States Securities and Exchange Commission v. American International Group, Inc., responsible for the design and implementation of a Plan for the distribution of a Fair Fund settlement of $800 million to eligible claimants. He has also served as Fund Administrator in other prominent settlements including In Re: United States of America v. Computer Associates International, Inc. (responsible for the design and administration of a $200 million fund); In Re: Zyprexa Product Liability Litigation (a $700 million settlement fund); and In Re: Latino Officers Association City of New York, Inc., et al., v. The City of New York, et al. (a $17 million settlement fund).
He was also one of three arbitrators selected in 1999 to determine the fair market value of the original Zapruder film of the Kennedy assassination and was one of two arbitrators selected to determine the allocation of legal fees in the Holocaust slave labor litigation.
Mr. Feinberg received his B.A. cum laude from the University of Massachusetts in 1967 and his J.D. from New York University School of Law in 1970, where he was Articles Editor of the Law Review. He was a Law Clerk for Chief Judge Stanley H. Fuld, New York State Court of Appeals from 1970 to 1972; Assistant United States Attorney, Southern District of New York from 1972 to 1975; Special Counsel, United States Senate Committee on the Judiciary from 1975 to 1978; Chief of Staff to Senator Edward M. Kennedy from 1978 to 1980, Partner at Kaye, Scholer, Fierman, Hays & Handler from 1980 to 1993; and founded The Feinberg Group, LLP in 1993. Mr. Feinberg has been a Court-Appointed Special Settlement Master, mediator and arbitrator in thousands of disputes.
Mr. Feinberg was a member of the Presidential Advisory Commission on Human Radiation Experiments from 1994 to 1998; the Presidential Commission on Catastrophic Nuclear Accidents from 1989 to 1990 and the Carnegie Commission Task Force on Science and Technology in Judicial and Regulatory Decision Making from 1989 to 1993. He previously chaired the American Bar Association Special Committee on Mass Torts from 1988 to 1989. He is also a national arbitrator for the American Arbitration Association.
Mr. Feinberg serves on the RAND Corporation’s Board of Trustees and is also the former president of the Washington National Opera.
He has had a distinguished teaching career as Adjunct Professor of Law at Harvard, Georgetown, The University of Pennsylvania, New York University, the University of Virginia, and Columbia. He has also taught as a visiting lecturer at various other law schools, including UCLA, Vanderbilt, Duke and New York Law School.
Mr. Feinberg was designated “Lawyer of the Year” by the National Law Journal (December 2004). He is listed in “Profiles in Power: The 100 Most Influential Lawyers in America” (National Law Journal, May 2, 1988; March 25, 1991; April 4, 1994; June 12, 2000; June 19, 2006). He is the author of numerous articles and essays on mediation, mass torts and other matters and is the author of two books: What is Life Worth? The Unprecedented Effort to Compensate the Victims of 9/11 (Public Affairs 2005); Who Gets What: Fair Compensation After Tragedy and Financial Upheaval (Public Affairs 2012).
Mr. Feinberg’s book detailing his work as Special Master of the September 11 Fund has been the subject of a major motion picture (to be released in on Netflix beginning September 3, 2021). He is also the subject of a movie documentary, “Playing God,” released in 2018.
Closing Remarks
Douglas Burrell, Partner, Drew, Eckl, & Farnham LLP and DRI’s President-Elect
Thank you to DRI's Webinar Partners
The Hispanic National Bar Association (HNBA) is an incorporated, not-for-profit, national membership association that represents the interests of over 65,000 Hispanic attorneys, judges, law professors, legal assistants, law students, and legal professionals in the United States and its territories. Since 1972, the HNBA has acted as a force for positive change within the legal profession by creating opportunities for Hispanic lawyers and by helping generations of lawyers to succeed. The HNBA has also effectively advocated on issues of importance to the national Hispanic community. While we are proud of our accomplishments, we are mindful that our mission is as vital today as it was nearly five decades ago, especially as the U.S. Hispanic population continues to grow.
NAPABA is the nation's largest Asian Pacific American membership organization representing the interest of 60,000 attorneys, judges, law professors, and law students.
The National Bar Association was founded in 1925 and is the nation's oldest and largest national network of predominantly African-American attorneys and judges. It represents the interests of approximately 66,000 lawyers, judges, law professors, and law students. The NBA is proud of its Alternative Dispute Resolution Section, which is comprised of diverse highly trained, skilled and experienced Mediators and Arbitrators. We have years of experience in the full spectrum of practice areas. A number of our members belong to our certified Panels of Arbitrators and Mediators.
Must click applicable “ADD” button(s) associated with each event listed above before checking out. | https://members.dri.org/driimis/DRI/DRI/Events/Event_Display.aspx?EventKey=DRI3615 |
LIVINGSTON, NJ — As the total number of COVID-19 cases in Livingston increased to 320 and the number of related deaths increased to 35 as of 9 a.m. on Thursday, the Township of Livingston—in conjunction with the local VFW, Jewish War Veterans, American Legion and Memorial Day Committee members—announced that all Livingston Memorial Day festivities have been canceled as a result of the global health crisis.
Although the ceremony and parade have been canceled, the township stated that residents “should still use the day to reflect and remember the men and women who have paid the ultimate sacrifice while in the military service of their country.”
“This was not an easy decision to make, but over concerns about the impact of COVID-19 and the safety of the participants and residents, it was the only appropriate decision,” said Mayor Rudy Fernandez, adding that this was a unanimous decision among all involved. “With so much uncertainty as to when and how the governor will lift the stay-at-home order, even if the parade or ceremony could be held, it would be difficult to decide how everyone could safely participate, and with some level of physical distancing still expected to be in place at the time, how to organize such an event.”
Earlier this week, Livingston Township Manager Barry Lewis and Livingston Health Officer Lou Anello acknowledged that although the number of deaths being reported in Livingston seems alarming compared to other towns, many of the local deaths have been residents of long-term care facilities, where a high volume of at-risk individuals are living in close quarters.
“It’s a tragedy, but in terms of our numbers—if they seem a little skewed, and the number of deaths versus the number of cases seem much higher than the mortality percentages you hear out there—[it’s] because of the numerous facilities that we have that house nothing but the most vulnerable,” said Lewis, noting that the significant number of deaths associated with COVID-19 in Livingston, which is nearly 11 percent of the total as of Thursday, “has caused a lot of apprehension.”
During Monday’s Livingston Township Council meeting, which was live-streamed on Facebook, Anello said that Livingston had five coronavirus-related deaths over the weekend that were all affiliated with long-term care facilities.
Although he could not provide specific information about how many of the positive cases in Livingston are residents of assisted-living facilities, Anello indicated that 12 of the 26 deaths reported by 5 p.m. on Monday were residents of long-term care facilities.
“It’s very sad to see, but [these facilities are] isolating those patients, and some of those patients might have been infected more than 14 weeks ago and just have never recovered from that,” said Anello. “It’s very sad to see the statistics come through, but hopefully that will be going down as well.”
In response to inquiries from the council, Anello noted that the Essex County towns reporting a higher volume of COVID-19 cases are the municipalities that either have multiple assisted-living facilities or multi-family dwellings where people are “living in close quarters.”
As of 9 a.m. on Thursday, Essex County reported a total of 9,126 cases and 640 deaths. The cities of Newark and East Orange currently have the highest number of cases within the county, with 3,412 cases and 203 deaths reported in Newark and 900 cases and 59 deaths reported in East Orange.
In Livingston's neighboring towns, West Orange reported 603 cases with 67 deaths on Thursday while Millburn reported 96 cases with three deaths and Roseland reported 50 cases with six deaths.
According to Anello, the number of new cases being reported each day in Livingston has also been consistently lower over the last week, but the township is urging residents not to consider these encouraging statistics as a reason to let up on social-distancing measures.
“There are a lot of people out there that don’t even know that they’re positive, and this is why it’s so important for people to stay home and that it’s absolutely necessary that they social distance from each other,” said Mayor Rudy Fernandez. “It’s an important message to still get out there to people that even if the daily numbers are decreasing, it can very easily start to increase if we don’t follow all the CDC (Centers for Disease Control and Prevention) recommendations a follow through on what we’re supposed to be doing.”
Fire Chief Chris Mullin, who also serves as coordinator for Livingston’s Office of Emergency Management (OEM), released a statement earlier this week asking all Livingston residents to continue practicing social distancing in order to flatten the curve even further.
“Although we may be seeing a slight turnaround in the numbers regarding new cases, this is not a time to let our foot of the gas pedal,” he said in his statement. “We must all continue to practice social distancing to the greatest extent possible and wear a face covering when out in public places such as supermarkets, pharmacies, etc., gathering essential items.”
Mullin also reported this week that Livingston’s two largest long-term care facilities—CareOne at Livingston Assisted Living and Inglemoor Rehabilitation & Care Center—have recently received personal protective equipment from local and state entities.
“Supplies are coming, but they’re obviously backlogged with everything that’s going on nationwide,” he said, adding that Inglemoor received needed equipment from the federal government over the weekend and that the county assisted in providing 800 surgical masks and a container of hand sanitizer to CareOne.
Anello also shared another encouraging local statistic, noting that many of the COVID-19 patients who have been isolating at home have recovered and were recently released from quarantine.
Lewis confirmed that there have been no COVID-19 cases reported among township employees and that “morale is still as high as it can be.” He reiterated that all township offices remain closed to the public until further notice.
During his report, Anello made sure to acknowledge his staff as well as the licensed professionals who have been volunteering their time to helping with contact tracing when new cases come in.
He also reminded residents that the governor’s recent executive order mandates all New Jersey residents to wear protective masks in public areas. | https://www.tapinto.net/towns/livingston/sections/health-and-wellness/articles/livingston-cancels-memorial-day-parade-provides-local-coronavirus-update |
Magic is the ability to influence the course of events via supernatural or mystical forces, passed down via genetics as a family trait; those born with the ability to use magic are known as witches and warlocks, respectively. A number of magical powers and abilities have been showcased throughout multiple seasons of American Horror Story, namely Coven, Hotel, Roanoke and Apocalypse. This is a partial list of those powers and spells to date.
Some magical abilities are inherent to certain witches; that is to say, they are naturally born with these abilities and do not need to focus or concentrate on them in order to perform them. Oftentimes, witches will inherit their magical powers from relatives who possessed these powers themselves; as a result, a witch descended from a unique bloodline may possess powers that cannot be replicated by other witches who do not possess these same powers (Queenie's Injury Transference and Mallory's Tempus Infinituum are two examples of this). Other powers can achieved by all witches regardless of their bloodline via reading the reading of incantations or performance of rituals.
It is not rare for a witch to manifest more than three powers, though in order for them to claim the title of Supreme Witch, they are required to possess all seven of the Seven Wonders, though this witch does not necessarily need to exhibit every possible magical power that exists.
If witches who share the ability to perform a certain magical power are in the same vicinity as each other, they will be able to perform this particular ability collectively, giving it much more intense effect than if they were to use this power singlehandedly (for example, Misty, Cordelia, Queenie, Zoe and Madison were able to combine their telekinesis, resulting in all of them being able to fling The Axeman away from them by several yards).
Some magical abilities may be triggered by certain events and substances. The ability to negate magic was instinctively activated by Zoe with no prior knowledge of the skill, and Fiona had an uncontrolled clairvoyant event while undergoing chemotherapy in a hospital, remarking that she never possessed the ability before. During times of crisis, witches may experience a spike in their power, which manifests in the form of newly-developed abilities.
According to Cordelia Goode, witches draw their power from light, though evidently, there are other witches lurking in the shadows of their benevolent counterparts who draw their power from dark forces, and look less human as a result.
Voodoo and Witchcraft practitioners share certain powers.
The Seven Wonders
The Seven Wonders are a category of magical abilities which the Salem witches use to determine who will be the Supreme Witch, a title they use to refer to the most powerful witch among them who will lead their coven. Although witches will typically manifest one to three of the Seven Wonders throughout their lifetime (or more if they are particularly powerful), they will not qualify as the Supreme Witch unless they demonstrate that they possess all seven of the following abilities:
Telekinesis
The ability to manipulate objects with the power of the mind, allowing witches to move or levitate people and objects without physically touching them. This seems to be the most common power, as it has been displayed by many witches, and can be used both offensively and defensively.
- Madison Montgomery
- Fiona Goode
- Myrtle Snow
- Nan
- Queenie
- Zoe Benson
- Misty Day
- Cordelia Goode
- Anna Leigh Leighton
- Prudence Mather
- Marianne Wharton
- Mimi DeLongpre
- Stevie Nicks
- Scáthach
- Mallory
- Ariel Augustus
- Behold Chablis
- Baldwin Pennypacker
- John Henry Moore
- Coby Dellum
Concilium
The ability of a witch to impose their own will onto another person or animal, allowing the aforementioned witch to control many parts of an intended victim's mind (such as their thoughts, actions and memories). This power can be resisted by humans with strong willpower, though doing so will cause these individuals to experience an increase in intracranial pressure, leading to permanent brain damage in these individuals if they do not give in to being controlled by a witch. As a result, if exercised properly, a witch with this power can bend the strongest of wills to her personal desires. It is more commonly known as Coercion or Mind Control.
Pyrokinesis
The ability to create, control, and manipulate fire with the power of the mind.
- Madison Montgomery
- Fiona Goode
- Anna Leigh Leighton
- Prudence Mather
- Marianne Wharton
- Mimi DeLongpre
- Kaylee
- Chattahoochee Forest Witch
- Cordelia Goode
- Scáthach
- Mallory
- Ariel Augustus
- Baldwin Pennypacker
- John Henry Moore
- Zoe Benson
- Unnamed witch
Transmutation
The ability to move instantaneously from one location to another without physically occupying the space in-between, also known as Teleportation. Warlocks refer to this power as "Salire per spatium".
Vitalum Vitalis
The ability to tip the scale from one life force to another. Witches can transfer their own life force into people or animals that are sick, injured or on the verge of death, thereby restoring living things to perfect health and healing their injuries.. Common side effects on witches with this power are fainting and dizziness, due to the strain a witch experiences from giving up part of their own soul to save someone or something else's. Contrarily, witches can also abuse this power by using it the opposite way, draining the life force of living things in order to temporarily reverse their own aging and become younger, though they will very quickly return to their true age.
Descensum
The ability to descend into the netherworlds of the afterlife. Witches are able to project their souls directly into Hell, which takes the form of their worst fears. If a witch is stuck for a certain amount of time in Hell, their physical body will disintegrate into dust and their soul will be trapped there for all of eternity. To use this power, witches commonly chant an incantation.
|“||Spiritu duce, in me est. Deduc me in tenebris vita ad extremum, ut salutaret inferi. Descensum!||”|
|— Incantation|
A counter-spell was used by Cordelia Foxx in an attempt to guide Misty Day back from the netherworld.
|“||Sequere lucem, venite ad me.||”|
|— Incantation|
Divination
The ability to obtain direct knowledge of an object, person, location, or physical event through means other than the user's physical senses. This power can be activated by just being around a person, focusing on specific tasks, or touching objects.
Uncommon Powers
Resurgence
The magical ability to resurrect oneself and other individuals from death. Unlike Vitalum Vitalis, which requires a witch to give up part of her own soul to restore a person or animal back to perfect health, resurgence works by a witch reaching into the space between life and death, drawing a soul back from the precipice of the afterlife before restoring it to the deceased's body. Misty Day is the only known witch to possess the power of resurgence. It is considered to be more difficult than any of the Seven Wonders.
Resurgence requires the deceased's body to be mostly intact, even if great damage was inflicted upon it. When the Salem coven was tricked into believing Fiona Goode's body was disposed of in the Louisiana swamps, Misty remarked that even she could not bring someone back "once they're gator shit." Similarly, individuals who have been dead for a considerable amount of time are harder to resurrect. Misty had to combine her powers with Zoe Benson's in order to expel the death from Madison Montgomery's decaying corpse before she could bring the latter back to life. Misty had no trouble resurrecting Myrtle Snow, however, as she was able to locate Myrtle's charred body almost immediately after the witch was burnt at the stake.
Any damage inflicted on the deceased's body when they died cannot be undone by resurgence, thus resurrecting badly decomposed or damaged bodies (i.e. someone whose throat was slit in life) will result in that person still baring the wound that resulted in their death after being resurrected. As a result of this side effect, Misty had to employ the healing properties of Louisiana swamp mud to graft Madison's dismembered arm back on to her body, and likewise used the same method to restore Myrtle's burnt body to its former state.
Misty used resurgence to resurrect herself after being burnt at the stake. She also brought animals, such as birds and alligators, back to life. Myrtle Snow, Madison Montgomery, and Joan Ramsey were all individuals who were resurrected by Misty through resurgence.
Tempus Infinituum
The immensely rare and powerful magical ability to manipulate the flow of time. This power is especially unique in that it can be performed by a witch in two different ways: on a localized scale, such as reversing the time of a specific object or organism (i.e. reversing a fully-grown deer's age to turn it back into a doe), or on a larger scale, which involves the witch going back in time herself to alter the course of history from that point onwards, changing or reversing past events as if they never happened and, as a result, creating a brand new timeline separate from the original timeline's series of events. Unlike resurgence or Vitalum Vitalis, which bring people or animals back to life after they've been injured or have died, Tempus Infinituum can erase an organism from ever having been injured or died. It is such an uncommon power that the Salem witches assumed it to be fictional for generations.
Immortality
The magical ability to live forever and never age, allowing those afflicted by it an immunity to all aging, disease, and death. It would appear to be an exceptionally rare and complicated ability, as even most Supreme Witches seem unaware of its existence; as a result, this power may have its origins in ancient or forgotten Pagan skills not practiced by modern witches. Immortality seems to come with a steep price, as it appears it can only be bestowed to a witch by malevolent deities, such as the Old Gods, and requires the aforementioned witch to perform annual human sacrifices during specific times of the year, taking the lives of innocent people in order for the witch to preserve her own.
Black Widow
The magical ability to induce brain aneurysms during sexual intercourse. Individuals who have died and were resurrected are immune to this power, as Madison Montgomery and Kyle Spencer were both able to pursue a sexual relationship with Zoe Benson after being brought back to life following their respective deaths.
- Zoe Benson
- Zoe Benson's great-grandmother
Power Negation
The magical ability to cancel out someone else's magic or Voodoo curse. Despite having no prior knowledge that she possessed this ability beforehand, Zoe was able to instinctively use this power when Marie Laveau sent an army of zombies to kill the witches of Miss Robichaux's Academy, breaking the Voodoo Queen's spell and resulting in these zombies falling to the ground as inanimate corpses. According to Zoe, this power was activated out of her sheer panic and alarm rather than intentionally.
Chlorokinesis
The magical ability to control plant life. During her preparation for the Test of the Seven Wonders, Misty cut off a flower's petals and used this power to speed up their growth in a matter of seconds, resulting in the flower completely reforming itself much faster than it would naturally.
Hydrokinesis
The magical ability to manipulate water and other liquids.
Stiricidium
The magical ability to control weather through water molecules present in the air, allowing a witch to create snow or rain in the surrounding environment, even indoors.
Enhanced Agility
The magical ability to perform motions, or movements, at a speed and effortlessness that surpasses that of a normal member of the user's species, possessed of enhanced speed, balance, endurance, flexibility, and reflexes.
Illusion Manipulation
The magical ability to create and manipulate illusions, causing others to see, hear, touch, smell, and/or taste things which do not actually exist, or cause them to perceive things differently from what they truly are.
Clairvoyance
The magical ability to read the minds of others and project one's own thoughts into them, also known as Telepathy.
Lectio Animo
The magical ability to listen to a person's soul to extract the truth, allowing a witch with this power to hear individuals' true hidden intentions as if hearing their thoughts out loud. It is somewhat similar to Lie Detection, though it is a variation of Clairvoyance.
Telekinetic Earthquake
The magical ability to telekinetically create small seismic shocks. A variation of Telekinesis.
Telekinetic Incision
The magical ability to telekinetically cut into a person's skin without causing any hemorrhage. A variation of Telekinesis.
Levitation
The magical ability to propel oneself into the air, granting them flight. A variation of Telekinesis.
Memory Manipulation
The magical ability to manipulate another person's memory in order to either implant false memories into them or erase their memory of specific events. A variation of Concilium.
Hypnosis
The magical ability to entrance a victim into an instant slumber, at which point the victim will not awaken unless commanded to do so by the witch. A variation of Concilium.
Lie Detection
The magical ability to detect lies. A variation of Divination.
Magic Detection
The magical ability to sense another witch's magic. Misty describes it as "[her] heart starts racing, [her] teeth start vibrating, and something is calling to [her]". A variation of Divination.
Life-Force Detection
The magical ability to detect a person's life-force (or lack of it). Witches with this power use it determine whether or not a fellow witch is alive or deceased, without ever needing to find the missing witch's body as confirmation of their fate. A variation of Divination.
Evil Detection
The magical ability to sense evil like a perfume. A variation of Divination.
Danger Detection
The magical ability to detect imminent danger. A variation of Divination.
Aura Detection
The magical ability to detect auras, allowing a witch with this power to distinguish one individual's personality traits from someone else's. A variation of Divination.
Calorie Detection
The magical ability to detect how many calories a specific food has. A variation of Divination.
Gluten Detection
The magical ability to detect if food has gluten in it or not. A variation of Divination.
Scrying
The magical ability to see things such as messages, visions, and prophecies on a reflective surface. A variation of Divination.
The Sight
The magical ability to see significant visions or premonitions of the past, present, and future through touch. It is described as the greatest ability to have and the most painful to live with. Cordelia Goode describes these visions as vibrating with light. A variation of Divination.
Astral Projection
The magical ability of a witch to separate her soul from her own body, thereby allowing her soul to travel to different locations via the Astral Plane, a dimension between life and death where witches can spy on different locations without needing to physically travel to them. Witches and warlocks use this power to see areas which would otherwise pose dangerous to them if they were physically present there. A variation of Descensum.
Instrumental Crafts
Potioncraft
Affinity for an extensive knowledge of "Green Magic," including conventional herbalism as well as more sophisticated botanical science and potion brewing. While Cordelia usually uses her knowledge in this field for protection and healing, Myrtle uses her knowledge to brew a poisonous potion to take down her enemies by putting the poison on foods.
- Cordelia Goode
- Myrtle Snow
- Scáthach
- Madison Montgomery
- Baldwin Pennypacker
- Agnes Sampson
Spellcraft
Affinity for casting spells and performing rituals.
- Cordelia Goode
- Zoe Benson
- Madison Montgomery
- Myrtle Snow
- Fiona Goode
- Scáthach
- Joséphine Bonaparte
- Mallory
- John Henry Moore
- Behold Chablis
- Queenie
- Bubbles McGee
- Anastasia Romanov
Spirit Board
The spirit board is an object used to communicate with the spirits of the dead. It is a rectangular-shaped board inscribed with letters of the English alphabet and the numbers 1-9.
Zoe Benson found a spirit board hidden away in a closet while going through Madison Montgomery's things. Enlisting the help of Queenie and Nan, Zoe attempts to contact Madison, whom she believes to be dead. Queenie recounts an event when her grandmother played around with a spirit board and had half of her face burnt off by a bad spirit she accidentally released. Zoe assures Queenie that three witches are more than capable to face any malicious ghosts. Using a glass as a makeshift planchette, the girls make contact with the spirit world. However, instead of Madison, the spirit of the Axeman communicates with the witches, revealing his identity to them. Queenie quickly puts an end to the communication, warning Zoe to find out who she is talking to if survival is important to her.
Later by herself, Zoe once again reaches out to the Axeman, promising him release should he reveal Madison's whereabouts. In response, the Axeman directs Zoe to the attic through the spirit board.
Louisiana Swamp Mud
The mud from Louisiana swamps are rich in Spanish moss and alligator dung, granting it extraordinary healing properties. After being burnt at the stake and resurrecting herself, Misty Day used Louisiana swamp mud to restore her burnt body. Following Myrtle Snow's own gruesome death at the stake, Misty revived her and healed the witch's charred body with Louisiana swamp mud.
After Zoe Benson and Madison Montgomery brought Kyle Spencer back to life using the body parts of several other corpses, Misty applied Louisiana swamp mud to Kyle's wounds. However, the mud was unable to fully heal a deep wound he had near his neck.
Zoe had Misty use Louisiana swamp mud to graft Madison's dislocated left arm on to her body back before resurrecting her.
Cordelia, Madison, and Myrtle buried themselves in Louisiana swamp mud to hibernate for two years and became immune to the fallout.
Spells and Rituals
In addition to the inherent (sometimes reflexive) abilities, there are some spells or rituals featured that require more preparation. A spell may require ritual actions, an incantation, material components, or any combination of these.
Lock Enchantment Spell
A spell to enchant locks on doors and prevent anyone from entering. Although she never used it, Cordelia threatened to enchant the locks after Fiona left the house.
Memory Spell
A spell to alter or implant false memories onto someone. The caster requires their target to consume their spit. This spell was used by Fiona to alter the memories of the two detectives investigating Zoe and Madison. She later used a more elaborate version on The Axeman to convince the rest of the coven that she was dead. It was able enough to fool Cordelia's Sight.
Fertility Ritual
A ritual to boost to female fertility. Performed in a candle-lined circle by Cordelia Goode, and involving coitus with Hank Foxx inside the circle. Unfortunately, the ritual did not work for her.
|“||Jam tibi impero et praencipio maligne spiritus! Ut confestim allata et circulo discedas, absque omni laesione cujuscunque creaturae vel rei et ad locum a justissimo, Deo tibi deputatum in momento et ictu oculi abeas. Krec Kreteo Mas Mav Kaetan!||”|
|— Incantation|
Resurrection Spell
A reanimation of once-living things. The ritual was performed on Kyle Spencer, with anatomical contributions from other cadavers, by Madison Montgomery and Zoe Benson. Ritual components involved inhalation of burning sage ("salvia officinalis"), the blood of a dove ("colomba sanguinem"), a circle of salt formed around the corpse, a lock of the deceased’s hair ("litus de pilis dilecti"), and a reversed pentacle drawn with spellcaster's blood on the corpse's chest, as a sacrament.
|“||Calpriziana Offina Alta nestra fuero menut. Azazel we submit to you body and soul. Lord of the Underworld we offer you our obedience and everlasting devotion until death sanctifies this unholy union. Berald Beroald Gab Gabor Agaba! Return to the mortal coil! Arise!||”|
|— Incantation|
Truth Enchantment
An enchantment on the tongue to only speak the truth when questioned. Cast by Myrtle Snow on Spalding, which led him to cut off his tongue to thwart it.
|“||Veritas, Honorum, Justitia, Sapientia, Scientia. I conjure and command thee, dark lords to the vernacular, summon truth from lying tongues. Fire upon the wicked who dare to throw sand in our eyes. With force I command thee, let truth be spoken!||”|
|— Incantation|
Banishing Spell
An exorcism of evil spirits. Performed by Nan, Queenie and Zoe to banish the Axeman's ghost from the Academy.
|“||Solvo Liberatum Spirito Malus Nequam Pessimus Peior Cantum sufficare non levsusne milte illuc ubi mal spiritus sunt mortem cadaver putridum repraesent infur imperator requiru a choro.||”|
|— Incantation|
Preservation Spell
An enchantment that allows an object or thing to be preserved. Myrtle Snow has achieved such a spell, enchanting the tongue of Spalding for safe-keeping.
Restoration Spell
The magical grafting of a body part back onto a living host. This ritual was performed by Zoe Benson to restore Spalding's tongue to his mouth and was presumably used by Myrtle in Cordelia's transplantation of the eyes "donated" by Cecily and Quentin.
|“||Infernales, curare hominem. Restitue eum ad naturam. Infernales, curare hominem. Restitue eum ad naturam.||”|
|— Incantation|
The Sacred Taking
A ritual that allows the ascension of a new Supreme, requiring the selfless suicide of the current Supreme. A ritual requires the witches to wear red robes and black lace veils. The ritual usually proceeds with all the coven members gathering up to form a circle, they will then put their hands on opposite of each others' and will tilt up their head, having their body in a bending position facing upwards. An athame will then be passed on from one witch to another, each of them will cut the tip of their index finger for a small portion of their blood to be spilled. After all coven members slashed their fingers, they will all together put in the middle pointing and meet at the center.
Cordelia made a raw version of The Sacred Taking as a last-ditch effort to alter the Apocalypse. After telekinetically stealing the knife of Michael's hand, she then stabbed herself straight in the heart and let her body fall down the stairs so that it will immediately kill herself, allowing her power to pour swiftly to Mallory's body, transforming her as the new Supreme, and with enough power Mallory can be able to execute Tempus Infinituum with no failure. Before Cordelia, only three Supreme witches invoked The Sacred Taking, making her the fourth to do it in the Salem witches history.
Protective Berries Spell
A spell to make plants come to life and grow berries used to protect the people that eat them. This ritual was used by Cordelia Goode and Misty Day to make the plants from the greenhouse come to life and grow berries to protect the other witches in Miss Robichaux's Academy.
Plant Revival Spell
A spell to revive plants. It was used by Misty Day and Cordelia Goode. It required a potion made of asafoetida herb, bay leaf, various other herbs and mud.
|“||Bazabi lacha Bachabe, Lamac cahi achabahi, Karrelyos. Lamac Lamac Bachalys, Cabahagy sabalyos Barylos.||”|
|— Incantation|
Sleep Spell
A spell used to help a person sleep. It was used by Fiona on Marie Laveau to help her fall asleep after her tribe was attacked.
Bankruptcy Spell
A very powerful spell used by Fiona and Marie Laveau to make Delphi Trust go bankrupt. The spell components were a maze, a set of white candles, mice, and fresh-wrapped bills. Once the maze is surrounded by candles and bills, the mice (previously enchanted with an unidentified mixture of herbs) are left free to run in the maze until they are captured by traps, thus causing the chance of bankruptcy as the mice represent the inspectors dismantling a business corporation represented by the maze.
Note: This spell requires an enormous amount of power, because Fiona fainted after the spell was complete or maybe because she's already fading when they proceed with the ritual.
|“||Come to me, Hecate. Mother of Angels Cosmic World Soul. Comminuet, infirmabitur, submergetur. Praecipita, strangulare percusserite in corde suo proposito. Comminuet infirmabitur submergetur. Praecipita strangulare percusserite in corde suo proposito. Bring them to me in a weakened state. Make me strong and cunning, so that I may destroy them.||”|
|— Incantation|
Scrying Spell
A spell used by Zoe Benson to know what happened to Nan. Light a few white candles around a bathroom and hold a lighted silver candle above a bathtub full of water and say the incantation while touching the water. The images will then appear in the water.
|“||Elementum recolligo huic locus. Commodo mihi vestri vox.||”|
|— Incantation|
Analgesic Spell
A spell used by Myrtle Snow on Cordelia in order to alleviate the pain for cutting out both eyes.
Spirit Contacting Spell
Queenie is seen performing a spell to contact Nan's spirit during her preparation to the Seven Wonders Test.
Descensum Reversal Spell
A spell that supposedly guides back the soul of a witch who attempted descensum. Cordelia tried to use this spell to save Misty Day after she was trapped in her personal hell during the test of the Seven Wonders. However, the spell failed to work and Misty's body disintegrated into ash from being unable to return from hell.
|“||Sequere lucem. Venite ad me.||”|
|— Incantation|
Winning Enchantment
An enchantment on a ticket to win lots of money. Cordelia Goode enchanted Queenie's ticket for the Price is Right to ensure she will win big.
Eternal Servitude Ritual
A ritual used by Scáthach to control others via stealing their souls.
|“||Surrender thy soul... to me||”|
|— Incantation|
Pyrokinesis Spell
A spell that can generate fire when recited multiple times.
|“||Igneme accende.||”|
|— Incantation|
Molecular Rearrangement Spell
A spell that can manipulate the molecules of an object, thereby transforming it from one thing to another. A group of warlocks at the Hawthorne School used this spell to transform a set of diamonds into a single metal orb.
|“||Ex forma mutata. Summa partes. Ex forma mutata. Facti sunt figura novi.||”|
|— Incantation|
Rose Color Enchantment
An enchantment that changes the natural color of a rose to how they want.
Transformation Enchantment
An enchantment that temporarily transforms matter from one thing to another. Mallory used this enchantment to transform rose petals into butterflies.
Warlock Blessing
A blessing for a warlock undergoing the test of the Seven Wonders. The blessing requires salt from the earth, water from the sea and a warlock's blood. A ring of fire is conjured around the warlock.
|“||We gather at the cusp of the Blood Moon to anoint and protect our brother before he undergoes the rigors of the Seven Wonders. Let the blessings begin. Salt from the Earth. May all hindrance and malignity be cast forth hence, and let all good enter. Water from the sea. To cleanse all impurities and uncleanliness. Blood from the body. To protect the soul. Let the fire illuminate our hearts and spirits and minds so that all darkness and cold retire herein. I conjure the circle of power to be a place of protection, a circle to confer the blessings of all warlocks. May you be imbued with wisdom, perseverance, strength and courage. To our champion!||”|
|— Incantation|
Disarming Spell
Soon after having his tendons slashed by Miriam Mead, John Henry Moore attempted to cast an unknown spell, most likely in order to disarm her but she slit his throat to make him not finish it.
|“||Accio...||”|
|— Incantation|
Spirit Revealing Spell
A spell to reveal the spirits who concealed themselves from the human eye. The spell is performed surrounded by candles and a bowl filled with unknown ingredients and the witch or warlock's blood. This spell is meant to have the users pierce the veil separating the mortal and spirit realm, enabling them to interact with the spirits who initially wished not to be seen by people. Madison and Behold Chablis used this spell to be able to see the ghosts of the Murder House who wished not to be seen.
|“||Monstra te spirituum. Ne ascondas.||”|
|— Incantation|
Ghost Repelling Spell
A spell that can presumably cast a spirit away. As appeared, the caster points their hand towards the ghost and says:
|“||Be gone!||”|
|— Incantation|
If done properly the spell will somehow repel the ghost away. The intented effect of this spell was not seen as Behold Chablis was interrupted by Billie Dean Howard.
Ghost Binding Spell
A spell to bind a ghost and prevent her from leaving a specific area. Behold alleged to be able to cast this spell as to find an easier way of getting Moira out of Constance's sight.
Cordelia's Resurrection Spell
A spell that resurrects the people who died by burning to death. The spell is performed surrounded by candles and a bowl in the center. The witch or warlock's hand burns and a fire emerges from the bowl. Cordelia used this spell to resurrect Myrtle.
|“||Cinis est anima, oriri ex igne, revertere ad me, revertere ad me! Revertere ad me! Reverter||”|
|— Incantation|
Mouth Removal Spell
A spell to remove a person's mouth rendering them unable to speak. Cordelia used this spell on Ariel and Baldwin.
|“||Perpetuum clausis||”|
|— Incantation|
Soul Concealment Spell
A spell to hide a soul in an afterlife to prevent another witch or warlock from finding them. Cordelia used this spell on Miriam Mead's soul to prevent Michael Langdon from descending into Hell and resurrecting her.
Aura Shield
A spell to protect a location. This will prevent any human, demon, or other being to find it impossible to enter. Cordelia used this spell to protect Miss Robichaux's Academy and the witches from Michael Langdon. However it was negated by a Dinah Stevens counter-spell to allow Michael and Miriam Mead into Miss Robichaux's Academy.
The Guardian's Chalice
A boundary spell to protect a location. According to Zoe Benson, this spell is considered a bear trap for bad juju. The Guardian's Chalice is stashed in or around the space the witch or warlock wants to protect. The spell puts all the power into jars of junk (like stones and nails). Zoe and Queenie taught this spell to the young witches in Miss Robichaux's Academy, before they all have been slaughtered by Michael Langdon and Miriam Mead.
|“||Any unwanted spirits and negative energy, you must leave now. Any evil presences, leave this space. Only light and healing energy is allowed in here. Negative energies, you must leave now. Evil presences, leave this space. Only light and healing energy is allowed here.||”|
|— Incantation|
Romanov Protection Spell
A spell to summon a barrier to protect the caster from the other side of the spell. Purple mist rises from the ground as the spell is being cast, in order to form a magic barrier capable of protecting from any physical attack. Anastasia Romanov attempted this spell to protect herself and her family from being executed, but was not powerful enough to keep the spell going. After Mallory went back in time to change the past, Mallory and Anastasia attempted this spell to change her fate, but Mallory's time travel spell did not last long. It can also be noted that Anastasia needed her pendant to channel her magic.
|“||Repellendum malum minatur, ut nobis.||”|
|— Incantation|
Time Travel Spell
A powerful, dangerous spell to send a witch or warlock back in time to change past events and alter history. In order to achieve this feat, witch or warlock must place themselves in a different state of mind, shed their egos, and disengage from this realm. The witch or warlock must focus their energy on a jewel to get back to a certain period in time. Myrtle and Cordelia used this spell to send Mallory back to try to save Anastasia Romanov from being executed.
|“||Balneum infinitum. Dona salui conductus.||”|
|— Incantation|
Concilium Spell
A spell to control the mind of another person. Myrtle used this spell on Wilhemina Venable to get her key to the room of Jeff and Mutt.
|“||Meus animus tuum dominatur.||”|
|— Incantation|
Immobilization Spell
A spell to immobilize a person. Myrtle used this spell on Jeff and Mutt to drop the gun and immobilize them.
|“||No loquaris mini quaper.||”|
|— Incantation|
Identity Spell
A spell to conceal another person's identity and prevent them from learning their true identity. This spell was used on Mallory and Coco St. Pierre Vanderbilt. According to Cordelia Goode, this spell is more powerful than any sort of voodoo spell. Witches under this spell are not detected by the Michael Langdon's gift of Night Vision of the Soul.
**Uses a yarn to surround the targets of the spell, burning of sage to cleanse the surroundings of bad energies and a powder that will render them in a trance-state
|“||Memoria unda temporis est.||”|
|— Incantation|
Combustion Spell
A spell to make an object explode. It is unknown whether the spell causes a direct explosion or a malfunction in a cyborg's body. Cordelia used this spell to make Miriam Mead explode and destroy her.
|“||Confringe||”|
|— Incantation|
Immolation Spell
A spell to generate fire. Myrtle Snow used this spell to set Brock on fire and kill him.
|“||Ignis!||”|
|— Incantation|
Potions and Powders
- Coma Inducing Potion
A potion brewed by Cordelia Goode that was supposedly a "restorative", but really put the drinker into a deep coma for a couple of days, or weeks. Cordelia tried to trick her mother Fiona Goode into drinking this potion, however Fiona upon smelling the potion, realized it was harmful and instead poured into the water bowl of Cordelia's cat. Cordelia then disposed of the poisoned water.
- Healing poultice
A concoction mixed by Cordelia Goode in order to improve the Queenie nearly-death state. However, unfortunately Queenie ended up dying from her injuries and was brought back by Fiona Goode.
- Sight Recovering Potion
A magical mixture prepared by Cordelia Goode in an attempt to amplify or regain her gift of Sight.
- Blindness Dust
A powder to make another person blind. Scáthach used it on Cricket Marlowe.
- Truth Revelation Powder
A powder that reveals the truth when blown to one's face. Madison used it on Violet to make her realize that Tate saved her mother from the flames.
- Witch Killing Powder
A powder to kill witches or warlocks by making them hemorrhage from every pore in their body. Agnes Sampson created a powder to kill warlocks, but was killed before she could use it. In the erased timeline, Baldwin Pennypacker planned to use this power to kill the witches at Miss Robichaux's Academy before being caught and sentenced to death.
Gallery
Trivia
- Several of the chants used in the TV series are reinterpretations of actual rituals and spells drawn from Medieval, Renaissance or Modern Age grimoires, or magic handbooks.
- The Fertility Ritual used by Cordelia is actually an exorcism called Dimissio Jesuitarum ("Jesuit's Discharge") taken from the Verus Jesuitarum Libellus (also known as The True Petition of the Jesuits), and it is used to force a given spirit or demon to bring wealth to the conjurer.
- The Resurrection Spell used by Madison and Zoe to bring Kyle back to life is known as Ritual of Infernal Necromancy found in several grimoires, but present in its complete form in The Book of Ceremonial Magic, by renowned occultist A. E. Waite.
- The Plant Revival Spell used by Misty Day is an invocation to the Devil from a 13th-century French miracle play called Le Miracle de Théophile. The chant is also part of a ritual known as Eko Eko Azarak, a Wiccan canticle that appeared in High Magic's Aid, a novel by Gerald Gardner inspired by a ritual of Basque origins.
- Witches and their magic are somewhat hindered by blessed silver, a weapon of choice used by witch hunters.
- Cordelia stated that the light from which witches draw their power was extinguished by Satan himself at the Hotel Cortez and likened it to a Hellmouth. This statement also disproves any possibility of witches' magic coming from Satan. Furthermore, Queenie considers the belief about witches marry Satan ignorant and offensive and states that witches are born this way and their power comes through bloodline.
- However, the ancient witch Scáthach's magic comes from the Old Gods, who are as dark and bloodthirsty as Satan.
- The witches are shown to be more capable to achieve and/or perform at least six of the Seven Wonders, strengthening the claim that witches are more gifted in harnessing magic compared to men.
- It was also implied that the warlocks can only do a few but never all of the four abilities included in the Warlocks' evaluation. As Ariel Augustus once mentioned to his brother warlocks "Everyone in this room can do some of what he (Michael Langdon) did. Not a single one of us can do it all." this statement further reduces the status of the warlocks compared that to the witches.
- The magical capabilities of a witch grows naturally over time through experience, practice and study, making them capable on performing more than one or two magical feats.
References
- ↑ 1.00 1.01 1.02 1.03 1.04 1.05 1.06 1.07 1.08 1.09 1.10 1.11 1.12 1.13 1.14 Episode: Go to Hell
- ↑ 2.00 2.01 2.02 2.03 2.04 2.05 2.06 2.07 2.08 2.09 2.10 2.11 2.12 2.13 2.14 2.15 2.16 Episode: Could It Be... Satan?
- ↑ 3.0 3.1 3.2 Episode: Chapter 7
- ↑ 4.00 4.01 4.02 4.03 4.04 4.05 4.06 4.07 4.08 4.09 4.10 4.11 4.12 4.13 4.14 4.15 4.16 Episode: Bitchcraft
- ↑ 5.0 5.1 5.2 5.3 5.4 5.5 5.6 Episode: The Replacements
- ↑ 6.00 6.01 6.02 6.03 6.04 6.05 6.06 6.07 6.08 6.09 6.10 6.11 6.12 6.13 6.14 6.15 6.16 6.17 6.18 6.19 6.20 6.21 6.22 6.23 6.24 6.25 6.26 6.27 6.28 6.29 6.30 6.31 6.32 6.33 6.34 6.35 Episode: The Seven Wonders
- ↑ 7.00 7.01 7.02 7.03 7.04 7.05 7.06 7.07 7.08 7.09 7.10 Episode: Return to Murder House
- ↑ 8.00 8.01 8.02 8.03 8.04 8.05 8.06 8.07 8.08 8.09 8.10 8.11 8.12 8.13 8.14 8.15 8.16 Episode: Boy Parts
- ↑ 9.0 9.1 9.2 9.3 9.4 9.5 9.6 9.7 9.8 9.9 Episode: Fearful Pranks Ensue
- ↑ 10.00 10.01 10.02 10.03 10.04 10.05 10.06 10.07 10.08 10.09 10.10 10.11 10.12 Episode: The Sacred Taking
- ↑ 11.00 11.01 11.02 11.03 11.04 11.05 11.06 11.07 11.08 11.09 11.10 11.11 11.12 11.13 11.14 She was a Supreme, therefore she had to have this power because it is one of the Seven Wonders
- ↑ 12.00 12.01 12.02 12.03 12.04 12.05 12.06 12.07 12.08 12.09 12.10 12.11 12.12 12.13 12.14 12.15 12.16 12.17 12.18 12.19 12.20 She was a Supreme, therefore she had to have this power because it is one of the Seven Wonders
- ↑ 13.0 13.1 13.2 13.3 Episode: Chapter 3
- ↑ 14.0 14.1 14.2 14.3 14.4 Episode: Forbidden Fruit
- ↑ 15.00 15.01 15.02 15.03 15.04 15.05 15.06 15.07 15.08 15.09 15.10 15.11 15.12 15.13 15.14 Episode: Boy Wonder
- ↑ 16.0 16.1 Episode: Dollhouse
- ↑ 17.0 17.1 17.2 17.3 17.4 Episode: The Dead
- ↑ 18.0 18.1 18.2 18.3 18.4 Episode: The Magical Delights of Stevie Nicks
- ↑ 19.0 19.1 19.2 19.3 19.4 19.5 Episode: Chapter 4
- ↑ 20.00 20.01 20.02 20.03 20.04 20.05 20.06 20.07 20.08 20.09 20.10 20.11 20.12 Episode: Traitor
- ↑ 21.00 21.01 21.02 21.03 21.04 21.05 21.06 21.07 21.08 21.09 21.10 21.11 21.12 21.13 21.14 21.15 Episode: The Axeman Cometh
- ↑ 22.0 22.1 22.2 22.3 22.4 22.5 22.6 22.7 22.8 Episode: Head
- ↑ 23.00 23.01 23.02 23.03 23.04 23.05 23.06 23.07 23.08 23.09 23.10 23.11 23.12 23.13 Episode: Fire and Reign
- ↑ 24.00 24.01 24.02 24.03 24.04 24.05 24.06 24.07 24.08 24.09 24.10 24.11 Episode: Apocalypse Then
- ↑ 25.0 25.1 25.2 25.3 25.4 25.5 25.6 Episode: Burn, Witch. Burn!
- ↑ 26.0 26.1 26.2 26.3 Episode: Battle Royale
- ↑ Nora Benson reveals in Bitchcraft that Zoe's great-grandmother had "the same genetic affliction" likewise her, which means that this specific Zoe ancestor was a witch with the same power. | https://americanhorrorstory.fandom.com/wiki/Category:Witches/Magic |
Minutes of meetings are important documents because they record in writing what was discussed in the meeting, and what decisions were actually made there. In organizations that maintain good practices, a review of the minutes of the primary management meetings over time would reveal an excellent record of the history of that organization.
During my 25+ years working in various organizations, there were many occasions on which I was tasked with either writing the minutes of meetings myself, or editing/approving minutes written by others. As a result, below are a few suggestions I have for you, should you ever be asked to write the minutes for any type of meeting.
5 Tips For Writing Good Meeting Minutes
1. Work From An Agenda
A meeting agenda that lists the main items to be discussed should be circulated to all potential attendees a few days (ideally) prior to the meeting so that they can make sure it is on their schedule and that they will have the necessary documents that will be needed to discuss the items listed. That very same agenda should be used by the meeting chairperson to conduct an orderly meeting. Keep this list short and focused! A good meeting should last no more than an hour. Anything more than that, and it becomes unproductive and a time-waster. Your colleagues will thank you for running a tight, short gathering.
2. Be Concise
Meeting minutes should NOT be a long-winded and verbatim “he said” – “she said” account of the meeting. They should briefly record only the essence of the major points discussed and/or major decisions reached, from a bottom line perspective. The key items to record are decisions made/deferred, the specific reasons for that decision, and most importantly who is responsible for any follow-up action.
3. Use Clear and Precise Language
Because minutes of meetings are an “official” record of corporate decisions made, they are often referenced many months later in order to recall what “exactly” was decided at a previous meeting. This makes clarity and precision of language very important when later trying to determine exactly what decision(s) was made and what specifically led to the decision.
4. Make the Right Person Responsible
In most organizations, a corporate “meeting secretary” is made responsible for organizing meeting logistics, drafting of minutes, and distribution of meeting-related documents such as agendas, minutes, and support documents. This is an important task; the person chosen for this should be well-organized with above-average writing skills.
5. Make Someone Else Accountable
Once the meeting secretary has drafted the minutes they should be carefully reviewed and revised if necessary, by the person who chaired the meeting. That individual, who will normally occupy a position of some responsibility in the organization, will then sign them off as “approved” before they are distributed by the secretary.
Well written minutes are critical to the effective functioning of organizations over time. Good minutes can be used as checklists for what has been achieved to-date in an organization, as well as action lists of what tasks have to be completed going forward. Making sure that your organization produces well written and meaningful meeting minutes will be an important element of its success. | https://www.inklyo.com/tag/meeting-minutes/ |
Physical therapy can be an important part of the treatment and rehabilitation process for individuals with work-related injuries. Physical therapists can help patients regain strength, mobility, and function, and may use a variety of techniques including exercise, manual therapy, and modalities such as heat or ice to help reduce pain and swelling. They may also provide guidance on how to modify activities of daily living to reduce stress on the affected area and prevent further injuries. The goal of physical therapy for work-related injuries is to help patients recover as much function and independence as possible, and to prevent future injuries.
1
Back Injuries
Back injuries are a common work-related injury, often caused by repetitive lifting or bending, or by sudden trauma such as a slip or fall.
2
Repetitive Strain Injuries
Repetitive strain injuries such as carpal tunnel syndrome or tennis elbow are common work-related injuries that can be caused by performing the same motions repeatedly over time.
3
Shoulder Injuries
Shoulder injuries are common in jobs that require repetitive overhead motions, such as painting or construction work.
4
Knee Injuries
Knee injuries are common in jobs that require kneeling or heavy lifting, such as construction work.
5
Neck Injuries
Neck injuries are common in jobs that require prolonged sitting or standing, such as office work.
6
Foot and Ankle Injuries
Foot and ankle injuries are common in jobs that require prolonged standing or walking, such as retail or hospitality work. | https://www.backinactiontherapy.com/work-related-injury |
If you follow any fashion accounts on social media, you'll know that New York Fashion Week is currently in full swing with all the biggest designers showcasing their SS 2018 collections.
The front row is almost as important as the fashion shows with a-listers and celebrities dressing up and showing their support for their friends. As much as I love the fashion, I really love a front row picture and these are some of my favourites from #NYFW.
No comments yet on #NYFW 2017 Front Row . | http://www.luxo.co.za/nyfw-2017-front-row-.html?articleID=2670 |
Summary Notes: Joint Meeting of the Neighborhood Centers and Residential Development and Compatibility Policy Expert Groups
August 13, 2013 from 3:00 to 5:00 p.m.
Attendees:
Centers PEG: Kate Allen, Lisa Bates, Kristin Cooper, Ivy Dunlap, Allen Field, Bob Granger, Gary Oxman, Rick Michelson, Mark Raggett, Alison Stoll
RDC PEG: Tamara DeRidder, John Gibbon, Michael Hayes, Rod Merrick, Emily Sandy, Irma Valdez, Justin Wood
Key Points and Outcomes
- Different tools and approaches for managing scale transitions are needed in different places. Portland needs a corridor-by-corridor approach to determining appropriate ways of achieving transitions.
- Need to consider the impacts of additional restrictions on building scale on housing affordability and on housing opportunities for future residents.
- Activity impacts are often not site specific. Need to find ways of addressing impacts, such as from traffic and peoples’ behavior (e.g., public inebriation, noise), that cannot be addressed by screening and site design alone.
Welcome, Introductions and Updates
Presenter: Bill Cunningham and Barry Manning, BPS
Summary: Bill welcomed members of the Neighborhood Centers and Residential Development PEGs and guests. Staff for these two PEGs (Bill Cunningham and Barry Manning) summarized the areas of focus of these PEGs. Bill related that this meeting will be an opportunity to share the perspectives of both PEGs in exploring how the role of centers and corridors as places of growth and activity relates and transitions to adjacent lower-density residential areas. Bill encouraged PEG members to consider appropriate approaches for balancing priorities for focusing growth and activity in centers and corridors with desires to limit impacts on adjacent residential areas.
Scale Transitions
Presenters: Bill Cunningham and Debbie Bischoff, BPS
Summary: Bill and Debbie provided a presentation on issues related to transitions in scale between the higher-density zones of centers and corridors and adjacent lower-density residential areas. This discussion is intended to provide staff with initial guidance as they begin to consider approaches for implementing the draft Comprehensive Plan policies.
The draft policies focus growth and higher-density development in centers and corridors, helping to achieve goals for allowing more people to live close to services and transit, and providing the sustainability-related benefits of compact development (these priorities have been a focus of Centers PEG). However, where the higher-density zoning of centers and corridors is adjacent to lower-density residential areas, the new development can create compatibility and livability issues due to their larger mass and height, limited setbacks, and lack of transition requirements in many areas (the lower-density residential areas have been a focus of the RDC PEG). The draft policies call for transitions in development scale, but do not provide much guidance on appropriate implementation approaches for achieving these transitions. Some issues staff highlighted included:
- Narrow bands of mixed-use zoning complicate balancing growth and transitions (limits development types and configurations, and provides little room for transitions in scale).
- Currently there is no citywide zoning approach to addressing transitions in scale.
- Limited options for discretionary design review as a tool (transitions could be addressed through discretionary design review, but this is not available citywide – due in part to state limitations on the ability to require discretionary design review).
Staff shared the various types of approaches that Portland has used to manage transitions, including:
- Requirements for step-downs in building scale within higher density zones where they are adjacent to lower density zones.
- Zoning transitions outside higher density zones, in which medium density zoning is used as a transition to single-family zoning.
- Zoning boundaries at mid-block (or keeping areas of mixed-use zoning one-lot deep along major streets), limiting the area of neighborhood impact but contributing to abrupt scale contrasts.
- Zoning boundaries providing a full-block of mixed-use zoning depth, providing more space for scale transitions, but expanding area of change.
- Use of trees and landscaping to soften scale differences, responsive to the more vegetated character of western and eastern neighborhoods, but requiring sufficient site space.
Staff invited PEG members to share their perspectives on what priorities staff should consider as they investigate implementation approaches, and to provide feedback on which approaches might be appropriate to apply more broadly in the future.
PEG member comments included:
- Need to know how regulation of development scale and transitions impacts the numbers, types, and affordability of future housing. Issues of design, scale and transition should not be used as a cover for exclusionary practices.
- Need to consider impacts on the health of residents of future multifamily housing. If we limit development in centers and corridors with good access to services, are we forcing more people to live in outlying, less walkable areas?
- Need to think long-term regarding scale and context. Those nearby low-lying houses may not always be there.
- Transitions in scale are needed at the edges of the higher-density zoning.
- Solar access should be a consideration in determining appropriate building scale (scale along east-west streets needs to be considered differently than along north-south streets). Zoning boundaries between higher- and lower-density zones located along streets have less solar access impacts on lower-density zones.
- 45 feet is an odd height to use as a scale limit. It is tall enough for elevators, but 65-foot buildings are more cost effective and make more sense in many areas.
- Step-downs to streets are important for preserving the character of areas where low-rise buildings predominate.
- Density and tall buildings may not be appropriate or feasible in all areas. Development economics in southwest and east Portland do not support higher-density development.
- Step downs in scale are important. Managing building height and bulk is important to livability. Need to consider access to light and air.
- We should not assume everything will change, so context should be a consideration.
- The various approaches to transitions Portland has used are all reasonable tools. Different tools and approaches are needed in different places. Need a corridor-by-corridor approach to determining appropriate ways of achieving transitions.
- Need to consider whose voices are being heard when we consider implementation approaches. Is it just homeowners? Are renters being considered? Are we considering just people who are here now, or also future Portlanders?
- Transitions in scale are needed as a compromise (between accommodating growth and neighborhood concerns about limiting change)
- Windows and the privacy impacts of taller buildings are an issue.
- We are in a city – we cannot expect that there will not be privacy impacts (even 2-story buildings allow neighbors to see into your yard).
- Concentrating housing in compact areas close to services is a good idea, but concerned about corridors.
- Focus development around transit hubs – don’t want continuous stretches of 4-story buildings along lengthy stretches of corridors.
- Organizing principle should be 20-minute neighborhoods, allowing more people to be close to services.
- Need to be better in communicating growth concepts to the community. Need 3-dimensional graphics to show community members where growth is intended to be focused, intended patterns and scale.
- Need to avoid regulatory approaches that lack flexibility and force everything to look the same.
- Base allowable building heights at a height 10-feet above adjacent residential zones.
- In historic districts, need to set height allowances to be in-scale with existing development.
- Need to be more creative in engaging the public about development scale. Use lego blocks to show building scale relationships. Help people see the connections between density and additional services.
- If we minimize scale contrasts at the cost of density, where does density go instead? Is it really a good idea to limit growth in areas where we want growth to happen?
- Our commitment to housing affordability should be a greater priority than concerns about transitions.
- Need greater clarity in our policies regarding what is meant by preserving privacy and access to light.
- We need to do a better job at communicating expectations of change to the public.
Use and Activity Transitions
Presenter: Barry Manning, BPS
Summary: Barry provided a presentation that highlighted issues related to managing the impacts of activities in centers and corridors on residential areas. Centers and corridors are intended to be places of focused activity. However, an intense mix of uses can create impacts and conflicts between non-residential and residential uses. The draft Comprehensive Plan policies identify the need to improve the interface between non-residential uses and residential areas. Staff is looking into appropriate implementation strategies for improving this interface. Some issues to consider include:
- Many policies encourage development along transit streets, but fewer policies address the compatibility of different land uses.
- The intensity and scale of residential/mixed development in centers and corridors may amplify use conflicts.
- Many commercial sites have minimal lot depth in which to buffer/mitigate impacts to nearby residentially-zoned areas.
- Mitigation and buffering - through lot-line landscaping - may not be an effective tool for some impacts.
- Sometimes impacts can be better addressed through a review process, but most development is checked only for compliance with standards.
Implementation approaches Portland uses to address impacts include:
- Transitional zoning patterns, using different zones to minimize/buffer direct use impacts.
- Buffering, landscaping and screening requirements, such as code provisions that address impacts at the site level.
- Regulation of off-site impacts through enforcement-driven code standards.
Barry shared examples of transitional zoning patterns and the use of landscaping and screening to provide buffers between uses, and also raised the issue of the impacts of activities on residents living within centers. He invited PEG members to share their perspectives on priorities and their ideas on appropriate approaches for managing the impacts of non-residential uses and activity.
PEG member discussion included:
- Need to also consider the impacts of pollution along freeways and high-traffic roads. Need to address health issues and provide buffers from these impacts.
- Parks are needed in centers to bring fresh air and provide a focus for community activity.
- Need to consider use impacts within residential areas, such as from home occupations and short-term rentals.
- Need buffers between industrial and residential areas.
- Impacts are often not site specific. Impacts from traffic and drunk people cannot be addressed by screening and site design.
- Some impacts are best addressed by the building code (sound, air quality, etc.).
- Delivery trucks blocking sidewalks are a concern of neighbors.
- Noise needs to be considered. Some neighbors are concerned about noise from bar patios.
- Impacts of I-5 corridor traffic compromise livability. Something is needed in the policies about addressing freeway impacts.
- The buffer between industrial activities (noise, odors, etc.) and residential areas should happen in industrial areas (onus should be on the industrial uses).
- Tacoma in Sellwood is intended to be a mixed-use main street, but heavy traffic has a blighting effect. What tools can be used to address these traffic impacts and encourage mixed-use development?
- Longstanding light industrial in Sellwood is part of the neighborhood mix. This allows creativity and land-use variety that is compatible.
- Health should always be a consideration. Need to consider impacts of industry on residents. What are the impacts and what regulatory tools can be used to mitigate them?
- Use good neighbor agreements, since impacts typically extend beyond an individual site. Explore ways of encouraging greater use of good neighbor agreements.
- Portland will need to use a greater range of approaches to address impacts as it becomes a more mixed-use city.
Meeting Presentation:
Scale and Use Transitions Issues
Public Comment
- Examples used in the transitions presentations are mostly from the inner neighborhoods. Need to address issues related to East Portland’s differing characteristics and urban form.
- Need to address issues related to the Eastside MAX corridor along Burnside. Concerned about the amount of density between the light rail stations, where there is no transit access. Density should be focused more closely around the stations and where streets connect. Burnside is not wide enough for parking, which density creates more demand for, and there are not enough north-south connections across Burnside.
Next Steps
The next meeting of the Neighborhood Centers PEG will be Thursday, September 19th, from 8 to 10am. The likely focus will be the Comprehensive Plan “Map App” and a wrap-up of lessons learned from the Neighborhood Centers PEG discussions. There may also be an All-PEG meeting in the Fall to discuss the Comprehensive Plan Part 2 products.
Adjourn
For more information, please contact Bill Cunningham, Bureau of Planning and Sustainability at 503-823-4203 or [email protected] or Steve Faust, Facilitator at 503-278-3456 or [email protected]. | https://www.portlandoregon.gov/bps/article/463763 |
This paper describes an automated scheme that extracts salient linguistic features from academic text and presents them in an interface designed for L2 students who are learning academic writing. The system is guided by several common ways of utilizing corpus technology in L2 writing. The authors have developed and tested an extraction method that identifies typical lexico-grammatical features of any word or phrase in a corpus. Collocations and lexical bundles are automatically extracted; students can explore them by searching and browsing, and inspect them along with contextual information. They also present learners with common words, and academic words, hyperlinked to their usage and collocates in authentic contexts. This article uses a single running example, the British Academic Written English corpus, but the approach is fully automated and can be applied to any collection of English writing.
This paper describes FLAX, a corpus analysis tool that makes it easy for L2 students to seek language patterns. The system is up on the web for anyone to use online;1 and the source code is also available.2 Like existing concordance tools, it allows students to access, analyze and discover linguistic patterns in a particular corpus, which can be chosen to match the task at hand. However, it goes far beyond simply returning concordance lines.
First, it facilitates retrieval of typical usage of words or phrases by grouping concordance data and sorting search results to show the most common patterns first. Second, it incorporates grammar rules involving prepositions, word inflection, and articles, and makes common patterns stand out. Third, it retrieves collocations according to part-of-speech tags—for example, all adjectives associated with a particular noun—without using any special syntax.
FLAX is particularly appropriate for supporting academic writing. In this paper we illustrate its design using the British Academic Written English corpus, but it can be applied to any academic corpus—including samples of writing collected by an individual teacher, entire textbooks (provided they are available electronically), or essays written by students.
The design incorporates the pedagogical implications of many studies of academic corpora. All academic words in a corpus are made available for users to study their usage and collocations directly. Lexical bundles, a feature of academic prose that has recently been unearthed by linguists, are shown in their original context, because they can help L2 students construct academic text. The system is also able to group words by pattern, allowing users to study word usage by showing salient lexico-grammatical patterns that involve it.
FLAX shares the advantages of existing concordancers as popular tools for supporting L2 writing. Researchers report positive responses from students using concordance data for checking grammatical errors, seeking vocabulary usage, and retrieving collocations (Gaskell & Cobb, 2004, O’Sullivan & Chambers, 2006, Yoon, & Hirvela, 2004, Varley, 2009). However, some researchers suggest that concordance data be screened before being presented to students (Varley, 2009). Others ask for commonly used linguistic patterns to be made more accessible (Coxhead & Byrd, 2007), perhaps through a simple interface for retrieving collocations (Chen, 2011). FLAX addresses these criticisms to provide a more learner-friendly interface to the underlying concordance data derived from a given corpus.
This paper is structured as follows. The next section summarizes relevant background of concordancers and how they are used for supporting L2 writing, followed by a brief review of research on academic wordlists, collocations and lexical bundles for academic purposes. Then we describe the British Academic Written English corpus, which is used as an example throughout the paper. Following that we examine and illustrate the facilities provided for searching and browsing word usage, collocations and lexical bundles, and finally draw some conclusions.
Concordancers are software services installed on a computer or accessed through a website that are designed to help users search, access and analyze language in a corpus; some provide a range of corpora that can be used. They are among the most frequently used tools to explore linguistic corpora, particularly when examining collocational use. They make it possible for students to obtain, organize, and study real-language data. The concordancer software mediates a corpus for the user. | https://www.igi-global.com/article/transcending-concordance/153892 |
Lifting up a generation of Native American geoscientists
Native Americans live in some of the most rural parts of the United States. The Navajo Nation extends across the deserts of northeastern Arizona with extensions into southern Utah and western New Mexico, and, due in part to its remoteness and also the harshness of the terrain that defines it, the tribe faces unique environmental problems.
Those problems, including struggles to find and maintain access to clean, potable water — a problem exacerbated by a multi-year drought and climate change — as well as hazards associated with uranium mining, demand complex solutions informed by an understanding of the scientific issues at hand.
But, according to Kathleen Johnson, a professor in the UCI Department of Earth System Science, many of the people tasked with imagining solutions to these problems do not have the kind of scientific training that would position them to make the best decisions they can. “Native Americans are often not geoscientists, and yet they’re tasked with addressing a huge number of environmental challenges,” Johnson said, who added that Native Americans are the most underrepresented population in the geosciences.
What’s more is that “a lot of tribes have environmental offices led by non-native people,” Johnson said, which can present a challenge when it comes to understanding which environmental solutions are the best fit for a particular tribe.
This gap is part of what spurred Johnson to create the American Indian Summer Institute in Earth System Science (AISIESS) which ran from 2012 to 2017, and which brought over 130 Native American teen students from across the U.S. to UCI to learn about the science behind the environmental problems facing them. The program included a one week camping trip to the La Jolla Band of Luiseño Indians reservation in San Diego County, where the students conducted field projects with faculty, graduate students and Tribal environmental staff. The second week of the program happened at UCI, where students got a taste of college life and did research on topics affecting their own Tribal communities. AISIESS wove Native studies and cultural activities throughout the activities, and encouraged students to bring their “whole selves to the program and to draw from both western science and Indigenous knowledge in their research,” Johnson said.
One of those students was Nizhoni Tallas, who grew up in Rough Rock, Arizona, a Navajo community that, according to the recent census, is home to just 429 people. One of the things Tallas remembers most of all is the land around Rough Rock. “There’s a mesa right by my house, and there’s a canyon in my backyard,” she said. Tallas has six siblings — all brothers, and she’s the only girl. She would tag along with her brothers and go on hikes. “Just growing up in the environment opened my eyes to how important it is to serve and also protect these areas. That enhanced my understanding of the amount of respect and care we should have for Mother Earth just like how my ancestors did and how we should carry on that knowledge,” Tallas said.
When Tallas came to AISIESS, she was a junior in high school, and it was during AISIESS, she explained, that she did a project focusing on the drought facing the Navajo Nation, as well as how climate change-driven sea level rise is affecting coastal Native American communities in Alaska.
The idea was to help Native Americans like Tallas develop a sense of pride in their Native identity and to help them envision themselves as scientists — two things they may not have had before, explained Johnson, who, herself a member of the Grand Traverse Band of Ottawa and Chippewa Indians, hopes to one day resurrect AISIESS, which no longer exists due to a lack of funding.
And the efforts seem to be working.
“Even though I was just in high school, it was a major point in helping me see there are a lot of big issues happening to tribal communities in terms of environmental problems, Tallas said. “And I was very passionate about bringing awareness to those issues.”
Tallas took that passion with her to college, where, at Virginia Tech, she majored in natural resources and conservation. Soon she’ll be a Ph.D. student at the University of Arizona, where she plans to work to understand how traditional tribal knowledge of land in the Navajo Nation can inform everything from solutions to the environmental problems facing her tribe to building out recreational infrastructure like public trails on Navajo land.
“It’s been a wild ride, learning about all the different ways of knowing,” she said. “I really want to go even more into and learn more about is traditional ecological knowledge, for sure, and how that plays a key role in natural resource management, and just the way people interact with land and the environment. Because I think that will be a big influence on how people kind of think of land — how they feel when they’re hiking — so trying to capture those ways of knowing and also implementing plans that also include Indigenous people, their knowledge, and how they would like these plans to be managed.”
Tallas underscored that she wants those who manage lands to be aware that Native Americans need to have a seat at the table when decisions happen and that they shouldn’t have to fight for that seat. | https://ps.uci.edu/news/2398 |
See which inclusive projects our Brussels museums are launching, get inspired by (inter)national D&I examples or get in touch with experts fighting against structural discrimination.
This list is never finished! Suggestions welcome at [email protected]
The Guggenheim museum, want to create paths that lead to a more inclusive and diverse institution. Guggenheim museum does not only diversify the team, but it also amplifies the voices of Black people, Indigenous people, and people of color (BIPOC) and broaden the scope of thought and perspectives within the museum.
“Open Access is a logical and exciting outgrowth of the CMA’s inclusive mission ‘to create transformative experiences through art, for the benefit of all the people, forever’. With this move to Open Access, the museum has transformed not only access to the CMA’s collection but also its usability inside and outside the walls of our […]
“This colorful display was designed by participants and artists from Heart n Soul at The Hub, a research project led by autistic people and people with learning disabilities. There are design ideas and personal perspectives from the people who created them on display”.
(FR) “The Scientific and Cultural Project of the Louvre-Lens is the result of a continuous and exemplary dialogue between the museum team, the public, the Louvre, the local authorities and the partners. (…) The Louvre-Lens remains a different kind of Louvre, in that it is both a promise of cultural democracy and a challenge to […]
(FR) “This little feminist and anti-racist dictionary is the fruit of a collective writing process and contains a variety of viewpoints that are impertinent. It offers you a walk through the language, through these new concepts that are redrawing the map of power relations (and, of course, sometimes it makes you scream a little)”.
This publication recounts the trials and tribulations of a collaborative project designed to engage with the need to deconstruct the practice of forms of “othering” in European cultural institutions.
Guidelines to implement measures that turn your institution into a safe(r) space for queer communities
(FR) Cultural mediation, museums, diverse audiences. Guide for an inclusive experience.
A ground-breaking study by CCLI to better understand the current state of diversity, equity, accessibility, and inclusion (DEAI) practices in the museum field in the United States. | https://openmuseum.brussels/en/org/inter-national/ |
Some paintings have become the defining images of a social or political catastrophe. But can art really shape the narrative of war and atrocity, asks Karen Burshtein.
Canadian Cree artist Kent Monkman’s graphic and gut-wrenching painting The Scream (2017) depicts a chaotic scene. Mothers are held back by the Royal Canadian Mounted Police (Mounties) as they lunge toward their children, who have been snatched from their arms by Catholic priests. That scene encapsulates the anguish of the all-too real history of aggressive assimilation that saw children torn away from their families and taken to residential schools, and where untold other abuses, physical and sexual, took place. The practice was in effect from the 1880s to the 1990s, led by the Catholic Church with the approbation of the Canadian government.
In May 2021, unmarked graves containing the remains of 215 children at a former residential school were discovered in Kamloops, British Columbia. Only weeks later, 751 unmarked graves were found at another residential school in Saskatchewan. And again: on 30 June, another 182 unmarked graves were discovered near a residential school in a different location in British Columbia.
Painted in 2017, The Scream has come to symbolise outrage and grief after the discovery of unmarked graves (Credit: Kent Monkman/ Collection of the Denver Art Museum)
Since the first discovery in May, Monkman’s painting has been shared widely, in posts reflecting the country’s collective rage, grief and a sense of urgency. Thanks to social media, and the Covid-era practice of museums putting their collections online, images have never been more accessible to the public, to the point where they’re often becoming symbols for the voice of moral outrage against atrocity.
It was while looking at Old World paintings at Madrid’s Museo Prado about a decade ago that Monkman, one of Canada’s most esteemed contemporary painters, began to see their emotional power. The artist purposely appropriated Western artistic traditions of history paintings (and bright colours) to tell the story of The Scream: this is a shared history, he seemed to be saying. (The painting was dedicated to Monkman’s grandmother, who was a survivor of the Residential School system; the first time she spoke about her experience at the school was on her deathbed.)
Putting it in context
This information about the painting, like so much else, including context, and scale (the painting is a huge two metres by three metres) is likely to get lost when it’s viewed on Facebook. “They were showing this image all over the internet and a lot of these places they weren’t even saying it was made by Kent Monkman,” says MaryLou Driedger, a Winnipeg author and teacher, who worked as a tour guide at Winnipeg Art Gallery when the painting was on display as part of a cross-Canada Monkman exhibition, Shame and Prejudice: A Story of Resilience. She tells BBC Culture: “If you don’t know that this painting was made by a Cree artist who spent the first five years of his life on a reservation, you are losing a lot of the story. It’s important to know that. And that he listened to every single one of the Truth and Reconciliation Commission’s testimonies before he did the paintings and I think to just blast this picture over the internet you’re not getting much context.”
Much about The Scream – including its scale – is lost when it’s viewed on social media (Credit: Kent Monkman/ Collection of the Denver Art Museum)
But The Scream is just one example of how, throughout history, artists’ works have been used as tools of change. In some cases, the artists have made themselves proactive participants to effect social action and change, even hoping to drive policy decisions. Their work of art becomes a calculated creation, the artist abandoning allegory for activism. The artist hopes for a visceral impact so that the painting might raise an awareness of an injustice.
But how do artworks serve to interrogate an atrocity or an act of war? What happens when a painting goes from image to concept? And when the artist is asking the viewer not to be just the audience, but a messenger, to carry their outrage to the greater world, what does that do to the traditional relationship between artist and viewer? A more equal, or at least collaborative, relationship – partners in advocacy – has been suggested, one that reflects people’s power when associated with an artist.
Art adds an ethical quality to the act of witnessing – Bracha L Ettinger
“Since photography is seen as reality, images of violence are off-putting for an audience,” Cameron Deuel wrote in The Relationship Between Viewer and Fine Art, a 2013 paper for Western Washington University. Art can be helpful by opening avenues that photography, or a text, can’t. As Bracha L Ettinger, a visual artist, philosopher, psychoanalyst and author, said in a 2016 discussion in The New York Times: “Art works toward an ethical space where we are allowed to encounter traces of the pain of others through forms that inspire in our heart’s mind, feeling and knowledge. It adds an ethical quality to the act of witnessing. By trusting the painting as true you become a witness to the effects of events that you didn’t experience directly, you become aware of the effects of the violence done to others, now and in history – a witness to an event in which you didn’t participate, and a proximity to those you have never met.”
And despite the limitations of social media, there is often greater impact when a work is seen outside of its most traditional home, the gallery or museum. It takes the perceived or actual elitism out of art, further empowering the viewer. A research project by the Museo Reina Sofia in Madrid explores the impact of what one of its contributors, art dealer Tony Shafrazi, called “the greatest war painting in the world”: Pablo Picasso’s Guernica. The project, Rethinking Guernica, contains more than 2,000 documents, essays and interviews. Little wonder that the way in which art can serve to tell an atrocity is called The Guernica Effect.
Picasso’s Guernica helped garner support for the cause against Franco’s Fascism (Credit: Alamy)
In 1937, during the Spanish Civil War, Franco invited the Nazi Condor Legion to drop bombs over a small town, Gernika, that was a symbol of Basque independence. In Picasso’s jarring iconic oil-on-canvas painting of the aftermath, civilians scream in anguish; scattered limbs are strewn throughout. Violence and pain scream from the canvas.
While art critics scrambled to unravel the meaning of each figure represented in the piece, it could be argued that was beside the point. As Picasso wanted, this painting went beyond standard art-analysis dialogue of aesthetic, technique and style. Though it was rendered in the Cubist style, as Shafri said, “It’s beyond Cubism.” Picasso called Guernica the “property of the people”.
The artist, who painted the work in the immediate aftermath of the event to capitalise on news reports, sought to use the painting to influence changes in national policy, to galvanise world opinion, and to push viewers into being proactive participants in the outrage. Picasso toured Guernica in the UK and US, as a fundraising effort for Spanish Relief for Guernica in 1938. While still in exile in France, Picasso even used the painting as a bargaining chip for democracy. In later years, Franco’s followers wanted the painting in Spain (perhaps owing to its celebrity), but Picasso decreed he would only allow it to hang in the country once democracy had been established.
The art of war
This idea of how well-timed art can shape the social narrative of war was explored by Nicole Dean, a US Army officer specialising in looted art. In a 2020 article, Dean proposed that Guernica could be used as a tool for leadership development: “This calculated creation of a powerful masterpiece should be examined and appreciated as part of a greater wartime narrative.”
She even suggested that art could be used as a guide to the art of war. “The study of wartime art can be a valuable addition to the professional development of military leaders, generating options for professional dialogue about how societies see the victors, the vanquished, and the value of conflicts through the lens of artists and cultural patrimony.”
Before him, Picasso’s fellow Spanish master artist, Francisco Goya, was a graphic eyewitness to the atrocities of his day – and his painting The Third of May 1808 (part of a diptyque with the Second of May, held by the Museo Prado in Madrid) continues to shock almost two centuries after his death, as a ground-breaking masterpiece of art – and a political tool.
Goya’s The Third of May 1808 created a timeless image of violence from specific events (Credit: Alamy)
The painter was deeply affected by the disillusionment he saw during the Napoleonic invasion of Spain in May 1808, by widespread starvation among civilians and by their resistance – it was the first time the term “guerrilla warfare” was used – as well as their subsequent execution at the hands of Napoleon’s troops. But it was the way Goya approached the painting that suggested the painter was focusing on a universal and timeless message. The troops, guns pointed straight at the masses, are faceless. Many of the civilians cover their faces. They could belong to any country, and any time. (The anonymity was radically avant garde, rejecting all the usual conventions of Baroque and Neoclassical history painting for its day).
And it did indeed transcend time and place. In the words of art critic Robert Hughes, author of a 2003 biography of Goya, The Third of May 1808 is “truly modern… the picture against which all future paintings of tragic violence would have to measure themselves… He speaks to us with an urgency that no artist of our time can muster. We see his long-dead face pressed against the glass of our terrible century, Goya looking in at a time worse than his.” Later, Edouard Manet echoed The Third of May in tone and composition with his The Execution of Emperor Maximilian (1868-69).
A ‘propaganda painting’, Death of Marat was widely shared in its time – and has become a meme today (Credit: Alamy)
Jacques-Louis David’s Death of Marat (1793) might have been the first painting to shift public opinion in real time, or as close to real time as that day allowed. The painting depicts the murder of revolutionary leader and journalist Jean-Paul Marat who was stabbed in his bathtub. David one of the most prominent painters of his day, completed the work just several months after Marat’s murder. Espousing academic techniques of the day, it’s almost photographic in its simplicity. Art historian TJ Clark called it the first modernist painting, for “the way it took the stuff of politics as its material, and did not transmute it”. This was calculated. David was an official artist of the Jacobins, and was asked to make Marat into a martyr to the cause. Marat was one of three “propaganda paintings” David painted.
Significantly, it was also turned into an engraving that was widely circulated among the public. (Its popularity only waned during the reign of terror but returned to glory by the 1820s with the help of a flattering essay on it by Baudelaire: “This painting is David’s masterpiece and one of the great curiosities of modern art because, by a strange feat, it has nothing trivial or vile…”). Today, the painting is often used as a meme in response to contemporary conflicts, with a pepper-spraying policeman, for example, standing over the murdered subject in the bath.
German artist Käthe Kollwitz wanted her 1923 painting War (Krieg) to be seen through prints that were distributed, or shared, like pamphlets. The artist sought a suitable response to the “unspeakably difficult years” of World War One that saw the death of her soldier son, Peter, a loss she never got over. She began work on War in 1919, ultimately finding woodcuts as the right medium to give expression to the atrocities she experienced and saw. The finished work is seven woodcuts of unadulterated anguish – in one, a mother offers her baby up as a sacrifice to the cause; in another, a widow lies in anguish, near dead herself. “I have tried again and again to represent war. I was never able to capture it… These prints should be sent all over the world and give everybody the essence of what it was like,” Kollwitz wrote in a letter to Romain Rolland in 1922.
Banksy’s 2016 creation drew attention to the refugee crisis (Credit: Alamy)
There’s perhaps no better present-day example of an artist giving agency to a viewer than graffiti artist Banksy’s 2016 “Les Mis” image, part of a series of works criticising the use of teargas in the refugee camp in Calais, France. The graffiti – featuring Cosette, the young heroine of the film and musical Les Misérables, with tears in her eyes from CS gas used to clear refugee camps – appeared overnight opposite the French Embassy in London. The artwork was interactive. Under the image was stencilled QR code that could link viewers to an online clip of a police raid on the camp. | https://khyberartgallery.com/2021/07/08/paintings-that-define-catastrophe/ |
No, but it is easy to write code in ASP, ASP.NET, JSP, PHP to insert and retrieve data.
Yes, you can write functions of your own.
The cells are accessable, but not as a grid, but as variables and arrays. We optimized the grid away, since it in theory can contain 1,000,000 cells per sheet.
There are several solution. For example, you can send them over an URL with the syntax http://www.foo.com/calc.htm?bar=56 will set the field call bar to 56. You name cells in Excel.
This assumes that you are prefilling an input cell. Here is a better solution that can be used to set any value.
If you know ASP, the simplest solution is to take the HTML page, make it into a ASP-page over replace statements like
p1A1 = 1234
with
p1A1 = <%= reference to variable which contains the value for cell A1 on sheet 1 %>
where 1234 is the default value that you set in Excel and which you want to read from the database instead.
This solution also works for PHP.
If you want to set constants, see <a href=”/tutorials/programmers/in itialize-values-on-server/Default.htm”>How to initialize values on the server</a>
No.
Click on Download to install and test this Excel add-in for Windows.
Click on Upload to let us convert a spreadsheet for you for free. | https://www.spreadsheetconverter.com/support/faq/faq-backend/ |
How does ethics connect with our lives, professional and otherwise? How are ethical actions possible in business, the hospital, or concerning the environment? What are the deeper issues underlying the subject of ethics itself? Ethics and Values Studies minors consider these issues, and others of practical and theoretical relevance to how we live our lives and interact with others. A novel and somewhat unique minor, Ethics and Value Studies has been developed at Carroll as an interdisciplinary study, overseen by the Philosophy Department. Its emphasis is on the critical and in-depth study of ethics and morality, as well as the extended study of other areas that involve values as a standard of judgment, and affect our application of ethical judgments.
Students in this program will develop a better understanding of ethics and values in all aspects of human life, and be better prepared for careers in ethics, and any other area.
Move students toward ethical decision-making in all areas of social interaction.
Possess a wide understanding of the various aspects of ethical study, both in its theoretical and applied aspects.
Even though it isn't focused on training specific to a career, Ethics and Values Studies is excellent preparation for any profession or career. Excellent preparation for graduate studies in ethics and ministry, and careers such as ethicists, hospital chaplains, ethics/compliance officers.
This is an interdisciplinary minor and a great way to manage CORE credits as well.
Cope better with ethical ambiguity, and even reduce it.
Solve ethical problems and dilemmas, and defend those resolutions to others.
Promote the dignity of persons in all aspects of your life. | https://www.carroll.edu/academic-programs/ethics-value-studies |
It is often the case that Accidents/Near Misses increase during the Autumn and Winter season due to a number of reasons including: there being less daylight, leaves falling onto paths causing them to become wet and slippery and cold weather spells causing ice and snow to build up on paths and walkways.
As a result of the added risk Winter factors will pose to many organisations, Employers will need to ensure that their risk assessments are conducted/updated for activities and work areas affected by the winter season. They will need to ensure that the weather conditions have been considered, appropriate controls have been included and that these have been communicated effectively to all employees.
There are some factors which pose more of a risk than others which we look at in further detail below and ways to reduce the likelihood of an accident.
Driving
Winter driving conditions are often not so bad as to prevent travel entirely, however there are various aspects of journey planning that should be carried out to ensure that travel during winter conditions is as safe as it can be. Every journey should be managed and those responsible for journey planning should take into account: road type (for example, can rural roads be avoided?); hazards (such as accident “black spots”, unsalted/ungritted roads or stretches of road that might be unsuitable for high-sided vehicles in high winds); traffic densities (timing journeys to avoid peak traffic hours); and, high-risk features (for example, steep hills in the winter).
Suitable workplace temperature
The Approved Code of Practice suggests the minimum temperature in a workplace should normally be at least 16 degrees Celsius. If the work involves rigorous physical effort, the temperature should be at least 13 degrees Celsius. When the body is exposed to cold temperatures, effects can include dehydration, numbness, shivering, frostbite, immersion foot and hypothermia. In very cold weather, workers can face two major health problems: hypothermia and frostbite. As with other health and safety problems, the best method of dealing with the hazards related to cold-weather working is to eliminate the risk. However, this is not always practical when working outside and so measures are required to reduce exposure. These will include the provision and wearing of appropriate clothing and the best advice suggests that layering clothes is most effective, as these layers can be added to or removed depending on each individual’s metabolism. Business’s shall ensure that their heating systems are in a working order and maintained on a regular basis.
Personal Protective Equipment
This is one of the most important precautions to reduce cold stress. It is best to wear three or more layers of clothes and employees should be encouraged to use layering to protect their feet, hands and head. As the wind velocity increases and/or the temperature drops, employers should provide additional breaks to employees away from the elements to warm themselves.. Lone workers should be particularly protected in cold weather especially if they are required to work in remote locations. Robust procedures are imperative, with provisions made for communication, the ability to summon help and be easily located in case of an accident.
Lighting
Employers must ensure that there is enough lighting around the workplace for employees to be able to see and avoid hazards that might be on the ground. The easiest way to find out is to ask employees. Another way is to shadow employees for a couple of days, walk the main internal and external routes that employees use throughout their working day. It is important to do this both inside and outside of the workplace and at different times of the day. This is because. If hazards on the ground are not easily identified and avoided, the lighting must be improved to ensure the health and safety of employees. Improvements may include fitting additional lighting fixtures or changing the type of bulb used.
Slips, Trips and Falls
To reduce the risk of slips, trips, and falls for employees in winter, employers must make sure that any external paths are regularly cleared of ice and snow, and that these are gritted if needed. Employers should also have suitable entrance mats and matting in place to remove debris from shoes, and reduce slip risks developing inside the workplace. Leaves can also create slip risks in two ways – by being a slip risk on walkways and also by hiding hazards that may be on the paths. Sweep up leaves at regular intervals and make sure they don’t lie on your path of work. It’s far too easy to slip on leaves when making your way to and from your van.
If you need support with preparing your business for winter, contact Napthens Health and Safety. | https://www.napthens.co.uk/blog/winter-precautions/ |
Ophiocordyceps unilateralis (Hughes 2011).
Complex adaptations to a particular host are a hallmark of specialized parasites. The manipulation of behavior by the parasitic fungus Ophiocordyceps unilateralis upon the Camponotus leonardi ant is suggestive of such an adaptation (Hughes 2011). Worker ants on the forest floor pick up spores dispersed by a mature fungus, allowing the spore to secrete enzymes and enter the host’s body (Evans, et al. 2011). Once inside, the fungus begins to spread throughout the ant’s body and head, occupying muscle tissue and cavities (figure). When the fungus makes an established foothold in the ant’s body, it is able to manipulate its host’s body to increase its own fitness. In more specific terms this relationship is an example of an extended phenotype, which is defined by Dawkins as the capacity of an individual or group of parasites to manipulate host behavior to improve fitness (Dawkins 1982).
It is suggested that the invading fungus, through the use of extended phenotypes and mechanisms, is able to cue for a specific form of behavior as has been observed by researchers who timed the death-grip bite of infected ants around the noon hour (Hughes 2011). These adaptations to manipulate behavior are essential in directing the host to an environment that promotes optimal growth. Though these mechanisms are not well known, it is believed that the parasitic fungus produces compounds that allow it to direct the host to perform an action (Evans, et al. 2011). Some of these adaptations, such as the use of clock genes to synchronize behavior are commonly found in other fungi (Hughes 2011). It is interesting to consider what might happen when scientists eventually discover what chemical or pathways the fungus utilizes to control behavior in its host to be both horrifying and beneficial. | http://bioweb.uwlax.edu/bio203/f2013/kumlien_aaro/adaptation.htm |
Routing is at the core of the internet; a demarcation point separates the public network from a customer’s private network whilst routing protocols determine how routers communicate with each other,
Explain the approach in troubleshooting a complex network infrastructure
In an organization the potential loss of revenue and reputation due to a network outage or a data breach (Chemweno et al, 2015), are driving enterprises to consider adopting a Network Maintenance Plan.
Explore and explain in detail how a Cisco switch may be configured for security
Maintaining a secure network protects users and secures commercial interests in an enterprise even though a Risk Management Strategy’s focus is mainly on environmental factors and securing Edge Devices,
Critically compare HSRP to VRRP or GLBP, discussing the benefits and potential weaknesses of each
The driving force in implementing First Hop Redundancy Protocols (FHRP) in a Cisco centric High Availability Campus network design has been the reducing cost of Layer 3 devices and more importantly the potential loss of revenue in the event of a network outage to an Enterprise (Pavlik et al, 2014).
Rapid Spanning Tree Protocol
In multi-switching environments, the drive for backup link redundancy has introduced bridging loops into the network as frames are continuously forwarded.
Discuss the strengths and weaknesses of redistribution between two different IGP
In most cases a prudent approach would be to introduce the main theme of the strengths and weaknesses of Route Redistribution between different Autonomous Systems running different IGP (Interior Gateway protocols).
Border Gateway Protocol
The modern internet is constructed around a concept of Autonomous Systems (ASes) that uses the Border Gateway Protocol (BGP) for routing traffic between ASes.
A critical evaluation of two complex interior routing gateway protocols
Interior Gateway Routing protocol is a protocol that “distributes routing information between routers belonging to an Autonomous System” (Moy, J., 1998) whereby computers or any device able to connect to the network can exchange data within their own domain and beyond by being routed externally through a border router.
A critical review of the Logjam Threat
LOGJAM A PRODUCT OF THE NSA? A group of university researchers have discovered a vulnerability affecting the Diffie-Hellman key exchange which makes it susceptible to an attack called Logjam. | https://www.skyzonetech.com/ |
Language is a Way of Knowing (WhenI first hear the word language, there…
Language is a Way of Knowing
WhenI first hear the word language, there are many things that come to mind.
Must be learned- Language, like any other thing is not something that we are born with. Our parents and loved ones teach us how to talk when we are a child, we do not just simply know the language already.
Infinite number of words - In every language, there are different ways to say certain things. This means that any language can have infinite number of words for language is always changing and there can always be a new way to say something.
Communication - When I first hear the word language, the first thing that comes to mind is communication. Right when we are born and enter this world people communicate with us in hopes to make us understand them. However, since not everyone speaks the same language, some things are never communicated properly. For some things, we just know what the other person is trying to say. Language is our main form of communication. It allowed us to express our ideas, share experiences and build connections with others.
Talk to ourselves- We always have a voice in our head that speaks out and talks to us. This voice that talks to us is made up from our language which is very crucial.
Language is a way of knowing and learning new things- I strongly believe that a huge part of all the knowledge that we have acquired through the years has been influenced greatly by language. Language is not the only way of gaining knowledge, but it is an important one.
GOTLLOB FREGE
Gottlob Frege (1848-1925) was a German philosopher and mathematician and he is recognized today for his contributions to the philosophy of language (Lotter). Ferge differentiated words by using terms such as sense (Sinn) and reference (Bedeutung). Ferge first started this theory in mathematics and then later expanded it to all linguistic expressions.
Ferge further expanded distinction by working on identity claims (Zalta). Consider the two expressions:
the morning star = the morning star
the morning star = the evening star
The first one is the law of self-identity, also known as a priori. Whereas the other is known as a posteriori that was discovered by astronomers. If these two expressions mean the same thing, then they have the same meaning, both having the thing’s identity connected to itself (Zalta).
The reference of a word is the object or the concept that it’s meant to designate. The sense of the word is the which the words tie us to the object or the concept (Lotter). A primary example has the expressions “the morning star” and “the evening star” in which both refer to the same planet, Venus. These two expressions have the same reference, but they have different senses (Zalta).
Gottlob Ferge emphasizes that there are distinguishes between words by using words such as sense and reference. I agree with this theory for I have experienced this between words first hand. For example let’s look at the words sad, depressed, glum and miserable. They all have the same reference; to show the feeling of sorrow. However, when thinking of the word glum you might think of someone who is having a bad day, but when you think of the word miserable, you think of someone who is suffering deeply for some time. The difference between these two words are because of sense. There might be some similar words out there that do have some distinguishes between them but all of the words I have encountered have a clear difference relating to sense and reference.
"If the task of philosophy is to break the domination of words over the human mind [...], then my concept notation, being developed for these purposes, can be a useful instrument for philosophers [...] I believe the cause of logic has been advanced already by the invention of this concept notation."
This quote further explains how Frege has created a concept, between sense and reference, that can be used by many philosophers.
Language:
the method of human communication, either spoken or written, consisting of the use of words in a structured and conventional way.
Linguistic Relativity:
is the claim that human behavior and perception is influenced by language.
Knowledge:
Facts, information, and skills acquired by a person through experience or education; the theoretical or practical understanding of a subject.
Although Gottlob Frege have different theories of language, they are very similar. To summarize, Gottlob simply believes that words can be differentiated using words such as sense and reference and Noam Chomsky believes that language acquisition is innate. They both believe that language plays a part in viewing our everyday life and that we need it to gain knowledge. It helps us look at the world in different ways. Chomsky states that language is not only for communication but for sharing new experiences and making relationships as well. Frege only talks about his perspective in terms of using it to communicate with others. However, they do not have opposing views directly against each other for they simply have things to say about different parts of the language. Philosophers and linguists rarely have the same thoughts on the same branch of their topic for they often have new things to say about a specifc topic.
Noam Chomsky
"It's perfectly obvious that there is some genetic factor that distinguishes humans from other animals and that is language specific. The theory of that genetic component whatever it turns out tobe, is universal grammar. " (Dovey).
The most famous linguist to date is Noam Chomsky. In the 1960’s, Chomsky proposed the idea of Universal Grammar; language acquisition is innate and distinct from all other aspects of human cognition in the brain (Dovey). For humans, language is a basic instinct. It is evident that there are parts of the brain that control speech and interpretation but there was not clear a clear explanation on how humans had language ability (Dovey).
The simple motion of walking was both taught and innate by humans. Every child is born with the mechanism to walk but proper guidance is needed for this skill to develop (Lemetyinen). Chomsky compared this idea to language and states that these two are very similar (Lemetyinen).
Chomsky used some factors to support his theory of language. Chomsky emphasized the fact that there is an optimal age to learn a language; ages 3-10. After a child is above the age of 10, it is hard for his mind to learn and grasp a new language (Crabtree).
Children also go through stages in their life where the learn certain parts of a language. They go through this stage in their life at around the same age at the same time. A child in India will have similar language patterns of acquiring a language compared to a child in Canada. Chomsky uses this to argue that language is innately organized (Crabtree).
Also, children do not need to be forced to begin acquiring a language for it simply happens by itself. Parents are able to help the child develop its language factor by communicating in baby talk or reading books, but even if they do not do this, the child starts to speak on its own (Crabtree).
Noam Chomsky believes that we are all born with the instinct of language. I agree with his theory to some extent. When a baby is born and brought into this world, he does not know anything or know anyone. It’s naturally a baby’s first instinct to somehow communicate with the outside world or with someone. I believe that
language is not innate
but rather the
need to communicate is.
Language is one form of communication but not the only one. Communication can be done by many ways just as actions. I do agree that language is a major factor in distinguishing us between other animals. Humans do have some natural function that tells them communicating is necessary. Chomsky does prove his theory well with stating many factors to which I do agree with, but I however, think that communication, not language is innate.
This quote emphasizes how Chomsky believes that we humans have a function in our brain specifically for language acquisition that other animals do not have. This allowed him to come up with his theory of universal grammer.
1) All of us have vast amounts of knowledge within us. We have acquired all this knowledge over the years throughout many ways. Language is one of the factors that contributes to our knowledge gain. Linguistic Relativity, otherwise known as the Sapir-Whorf Hypothesis, is credited to linguists Benjamin Lee Whorf and his mentor Edward Sapir in 1929. This theory states that an individual’s thoughts, behavior characteristics and the way he views the world is formed and influenced by the language that individual speaks (Familas). This theory was developed when Whorf was at work and saw workers smoking next to an empty gas container assuming it would do no harm. However, it turned out that an empty container is far more dangerous than filled ones due to highly residual toxins (Familas). The connection between words and actions pushed Whorf to believe that language shaped the way we view our world.
2) According to Whorf, our mother tongue imprisons us from understanding new concepts and thoughts outside of our own language (“Ask”). However, this idea has been rejected for no language has the ability to prison out thoughts. However, it does have the ability to compel us to think a certain way. This idea is referred to language relativity. There are two versions of linguistic relativity; the weak and strong hypothesis. The strong version is that language influences our thoughts and completely whereas the weak version states that language influences the way we see the world to only some extent and does not fully change how we see the world (“Ask”).
EDWARD SAPIR
BENJAMIN LEE WHORF
Language is each organized in different ways, what's most important to the people who use the language, will often be the focus of the language. It's so embedded in our thoughts and consciousness that we can’t imagine anything else (Familas). As we explore other languages it becomes clear that each language is different, each with its own advantages and disadvantages.
In English, there is only one-second person singular pronoun, you. Everyone is considered a "you". However, in another language, like French, there are two; tu and vous. Tu is for your friends or to be informal whereas vous is giving respect or talking to an elderly. This small difference confuses many English speakers when they try to learn French. Other languages have more than two that require you to know the relationship and the tone of the conversation. This forces people to shape their thoughts, in a way English speakers are not required to do so. These differences force cultural ideals that already exist ("Language"). English suggests everyone is equal, at least in terms of pronouns. Every person speaks their own language a little differently, which means everyone thinks differently, can influence us to think about the world a different way but does not imprison us.
After researching about linguistic relativity and how it affects us, I have changed my opinion about language in some ways.
I thought, that like every other thing in life, language is something that has to be taught. I can't just start to talk to someone who speaks French and expect to already know that language and talk to them with ease. I will have to learn that language is first. That stills holds true, however, Chomsky stated that language for us is innate. Even without being taught a language, it will already be out instinct to acquire a new language when we are a child. This is what makes us different than any other species.
I have also learned about the weak and strong hypothesis in where I agree with the weak hypothesis. I still do strongly believe that language plays a huge role in how we view the world, but like mentioned in my research, it does not imprison us from any concepts.
Even though I believe that there are infinite number of words in a language, many of the words are repetitive; the mean the same thing, However, there is still a distinction between these words and that is sense and reference. I still believe with what I said I just now know that every word can be in a cateogry. | https://coggle.it/diagram/WNFqqyGgBwABYEFp/t/language-is-a-way-of-knowing |
This presentation provides an illustration of performative social science through the world's first project to focus on multi-media storytelling with a nationwide LGBT community for public representation and museum archiving. Where voices are unheard, hidden or suppressed, the images and representations of a community may be stereotyped and discriminatory, constructed about the community by those on the outside. LGBT (lesbian, gay, bisexual and transgender) people have experienced social exclusion and marginalisation, and their stories have been neglected or distorted. Their lives and loves have been characterised as wrong: mistaken in medical or moral terms. OurStory Scotland was established to research, record and celebrate the history and experiences of the LGBT community through their own words. Our approach combines action research and performative social science: it is participatory and emancipatory, developing the knowledge of a community through various modes of storytelling performance. This presentation reviews storytelling methods and themes, that have relevance for marginalised communities where disclosure may be problematic. The narrative acts that make up our stories range from one-liners, through written episodes, to oral history recordings, stories shared in group storytelling and narrative exchange, tales told with and through images, "text out" visual displays, "supporting stars" mapping support as an alternative to the conventional family tree, dramatisation and ceilidh performance. The stories challenge fixed and stereotyped identities, and reveal the centrality of storytelling to leading our lives. They also illustrate the rewards of performative action social research, both for a community researching itself and for dissemination more widely.
URN: urn:nbn:de:0114-fqs0802491
URN: urn:nbn:de:0114-fqs0802491
Keywords
storytelling; narrative; performance; oral history; lesbian; gay; bisexual; transgender; queer; marginalised community
DOI: http://dx.doi.org/10.17169/fqs-9.2.412
Copyright (c) 2008 James Valentine
This work is licensed under a Creative Commons Attribution 4.0 International License. | http://www.qualitative-research.net/index.php/fqs/article/view/412 |
A tortoise was walking on a cool evening when she met a hare who made fun of her. Annoyed, the tortoise challenged the hare to a race, and the result was shocking.
One day, a tortoise was taking a walk and met a hare who made fun of her. The hare poked fun at the tortoise's pace, asking why she walked so slowly. Amidst laughter, the hare said:
"my, my, you move so slowly, you will never get far."
A photo of a giant tortoise at the edge of beach. | Photo: Getty Images
The tortoise became upset at the hare's comment and thought of a way to get back at her and prove her wrong. The tortoise then said, "let's have a race and see who is faster."
Hearing the tortoise's request, the hare laughed even harder, rolling on the floor. The hare called the tortoise a big joker and agreed to race. The hare pointed at a hill and said that whoever got to the other side of the hill would be declared the winner.
The hare immediately ran off, leaving the tortoise far behind. The hare had run for a long distance without seeing the tortoise, so she decided to wait for the tortoise to get close so the defeat can be fun.
While waiting for the tortoise, the hare felt sleepy. He had waited for about an hour without seeing any trace of the tortoise. The hare said to herself, "I might as well take a nap." She thought, "even if she catches up with me, I can easily win the race."
The hare saw a tree with a shade and lay down under the tree, closed her eyes and took a much-needed sleep, but while she was napping, the tortoise began to close in on the huge gap.
Finally, the tortoise got to where the sleeping hare was and continued to walk. She walked slowly but steadily. After the tortoise had walked for some minutes, the hare woke up and saw something shocking.
The tortoise was already near the finishing line. The hare ran as fast as she could, but she was unable to catch up with the tortoise, who had finally crossed the finish line. Slow and steady can win the race.
Enjoyed the parable? Read another parable where a lonely elephant walked through the forest. | https://news.amomama.com/266691-daily-parable-a-tortoise-met-a-hare-who.html |
Mousse dessert with quince marmalade
Mousse dessert with quince marmalade – recipe for dessert based on Philadelphia cheese with quince marmalade, covered with mirror glaze. Quince marmalade can be replaced with any other, you can also use marmalade sweets.
Mousse dessert with quince marmalade Ingredients
- For the cake
- Shortbread cookies 350 g
- Butter 150 g
- For mousse
- Cheese "Philadelphia" 350 g
- Sugar 3 tbsp
- Milk 160 ml
- Gelatin 2 tsp
- Vanilla sugar 10 g
- Quince marmalade 100-150 g
- For mirror glaze
- Water 45 ml
- Sugar 90 g
- White chocolate 90 g
- Condensed milk 150 g
- Gelatin 7,2 g
- Titanium dioxide 1 tsp
Mousse dessert with quince marmalade Recipe
For the recipe mousse dessert with quince marmalade, at the beginning you need to prepare, so to speak, a substrate. Grind cookies into small crumbs and mix with softened butter. Cookies can be crushed with a rolling pin or in a mixer.
Transfer the prepared dough to a tray lined with foil, cling film or baking paper. Flatten the dough into a layer 0.5 cm thick and place in the refrigerator or freezer to harden. Next, cut out of the cake, using the recess of the substrate for the dessert.
Now you can cook the mousse itself. Mix the cheese with 80 ml of milk and beat lightly, but not too much, so as not to interrupt. Pour gelatin with the rest of cold milk (80 ml). When the gelatin swells, put it on a slow fire, add sugar and heat until sugar and gelatin are completely dissolved. Pour gelatin into cheese, add vanilla sugar and beat everything.
Put the prepared mousse into the silicone mold. Marmalade cut into small cubes and literally drown in mousse. Top the mousse with a cookie and butter crust. Place the dessert in the freezer and let it slow down well. To make it easier to move the dessert and not deform it, the silicone mold must first be placed on a tray or on a cutting board.
The dessert freezes well enough, but if the mousse has crawled out of the mold, after freezing it can be easily cut off. In order for the glaze to lay down better and evenly cover the surface, it is better to keep the dessert until the last in the freezer.
The mousse has frozen and now you can start the glaze. Pour water into a saucepan, add sugar and put on a slow fire. When the sugar dissolves, add condensed milk, mix and bring to 45-50 degrees. Pour gelatin with a small amount of cold water and set aside to swell. When gelatin swells, add it to a mixture of sugar and condensed milk, mix. Break the chocolate, add after the gelatin and beat with an immersion blender until smooth. To color the dessert in a beautiful color, you need to use food coloring, but condensed milk and white chocolate give a yellow color and, accordingly, when you add a dye, you will not get the perfect color. For this, titanium dioxide is used, it whitens the glaze, and after that food coloring is added. When whipping, the icing is covered with small bubbles so that they are not on the dessert, firstly, you need to beat holding the saucepan at an angle of about 45 degrees. Secondly, you can not raise the immersion whisk above the icing, that is, carry it along the bottom of the saucepan. And thirdly, after whipping, strain the icing through a fine sieve.
To cover the dessert, the icing needs to be cooled to 35 degrees, if the icing is less than degrees, heat it in a water bath or over very low heat with a divider. Now you can take the dessert out of the freezer and immediately put it on the wire rack. Pour the prepared icing over the dessert and let it drain. Dessert can be glazed several times using the glaze that is glass. Reheat it and pour over the previous layer of glaze. Cut off the drops of icing from the bottom with a knife, put the dessert into paper molds and that's it, the dessert is ready, it can be served at the table. | https://kashewar.com/en/recipes/mousse-dessert-quince-marmalade |
Referred pain is a term given to pain that is felt in one region of the body although it originates from another. This is commonly seen in clinical practice.
There are several structures in the body that, when injured, may cause the patient to experience pain in the thigh. This can occur even though there may be nothing wrong with the thigh itself.
The lower back, hip and sacroiliac joint are the most common areas of the body that, when injured, may cause referred pain to the thigh (figure 1). In addition, increased neural tension (tight nerves) may also contribute to the development of symptoms.
Patients with thigh pain that is referred from another source may or may not experience symptoms from the originating source. Patients typically experience a dull ache in the thigh that is poorly localized and may vary in severity or location. They may also experience pain or stiffness in other locations in the body such as the lower back, hip, groin or buttock. Occasionally pain may also be felt in the knee, lower leg, ankle or foot. These symptoms are usually experienced on the same side of the body as the thigh pain, although sometimes, the opposite side or both sides may be affected. Occasionally patients may also experience pins and needles or numbness in the affected leg. This most commonly affects the foot and can sometimes affect the other leg or both legs.
Patients with referred pain to the thigh normally experience restricted movement and abnormalities on assessment (such as tenderness on palpation) in the specific region of the body causing the pain. Local assessment of the thigh may demonstrate no significant abnormalities although patients may experience tenderness on firmly touching the thigh region. In long standing cases of thigh pain that is referred form another source, patients may develop muscle tightness or weakness in the muscles of the thigh.
A thorough subjective and objective examination from a physiotherapist is usually sufficient to diagnose referred pain to the thigh and the underlying cause of symptoms. Further investigations such as X-rays, MRI or CT scans are often required to assist with diagnosis.
Treatment for patients with thigh pain that is referred from another source varies greatly depending on the cause. Accurate diagnosis from a physiotherapist or doctor is therefore required to determine the most appropriate treatment. Treatment of the underlying cause of symptoms should result in improvement in the thigh pain.
To purchase physiotherapy products to assist with rehabilitation such as Ice Packs or Heat Packs, Postural Braces, Back Braces, Resistance Band, Foam Rollers, plus more, click on the appropriate link or visit the PhysioAdvisor Shop.
Find a physiotherapist in your local area who can assess and treat pain that is referred to the thigh.
Return to the top of Referred Pain (Thigh). | https://www.physioadvisor.com.au/injuries/thigh/referred-pain-thigh/ |
Genre is any type of literature or other forms of art and entertainment that is identified by similarities in form, style, or content. Genres, and their relative acceptance at any given time are a function of current events and attitudes, fads, and other social phenomena, as well as, the current trends in the artist medium.
The defining American genre considered to be westerns. They were the first wellknown type of movies. Westerns are characterized as classic plot elements such as cowboys, indians, outlaws, etc. The genre became less popular over the decades and have been refined and changed as well, but the layouts and plots have stayed the same.
True Grit has been made twice with only slight various in the two stories. The film’s main character is very flawed and these flaws are demonstrated early in the film to develop the character. A supporting protagonist is introduced that brings out the good qualities in the main character. The main character is then led to show both his warm and good qualities while using his flawed qualities to resolve the elements of the film. Although this formula of story development is not unique to western genre, the time periods and settings define it as western genre and western genre furthered this formula in the earlier days of film.
Similar to westerns, comedies gained popularity with audiences rapidly. Early slapsticks comedy styles and vaudeville stage acts catched on in silent films. Silent films paved the way for carefree, funny, embellished situations, relationships, and characters. Comedic subgenres were
developed over time including black and romantic comedies. Charlie Chaplin characters in silent films were satirical and timely, thus arousing the ire of important political entities. | https://www.majortests.com/essay/Western-Genre-570555.html |
Gold softened overnight in a range of $1220.90 -$1225.65, fading the direction of the US dollar.
The yellow metal ticked up to its high of $1225.65 during early Asian time as the DX edged to its low of 96.73.
Later during European hours, however, gold slid to its low of $1220.90 - finding support ahead of $1218-21 (6 bottoms, 11/19, 11/20, 11/21, 11/23, 11/25, and 11/29 lows).
Gold was pressured as the dollar turned higher (DX to 97.02) - boosted by weakness in sterling ($1.2809 - $1.2746, ongoing Brexit concerns) and the euro ($1.14 - $1.1357, miss in German Retail Sales, Euro CPI).
Global equities were mixed with the NIKKEI up 0.4%, the SCI was +0.8% (despite misses on China’s PMIs), European shares were off from 0.4% to 0.7%, and S&P futures were off 0.5%. A pullback in oil (WTI from $51.40 - $50.33) weighed on stocks.
Some dovish comments from the Fed’s Kashkari (Fed should pause on rate hikes, rates close to neutral, hiking rates too forcefully could risk recession) and Williams (risk of inflation persistently too low, neutral rate of interest not far from current levels) along with upbeat comments from US Trade Rep Lighthizer (would be surprised if Trump-Xi meeting wasn’t a success) helped boost S&P futures (2740), and took the US 10-year bond yield down to 3.011%.
The DX, however failed to decline and rose to 97.10 as further weakness in sterling ($1.2734, growing uncertainty about Brexit amid fierce opposition in Parliament) and the euro ($1.1333) kept it firm. Gold – after rebounding to $1223 – slid to $1220.
After opening weaker, US stocks rallied into positive territory by mid-morning (S&P +9 to 2747), aided by a much stronger than expected reading on the Chicago PMI (66.4 vs. exp. 58.5).
The 10-year yield rebounded to 3.021%, and the DX rose further to 97.25. Gold broke support at $1218-21 and fell to $1216.50. However, as we have seen on numerous occasions, bargain hunting buying quickly emerged to lift gold back to $1222.75.
US equities climbed higher into the afternoon (S&P +14 to 2752), with gains in the Utilities, Industrials, Health Care and Real Estate sectors leading the advance. Stocks were lifted by upbeat comments from a Chinese official that “consensus is steadily increasing” in the US-China trade talks. The 10-year yield retreated to 3.011%, but the dollar - which had been supported for months from trade tensions – failed to decline. The DX rose to 97.31, as sterling remained weak and the euro dipped lower ($1.1305). Gold declined in response and slid back to $1220.
Later in the afternoon, US stocks went out stronger (S&P ends +22 to 2760), but the 10-year yield ticked to 3.006%. The DX pulled back to 97.18 – but remained fairly firm given the market expectations for some type of truce in the US/China trade dispute. Gold edged up to $1222 and was $1222 bid at 4PM with a loss of $2.
Open interest was again off significantly – 27.9k contracts – showing a net of short covering from yesterday’s gain, along with a fair number of closeouts of both longs and shorts instead of rolling positions into February.
Volume was lower with 307k contracts trading. The CFTC’s Commitment of Traders Report as of 11/27 showed the large funds slashing 8.7k contracts of longs and trimming 1.7k contracts of shorts to reduce their net long position to 2k contracts.
This was done largely during gold’s pullback from $1330 on 11/21 to $1212 on 11/27. While the funds position remains net long, it is still historically and comparatively extremely low.
This sets up the gold market very well to move sharply higher as the short side of gold is still a very crowded trade.
With many longs still on the sidelines and a massive gross short position still remaining (155k contracts), gold just needs a significant spark to unleash a torrent of buying from shorts covering and sidelined long-side players returning.
Bulls were disappointed that despite a market expectation for at least a “truce” between US-China on trade (no increase in tariffs, agree to talk) that lifted equities, the DX rallied significantly (holding trade tension premium) and kept gold from testing resistance between $1226-30.
Nonetheless, bulls are encouraged that gold is back again on the verge of challenging this key resistance level. Bulls remain steadfast in their thinking that gold bottomed at $1160 on 8/16 after a $35 2-day capitulation.
They still have an uptrend in place from that level, and will look to continue to add to long positions on weakness, or on some expected ensuing upside momentum. They maintain the market has been and remains extremely oversold - having dropped $205 (15.0%) since the 4/11 $1365 high, and $149 (11.4%) since the $1309 high on 6/14.
Bulls strongly believe that the dollar’s recent climb from its 9/21 93.81 low to the 97.70 high two weeks back (+4.15% to fresh 17-month high) is badly overextended, and expect a correction to drive a significant short covering rally in gold.
Bulls are looking for a spark that will aid in taking out $1226-30, which they feel should ignite further buying to challenge $1235-38 (6 tops –10/29, 11/1, 11/2, 11/5, 11/6, and 11/7 highs), and then $1245-46 (double top – 7/16 and 7/17 highs).
In addition, bulls maintain that today’s Commitment of Traders Report still shows the funds with a massive gross short position (155k contracts). They feel the that the short side of gold is still a very crowded trade, and that the gold market is still set up in a highly favorable position to move up from potential heavy short covering (as we saw today) and sidelined longs returning to the market.
Bears were relieved that the DX held well – and actually advanced significantly - given the upbeat comments and market expectations on the US and China at least reaching a “truce”.
Bears remain comfortable scale-up selling into strength, feeling moves toward overhead resistance at $1226-30 and $1235-38 will continue to provide a good entry point for short positions.
Bears point to the lack of follow-through gold has presented on recent rallies: yesterday’s failure to take out $1228-30, the failure to breach$1235-38 (6 tops –10/29, 11/1, 11/2, 11/5, 11/6, and 11/7 highs) during the first week of Nov, the failure to take out $1244 on 10/26 (would have tripped down trendline from 4/23 $1336 high), and that the fairly heavy amount of short covering seen thus far from the prior few week’s COT reports has failed to lead to a breach of at least $1250 - as signs of a tired market – and expect a significant pullback to unfold.
Many bears are firm in their conviction that fuel from dollar strength, higher interest rates (though that argument is losing steam with 10-year hovering just over 3% and recent Fed speak decidedly more dovish) and a rebound in equities (as we saw continue today) will provide downside pressure on gold, and see prices north of $1200 offering a great opportunity to get short(er).
This is witnessed by today’s COT Report that a shows massive gross short position (155k contracts) still remains. Bears will look for a breach of initial support at $1211 (100-day moving average, double bottom) and then expect a challenge of $1206 – the up trendline from 8/16 $1160 low, followed by a test of $1200.
All markets will continue to focus on geopolitical events (especially Brexit developments), developments with the Trump Administration (especially on US-China trade, potential legal issues), oil prices, and will turn to reports Monday on China’s Caixin PMI, Eurozone PMI, US Markit PMI, ISM Manufacturing, and comments from the BOE’s Haldane and the Fed’s Kaplan for near-term direction.
In the news:
Resistance levels:
$1225 – options
$1226 – 27 – double top, 11/28 and 11/30 highs
*$1227 – down trendline from 4/23 $1336 high
$1228-30 5 tops – 11/20, 11/21, 11/22, 11/23 and 11/26 highs
$1235-38 – 6 tops –10/29, 11/1, 11/2, 11/5, 11/6 ,and 11/7 highs
$1239-40 – double top, 10/23 and 10/25 highs
$1243 – 10/26 high
*$1245-46 – double top – 7/16 and 7/17 highs
$1250 - options
$1251-53 – triple bottom 7/4, 7/5, and 7/6 lows
$1259-61 – quadruple top – 6/27, 7/4, 7/5, and 7/6 highs
$1262 – 50% retracement from 4/11 $1365 high to the 8/16 $1160 low
Support levels:
$1218-21 – 6 bottoms, 11/19, 11/20, 11/21, 11/23, 11/25, and 11/29 lows
$1221 – 40 day moving average
$1220 – 20-day moving average
$1217 – 11/30 low
$1216 – 50 day moving average
*$1211 – 100-day moving average
$1211-12 – double bottom (11/27 and 11/28 lows). | https://goldsilver.com/blog/gold-traders-report-november-30-2018/ |
Long-term cultivation-independent microbial diversity analysis demonstrates that bacterial communities infecting the adult cystic fibrosis lung show stability and resilience.
Culture-independent analysis of the respiratory secretions of people with cystic fibrosis (CF) has identified many bacterial species not previously detected using culture in this context. However, little is known about their clinical significance or persistence in CF airways. The authors characterised the viable bacterial communities in the sputum collected from 14 patients at monthly intervals over 1 year using a molecular community profiling technique-terminal restriction fragment length polymorphism. Clinical characteristics were also collected, including lung function and medications. Ecological community measures were determined for each sample. Microbial community change over time within subjects was defined using ecological analytical tools, and these measures were compared between subjects and to clinical features. Bacterial communities were stable within subjects over time but varied between subjects, despite similarities in clinical course. Antibiotic therapy temporarily perturbed these communities which generally returned to pretreatment configurations within 1 month. Species usually considered CF pathogens and those not previously regarded as such exhibited similar patterns of persistence. Less diverse sputum bacterial communities were correlated to lung disease severity and relative abundance of Pseudomonas aeruginosa. Whilst not true in all cases, the microbial communities that chronically infect the airways of patients with CF can vary little over a year despite antibiotic perturbation. The species present tended to vary more between than within subjects, suggesting that each CF airway infection is unique, with relatively stable and resilient bacterial communities. The inverse relationship between community richness and disease severity is similar to findings reported in other mucosal infections.
| |
Are road safety evaluation studies published in peer reviewed journals more valid than similar studies not published in peer reviewed journals?
The peer review system of scientific journals is commonly assumed to prevent seriously flawed research from getting published. This paper compares the quality of 44 road safety evaluation studies published in peer reviewed journals to the quality of 79 evaluation studies dealing with the same safety measures, but not published in peer reviewed journals, in terms of seven criteria of study validity. Studies were scored for validity in terms of (1) sampling technique, (2) total sample size, (3) mean sample size for each result, (4) specification of accident or injury severity, (5) study design, (6) number of confounding factors controlled and (7) number of moderator variables specified. Confounding factors are all factors that disturb the attribution of a causal relationship between the safety measure being evaluated and the observed changes in safety, moderator variables are all variables that influence the size of the effect of the safety measure. Very few statistically reliable differences in study validity were found between studies published in peer reviewed journals and studies not published in such journals. There was, at best, a weak tendency for studies published in peer reviewed journals to score higher for validity. An interaction was found between author affiliation and type of publication with respect to study validity. Studies published in peer reviewed journals by authors who were at a university scored highest for validity. For a number of reasons, this study must be regarded as exploratory and its results as indicative only. The study does, however, point to a line of research that might be worth pursuing in larger and more rigorous studies.
| |
There is a great deal of things to discover in Gislaved municipality. We are surrounded by a glorious, diverse countryside that makes a number of leisure activities and outdoor pursuits possible throughout the year. Our 388 lakes and beautiful green spaces provide many opportunities for bathing, birdwatching, relaxing walks or fishing.
Sports, culture and experiences
We offer a wide range of cultural and recreational amenities for inhabitants and visitors. Sports and culture have put our municipality on the map. This includes the Nordic region’s largest motor racing track, Scandinavian Raceway, and a rich music life that has its roots in an active municipal music school.
The Nissan River runs from north to south through the municipality. In olden times the Nissan was used for timber floating, as a transportation route and a source of power. These days, the Nissan provides opportunities for active outdoor pastimes such as canoeing, hiking along great trails and fishing.
Leisure
Gislaved municipality provides excellent conditions for a wide range of recreational activities all year around. Whether you are looking for active leisure time on your own account, as a member of a club or association, there is plenty to choose from.
There are sports halls and gyms in most of the municipality’s communities. They are used by the schools during daytime and by associations, companies and private individuals in the evenings and at weekends. In addition, our associations have built sports halls in several towns. In Gislaved and Anderstorp there are an indoor pool for family swimming, exercise and fun.
Several communities have so-called multi-purpose sports arenas. There are facilities for playing football, basketball, hockey and volleyball. In Gislaved there is an attraction called “Tillsammans”, “Together”. It includes a multi-purpose sports arena, parkour course, a traditional play park and also horticultural allotments with greenhouses. It is a meeting place where everyone can enjoy different activities regardless of age … together. A skate park is situated in Smålandsstenar.
With 388 lakes and several waterways, activities on or by the water come naturally. Our many waterways offer canoeing, kayaking, fishing, water sports and, naturally, swimming during the summer months. There is a canoe trail along the Nissan with rest areas for overnight stays.
Association activities
Gislaved municipality is home to a busy, broad range of club activities in everything from sports to social groups. The municipality endeavours to provide non-profit associations with the best conditions possible for pursuing their activities by providing support and awarding subsidies and grants.
Sports associations
Almost all sports associations in Sweden are counted as voluntary organizations, as they are non-profit making. In most cases, membership and practice fees are relatively low. Youth clubs can apply for activity grants from the municipality, and receive a lot of help from parents involved as leaders. There are 300 different associations in the municipality, 90 of which have a youth section.
Social groups and village communities
Social groups and village communities protect and develop local areas.
Local folklore societies
There are several active local folklore societies in the municipality who work with the local history and environment. They take care of the rural community centres in the municipality and exhibit buildings from several different centuries. Visits to them show us how people lived in times past. In the course of the year they also arrange traditional festivities and activities such as Midsummer celebrations and hay-making. | https://www.entergislaved.se/en/living-gislaved/discover/ |
Discover the Latest Innovations and Lessons Learned in Rule of Law and Legal Empowerment Projects
With many rule of law and democracy programs incorporating projects that focus on popular culture and the media in developing countries, I found this new report by the University of Oxford pretty interesting. The paper, “Media and Democratisation: What is Known about the Role of Mass Media in Transitions to Democracy”, looks at Central and Eastern Europe, Latin America, and the Middle East to understand what role media has had in shaping democracies and creating institutional change. Check out the excerpts below!
The role of the media in the process of democratisation has been greatly underestimated partly because the literature on political science and communication is largely fragmented. Nevertheless, it is difficult to identify a direct relationship of cause and effect between the media and democratization as the available empirical evidence is anecdotal and so cannot be subjected to rigorous empirical testing. For both media and democratisation scholars, the mass media are regarded as one of the key democratic institutions vital in improving the quality of the electoral system, political parties, parliament, judiciary, and other branches of the state, even civil society, and safeguarding their democratic performance.
The Challenges in Transforming Media into Democratic Institutions
Transforming the media into fully democratic institutions is a challenging task mainly because (1) the relationship between government and the media is highly ambivalent, (2) reformed media institutions will still retain elements of the logic and constraints of their predecessors, and (3) journalists in the newly transformed media organisations will still hold values that are rooted in their professional life under the old regime. This transformation is often achieved through liberalization of the media so that an ideal media environment includes two media sectors: a market-led media sector and a non-market sector.
As a challenge to legislative democratisation, emerging democracies are thought to develop unique types of media systems that differ significantly from those in established democracies, and journalistic professionalism is argued to be embedded in the wider cultural traditions of a given country and to reflect the needs and expectations of audiences. This creates several – and larger – gaps between the ‘ideal’ and the reality of journalism than in established democracies. Katrin Voltmer noted that: the media in many new democracies often seem to lack the qualities that would qualify them for playing a key role in promoting accountability and inclusive politics. They are frequently criticized for remaining too close to political power holders to be able to act as effective watchdogs; political reporting is regarded as too opinionated to provide balanced gatekeeping; while commercial pressures on news coverage often encourage an overemphasis on the trivial and popular at the expense of serious and sustained attention to international affairs and complex issues on the policy agenda.
When Media is Most Effective
In the pre-transition period, the media may play a witnessing role, as well as a legitimising role for the changes taking place before the regime loses its hold on power. It may also exert direct pressure and constitute an actual ‘trigger’ for democratization. During the transition period, the media may set the agenda for political debate, offer alternative interpretations of the ongoing events, and create support for emerging political parties. While previous research suggests that the media tend to be most supportive of democracy in the early stages of democratization, their performance is vulnerable to political control which manifests itself in highly opinionated and politicised reporting during transition phases. The media’s role in the early stages of democratisation can be very influential because of its potential impact on political decisions and political orientations.
The media tend to be most supportive of democracy at a particular political conjuncture, when they are themselves emerging from political control, are strongly identified with the process of democratization and, moreover, benefit from the public’s enormous hunger for news and for political change. At an earlier ‘stage’, their contribution will inevitably be more restricted but to the extent that they offer alternative accounts of social and political reality and even that they draw people into a sense of shared public space, they can be seen as helping to pave the way for democratization. As the process of transition approaches the consolidation stage, the media’s contribution becomes more equivocal. When deprived of state financial support and facing a public whose news appetite has been blunted by growing cynicism, they increasingly become prey to the pressures of commercial survival.
Media and Institutional Change in Central and Eastern Europe: ‘Lessons to be Learned’?
One of the main reasons to focus on the countries of Central and Eastern Europe (CEE) when examining the roles of media in the process of democratisation lies in the fact that this region, for the most part, can represent more or less ‘complete’ case of democratisation. We have witnessed the beginning, middle, and end of transition as many of the countries of this region have not only moved away from authoritarianism towards democracy but have succeeded in doing so (e.g. with membership in the European Union).
Rapid commercialisation of the media after 1990 has been one of the most frequently quoted reasons for the apparently flawed democratic performance of the media in the CEE countries, particularly in those where privatisation of the news media sector took place at an early stage and to a greater extent while the end of censorship, the diminishing of direct political control, and the overall pluralisation of the media sector created conditions for the media to effectively aid the democratisation process and the creation of the democratic public sphere, the simultaneous process of replacement of ideological control with market‑driven imperatives has quickly made the goal of serving the public interest secondary to the search for profit. Still, not all authors share such a negative perspective on the development of the media’s democratic roles in the region.
As one of the most important achievements of the media, Gross quotes ‘the creation of a public climate of competition between a wide range of competitors for political and economic power or for cultural predominance’. Another positive effect can be seen, according to him, in the media’s informative role, since ‘the media also brought to the fore new issues, new parties, new leaders, and potential leaders, new ideas and possibilities, and contributed to the creation of varied new nongovernmental groups, which is to say, civil society’. His position can be read as supporting a notion that the media facilitate, rather than directly stimulate, the establishment of democratic institutions: The Eastern European media’s most significant contribution to the initial phases of democratization in 1989–2000 has thus been to serve as examples of and conduits for the newly available political, economic, and cultural options, on the one hand, and as facilitators of political, market, and cultural competition, on the other.
Media’s Interdependence on Other Democratic Institutions
Quoting Morris and Waisbord, Marta Dyczok summarises that ‘there seems to be an emerging consensus on the fact that “paradoxically, the media’s ability to uphold democratic accountability eventually depends on the degree to which political institutions have adopted democratic structures and procedures.”’ The case study by Stetka (2013), looking at the achievements of investigative journalism in the Czech Republic, found that for the fight against corruption, to be successful, there has to be a joint effort of various accountability institutions, including civil society, the judiciary, and the prosecution authorities, as media pressure itself may not be enough to enforce accountability and safeguard systemic changes.
The Role of Media in Latin America
Drawing on empirical examples of public scandals from several countries of this continent, including Brazil, Colombia, Peru, or Argentina, one author argues that ‘accountability hinges on the combined actions of a network of institutions rather than on the solitary actions of one organization’. However, even within these limits, the role of the press is indispensable in exposing issues which either the state wants to keep secret or which involve corruption of public officials. In those scandals he finds, ‘the press has unquestionably helped to raise accountability by publicizing information and actions that resulted in “throwing the rascals out.”
According to Sheila Coronel, Latin America represents ‘perhaps the most instructive case’ of the watchdog role of media, as it is ‘widely acknowledged that sustained investigative reporting on corruption, human rights violations and other forms of wrongdoing has helped build a culture of accountability in government and strengthened the fledgling democracies of the continent’. The media are playing a central role in exposing abuses and keeping governments in check’, not just by damaging the political capital and reputation of public officials but, subsequently, also by triggering ‘procedures in courts or oversight agencies that eventually lead to legal sanctions.’
Argentina has, however, portrayed the current state of this genre in a less optimistic light, observing that, after two decades of being part of the mainstream, ‘watchdog press had lost its bite by 2005’, which, was caused by the economic crisis as well as by the changing organisational culture of the news media, favouring corporate interests. This trend of gradual diminishing and weakening of investigative journalism – has been observed in many Central and Eastern Europe as well, especially since the beginning of the economic crisis in 2007/8 which put news media organisations under unprecedented pressure and resulted often in the trimming of investigative departments. Such tendencies, revealing the fragility of the news media as an institution whose performance is tightly dependent on external economic conditions, further underscore the necessity to examine journalism’s role in fostering the democratisation process within the processes of commercialisation and tabloidisation of content which quickly followed the growth of media markets in the newly democratising countries have been viewed as obscuring and – at least partly – inhibiting the democratic roles the free media.
Based on the reviewed literature, one might plausibly argue that the contribution of the media to democratisation might well be at its strongest during regime change – including mobilisation against the old regime. In later stages of democratic consolidation, the media get often watered down by market pressures as well as by (newly emerging) political constraints.
Mass Media and Attitudinal and Behavioural Change during Democratisation
The democratisation literature rests on institutional foundations; yet full democratisation is not realised unless citizens undergo socialisation to new values, attitudes, and behaviour norms of democratic culture. It is not unreasonable to think that the mass media play an important role in political socialisation for the citizens of countries undergoing democratisation. There are several reasons to expect this. One, as turmoil and periods of transitions exist, citizens are more likely to turn to the media as a source of reassurance and information. In turn, they are more highly subject to the effects of media in contrast to a ‘normal’ period in stable societies. Others offer two rationales for this expectation: (a) democratisation is a highly politically charged environment and so (b) there is an increased level of uncertainty associated with that period. This theory of media dependency leads us also to the conclusion that this heightened media use (and thus effects) will subside as countries reach certain levels of political stability and thus to media theories derived from – and designed for – stable, modern democratic societies.
Mass media can also play a salient role in democratising countries, because the requirements of democracy include certain habits, beliefs, attitudes, and values and the role of the media can provide insight into the development of a democratic civil society and individual political development. The responsibilities of democratic citizenship, while perhaps generally considered less acute in stable democracies, are heightened in the chaotic process of democratisation, in which the socialisation process is disrupted or limited and all institutions of politics, economics, and society are in a state of flux. Media are capable of producing changes in values, attitudes, and behaviours congruent with democratic citizenship (see the beginning of this section). Thus, ‘media can play an instrumental role in resocialization and modernization by teaching a new way of participating in politics and socioeconomic life and by encouraging new individual and national aspirations’.
Fundamentally, the study of mass media in democratising countries is an exercise of a different quality than the study of mass media in established democracies. To assume a simple and positive relationship between changes in the quantity and quality of information sources and enhanced freedom of expression on the one hand and successful democratisation on the other hand can be misleading. In sustaining this assumption, we learn little of the implication of changes to the local media landscape in transition periods, particularly during a time where information can be sought from many different sources such as the internet and extended social networks.
Media in Rwanda After the Genocide
Examine a radio programme aimed at promoting independent thought and collective action in problem solving in post–‐‑genocide Rwanda. Using field experiments of broadcasts to randomly selected communities over one year, the data amassed by the authors indicated that, while the broadcasts were not effective in shaping listeners’ beliefs and attitudes, these same listeners were more resistant to directions and calls for obedience from the authorities and showed evidence of acting independently. Regardless of the mixed outputs of this research, the depth and breadth of data collection in such a project is hard to generalise.
Media in the Arab World
Greater political liberalisation, an expansion of national privatization programmes, and the diffusion of new communications technologies, have given the media a key role in the debate about Arab democratisation. These changes resulted in, among other outcomes, the relaxation of government controls over broadcasting, the creation of more autonomous radio and television corporations, and the abolition of some ministries of information. The emergence of a transnational media market has also intersected powerfully with cross‑national media professionalisation, whereas increased competition has compelled Arab broadcasters to diversify their programming. As research on Arab media audiences is still in its infancy there has been little evidence to support the assumption that the media have massive effects on Arab political opinions and behavior.
To read the full report, you can find it here. | https://reinventingtherules.com/2013/11/01/the-role-of-mass-media-in-transitions-to-democracy/ |
Midterm exams I Optical Microscopy 1. Spectrum of the visible light (blue, green, and red light) 2. Give a definition of absorption, refraction, dispersion and diffraction of the light. 3. Give a definition of the refraction index 4. Give a definition of the focal point and focal plane. 5. What is magnification power of the lens (write an expression). 6. Describe the difference between magnifying lens and compound microscope. 7. What is the Abbe condenser? 8. Describe Dark-field Microscopy 9. Give a definition of a plane wave (write an expression). 10. Describe the principles of operation the confocal optical microscope 11. Describe the field in the focal plane 12. Give a definition f the numerical aperture 13. Describe the Rayleigh criterion of resolution in microscopy 14. Give a definition f the lateral and axial resolution in optical microscopy (write an expression) 15. Describe contrast in reflection and transmission optical microscopies. 16. For a given optical microscope objective explain meanings of the numbers on the side face of the objective. 17. Give a definition of the Fourier transform (write an expression) 18. Write an expression for Fourier transform of the step function Raman Spectroscopy 1. What is a Raman phenomenon? 2. What information do you get from a Raman spectrum? 3. What is the vibrational frequency of a diatomic molecule? 4. Where would be Raman lines (in cm-1 ) for (1) diamond and (2) for helium? 5. Which molecule would have higher vibrational frequency: Fluorine (F2) or iodine (I2)? 6. Why Raman spectra should be measured at very low laser power? 7. Why Raman lines of amorphous phase looks broad in comparison to lines of crystalline phase of the same material. 8. How can you experimentally determine what Raman lines are associated with hydrogen bonds in a chemical? Infrared Spectroscopy 1. What is the main difference between Raman and Infrared spectroscopies? 2. How many vibrational modes are there in CO2 and H2O? 3. At what wavelength region you would expect to measure the infrared spectra? 4. How do we know what elements are present in sun’s atmosphere? 5. Why no laser is used to measure the Infrared spectra and laser must be used to measure the Raman spectra? Both techniques give information about the vibrational modes of a molecule. 6. What is zero point energy? Are the molecules always vibrating? 7. What is the difference between the infrared imaging (night vision system) and infrared spectroscopy? | https://studyres.com/doc/20148898/midterm-exams-i |
Why Sustainable Tourism Needs Smart Management
The importance of sustainable tourism has been receiving increased recognition in recent years, highlighting the potential of tourism as a positive force supporting the Sustainable Development Goals (SDGs).
On the other hand, successfully implementing sustainable tourism initiatives remains a critical challenge.
Since tourism is a diverse sector including and influencing a wide range of economic activities and social segments, the possible "ripple effect" of tourism can have significant impacts - both positive and negative - on the sustainable development efforts locally, regionally and globally.
"A well-designed and well-managed tourism can make a significant contribution to the three dimensions of sustainable development and has close linkages to other sectors and can create decent jobs and generate trade opportunities."
- UN Resolution 66/288 “The future we want” (2012)
To maximize the potential of tourism as a driver of sustainable growth, the tourism sector needs smart and effective approaches to development projects and sustainability initiatives, ensuring that funding and resources for delivering sustainable tourism projects lead to achieving substantial results for destinations and communities, with demonstrated impacts and lasting benefits.
Why Do Some Projects Fail?
It seems clear that lack of proper management is among the main factors for project failure. But what are the specific reasons behind those projects that are not properly managed?
They include:
- Lack of a solid needs analysis: Without properly understanding the stakeholders and their needs, a project would not lead to optimal outcome.
- Poor planning and project design: Project planning and design should follow a structured and systematic method in order to ensure an organized approach.
- Inadequate monitoring and evaluation mechanisms: Project managers must be able to measure the progress being made, as "you can't manage what you don't measure".
- No integration of planning the delivery of benefits: What happens after the project is just as important as what actions are taken during the project period.
With these failure factors and solutions in mind, the following are three key recommendations on effective approaches to project management in sustainable tourism.
1. Prioritize Good Governance
The tourism industry is characterized by a diversity of private and public stakeholders and community members who will be directly and indirectly impacted by decisions around tourism development within their destinations.
A key part of what underpins successful execution and delivery of tourism projects, therefore, are the "people factors": effective leadership, good team work and delegation, and stakeholder engagement.
What are some of the key conditions for good collaborative governance for effective project management?
- Strong vision that reflects the needs and interests of various stakeholder groups in the project goals and deliverables.
- Effective leadership that allows for constructive dialogue, information sharing and communication.
- Transparent and accountable decision-making.
- Public-private-community partnership that ensures shared decision-making about common issues.
- Developing and sharing expertise and knowledge.
- Clearly defined roles and responsibilities among project team members.
- Clear operational structures and processes, and effective and efficient allocation of resources.
2. Measure Success Based on Benefits
One of the most important aspects of successful projects is defining "success" based on results.
Successfully achieving project results means not just completing tasks and meeting deadlines, but also producing tangible and lasting benefits.
Tourism projects, upon completion, may deliver concrete results such as: organizing a cultural event, creating new touristic infrastructure, and implementing a new interpretation program for a better visitor experience.
The project manager must be able to measure and verify the benefits of the project, which may not be obtained until after the project. For example, do visitors return to the next cultural event or recommend the event to their friends? Or is the tourism infrastructure being used by the tourists and is it bringing enough funds? Does interpretation provide added-value to the visitors and increase their satisfaction levels?
In order for sustainable tourism projects to achieve concrete results and benefit stakeholders, a practical and structured approach to project management is needed. And the approach must take into account what the project produces as a result and what happens after the project is completed.
In project management terms, they are:
- Output: A project output is the project’s product, e.g. a brochure outlining the tourist resorts available in a particular country.
- Outcome: An outcome is the result of the permissible change allowed by the use of the output, e.g. improved promotion of the country using the brochure.
- Benefit: The benefits are all the measurable improvements derived from a successful outcome, e.g. any increase in the number of tourists choosing to visit the country, which would be a measurable benefit from the improved promotion (outcome) made possible by the creation of the brochure (output).
3. Be Prepared for the Unexpected
No matter how thorough the project plan is, and regardless of the size or the scope of a project, within a project lifecycle, there will always be challenges, issues and problems that were not thought of before the project. Any project plan, therefore, must take into account contingencies for when the unexpected happens, affecting the project flow.
Tourism projects are defined by a set of characteristics and variables that the project management team must consider and control throughout a project in order to ensure success.
Throughout the project life cycle, the project manager must monitor these variable factors, such as:
- Cost: Projects need to produce value for money and their products are meant to provide added value to the stakeholders. For this reason, the projects need to be affordable. Cost is considered to be one of the major standard factors to be monitored during the project.
- Scope: Scope is the definition of what a project is meant to deliver versus what it will not. The Project Manager must therefore have a clear definition of what is required from the project in terms of products to be delivered.
- Risks: Tourism projects are inherently subject to a higher level of uncertainty because they cover activities for creating and/or modifying products outside of the established operational processes and procedures.
PM4SD Training and Certification: Improving Skills, Enhancing Performance
The methodology of PM4SD (Project Management for Sustainable Development) has been developed to empower project managers with tools and techniques to better plan and manage funding and investment in the tourism context, and to improve their management skills and enhance sustainability performance.
A project management method to support the process of making tourism more sustainable, PM4SD is a specialized training scheme developed and owned by FEST (Foundation for European Sustainable Tourism), and is an accredited certification administered through APMG International, the leading accreditation and exam institute.
The PM4SD methodology is dedicated to delivering long-term benefits beyond the project life cycle for all stakeholders - national governments, destination marketing bodies, tour operators and service providers, owners of tourism infrastructure and transportation as well as host communities.
As a holistic management system for sustainable tourism practitioners, PM4SD has been recommended by the Global Sustainable Tourism Council (GSTC) as a tool to implement sustainable tourism best practices, particularly relevant to the Sustainable Management pillar of the GSTC Criteria.
|
|
PM4SD Online Courses
Since 2013, 20+ PM4SD training courses have been delivered in over a dozen locations across Europe and beyond. Through a partnership between Jlag and TrainingAid, PM4SD practitioner training is now available as a 2-week intensive facilitated online course, open to all tourism stakeholders and project managers. By completing the online course, participants are able to satisfy the requirements towards the official PM4SD exam, administered through APMG International, the leading accreditation and exam institute.
*The PM4SD qualification consists of the following two levels:
TrainingAid is an international tourism e-learning company offering online training courses and skills development opportunities for tourism professionals. | https://www.trainingaid.org/news/project-management-sustainable-tourism-3-key-success-factors |
Our offices are located in Vancouver, British Columbia, where the Seymour mountain and river meet – facing the gateway to our global city. We like to think our name reflects our mission to help you “see more” and create new possibilities.
As a boutique consulting firm, and through our Financial Health Index practice, we provide customized research, analytics, benchmarking and strategic consulting services for companies within and outside financial services.
Our clients operate across many industries: including financial services, telecoms, pensions and investments, retail, social enterprise, business services and higher education.
We’re members of the Institute of Certified Management Consultants of British Columbia (CMC) and our values drive everything we do. | http://seymourconsulting.ca/our-approach/ |
Squatting is an illegal activity in most states in the US, but there are exceptions for people living in abandoned buildings or other structures that are no longer being used.
Squatters often use these places because they’re cheap and easy to access with no overseeing or supervision from the owner.
Do You Need Permission from the Owner to Move Into an Unoccupied Property?
If you are squatting in an unoccupied building, you need permission from the owner before moving into the place. This is true even if you plan to fix up the property with cleaning and general maintenance and make it livable.
What Are the Penalties for Squatting?
If you are caught squatting without permission, you will face fines and possible jail time. You also run the risk of being evicted by the landlord.
What Happens When Someone Moves into My House Without My Consent?
A squatter is defined as “a person who occupies land or premises against the consent of the owner or rightful occupant.” In other words, if you move onto someone else’s property without their permission, you are considered a trespasser.
What Should I Do if I Find Out That Someone Else Lives in My Home?
If you find out that someone has been living in your home without your knowledge, you should contact law enforcement immediately. You can also file an unlawful detainer lawsuit against them. However, there are some exceptions to this rule.
For example, if you are renting an apartment and the landlord allows tenants to sublet the unit, then the tenant cannot be evicted because of another tenant living in the unit.
Is it Legal to Live in an Abandoned Building?
It is illegal to occupy an abandoned building in Alabama. This includes vacant houses, apartments, and commercial buildings. Someone who lives in an abandoned building without permission will likely face criminal charges.
If this article has been useful for you, help me reach as many people as possible. You just have to use the buttons you see below and share it on one of your social networks. Thank you. | https://squattersrights.info/alabama/ |
To the Roman world, Britain was an unknown and mysterious land across the sea when Julius Caesar invaded in 55–54 BC. Despite inflicting defeats on the British, Caesar soon made peace with his opponents and returned to Gaul.
For almost a century afterwards the kingdoms of Britain were kept quiet with gifts and diplomacy. But when anti-Roman rulers came to power, the emperor Claudius – in need of a boost to his domestic prestige – launched a full-scale invasion in AD 43, intent on regime change and military glory.
This rare coin belongs to a series dedicated to the armies of the frontier provinces. Beneath the depiction of the emperor Hadrian (r.AD 117–38) and soldiers are the Latin words EXERC[ITUS] BRITANNICUS: ‘army of Britain’.
This time the Romans enjoyed rapid military success. But gradual advance through southern England and Wales was halted in AD 60 by the rebellion of Boudicca, queen of the Iceni of East Anglia, incensed by the brutality of the conquest. The revolt was suppressed, but not before three recently founded Roman cities, Camulodunum (Colchester), Verulamium (St Albans) and Londinium (London), had been burned to the ground.
The advance resumed in AD 70 with the conquest of Wales and the north. The governor Agricola (AD 77–83) even succeeded in defeating the Scottish tribes at the Battle of Mons Graupius in AD 83.
Immediately after this victory, though, troops were pulled out of Britain to deal with invasions on the Danube frontier. As a result, the far north could not be held, and the army gradually fell back to the Tyne–Solway isthmus. It was here that the emperor Hadrian, visiting Britain in AD 122, ordered the building of his famous wall.
The emperor Antoninus Pius tried to reoccupy Scotland and built the short-lived Antonine Wall (AD 140–60). He was ultimately unsuccessful, however, and Hadrian’s Wall became the northern frontier of the province once more.
By now the three legions (army units of up to 6,000 men) remaining in Britain had settled in permanent bases. Auxiliary troops were scattered in smaller forts, mostly across northern England and along Hadrian’s Wall.
In the pacified parts of the province, cities had been founded as capitals for each of the tribal areas (the civitates) into which the Britons had been organised. A network of roads had developed, and landowners in the south began to build Roman-style villas.
Life for most ordinary Britons, who were farmers in the countryside, was slow to change. By degrees, however, they came into contact with villas, towns and markets. Here they could exchange their produce for Roman-style goods and see people dressing and behaving in Roman ways.
Shortly after AD 180 there was an invasion by tribes from what is now Scotland, who overran Hadrian’s Wall. Around this time most of the cities of Britain were enclosed within earthen defensive walls, which may have been linked to the invasion.
The Roman Empire was ruled from Britain for a brief period in AD 208–11, when the emperor Septimius Severus came to campaign north of Hadrian’s Wall. Severus divided Britain into two provinces, Britannia Superior (south) and Inferior (north), with capitals at London and York respectively. This prevented too many troops from being concentrated in the hands of a single governor who might have attempted to usurp power.
Alongside the cities, which acquired stone walls at this time, the 3rd century saw increased numbers of small market towns, villages and villas. Roman objects were now more common in even the poorest rural settlements.
There were still threats to the province. In the north, beyond Hadrian’s Wall, the Picts had emerged as a formidable enemy, while to the south there was a growing threat from seaborne raiders. The so-called Saxon Shore forts around the south-east coast were built towards the end of the 3rd century in response, such as at Caister Roman Fort and Reculver.
Britain was part of the separatist ‘Gallic empire’ from AD 260 until AD 273, and again broke away from Rome under the usurpers Carausius and Allectus (AD 286–96). Emperor Constantius I recaptured the province in AD 296, and when he died in AD 306 after a campaign against the Picts, his son Constantine the Great was proclaimed emperor in York.
After Constantine’s conversion in AD 312, Christianity was adopted more widely across the empire, including in Britain. In the 4th century Britain was reorganised as a ‘diocese’ consisting of four provinces, with military forces under the command of the Dux Britanniarum – the Duke of the Britains. The next 50 years or so were a golden age of agricultural prosperity and villa building, especially in the south-west.
But the later 4th century saw chronic insecurity and the great invasion known as the barbarian conspiracy of AD 367. Confident new building had ceased by the 370s. Repeated attempts to usurp the empire by generals based in Britain (the last being Constantine III in AD 407) drained the diocese of troops. By AD 410 Britain had slipped out of Roman control, its inhabitants left to fend for themselves.
Lions were commonly used as sacred symbols in Roman memorials, but the Corbridge lion is different. Find out what this extraordinary sculpture tells us about changing beliefs in Roman Britain.
The remains of Birdoswald Roman Fort have revealed more about Hadrian’s Wall than any other site along the Wall.
A remarkable sculpture of Mithras found on Hadrian’s Wall reveals religious and military connections with distant parts of the Roman Empire.
How recent archaeological excavations on Hadrian’s Wall have revealed why it has always been so difficult to discover where Roman soldiers kept their horses.
A pair of skeletons at Housesteads Fort reveal a brutal side of everyday life in Roman Britain.
From strange heads on pots to missing temples, there are many things about Corbridge Roman Town that continue to puzzle us.
An introduction to the design, development and purpose of Roman country villas, and the lifestyles of their owners.
Rome's success was built on the organised and practical application of ideas long known to the ancient world.
The daily experiences of most people in Britain were inevitably touched by its incorporation into the Roman Empire.
Most people in Roman Britain made their livings from a mixture of subsistence farming and exchange of specialist goods.
How the Roman conquest changed how people in Britain ate, and how they looked after their health.
Discover how, where and why a vast network of roads was built over the length and breadth of Roman Britain.
The Romans were tolerant of other religions, and sought to equate their own gods with those of the local population.
What kind of landscape did the Romans find when they conquered Britain, and what changes did they make?
Britain was one of some 44 provinces which made up the Roman Empire at its height in the early 2nd century AD.
Prehistory is the time before written records. It's the period of human history we know the least about, but it's also the longest by far.
The six and a half centuries between the end of Roman rule and the Norman Conquest are among the most important in English history. This long period is also one of the most challenging to understand – which is why it has traditionally been labelled the ‘Dark Ages’. | https://www.english-heritage.org.uk/learn/story-of-england/romans/?utm_source=blog&utm_medium=blog&utm_term=Romans&utm_content=in%20text%20link |
.
Quiz
iOS
Android
More
Abstraction
Defined
as the simplification or changing of a
visual subject while retaining its recognizable
aspects.
Idealism
Perfection, no flaws
Realism:
naturalism
like
it IS
in
real life (wrinkles, sagging skin, beady eyes, etc.)
Surrealism
making
an image in a very realistic manner but the images aren’t
realistic
Abstraction
levels
lSimplification:
reduce details
lDistortion:
change (geometric or organic)
lBreak
image apart - separate parts
lMoving
parts around or repeating parts
Cubism
lrealistic
parts replaced with geometric shapes or planes in such a way that the subject isn’t
evident.
Non-objective abstraction
Defined
as pure form with no explicit or evident
subject matter.
Author:
yourmomhaslice
ID:
201671
Card Set:
Art
Updated:
2013-02-19 04:22:03
Tags:
art drawing
Folders:
Description:
Degrees of representation
Show Answers: | https://www.freezingblue.com/flashcards/print_preview.cgi?cardsetID=201671 |
Published on: May 16, 2012
by Alice Park for Time:
Researchers have identified two genes that affect brain size and may be linked not only to IQ, but also to our risk of developing brain disorders like Alzheimer’s disease.
Scientists have known for some time that the size and volume of certain parts of the brain are linked to disorders including developmental conditions such as autism and degenerative diseases like Alzheimer’s. The brains of autistic children, for example, tend to be bigger than those of unaffected youngsters, and in Alzheimer’s patients, the brain region responsible for memory, the hippocampus, tends to be smaller.
But what influences brain size to begin with? It’s a feature that is highly heritable among humans, suggesting that genes may play a role. That suggests in turn that such genes may also influence vulnerability to any number of mental disorders that are linked to brain size, above and beyond the genes that directly affect memory or language skills, for example.
So researchers involved in the Enhancing Neuro Imaging Genetics through Meta-Analysis (ENIGMA) Consortium — more than 200 scientists from 100 institutions worldwide — decided to figure out which genes are responsible for brain size (with the assumption that they would then predispose people to brain disorders) by combining two powerful techniques: genome-wide analyses of disease-related genetic variants and brain imaging.
The researchers looked at MRI scans of the brain structures of 21,000 people, both with disorders including depression, anxiety, Alzheimer’s and schizophrenia, or without these conditions and compared them to genetic surveys of the DNA changes linked to these disorders.
Even the researchers were surprised by how well the strategy worked: they found two genetic variants, one that appears to be associated with overall brain size and another that was linked to the volume of the hippocampus, or memory center, which typically shrinks in people with dementia.
“None of these changes on their own will give you disease,” says the study’s senior author, Paul Thompson, professor of neurology and psychiatry at UCLA Medical School, of the group’s findings, published in Nature Genetics. “But they vastly tilt the scales in favor of disease.”
People who had the genetic variant associated with smaller hippocampus volumes had shrinkage equivalent to about five years of aging, Thompson said, meaning that whatever degradation in brain functions — memory, learning or attention — that occur with aging would be accelerated. That’s even after accounting for the known factors that can affect brain volumes, including ethnicity, height and other physical attributes.
One copy of the gene variant conferred a 1.3% reduction in hippocampal volume, while two copies, one from each parent, doubled that shrinkage. With normal aging, the brain loses about 0.5% of tissue a year, but the variant that Thompson and his colleagues discovered sped up that process considerably, potentially making the person more vulnerable to developing age-related disorders, including Alzheimer’s.
“We know what the variant of this gene looks like — the carriers of this new gene look like their brains are five years older than they should be,” says Thompson. “This is a major genetic discovery that makes that much of a difference on a brain scan. We don’t yet know whether the loss of tissue tilts the sales to people to have increased risk of Alzheimer’s disease, but it gives you a very strong lead.”
The other variant the team isolated was related to overall brain volume and was linked to a 1.3-point change in IQ. The effect of the gene on IQ scores was small, but significant — enough to show up on an IQ test. However, the authors note that there are many contributors to brain size and IQ, such as a good education, exercise and other environmental factors, which would outweigh the effect of this single gene variant.
The idea is to use these two variants as a starting point for thinking about how to improve diagnosis and eventually treatment of brain disorders, says Thompson. With Alzheimer’s, for example, experts believe that people can use brain-boosting techniques like exercise, continuing education and social interaction to reinforce existing nerve networks and build up a cognitive reserve — like a savings account for the brain. As the brain’s networks start to deteriorate naturally with age, it can call on its reserves to compensate for the loss of tissue and still function reasonably well.
People with the genetic variants isolated in the ENIGMA study, however, may have a smaller reserve due to their genetically influenced brain structures, and may therefore be more vulnerable to any environmental factors, such as obesity or excessive alcohol consumption, that further reduces brain volumes. “We all experience slow erosion of the brain by an army of culprits,” says Thompson. “And that army includes your genes. The relief platoon includes how much you invest in exercise, a good diet and education. So those two forces are basically in opposition.”
What’s encouraging about the results is that they hint that brain scans can be a powerful indicator of gene activity, or a way of tracking how certain genes are functioning and possibly contributing to disease — well before any symptoms appear. “These findings are a very, very big lead for brain health,” says Thompson, “and they can help our understanding of what we might do to prevent brain decline.”
Source: http://healthland.time.com/2012/04/16/bigger-brain-and-higher-iq-linked-with-specific-genetic-variants
Staying socially connected is extremely important for our overall health, including our brain health. A 2019 review article published in the Journal of Alzheimer’s Disease found that various aspects of social isolation, including low levels...
Although it’s great to celebrate the big achievements, it’s also important to celebrate the small wins.
Women are affected by Alzheimer’s disease and other forms of dementia in much larger numbers than men. Approximately two-thirds of Canadians and Americans living with dementia are women. Why are women disproportionately affected? Partly, it...
The material presented through the Think Tank feature on this website is in no way intended to replace professional medical care or attention by a qualified practitioner. WBHI strongly advises all questioners and viewers using this feature with health problems to consult a qualified physician, especially before starting any treatment. The materials provided on this website cannot and should not be used as a basis for diagnosis or choice of treatment. The materials are not exhaustive and cannot always respect all the most recent research in all areas of medicine. | https://womensbrainhealth.org/think-outside-the-box/brain-size-linked-to-iq-and-our-risk-of-developing-alzheimers |
Why use this technique? Is it appropriate?
- We calculate percentage increase and decrease to show how much ‘increase’ or ‘decrease/loss’ there has been in a specific category over time.
- By working out the percentage change it is easier to compare the change in a category over time e.g. population change.
- Working out a percentage is much more understandable than looking at raw figures. It also means that data is more easily comparable. | http://resource.download.wjec.co.uk.s3.amazonaws.com/vtc/2017-18/17-18_2-2/_eng/unit03/02-Practice.html |
Becoming aware of the warning signs of learning disabilities and getting children the necessary help early on can be key to a child’s future.
Learning disabilities affect one in seven people according to the National Institutes of Health. Parents, therefore, need to be familiar with the early indicators of a learning disability in order to get the right help as soon as possible.
The earlier a learning disability is detected, the better chance a child will have of succeeding in school and in life. Parents are encouraged to understand the warning signs of a learning disability from as early as pre-school. The first years in school are especially crucial for a young child.
The most common learning disability is difficulty with language and reading. A recent National Institutes of Health study showed that 67 percent of young students identified as being at risk for reading difficulties were able to achieve average or above average reading ability when they received help early.
Many children and adults with learning disabilities remain undiagnosed and go through life with this “hidden handicap.” The resulting problems can lead to poor self-esteem, failure to thrive in school, and difficulty in the workplace. With early detection and intervention, parents can give their children the necessary skills for coping with and compensating for the learning disability.
All children learn in highly individual ways. Children with learning disabilities simply process information differently, but they are generally of normal or above-average intelligence. Having a learning disability can affect a child’s ability to read, write, speak, do math, and build social relationships.
Here you will find several early warning signs commonly associated with learning disabilities between the preschool years and fourth grade. Many young children may exhibit one or two of these behaviors; however, consistent problems with a group of behaviors is a good indication your child may have a learning disability.
Early warning signs: Preschool
- Late talking, compared to other children
- Pronunciation problems
- Slow vocabulary growth, often unable to find the right word
- Difficulty rhyming words
- Trouble learning numbers, the alphabet, days of the week
- Extremely restless and easily distracted
- Trouble interacting with peers
- Poor ability to follow directions or routines
Early warning signs: Kindergarten through fourth grade
- Slow to learn the connection between letters and sounds
- Confuses basic words (run, eat, want)
- Makes consistent reading and spelling errors including letter reversals (b/d), inversions (m/w), transpositions (felt/left), and substitutions (house/home)
- Transposes number sequences and confuses arithmetic signs (+, -, x, /, =)
- Slow recall of facts
- Slow to learn new skills, relies heavily on memorization
- Impulsiveness, lack of planning
- Unstable pencil grip
- Trouble learning about time
- Poor coordination, unaware of physical surroundings, prone to accidents
Common learning disabilities include: | http://www.interplaytherapy.com/signs-of-learning-disabilities/ |
This Legendary Director Served As Inspiration For Oscar Isaac's Ex Machina Character
Although the question of what it means for a robot to achieve true personhood isn't exactly a new question in science fiction, writer/director Alex Garland's "Ex Machina" handled it in a way that felt fresh and exciting. The unsettling, claustrophobic film followed computer programmer Caleb (Domhnall Gleeson) as he's hired to determine if Nathan (Oscar Isaac) has built a truly sentient humanoid A.I. As the movie continues, Caleb starts to increasingly sympathize with the robot, Ava (Alicia Vikander), and decides to help her escape, which backfires horribly.
As much as Vikander's nuanced, mysterious performance as Ava steals the show, it's the Nathan character that glues the movie together. He's deeply intelligent and passionate about his work, but he's also manipulative, creepy, has a bit of a God complex, and may have a few screws loose from his months of isolation from the rest of society. Although there is no clear-cut villain, his intimidating nature and the often cruel way he treats both Ava and Caleb make him feel like the closest thing to a villain the movie has.
When explaining how he came up with the look for Nathan, with the shaved head and the beard, Isaac explained to Moviefone that he was emulating one of the most famous directors in history. "To me, it gave a little bit of that Kubrick look, although he had the long hair in his later years," he said. "He had the bald head and the glasses and those big owl eyes."
Inspired by Kubrick
It wasn't just the aesthetic of Kubrick that Isaac took inspiration from. "I listened to some of his speech patterns, particularly when he was younger," Isaac continued. When asked why he was basing so much of his performance on Kubrick, he elaborated:
"For me, I just liked the idea of someone who was mysterious and powerful and incredibly smart and who I think is a genius. That's where I started — who do I think is a genius?"
Like Kubrick, Nathan in "Ex Machina" is brilliant at what he does. Nathan develops the world's most impressive and complex artificial intelligence so far, whereas Kubrick created some of the most widely celebrated films in history. His influence on the character feels fitting considering how much the movie feels inspired by Kubrick's work. In fact, Alex Garland even named "2001: A Space Odyssey" as one of the four sci-fi films that influenced him the most, telling IGN:
"'2001' just shows you the scale of the ideas you can get into in sci-fi if you want to. It has two massive things in it: an alien first encounter and probably the best, most involved and intelligent depiction of A.I. that's ever been in a film or any kind of narrative."
Kubrick's treatment of women
Also like Kubrick, Nathan's accomplishments are undermined by the way he treats the people around him. In order to get the best possible results from Caleb, Nathan spends the first two-thirds of the movie emotionally manipulating him just as much as Ava does. It calls to mind the stories of the way Stanley Kubrick treated Shelley Duvall on the set of "The Shining," emotionally abusing the actress to the point where her hair was falling out.
Although the point of Kubrick's treatment was allegedly to get the best possible performance out of Duvall, plenty of other horror directors have managed to get good performances out of their actresses without torturing them. The claim falls apart further when you remember that he never treated actors like Jack Nicholson or Danny Lloyd that way while making the same movie. As one critic put it, "Kubrick trusts [Nicholson] to play evil without being evil, but he didn't trust Duvall to play terrified without being terrified."
Ex Machina's catharsis
It feels like a smart choice to have a Kubrick-inspired antagonist in "Ex Machina," considering how interested the movie seems to be in gender dynamics. As many film critics have pointed out, male-coded A.I. in movies tend to betray their human masters (like HAL in "2001" or Auto from "Wall-E"), whereas female A.I. tend to comfortably serve humans without any real fuss.
Both Caleb and Nathan come to think they understand Ava and are capable of controlling and predicting what she's going to do. Nathan's treatment is more straight-forwardly controlling and egotistical, whereas Caleb is motivated by a desire to be her savior and protector. Both of them ultimately fail to fully understand where Ava stands on the bridge between human and A.I., and that's exactly what leads to her outsmarting them in the end.
For those still bitter about the treatment of Duvall on the set of "The Shining," or people who just don't like Kubrick's work in general, there's some catharsis to be found here in the tale of how a Kubrick-based character has the tables turned on him in the end. Whereas Kubrick's treatment of Duvall went without consequences (let alone any kind of apology from the man himself), Nathan's mistreatment and manipulation of both Ava and Caleb blows up in his face hard. As Isaac put it, "When the tables do finally turn, it's really rewarding." | https://www.slashfilm.com/814810/this-legendary-director-served-as-inspiration-for-oscar-isaacs-ex-machina-character/ |
Thrush in the mouth can not be ignored, because it is in newborns with insufficiently formed immune system, can cause many problems. If you find the first symptoms of the disease, you should visit the pediatrician who will prescribe treatment. More often it consists in the use of antifungal solutions, ointments and suspensions. For example, flucanazole or clotrimazole. They are applied to areas of inflammation cleared of plaque.
The affected areas are treated with a solution of nystatin. You can cook it yourself. You should knead Nystatin tablet and dissolve it in boiled water. The solution is applied to the mucous membranes of the mouth and tongue of the child with a cotton swab. It is necessary to carry out the procedure 3 times a day.
For cleansing the affected areas it is recommended to use a solution of baking soda – 1 tsp. per cup of water or 1% peroxide solution. They should be moistened with a bandage wrapped around a finger or a piece of cotton, and then remove the white patina. Procedures must be given every 3 hours. With superficial and initial forms of thrush in newborns, such a cleansing may be enough to get rid of the disease.
One of the common problems in newborns is thrush. Contrary to the name of the disease, it is not associated with milk. It is based on yeast-like fungi called Candida. They cause white plaque in the mouth, which resembles milk residues.
Causes of thrush in newborns
There are small amounts of candida in the body of each person. While the body works without failures and immunity is at the proper level, they do not affect health. The disease begins with the rapid growth of fungi, which occurs when the body’s defenses are weakened.
In newborns, the immune system is only being formed. In this he is helped by the mother’s milk, with which he receives most of the immune cells. But besides this, the child usually borrows from the mother and the fungi that enter his body at birth or when fed. Candidates can “get” a crumb from other people, with a kiss or a simple touch, as well as from objects to which he touched.
Pathogenic fungi after they enter the body may not manifest themselves for a long time, but some factors can provoke their growth and cause thrush in children.
These include:
- weakening of immunity;
- teething. As a result, the child’s body is under stress, and its main defenses are directed to this process;
- mode change. It is also a stress for the baby;
- antibiotic use;
- trauma to the oral mucosa;
- frequent regurgitation. An acidic medium forms in the oral cavity, which is favorable for the growth of the fungus;
- non-compliance with hygiene rules.
More often sick and harder to carry thrush babies who are on artificial feeding, as they are not sufficiently strong immunity.
Thrush Symptoms
The presence of thrush is easy to determine visually. With the disease on the child’s tongue, gums, palates and cheeks, white specks or formations resembling cottage cheese are formed.
It is easy to distinguish them from the remnants of food. To do this, gently wipe the spot with a cotton swab and under it you will find an inflamed, reddened area.
At the initial stage, the disease does not cause anxiety. With the development of thrush the baby becomes capricious, his sleep worsens and his appetite is disturbed. Some babies may even refuse to eat, as sucking causes pain. | https://osvilt.com/mother-baby/treatmush-in-newborns.html |
The Ancient Somali History
(A research and collection made by Wikipedia encyclopedia) – Somalia has been inhabited since the prehistoric (paleonlithic) period. Cave dating said to date back as far as 9,000 BC have been found in the northern part of the country. The most famous of these is the Laas Gaal complex, which contains some of the earliest known rock paintings and descriptions on the African continent.
Descriptions have been found beneath each of the rock paintings, but the archaeologists have so been unable to decipher this form of ancient writing during the Stone Age. The Harghesian culture flourished here with their respective industries and factories.
Laas Gaal (Laas Geel) is a complex of caves and rock shelters in Somaliland famous for their rock arts. The caves are located in a rural area on the outskirts of Harhgeysa, and contain some of the earliest known cave paintings in the Horn of African continent.
In general, Laas Geel’s rock art is estimated to date back to somewhere between 9,000-8,000 and 3,000 BC. Laas Geel site contains caves sheltering about 10 rock alcoves decorated with Neolithic cave paintings. The coves are located outside Harhgeysa in an area encompassing a nomadic village, the Naasa Hablood hills.
The site overlooks a wide district of countryside where nomads graze their livestock and wild antelope roam the vast landscape. The local nomads use the caves as a shelter when it rained and never paid much attention to the paintings. The site is now guarded by local villagers.
DISCOVERY
During November and December 2002, an archaeological survey was carried out by a French team in Somalia. The reason for this was to search for rock shelters and caves containing stratified archaeological in-fills and caves containing capable of documenting the period when production economy appeared in this part Africa (circa 5,000-3,000) BC.
During the course of the survey, the French archaeological team discovered the Laas Geel cave paintings, encompassing an area of 10 rock alcoves. The painting, in an excellent state of preservation, show ancient humans of the area raising their hands and worshiping humbless cows with large lyre-shaped horns.
However, rock art had been known to the local Somali people for centuries before the French discovery. Yet the existence of the site has not been broadcasted to the international community. In November 2003, a mission returned to Laas Geel and a team of experts undertook a detailed study of the paintings and their prehistorical context. There are a number of other sites around Harhgeysa with similar cave paintings.
The Somali Ancient History
The Somalian architecture, maritime history and military Strength.
Ancient pyramid structure, tombs and stone walls, such as the wagaade wall found in Somalia are evidence of ancient sophisticated civilization that once thrived in the Somali Peninsula. The findings of archaeological excavations and research in Somalia show that this ancient civilization had had a an ancient writing system that remains undeciphered and the people enjoyed a lucrative trading relationship with ancient Egypt and Mycenaean Greece since at least the 2nd millennium BC, which supports the view of Somalia being the ancient kingdom of Punt.
Some historical citations refer to the land that encompasses the present Eritrea, Maakhir and Alula town. The Puntites traded not only in their own produce of incense, ebony and short-horned cattle, but also in goods from other neighboring regions. According to the temple reliefs at Deir Bahari-the Queen Hatshepsut burial site in Egypt, the land of Punt was ruled at that time by King Parahu and Queen Ati.
Through wars and conquest, old city states are destroyed and new ones take place, and the ancient Somali timeline history is considerably long and fragmented.
Herodotus (the Greek historian) spoke of Macrobians, an ancient people and kingdom postulated to have been located on the Somali Peninsula during the 1st millennium BC. They are mentioned as being a nation of people that had mastered with the average Macrobian longevity till the age of 120. They were said to be the tallest and handsomest of all men.
Somalia at Medieval Period
Adal State, Ajuuraan State and Warsangeli State
The history of Islam in the Horn of Africa is as old as the religion itself. The early persecuted Muslims fled to Axumite port City of Zeila in present day of Somalia to seek protection from the Quraysh infidels at the court of Axumite emperor in modern Ethiopia. Some of the Muslims that were granted protection are said to have settled several parts in the Horn of Africa to promote the religion. The victory of Muslims over Quraysh in the century had a significant impact on Somalian merchants and sailors as their Arab trading partners had now all accepted Islam and the major trading routes in the Mediterranean and the Red Sea now became part trade network of Pax Islamica.
Through commerce, Islam spread amongst the Somali population in the coastal cities of Somalia. Instability in Arabian Peninsula saw several migrations of Arab families to Somalian coastal cities, who then contributed another significant element to the growing popularity of Islam in the Somali peninsula.
In the Northern Somalia, Adal, the present Audal state, was in its early stages as a small trading community established by the newly converted Horn of African Muslim merchants, who were predominantly Somali, according to Arab and Somali chronicles. The century between 1150 and 1250 marked a decisive turn in the role of Islam in Somali history. The Adalite then came under the influence of the expanding Horn of African kingdom of Ifat, and proposed under its patronage and the capital of Ifat was Zeila. The Adal sultanate was now a center of commercial empire stretching from Cape Guardafui to Hadiya
For many years, Mogadishu stood as the pre-eminent city in the Balad-ul Berber (the land of Berbers), which was the Medieval Arab term for the Horn of Africa. The Sultanate of Mogadishu became the center of Islam on the East African coast, and the Somali merchants established a colony in Mozambique to extract gold from the Monomopatan mines in Sofala. Following his visit to the city, the 12 century Syrian historian Yaqut al-Hamawi wrote that Mogadishu was inhabited by dark-skinned Berbers, believed to be the ancestors of modern Somalia.
Camel Domestication & Use
Ancient Somalis domesticated the camel sometimes between the 3rd & 2nd millennium BC, from where it spread to the ancient Egypt and North Africa.
In the classical period, the Somalian city states of Mosaylon, Opone, Malao, Sarapion, Mundus and Tabae all located along the Somali coast developed a lucrative trade network connecting with merchants from Phoenicia, Ptolemic Egypt, Greece, Parthian Persia, Sheba, Nabataca, and the Roman naval used the ancient Somali maritime vessels known as Beden to transport their cargo.
After the Roman conquest of the Nabataean Empire and the Roman naval presence at Aden to curb piracy, Arab merchants barred Indian merchaants from trading in the free port cities of Arabian Peninsula because of the nearly Roman presence. However, they continued in the port cities of the Somali Peninsula, which was free from any Roman threat or spies.
The reason of barring Indian ships from entering the wealthy Arabian port cities was to protect and hide the exploitive trade practices of the Somali and the Arab merchants in the extremely lucrative ancient Red Sea-Mediterranean sea commerce. These Indian merchants for centuries brought large quantities of cinnamon from Ceylon and the Far East to Somalian and Arabian commercial ports. This is said to have been one of the most remarkable secrets of the Red Sea port cities of Arabian and the Horn of Africa in their trade with the Roman and Greek world.
The Romans and the Greeks believed that the source of the cinnamon has been a Somalian product, but in reality, the highly valued produce was brought to Somali Peninsula by way of Indian ships through Somali and Arab traders. Indian/Chinese cinnamon also fetched high prices at North Africa, the near East and Europe, which made the cinnamon trade a very profitable for the Somali merchants through whose hands the large quantities shipped across to the ancient land routes. | https://mudug.com/2018/04/27/the-ancient-somali-history/ |
Monitoring drug target engagement in cells and tissues using the cellular thermal shift assay.
The efficacy of therapeutics is dependent on a drug binding to its cognate target. Optimization of target engagement by drugs in cells is often challenging, because drug binding cannot be monitored inside cells. We have developed a method for evaluating drug binding to target proteins in cells and tissue samples. This cellular thermal shift assay (CETSA) is based on the biophysical principle of ligand-induced thermal stabilization of target proteins. Using this assay, we validated drug binding for a set of important clinical targets and monitored processes of drug transport and activation, off-target effects and drug resistance in cancer cell lines, as well as drug distribution in tissues. CETSA is likely to become a valuable tool for the validation and optimization of drug target engagement.
| |
The East African Rift System defines the setting of most of Kenya's important internal (e.g., Lakes Nakuru, Naivasha, Baringo, Bogoria) and transboundary (e.g., Lakes Turkana, Victoria) lake basins. The lakes support ecosystems that are rich in birdlife, wildlife and aquatic macrophyte species, but the influent rivers have low species diversity. The lakes and rivers are valuable to the area inhabitants as they provide water and food for humans and livestock, food and nutrition from fisheries, materials for building and weaving, tourism and recreational services, and have aesthetic values. The lakes are, however, experiencing changing trophic status, and this is largely due to increased and in many cases unsustainable human activities within their catchments, including deforestation, large scale damming, excessive surface and ground water abstraction, pollution from agriculture and industries, siltation, livestock pressure and increased intensity of human exploitation of the resources. Some of the governance and management challenges that are recognised include: absence of institutional structures in some cases; differentiated capacities to manage the basins; inadequate or ineffective decision-support tools; inadequate levels of transboundary coordination; and_low and uncoordinated participation by stakeholders. This research explores these governance and management challenges using Kenya's internal and transboundary lakes as a case study, and examines how the Integrated Lake Basin Management (ILBM) conceptual framework, with its six fundamental pillars for governance improvement (institutions, policies, participation, technology, information, and finance) can be brought to bear to ensure sustainability of the lakes and their supporting natural and built infrastructure in the context of balancing conservation and development.
Related Content
Ecological Risks of Net Pen Aquaculture in North American and African Great Lakes: Can BMPs Be Shared?
A recent expert review of the ecological risks of net pen aquaculture in the North American Great Lakes made a number of recommendations for Best Management Practices (BMPs) that should be applied to establishment of net pen farms. Based on that_study, researchers identified nine generic BMPs that could be applied to all Global Great Lakes.
Earth System Model Predictions of Climate and Environmental Changes in Great Lakes Watersheds to the Year 2100
Earth system models are the only scientific tools yet developed that are capable of integrating the multitude of physical, chemical and biological processes that determine past, present and future climate. Researchers here use the Community Earth System Model (CESM) to generate depictions of environmental futures under climate change specifically to serve stakeholder needs for each of the major Great Lake watersheds.
A Century of Rainfall Variability and Recent Change in the African Great Lakes Region
The Great Lakes of Africa help to sustain the economies of several East African nations. Changes in the condition of these lakes is of great concern. The objective of this research was to examine long-term variations of precipitation in the Great Lakes region. Rainfall over the catchment was assessed for Lakes Albert, Edward, Kivu, Malawi, Tanganyika, Turkana, and Victoria, using gauge data. In most cases over 100 years of record are available. Assessments were also made for the region as a whole. TRMM satellite estimates of precipitation were also used to examine the years since 1998.
From Fishing Rights to Human Rights in the Lives and Livelihoods of Women Fishers in the Great Lakes Region
This research project analyzes gender-based violence in cross-border fish trade in the GLR using a human rights perspective. A human rights perspective provides an understanding of the socio-economic conditions facing women fishers in the GLR. Expanding on established research on fishing rights of marginalized people, this analysis highlights human rights issues that have been less documented: gender-based cross-border violence and threats to personal security in the GLR.
Hydrological Impacts of Ethiopias Omo Basins Development on Kenyas Lake Turkana
Lake Turkana is Kenya's largest lake, renowned as the worlds largest desert lake, with 90% of the lakes inflow provided by Ethiopia's second largest river system, the Omo Basin. The natural hydrological cycle of the Omo / Turkana ecosystem is being dampened by a cascade of major hydropower developments, and in addition, large-scale irrigation plantations downstream will exploit the regulated river flow, and thereby deplete the natural river inflows to the lake. Local people utilize the lake resources, living in harsh conditions.
Illegal, Unregulated and Unreported Fishing on Africas Great Lakes
Illegal, Unregulated and Unreported (IUU) fishing has been reported in many publications;_this_research project_provides an overview of the extent of IUU fishing on the African Great Lakes. Stock has been taken of fisheries regulations and legislations in the riparian countries to understand the diversity of the interpretation of illegal fishing operations. A summary has been presented of the regulations governing the target species of the different fisheries.
Lake Level Fluctuations, Ecological Attributes and Fish Productivity in African Lakes and Reservoirs
Hydrological regimes, including inter- and intra-annual water level fluctuations, are key drivers of productivity and structure in freshwater ecosystems in Africa, where inland fisheries are a vital source of income and protein. Using a synthesis of seventeen standardized food web models of thirteen African lakes and reservoirs, this study explored the relationship between inter- and intra-annual water level fluctuations and sixteen ecological attributes associated with ecosystem configuration, productivity and maturity.
Prognosis for Long-term Sustainable Fisheries in the African Great Lakes
The three largest lakes of the African Great Lakes system, Victoria, Tanganyika and Malawi, have distinctive fisheries and histories of fisheries management. All three provide essential and high quality food to their riparian populations and a range of other ecosystem services. Lakes Victoria and Tanganyika have highly commercialised and lake-wide, open-water fisheries. In Lake Malawi the commercial fishery is largely confined to the southern end of the lake, mainly exploiting demersal fish. Artisanal and low-level subsistence fisheries occur throughout all three lakes.
The Importance of Monitoring the Great Lakes to Assess any Change in the Extent of Water-Related Ecosystems Over Time (Sustainable Development Goal Indicator 6.6.1)
Indicator 6.6.1 tracks changes over time in the extent of water-related ecosystems. It uses the imminent date of 2020 in order to align with the Aichi Targets of the Convention of Biodiversity, but will continue beyond that date to align with the rest of the SDG Targets set at 2030. Whereas all ecosystems depend on water, some ecosystems play a more prominent role in the provision of water-related services to society. Consequently, one of the focuses for global monitoring of this indicator is lakes. | https://www.africangreatlakesinform.org/link/utility-integrated-lake-basin-management-ilbm-approach-case-study-kenyas-internal-and |
The USGS Comprehensive Sturgeon Research Program is a multi-year, interdisciplinary research study to determine factors leading to spawning and survival of the endangered pallid sturgeon and the closely related shovelnose sturgeon.
https://www.usgs.gov/centers/new-england-water/science/new-england-wsc-seminar-series-simeone-20190424
Forest cover is predicted to decline in the western US in the next century, due in part to increased hydraulic stress associated with climate change. There has been a large body of work done on adult trees in natural settings, but a smaller amount has been done on more vulnerable seedlings outside of the greenhouse.
Keep watching this page for more photos from our scientists!
https://www.usgs.gov/centers/pcmsc/science/impact-sea-level-rise-and-climate-change-pacific-ocean-atolls
Providing basic understanding and specific information on storm-wave inundation of atoll islands that house Department of Defense installations; and assessing the resulting impact of sea-level rise and storm-wave inundation on infrastructure and freshwater availability under a variety of sea-level rise and climatic scenarios....
Brook trout vulnerability to drought: eastern component of USGS national integrated ecohydrological research and monitoring plans
https://www.usgs.gov/centers/lsc/science/brook-trout-vulnerability-drought-eastern-component-usgs-national-integrated-0
There is a growing and urgent need to develop and implement innovative strategies to research, monitor, and manage freshwater resources as societal demands escalate simultaneously with climate-driven changes in water availability. Over the past several years, many regions have experienced extreme droughts, fueled by prolonged periods of reduced...
Today’s low-cost sUAS compatible sensors have built-in GPS that can provide raw imagery with an average geospatial accuracy of 8-12 meters which when combined with additional ground control, achieved by physical ground control points (GCP) scattered around the mission site, can increase data accuracy to centimeters.
Actual evapotranspiration, flash droughts, water deficits, reduced vegetative growth, and wildfires: the effects of seasonally water-limited conditions in a changing climate
https://www.usgs.gov/land-resources/land-change-science-program/science/actual-evapotranspiration-flash-droughts-water
The Southeastern U.S. experiences recurring hydrologic droughts, which can reduce water availability for human consumption and ecosystem services, leading to plant stress and reduced plant growth. This project examines relationships between drought and the water cycle in the Southeast with data from the Panola Mountain Research Watershed (PMRW)...
Shortly after the Great San Francisco earthquake of April 18, 1906, a sea level disturbance (tsunami) was recorded at the Presidio tide gauge station in San Francisco (the station is now located nearby at Ft. Point). What type of mechanism (earthquake...
https://www.usgs.gov/land-resources/land-change-science-program/science/mountains-sea-fluvial-transport-carbon-and
Stream transport (lateral transfer) of carbon remains a poorly understood flux within the global carbon budget. This research addresses the need to refine our knowledge of both provenance and transformations of Dissolved Organic Matter (DOM) as it moves from mountains to sea. Interpreting shifts in carbon quality with increasing stream...
https://www.usgs.gov/centers/lsc/science/a-hydrological-framework-improve-precision-vital-signs-metrics-appalachian
Stream flow is a fundamental driver of ecological structure and function, but its influence on bioassessment measures is poorly understood. Although extreme flow conditions (e.g., floods and droughts) have long been known to play a central role in structuring stream communities, a mechanistic understanding of the linkages between flow variables,...
https://www.usgs.gov/land-resources/climate-adaptation-science-centers/science/variable-warming-lakes-upper-midwest-and
Check out this webinar to learn more about how warming temperatures are affecting lakes in the Midwest and the fish they support.
Climate Adaptation Science Centers, North Central Climate Adaptation Science Center, Northeast Climate Adaptation Science Center
https://www.usgs.gov/centers/lsc/science/fish-locomotion-and-biomechanics-limiting-and-optimizing-factors-fish-passage
Swimming ability determines how well fish are able to access habitat, and is a fundamental design consideration for passing fish at dams, road crossings etc. The purpose of this study plan is to improve understanding of how fish are able to negotiate zones of high velocity and turbulent flow, such as are found in fishways, culverts, as well...
Ecosystems, Energy and Minerals, Environmental Health, Water Resources, Fisheries Program, Invasive Species Program, Leetown Science Center
DRAFT By Susannah Erwin, PhD April 15
https://www.usgs.gov/land-resources/land-change-science-program/science/effects-disturbance-and-drought-forests-and
Climate-related forest disturbances, particularly drought-induced tree mortality and large, high-severity fires from increasingly warm and dry conditions, are altering forest ecosystems and the ecosystem services society depends on (e.g., water supplies). Our research combines long-term place-based ecological data, diverse methods (e.g...
The GLRI Urban Stormwater Monitoring effort brings together the expertise of the USGS with local and national partners to assess the ability of green infrastructure to reduce stormwater runoff in Great Lakes urban areas.
Great Lakes Restoration Initiative, Ohio Kentucky Indiana Water Science Center, Upper Midwest Water Science Center, Wisconsin Water Science Center
Linking water, carbon, and nitrogen cycles in seasonally snow-covered catchments under changing land resource conditions
https://www.usgs.gov/land-resources/land-change-science-program/science/linking-water-carbon-and-nitrogen-cycles
Changes in snowpack accumulation, distribution, and melt in high-elevation catchments are likely to have important impacts on water, carbon, and nitrogen cycles, which are tightly coupled through exchanges of energy and biogeochemical compounds between atmospheric, terrestrial, and aquatic environments. Our research helps to better...
Mechanisms, models, and management of invasive species and soil biogeochemical process in prairie pothole wetlands
https://www.usgs.gov/land-resources/land-change-science-program/science/mechanisms-models-and-management-invasive-species
The ecological foundation of thousands of acres of wetland habitat is being impacted by changes in land cover, land use, climate, and invasive species. This project utilizes USGS remotely-sensed products, along with experimental and observational field data to develop spatially-explicit, landscape-scale models of invasive cattails and soil...
Significant change to the Arctic and sub-arctic water cycle is underway, impacting hydrologic and biogeochemical fluxes. In southcentral Alaska, glacier mass loss, changes to precipitation (including the rain/snow fraction), thawing ground ice, and vegetation encroachment will change both magnitude and timing of water and solute fluxes...
https://www.usgs.gov/land-resources/land-change-science-program/science/forest-health-and-drought-response
Forests provide society with economically important and often irreplaceable goods and services, such as wood products, carbon sequestration, clean water, biodiversity, and recreational opportunities. Yet hotter droughts (droughts in which unusually high temperatures exacerbate the effects of low precipitation) are projected to increase in...
The Minnesota Pollution Control Agency (MPCA) lists streamflow alteration as a key stressor on aquatic life in many watersheds. However, the MPCA currently does not have the information needed to quantitatively associate metrics from Index of Biological Integrity (IBI) surveys with metrics of streamflow alteration. We are using USGS... | https://www.usgs.gov/science-explorer-results?es=water&classification=science_project |
Your life is a direct product of your actions, beliefs, and attitudes which makes you directly responsible for everything that happens in your life. You live the life you chose to and the control may not seem direct, but in the long run you do have the power to direct your life in a specific direction. It happens with the choices you make and the attitudes you show against the adversities as well as the self-belief that you carry within you.
The key to success in living your life is self-reflection. Self-reflection is cited as the most important factor in attaining success by experts and spiritual. This is true for all the people are living a fulfilled and happy life.
Following are the 5 reasons you should self-reflect and lead a more fulfilling and a happy life:
Understanding of your own self:
When you self-reflect, you understand yourself at a deeper level. When you become aware of your weaknesses, you put more effort to improve and develop those areas of your personality. Becoming aware of the shortfalls compels you to have a strong sense of self-improvement,
Get a clearer vision:
Self-reflection helps you to get a clear vision of what you are moving towards. When you feel stuck, all you need to do is step back and gain a new perspective. You can pay attention to every minor detail and then understand what the whole concept is and what you need to do.
Allows you to avoid reacting immediately:
When you practice self-reflection, it gives you the time to wait before addressing something. You think about the potential ramifications of your actions and take stock of your feelings and emotions. This stops you from saying or doing something which you may regret later.
Better able to retain and recall information:
Studies have proved that when you self-reflect, you are better able to get a deeper level of learning and understanding. Even few minutes of self-reflection to integrate and think about what you have learned, can make a critical difference in your life.
Gives you more confidence:
Once you get a better understanding of your own thoughts and emotions, you understand what is working and what’s not. This will help you to think about your decisions and improve them. When you will see your decisions working, you will gain confidence and have more knowledge as compared to others. | https://www.beingguru.com/here-is-why-you-should-self-reflect-and-lead-a-more-fulfilling-and-a-happy-life/ |
For questions regarding order status and other after-sales support, log in to My Orders and click on the order you need help with. From the detailed order page, you can easily review order details, track order progress and request help by submitting a Customer Service ticket. We will normally respond to all tickets within 1 working day. | http://www.yidejewelry.com/help/contact-us |
Warm and curious creatures, the castorans find even the simplest of things fascinating. This fascination in things can lead a castoran away from the comforts of its river-side home, to venture into the vast world beyond. Many races consider the castorans to be naïve and easily-fooled, referring to them with derogatory names such as "buck-teeth" and "flat-tails", but they will always prove their diversity with their surprising strength, colorful imagination and master craftsmanship.
Physical Description
The castorans are most easily described as humanoid beavers, bearing the same large front teeth and strong, flat tails as those of their beaver cousins. They are naturally strong creatures, clearly visible in their arms and back, and are often hired by other races to act as bouncers or bodyguards. Their head is positioned slightly low on their body, and their neck is buried under their shoulder muscles and fur, making them appear to be crouched forward at all times. While their hands appear normal, yet clawed, their feet are webbed, enhancing their swimming. Lastly, their tails hang just above ground level. They appear to be flat and feeble, but they can be swung at great strength.
History
Castorans are native to the world and are said to have evolved from an ancient species of Beaver that were constantly hunted by men. Due to their disadvantage in being only critters, castorans are not plenty to this day. Originally preferring the comforts and safety of their own homes, castorans were once rarely seen, only sighted if one dared to come out of hiding. In the last few thousand years, however, they have grown more comfortable around the other races, and despite their ancient struggle, they have come to accept humans as friends as well.
Society
Due to their beaver ancestry, castorans are profound woodcarvers and carpenters. Castoran settlements, known as lodges, are most often built by rivers and are entirely made of wood carved from the trees in the area. Like beavers, the most infamous and remarkable of Castoran architecture are their dams, which they often build across heavy flowing rivers to control and divert the flowing of water into their lodge. They do not use tools to carve their wood but instead use their large front teeth to chip away piece-by-piece until they have their desired shape. If a lot of chopping is required, however, castorans often resolve to use saws or axes.
Castorans are a generous species and love to play host to guests, especially to members of other races. A dinner party at a castoran’s home is considered a splendid evening, known to offer plenty of food, intriguing entertainment, and enthralling conversation. Some find this ambition to be a downfall, however, as castorans can get easily wound up by the lack of quality at another individual’s event and may even take over if it is enabled. It is always assured, however, that if you have a castoran by your side, you need not worry about running low on rations.
Castoran Names
Castorans are given names at birth, and often pass names down from older to younger generations. Some castoran families even invent their own names for their children. Their family names are kept throughout life, opting to use double-barreled family names when married to represent their birth family and in-law family.
Male: Ronell, Habier, Boan, Trevor, Jann, Moe, Gustus, Fabien, Lommy, Edgur, Garlend, Rickel, Bolbur, Harris, Alvin, Peter, Wesley, Fidius
Female: Patsy, Tarline, Roslyn, Harley, Jasmin, Kaylin, Daneille, Idris, Wanda, Mysley, Ella, Lorna, Kathelin
Family Names: Heisenberg, Rastley, Ottercop, Harvendown, Dale, Damson, Pettingrew, Warren, Coastley, Fryer
Castoran Traits
Master craftsmen of wood and profound house guests, these beaver-like humanoids share similar traits to their critter cousins.
Ability Score Increase. Your Charisma score increases by 2, and your Strength score increases by 1.
Age. A castoran reaches adulthood at the age of 18 and lives to be around 90 years old.
Alignment. Most castorans are Chaotic Good, looking to help whenever they personally believe something is wrong. They can get caught up in the adrenaline when things are exciting and sometimes cause more harm than good, but they are quick to correct whatever fault they have caused.
Size. Castoran stand between 4 and 5 feet tall and average at about 150 pounds. Your size is Medium.
Speed. Your base walking speed is 25 feet. Your speed when swimming is 30 feet.
Darkvision. You can see in dim light within 60 feet of you as if it were bright light, and in darkness as if it were dim light. You can't discern color in darkness, only shades of gray.
Keen Senses. You have proficiency in the Perception skill.
Natural Swimmer. Accustomed to life by the river-side, you have a swimming speed of 30 feet and can hold your breath for twice as long.
Tail Weapon. As an action, you can swing your tail at an enemy within 5 feet of you. Make a melee attack roll against the target, if successful, the target takes 1d4 + your Strength modifier in bludgeoning damage and must make a Strength saving throw equal to 8 + your Strength modifier + your proficiency bonus. If they fail they are knocked prone. Targets whose size is bigger than Large automatically pass the save and Large size creatures have advantage on the save, while Small and smaller creatures have disadvantage.
Wood Master. You have proficiency with the Carpenter’s tools and Woodcarver’s tools.
Languages. You can read, write, and speak Common and the language of whichever race’s town or city your home river runs into. For example, if your river runs into a Dwarven town nearby, you will have picked up the Dwarven language, or if your river runs through an Elven city in the forest, you will have picked up the Elven language. | https://www.dandwiki.com/wiki/Castoran_(5e_Race) |
Common Mistakes when Implementation Biometrics Based Systems
In today’s modern society biometric identification is integral to improved security and information management in both private and government applications to reduce risk and improve business efficiencies.
The 1st step in implementing a biometrics solution is been able to select a suitable biometric system meeting predefined criterions. It is important to understand not just the differences between the biometric systems, but also which factors are the most importance for a particular environment and target population. There are quite a large number of biometric technologies and applications out there. For example, usability may be more important than uniqueness for clocking into an engineering plant, whereas uniqueness is likely to be the main consideration in a corrections facility. The factors to consider are:
Universality – How common is the biometric characteristics? Every individual accessing the application should possess the trait. For example, signature biometrics might not be suitable for illiterate users who may not be able to sign. Similarly, a biometric system may not be able to acquire meaningful biometric data from a subset of individuals resulting in a failure to enroll (FTE) error. For example, a fingerprint system may fail operate on some individuals due to the poor quality of their fingerprints.
Uniqueness – It is desirable that the given trait is sufficiently different across individuals comprising the population. It is critical to understand how similar a biometric characteristic is to that of others and therefore how likely it is to be mistaken for another? One of the most common biometric questions is that of uniqueness, how unique is a human face, human fingerprints or DNA? Such a measure is important for biometric system vulnerabilities, especially as a measure of the strength of cryptosystems and for privacy measures.
Permanence – It is desirable that the biometric trait of an individual is sufficiently invariant over a period of time with respect to the matching algorithm. Therefore it is vital to understand to the extent to which the trait remains unchanged over a lifetime. For example, signature biometrics might low permanence, as the handwritten signature tends to vary along time and vulnerability to direct attacks using forgeries.
Collectability –It is desirable that the biometric trait can easily be captured using suitable devices that do not cause undue inconvenience to the individual. For example, face recognition might be convenient for recognizing suspected criminal from a distance by the authorities while retina scan would be inconvenient for the policy. It is important to further understand if the biometric technology will operate indoors where lighting, temperature and other variables are controlled, or outdoors where things are more variable.
Performance – It is desirable that the associated technology is robust in terms of speed. Different biometric technologies can perform human verification at different speeds. In addition, a biometrics system operating in verification mode is significantly faster than a similar system operating in identification mode. See previous articles for reference.
Acceptability – Individuals in the target population that will utilize the application should be willing to present their biometric trait to the system. It’s important to be familiar with the target population who’ll be using the biometric solution. For example, are they members of the general public with a mix of ethnic and education levels and a variety of attitudes?
Circumvention – How likely it is that a person could find a way around the technology and therefore achieving unauthorised access? This requires a good understanding of the False accept and false reject rate which was introduced in the previous articles.
More information on the implementation of biometrics based solutions can be requested from [email protected]. | http://www.namibiabiometricsystems.com/?tag=selecting |
Benefits of homeschooling in bangkok
A child who is homeschooled does his schoolwork at home. This appears to be fairly self-evident, yet again we are taking a gander at the most key attributes of homeschooling. A homeschooled child doesn’t go to another area for their education, not a school, not a congregation, not in any case the place of someone else. While a homeschooled child may take a particular class somewhere else, the focal area of education for homeschooling is the home.
Benefits of homeschooling in bangkok
Third, homeschooling parents are answerable for the real conveyance of the educational material. While an outsider can be contracted for a particular theme, the parents clutch the last duty of the conveyance of the material. The parents ensure the child takes every necessary step, the parents ensure the work is evaluated, and the parents are responsible for the records of the child’s education. The parents can use outside assets to assist them with this assignment, yet the last obligation is with the parents.
Who Does the Teaching
A homeschool teacher can be any individual from the family; it doesn’t need to be a parent. A grandparent, kin, uncle, or cousin, just to give some examples potential outcomes, can be the teacher for a homeschool child. Having said that, typically the fundamental teacher of a homeschooled child is either a parent or a grandparent, for evident reasons (discipline, obligation, and so forth.). | http://www.lapecheronza.org/benefits-of-homeschooling-in-bangkok/ |
Policy support for CHP varies in accordance with historical developments. Most European district heating systems were initiated to exploit the inevitable and large heat losses from thermal power generation. Placing CHP plants near final consumers turned out to be a viable solution. Early examples of district heating can be found in Germany (Hamburg, Berlin, Dresden), Denmark (Copenhagen), France (Paris) and later in Sweden and Finland. In the 1970s, due to the two world oil crises, district heating became one of the most effective options to reduce oil dependency and consequently became part of the national energy policies, mainly in those countries that already had experience of it.
In Eastern Europe, national energy policies focused on reducing primary energy supply for electricity generation by using CHP and district heating, which were developed mainly on the basis of planning decrees. The transition to a market economy and the restructuring of the industries in these countries led to the decrease of energy consumption as a whole. Heat consumption in particular decreased dramatically. This drop in consumption was one of the main reasons why the district heating sector experienced a deep recession. Latest statistics show, however, that the trend has been stopped and the situation has been stabilized.
Industrial processes are also applications in which the heat from CHP plants can be used. Industrial heat demands are characterized by a diversity of temperature needs. Medium (between 100à‚—400à‚°C) and low temperature (lower than 100à‚°C) processes such as those in the chemical, pulp and paper, food and machinery industries can be supplied with heat from industrial CHP plants. Countries with industries that require processing that occurs at temperatures in the medium-to-low range tend to use CHP to meet heat demands. An important factor in the use of CHP as an energy supply for an industrial process is also the electricity consumption on site. The sector of industry that has the greatest use of CHP generation is paper, pulp and printing. The countries with the greatest CHP generation are the UK, Austria, Turkey, the Netherlands, Finland and Portugal.
Figure 1 shows CHP production in the European Union. It shows that 54% of electricity produced in CHP units originates in plants connected to district heating networks while the rest is produced in industrial CHP units. It also shows that 58% of the heat is used directly by industry and 42% is distributed to customers via public district heating systems.
|
|
Figure 1. CHP supply, public versus autoproducers, in the EU 25 Source: Eurostat
High CHP production in public supply plants is typical in countries that have well-developed district-heating networks. This is the case for almost all new Member States of the EU, but also in Denmark, Finland, Germany and Sweden, where more than half of the CHP electricity is generated in public supply plants. High CHP production in autoproducer plants is typical in countries which use the heat produced in CHP for industrial processes. The share of CHP from autoproducers goes up to 100% in Spain, Greece, Ireland and Luxembourg. The UK also has a high share of autoproducer plants (92%).
CHP/DHC and RES policies à‚— similarities and differences
EU Directive 2004/008/EC requests Member States to identify their respective potentials for high-efficiency CHP, to remove barriers to its expansion and to establish promotional schemes. The Directive, like other efforts in most countries, focuses on electricity output, while little attention is given to the need to incentivize the establishment of district heating infrastructures to ensure access to and exploitation of larger heat loads.
When looking at the type of policy measures used to promote CHP and at the similarities between electricity from renewables (RES) and heating (including district heating support schemes) the following categories can be identified.
|
|
Feed-in tariffs: These are the most common support mechanisms for CHP and they reward the amount of CHP electricity supplied to the grid. Usually, these mechanisms are structured in a similar way as feed-in tariffs for RES electricity: fixed tariffs for electricity from qualified CHP plants, a bonus on top of the market price for electricity or minimum purchase prices. However, support is often solely provided to small-scale CHP units, especially in Central and Eastern European countries, for example the Czech Republic, Hungary and Latvia. As a result, larger plants are discriminated against and the market is distorted. Also, for new plants, the size is often not determined by actual market conditions and heat loads. While being effective in the electricity market, feed-in tariffs cannot be applied as such to the heat market due to its complexity and to additional practical measures required by the distributed local nature of the heat market. Placing an obligation on the operator of a district heating grid is likely to severely hamper the competitiveness of district heating compared with individual heating technologies. An analysis carried out by the International Energy Agency (IEA) shows that, as an alternative, renewable heat certificates could be used to promote long-term structural changes as, for example, higher compensation could be set for certificates based on RES heat fed into DH.
Fiscal incentives: These include discounts or exemptions from taxes such as energy and environmental taxes or value added tax. A wide range of tax incentives exist. This type of mechanism can increase the competitiveness of the technology for which it is used. It is used in countries such as the Netherlands for CHP, and Finland and Sweden for CHP and RES-based CHP. In Sweden, Finland and Denmark, systems for energy tax and environmental tax ensure a good market position for district heating systems.
Investment incentives: Capital grants and tax discounts/rebates are provided for certain CHP investments or to the developers or owners of renewable heating installations. For CHP, this type of support is used in Denmark, Finland, Sweden, the UK, etc.
Purchasing obligation or guaranteed purchase of qualified CHP electricity is the mechanism through which CHP plants receive priority dispatch by system operators. The definition of qualified CHP is country-specific and includes criteria related to capacity and/or efficiency. This type of support scheme exists in countries such as Austria, Denmark, France, Germany and Italy. It is also used in most Central and Eastern European countries such as the Czech Republic, Hungary, Poland and Slovakia.
Obligation to consider heat use: For district heating, heat mapping and zoning has proven to be an effective instrument in several EU-15 countries to ensure that the most environmentally effective energy infrastructure is chosen from the outset when a new area of housing is being built. On the contrary, in many Central and Eastern European countries, district heating has to compete directly with natural gas systems which have been built in parallel. In these cases, unfair price regulation is likely to have disastrous effects.
|
|
A waste-to-energy plant at Kamp-Lintfort processes 221,000 tonnes of waste per year & generates electricity, heat & steam. photo: kreis weseler Abfallgesellschaft mbh & co. kg
The status of the CHP or RES market has a large influence on the level of support required. Furthermore, the structure of the national industry plays an important role in the development of these sectors. The infrastructure of district heating can enable the use of different technologies. Until now, the possibilities provided by this infrastructure as regards the expansion of both renewable and energy efficient technologies have received little attention from policy makers and are not consistently integrated in policy measures. Few countries cover district heating with specific laws, and even then support schemes are not necessarily foreseen. Denmark has had a district heating law since 1997, while Germany addresses district heating through secondary legislation. Croatia (new heat law with secondary legislation under consideration), Estonia, Hungary (new DH law) and Lithuania have developed heat laws. In Romania, a district heating law is under preparation while the strategy for the sector has been approved through secondary legislation.
CHP support schemes à‚— country cases
Netherlands
An interesting example regarding the development of CHP is the Netherlands, which showed substantial growth in this sector during the 1990s. About 30 PJ of primary energy was saved in a decade. The development took place within a supportive framework which included subsidies for investments, tax exemptions and the permission for distribution companies to exploit CHP installations. Furthermore, during this period, gas turbine technology enjoyed technical progress.
The investment support lasted until 2000, when it was replaced by operational support. Nevertheless, other developments also had a significant impact on CHP: the industrial sector became a more intensive chemical industry, which increased the primary energy consumption of the country and created heat loads for CHP industry as well as a decrease in the gas price. During this decade, the heat output from CHP grew by 30% and the electricity output by 100%.
Spain
The development of CHP took place in 1990. Today, CHP plants in Spain produce almost 20 TWh of electricity and 160 PJ of heat. The support scheme was mainly based on bonuses.
Germany
A law promoting electricity generation from CHP was passed in May 2000. The objective of the law was to support energy conservation and climate protection measures by means of CHP. The law mainly comprised regulations concerning payment for CHP electricity delivered to the grid. This CHP support law was a temporary solution and did not contain any efficiency thresholds or rules on how to calculate CHP production. A study concluded that the use of modern CHP systems ranks among the most cost-effective solutions for reducing CO2 emissions.
A second study looked at a longer perspective, and the government concluded that the study should result in a new law supporting CHP. The new law was issued in April 2002. It has a life of nine years and foresees rules for the certification of CHP production based on an efficiency factor. The CHP law provides support which will ensure the modernization of existing CHP plants and the building of small-scale CHP plants (of under 2 MW) and promotes the introduction of new technology such as fuel cells.
|
|
The law provides CHP plant operators with a certain security in planning, clear definitions, bonus payments and a timetable. The premium payments depend on the type and age of the plant, and decrease annually, being phased out by 2010. By 2007, the law supported the modernization of over 2 GW of capacity in the public energy sector alone.
Analysis conducted by the German government on the effectiveness of the law concludes that it has only been partly effective in terms of preservation and modernization of existing CHP. The current CHP law will be revised in terms of duration and support. A new law under discussion considers a target for doubling the share of CHP/DH.
Austria
The Austrian Eco-Power Act, in force since 2003, provides the support framework for CHP and green electricity (wind, sun, geothermal, hydroelectric power, biomass, landfill gas, sewer gas and biogas) in the form of a purchasing obligation and tariff support. The subsidies for eco-electricity are funded via an extra charge on the electricity price. This measure has also contributed to increasing the competitiveness for new biomass plants. As regards CHP, the feed-in tariff is related only to the electricity generated by CHP and not to the cogeneration process as such. More recently, an extension of the time support was rewarded to biomass and biogas units.
Furthermore, the increase of the RES-produced electricity’s share of power production will be supported by a subsidy provided to new plants by 2011. The volume of subsidy is E17à‚ million per year and is mainly allocated to biogas and biomass (30% for each technology), while 30% goes to the wind industry and 10% to other RES such as photovoltaics. The feed-in tariff will be reviewed every year and decrease over the period. The Eco-Power Act also lays down criteria for energy efficiency and minimum full-load hours for each type of technology. For biomass plants, heat recovery will be obligatory.
Additional support is provided to CHP biomass plants connected to district heating networks. Investments for installation of the heat extraction part are subsidized depending on the ensured heat extraction with 15%à‚—30% of the investment cost.
Central and Eastern Europe
Usually, the support schemes used are mainly purchasing obligations for the electricity produced in CHP plants combined sometimes with tariff support, especially for small and medium-size capacities. For example, in the Czech Republic, CHP electricity is purchased for the market price plus an additional regulated price. Every heat producer considering the construction or reconstruction of a heat source larger than 5à‚ MW must determine whether CHP technology can be used, as must electricity producers for capacities over 10 MWe. In the case of gas turbines, this obligation starts from 2 MWe and with engines from 0.8 MWe. The potential of different CHP technologies is assessed, and the main development has been identified as related to DH.
Conclusions
There is a correlation between the type of preferred support scheme used in a country for CHP and RES electricity. For example, the feed-in tariff combined with a purchasing obligation is the preferred measure in Austria and Germany, both for supporting CHP and RES electricity. A similar situation is encountered in Central and Eastern European countries which use the purchasing obligation combined with bonus/feed-in tariffs for small CHP capacities and RES electricity (for example the Czech Republic, Hungary, Latvia). Nevertheless, the feed-in tariff is extensively used as a support scheme for RES electricity even in countries which do not apply this type of support for CHP. Sweden and Finland prefer fiscal/capital incentives, while the Netherlands and the UK use capital and fiscal incentives.
The effect of the support measures depends on many factors, such as the level of financial support, associated institutional capacity, time frame of the support, economic conditions.
Many countries already had established support policies/schemes for the development of CHP units à‚— even before the CHP Directive entered into force. For some other countries, the requirements to transpose the directive into the national legislation constitute a driver for enhancing CHP development. This is the case of Central and Eastern European countries with large capacities of installed steam CHP plants and which have started to shift to new technologies, implying smaller capacities.
Sabine Froning is Managing Director, Euroheat & Power, Brussels, Belgium.
e-mail: [email protected]
Norela Constantinescu is a Project Officer with the same organization. | https://www.powerengineeringint.com/decentralized-energy/district-energy/chp-support-mechanisms-in-different-countries-from-feed-in-tariffs-to-investment-incentives/ |
There are many different approaches to learning and studying which may suit your child more or less. It is important to learn which learning method suits your child the best and to help them perfect it.
Your child’s school plays an important role in determining, developing, and advancing your child’s learning style. If you feel like the school isn’t doing their best, you can consult Pacific Coast Advocates, an organization aimed at helping families with special needs children resolve problems with schools and school districts.
What Are Learning Styles?
There are numerous ways one can adopt some knowledge, depending on their aptitude, abilities, and motivation. These learning styles are correlated to different scores in the multiple intelligences tests. According to the modern interpretation, there are seven different intelligences which work in unison.
Depending on the degree one has developed a certain facet of intelligence, it will be easier or more difficult to adopt a certain learning strategy.
Auditory Learners
There are some students who adopt a lot of the knowledge just by listening to the information spoken to them once or several times. These learners generally don’t like writing as much and should be encouraged to learn to play an instrument if possible.
Remembering things comes to them better when it is in a form of a song or a rhyme, which can be an effective way to create reminders and learn in general.
Visual Learners
These learners focus primarily on the images and diagrams to learn just about anything. They have no problems visualizing objects and potential future outcomes, which is a useful skill.
Colors can be a great ally for these students, so they ought to try to incorporate as much color coding as possible.
Linguistic Learners
These learners are skilled at using words, both in written and in oral form. They typically enjoy reading and may attempt writing themselves.
These learners are very good at remembering words and mnemonic devices, which may be the easiest approach to learning for them. Writing down things that they need to remember is also particularly effective and very useful.
Kinesthetic Learners
Also known as physical learners, these learners like to use the sense of touch to experience the world, i.e. they like practical work a lot more than theory. When communicating their ideas, these learners will use a lot more gestures than other learner types.
These learners typically don’t like sitting for extended periods of time and enjoy acting out scenarios which helps them cement their knowledge and confidence.
Logical Learners
Also known as mathematical learners, these individuals are good at recognizing patterns and discerning how things work. They are also very good with numbers and calculations, which helps them be systematic and precise.
These students can apply their analytical skills to tackle just about any problem, which makes them really versatile and successful learners.
Social vs Solitary Learners
Until now, the main focus of this division was the sense which is dominantly used to learn. However, there is another important aspect to consider – whether the learner is more comfortable participating in group learning, i.e. a social learner, or if they prefer gaining knowledge on their own, i.e. a solitary learner.
Combinations
More often than not, your child will associate with more than one style of learning. Most students find themselves somewhere in the combination of two relatively similar learner types, like auditory and linguistic or kinesthetic and visual. This can help them in learning, as they can employ more different strategies for learning different subjects.
Teachers need to take into account the strengths and weaknesses of all individual students in order to give all children the equal opportunity to grow and learn. | https://wideinfo.org/help-your-child-learn-better/ |
Enketo web forms work on all devices since they open in regular web browsers and allow data collection online or offline. Generally we strongly recommend the latest version of all modern browsers; see here for more details on browsers working with Enketo.
Known issues with offline forms on iOS
iOS (running on iPhones and iPads) devices have several known limitations with using offline-enabled forms due to the Apple operating system platform. We strive to have the latest version of iOS fully supported.
- Offline data collection works in any modern browser. On iOS we only recommend Chrome or Safari.
- Version 9.x shows "NotFoundError: DOM IDBDatabase Exception 8". Solution: Close all Enketo tabs in your browser, then reopen the form. The error should now be gone forever.
- Version 9.3.1 shows "Attempted to assign to readonly property" when loading offline form
- Version 8.x shows "undefined is not an object (evaluating 'c.resources')". Solution: Update to latest iOS version
If data collection offline is not required and you are seeing an error on iOS, consider using the online-only version (https://ee.kobotoolbox.org/::ABCD) instead of the offline URL. | http://support.kobotoolbox.org/en/articles/592384-troubleshooting-enketo-web-forms |
The operational resilience of the financial services sector, and particularly the banking sector, has rarely been out of the news in recent years. How are senior industry leaders feeling as yet another operational failure hits the front pages? What is clear is that the impact of outages on consumers means industry, regulators and other policy makers are increasingly prioritising the topic.
At the heart of the regulators’ philosophy on operational resilience is a view that boards are responsible for ensuring the resiliency of their institutions but that senior individuals, in the form of senior manager function 24 (SMF24) should also be held to account for operational failings. The SMF24 has been in force as part of the Senior Managers & Certification Regime (SM&CR) for over a year now, so what impact is it having on the way firms manage operational resilience? How are firms approaching the role? What are the broader governance challenges around operational resilience? Below we set out some of our thoughts on these key questions based on our experience in working with banks and a recent roundtable we hosted with SMF24s for a number of leading financial institutions.
SMF24s have ‘responsibility for managing the internal operations and technology of a firm’. The scope of the role is clearly very broad and we know that many SMF24s find the potential scale of the issues they could be held to account for daunting. But our view is that the introduction of the role has had a positive impact in driving a greater focus on operational resilience across the banking sector.
While the impact of the role has been positive, SMF24s on their own will not be able to solve the problem. For firms to reach the level of resilience the regulators, customers, society and they themselves seek to achieve will require a concerted effort by all, from the boardroom down. The BoE/FCA Discussion Paper from July 2018 makes clear the importance of governance in addressing operational resilience and with a consultation paper expected to follow later this year broader governance is likely to remain a key theme for the regulators in the context of operational resilience.
The SMF 24 is unusual in that it was introduced into the SM&CR after the regime came into force and is the only role that may be split (rather than shared). Where the SMF24 is split, the PRA does not expect it to be split among more than three individuals.
The majority of firms have chosen to split the role- typically between the Chief Operating Officer (COO) and a Chief Information Officer (CIO) with overall responsibility for its internal operations and technology being assigned respectively. In light of the breadth of the responsibilities assigned to SMF24s splitting it is perhaps necessary, but splitting the role does give rise to some important questions in our interactions with our clients. For example does the fact that a COO may sit on the firm’s board but a CIO not, create a hierarchy of SMFs? Does a split between COO and CIO reinforce a silo between technology and ‘the business’? Are SMF24s able to ensure a firm’s strategy is properly informed by operational resilience considerations, particularly where strategic decisions may be made outside of the UK? In the event of a failure who will be held to account by the regulators?
What is clear is that for the renewed focus on operational resilience to have the required effect in firms senior leaders throughout the business need to embrace the philosophy of operational resilience and embed it in the processes that support them in delivering their commercial goals. Firms should ensure that accountability for operational resilience sits not just with SMF24 holders but also other key senior individuals throughout the firm, including those captured by the certification regime. In our discussions with firms we often find there are broader challenges in ensuring governance oversight of operational resilience. These include; ensuring adequate management information on key risks, getting the right skills and experience on boards and ensuring an understanding of the end to end processes which are required to deliver services.
It is inevitable that as a new requirement, such as SMF24, beds in that there will be questions around how it functions, but 15 months after its introduction our view is that the regulators made the right choice in bringing it into the regime. With the SM&CR applying to insurers from December 2018, the rest of the financial sector from the end of 2019 and the PRA’s SM&CR rules to EEA bank branches after Brexit, a much broader set of financial institutions and individuals will have to apply the requirement in future. For these firms, important lessons can be learnt from the experiences of the banks since late 2017.
All firms should consider how they can improve their approach towards the governance of operational resilience. In particular in ensuring boards and other key decision makers understand the end to end delivery of a critical business service and that risk information supports this understanding. Our experience of working with firms dealing with operational incidents shows gaining this understanding before a crisis event pays significant dividends. A customer-centric view of operational risk and resilience also allows board-level leaders to make better investment and risk decisions. For SMF24 holders, both current and future, there must a clear focus on clarity of responsibilities, how these are discharged and ensuring the right steps are taken to address risks in their area of accountability. | https://pwc.blogs.com/fsrr/2019/02/taking-accountability-for-operational-resilience.html |
How often do we researchers take time to reflect on our work and identify the key lessons that might be useful to others in the profession or considering entering it?
1. You never can do too much planning for a focus group.
The effort put into advanced planning for a group always pays out in terms of the overall quality of the output from the process. This includes such things as the most appropriate recruitment parameters, the content and flow of the discussion guide and the "external stimuli" that are used to elicit reactions from the participants.
2. Manage the recruitment process actively to be sure to get the right people in the groups.
Despite the good intentions of recruitment organizations throughout the country, the moderator has the ultimate responsibility for the quality of the respondents.
Because the quality of the output from focus groups depends on having the right people in the room, I decided years ago to invest in a full-time field professional to focus on this aspect. This enables me to concentrate on the actual focus group process, including developing the moderator guide, moderating groups and writing effective reports.
3. Dont prejudge the participants based on physical appearance.
I have found that the appearance of the people in the groups generally has little relationship to how effective they can be as participants. Further, a participants not having a great deal of formal education does not mean he or she does not have a great deal to say about a key topic being evaluated.
Clearly it is easier to conduct and watch focus groups comprised of attractive, articulate, educated people. But it is vital to realize that these characteristics are not necessarily critical to gathering useful information.
4. The best focus group moderators bring objectivity and expertise in the process to a project.
Specific product knowledge should not be an important criteria in selecting a moderator because a well-trained professional will take the time needed to learn enough about the topic being discussed to be an effective facilitator.
An effective moderator must be able to draw people out in a group environment, listen well, interpret the results of the sessions and communicate those results effectively to the clients.
5. Achieving research objectives does not guarantee a successful focus group project.
Some clients only view groups that educate and entertain as an effective research tool. Others have different research objectives that must be accommodated before they will feel the process was a success. These could include such things as the decor and comfort of the focus group facilities and the presentation of personally selected gourmet food for the client observers.
An effective moderator must be aware of these factors to have a satisfied client who will return.
6. The moderator and the client should coordinate their efforts at all stages of the process for the research to achieve its objectives.
For the moderator, this includes obtaining client input to the discussion guide and working with client organizations to develop the most effective external stimuli.
It also means regular communication between the moderator and the client observers who are watching a group from behind the one-way mirror. This should take the form of face-to-face discussions at regular intervals during the group, rather than random notes being sent into the room at the whim of a backroom observer.
Client observers need to be briefed about the most effective way to work with the moderator so that during the focus group session, minimal time is spent communicating the maximum amount of information.
7. Most client organizations conduct more focus groups than are necessary to achieve the research objectives.
It is not unusual for an organization to do eight, 10 or 12 groups in a series when four or six would be adequate.
There is no sure way to determine the optimal number of groups in a research program, but I generally find relatively few differences by geographic area.
So, I encourage clients to conduct as few sessions as makes them comfortable, with the caveat that it is always possible to conduct more if necessary.
8. One of the most important services a moderator can provide is a fast report turnaround.
Because of the subjective nature of focus groups, it is common for different client observers to leave with different interpretations of the most important information that emerged.
By giving the client organization a full report within three to five days after the group, the people who attended the sessions quickly gain the benefit of the moderators perspective so they can identify what they do and do not agree with.
In addition, each of the observers can use the moderators report to determine the common areas of agreement and disagreement. This is particularly important, as the ultimate findings and conclusions from the research will be distributed throughout the organization.
9. Client observers should be thoroughly briefed about the research objectives before the sessions start.
Although most people who observe focus groups understand the process and have watched focus groups from behind the one-way mirror before, it helps to review the goals of the sessions beforehand to ensure that all the observers are in sync with the objectives and the desired output.
This can help you avoid embarrassing last-minute surprises.
10. The most valuable service a moderator can provide is objective conclusions based on the interpretation of the research, without regard for what the client wants to hear.
It is easier to give clients good news that confirms their beliefs, but it is a mistake to try to sugarcoat conclusions so the client is not disturbed with the outcome of the groups. A qualitative research consultant must offer clients total objectively and honesty in order to provide the expected quality of service and professionalism.
This is one of the most important things a moderator can do for the client. Its probably the only one in which the moderator has a unique position because the client personnel who attended the sessions have their own internal agendas for the research that affects their interpretation of the research results.
Thomas Greenbaum is president of GroupsPlus Inc., a focus group research and consulting practice based in Fairfield County, CT. | http://www.groupsplus.com/pages/mn091498.htm |
The University of Sheffield is a world top-100 university and number one in the UK for student satisfaction in the 2014-15 Times Higher Student Experience Survey.
The Head of Procurement wanted two key outputs:
- Visibility of all non-pay spend; and
- An assessment of which categories or spend areas should be targeted as part of a new category management approach to procurement
The scope covered all non-pay expenditure at the University including Revenue, Capex and Grant monies.
A thorough spend analysis was completed using ProcHE categorisation. This was validated with the University.
Procura conducted interviews with the procurement team to gather context, assessed procurement capability and processes and completed a comprehensive opportunity assessment.
The spend analysis and opportunity assessment process had three key deliverables for the University:
- Spend analysis providing complete transparency of non-pay spend in terms of spend, categories and suppliers. The spend analysis also highlighted significant areas of spend not currently influenced by procurement
- Opportunity assessment highlighting 16 category initiatives for the function to target as part of it’s new category management approach. This included outline strategies and a prioritised workplan to deliver up to £4.4m of savings
- Capability assessment against Procura Standards of Procurement which highlighted a number of improvement areas across 6 key “enablers” of procurement.
Procura left the University with two headline recommendations: complete a cost reduction programme to deliver up to £4.4m of savings and a procurement transformation to address key enablers such as strategy, sourcing skills and the P2P processClick here to download a PDF of this Case Study
Please contact us for further details. | https://www.procuraconsulting.com/spend-analysis-opportunity-assessment-in-higher-education/ |
AbstractThe primary aim of this research is to develop and assess the innovative methods and techniques which are used to augment GPS using a variety of digital spatial data. It is well known that the use of GPS can be severely compromised by various error sources such as signal obstructions, multipath and poor satellite geometry etc., especially in highly built-up areas. In order to improve the accuracy and reliability of GPS, complementary data is often combined with GPS data for enhancing the performance of a standalone GPS receiver. Spatial data is one type of complementary data that can be used to augment GPS.
However, the potential of using various types of existing and newly acquired spatial data for enhancing GPS performance has not been fully realised. This is particularly true due to the fact that higher accuracy digital surface models (DSMs), which include buildings and vegetation, and digital maps, have only been made widely available in recent years.
This thesis will report on a number of experiments that used spatial data of various complexity and accuracy for enhancing GPS performance. These experiments include height aiding with different scale digital terrain models (DTMs); map-matching using odometer data, DTM and road centrelines; modelling and prediction of GPS satellite visibility using DSMs; and prediction of GPS multipath effect using DSMs and building footprints. These experiments are closely related to each other in the sense that GPS and spatial data are combined to provide value-added information for improved modelling and prediction of GPS positioning accuracy and reliability, for applications such as transport navigation and tracking...
Extensive fieldwork has been carried out to verify the developed techniques and methods. The results show that the accuracy of a standalone GPS receiver can be improved by height aiding using a higher resolution DTM and map-matching especially when the satellite geometry is poor. The mean error of single receiver GPS positioning for one particular dataset, on which the described map-matching algorithm was developed, is 8.8m compared with 53.7m for GPS alone. This work was carried out in collaboration with London Transport.
In terms of satellite visibility analysis, the results obtained from the fieldwork indicate that greater modelling accuracy has been achieved when using higher resolution DSMs. Furthermore, a ray tracing model was implemented in a 3D GIS environment in order to model reflected and diffracted GPS signals. The Double Differencing (DD) residuals were used to give an indication of the magnitude of the possible pseudorange multipath error caused by diffraction. A single-knife diffraction model was first implemented on 1m Light Detection And Ranging (LiDAR) DSMs, and verified by post-processing (i.e. large DD residuals occurred when the satellites are partially masked and unmasked by buildings), which indicate that GPS multipath prediction with LiDAR data and building footprints is feasible, and has the potential to offer greater modelling accuracy. | https://pure.southwales.ac.uk/en/studentTheses/gps-augmentation-using-digital-spatial-data |
Building with Nature is a knowledge-intensive practice. Water infrastructure is a tailor-made product that requires engineering expertise; and part of this expertise is still under development. All web pages of the BwN guideline outside of this governance section are meant to provide the new knowledge that is required for BwN projects. This governance subsection addresses the special governance challenges that are connected with working in an innovative and knowledge-intensive domain.
This chapter deals with knowledge issues in decision-making processes in general and specifically for BwN projects. BwN is an innovation on the brink of a break-through. Can an innovation process be managed, and if yes, how? It is helpful to know how innovation processes generally proceed and what factors can make the difference between a 'dead end' and a successful breakthrough of technology.
Read more
|BwN involves integration of different disciplinary domains, for instance morphology, hydrology, physics, ecology, technical sciences, social sciences. What challenges are resulting from such interdisciplinary projects?|
BwN projects require interaction with policy makers and other stakeholders. Conflicts of interests and misunderstandings can get easily out of hand. The use of technologies which still are under development cause uncertainties in BwN projects. Although project management will always be complex and in part unpredictable, guidance is provided how to understand and deal with these issues.
The present section addresses the following questions:
The section Examples illustrates how a project developer can handle knowledge and uncertainty issues in BwN-type projects, using the Sand Engine project case study as a concrete example where several aspects of these knowledge and uncertainty considerations have been tested. Finally, under References information can be found for further reading.
Knowledge can be functional in several ways. It is used to get the content right and it provides substantiation for legal procedures. Furthermore, knowledge can contribute to build up support for a project among actors and stakeholders and other parties involved (van Buuren et al, 2010). Knowledge plays an important role in different project phases. It provides a basis for:
In BwN projects, multiple functions are combined into one design: nature is integrated with infrastructural goals. This ‘functional integration’ is mentioned in policy documents and managements plans, but in practice implementation proves to be problematic and runs into barriers. Barriers originate among others from the fragmentation of policy fields. The field of water policy in the Netherlands, for instance, is historically an autonomous and isolated field, which complicates integration (Wiering and Arts, 2006). The challenge of BwN projects is realising functional integration in practice.
A further challenge in BwN projects is to deal with fragmented knowledge in decision making. Knowledge is often assumed to be inherently linked to a specific policy field. Consequently, functional integration requires integrating different knowledge domains. The relation between policy fields and knowledge, also known as a ‘knowledge arrangement’, is often neglected, although its relevance is clear. In functional integration the confrontation of multiple knowledge arrangements needs to be steered towards an integrated BwN design.
BwN-type projects often involve larger spatial scales and longer time horizons than conventional ones and hence, also more and possibly larger knowledge-related uncertainties and ambiguity.
The Guidance section addresses the following questions:
a) How to manage an innovation process?
b) How to manage interdisciplinary knowledge in BwN projects?
c) What to expect from knowledge in decision making processes?;
d) How to deal with uncertainties in a BwN project?
Knowledge is an important driver of innovation processes such as BwN. Insights form innovation studies can help to place the use of knowledge in BwN development in an economic perspective. Key aspects in managing innovation processes are
Read more
Technological Readiness Levels
BwN is a technology under development, and an innovation on the verge of a breakthrough. Many customers will prefer a technology that has proven itself. If a technology is new they will want to know exactly how new or how risky it is. The EU H2020 programme uses Technology Readiness Levels (TRLs) as indicators of the maturity of technologies. This indicator provides a common understanding of technology status and addresses the entire innovation chain. BwN technologies are often in the higher levels of this scale: TRL 6 and higher.
Organising the innovation process
Schumpeter was the first economist to identify innovation as an economic process. According to Schumpeter (1911) an innovator is an entrepreneur who is interested in creating something new that will improve the society he lives in. With an innovation the entrepreneur is able to gain a higher profit than the average producer. However, others will imitate a successful innovation soon, and only with repeated innovations the technological entrepreneur will be able to keep up the higher margin.
Theoretical models of innovation became more complex over time (Rothwell, 1992; Rothwell, 1994). Early models of how innovation takes place show a linear process: the technological push model.
Later models include market pull factors such as market needs, customer satisfaction, and risk analysis. In this model innovation does not start in the head of the entrepreneur, but in the market itself. Marketeers collect information about customer needs which can then be processed by designers. For an example see the innovation process model from Žižlavsky. In this model an invention is distinguished from an innovation: an invention is a new idea, a scientific discovery or a new technology, while an innovation is an invention that is integrated into economic and social practice (Diaconu, 2011; Žižlavsky, 2013). The model still shows the boxes from the previous models (from technology development to marketing) but has expanded this with things like learning and recycling.
Today consumers have gained more power through public product reviews. Producers have increasingly opened up to direct contact with customers. The newest model for innovation, therefore, is co-creation, in which customers are actively involved in the development of new products. See for example the coloured figure in which the technology has moved out of focus entirely.
Diffusion of innovations
The Diffusion of Innovations theory of E.M. Rogers (1962) explains how new ideas are adopted in a society. Not everyone responds the same to a new technology. Depending on personal characteristics people can be innovators, early adopters, early majority, late majority or laggards (see figure). BwN communications need to aim at innovators, early adopters or the early majority, depending on the Technological Readiness Level of a specific BwN technology.
Read more
For a BwN-er the message of these innovation models and theories is that innovation is not just about optimizing a technology, but also about understanding the market and about close contact with customers. Innovation can even be seen as a complex system requiring interactions with customers, suppliers, traders, competitors and various other public and private organizations.
Ingredients for successful innovation:
• A technological entrepreneur with a visionary idea based upon technical knowledge
• Exploring market opportunities for new/improved products and services
• Scientific and technological expertise for development and production engineering
• Targeting of different customer types based on the technological readyness level
• Innovation of production techniques, learning by doing.
• Learning by using and knowledge of customer perceptions for continous innovation
Innovation is not a linear process and successes are hard to predict. Even when a product is technically perfect, there is no guarantee that it is accepted by customers (Žižlavsky, 2013) Innovations also go through drastic changes in their lifetimes (Diaconu, 2011).
The strategies for the use of knowledge in BwN projects are based on the assumption that knowledge related to different policy fields needs to be integrated. Knowledge is assumed to be inherently related to a particular policy field, which is called a ‘knowledge arrangement’: actors, discourse, rules, regulations and resources affect the process of knowledge structuring and the other way around. This leads to knowledge arrangements with different perspectives, concepts and priorities.
Read more
Example of policy fields with different perspectives: the nature sector and the water sector both use the concept of ‘robustness’. For ecologists, robustness means a large nature area with a high biodiversity which is robust to disturbances. In the water sector robustness means a water body with few sensitive species so that the water body does not need too much maintenance (Veraart, 2016).
Knowledge arrangements are confronted with each other and interact in BwN projects. The strategy for using knowledge in BwN projects relates to this confrontation and interaction among knowledge arrangements. In the next section the ensuing enabling and constraining factors for realising a BwN design are identified.
Read more
Enabling and constraining factors for interdisciplinary work
Using knowledge from different policy fields requires bridging activities. While activities bridging boundaries between policy fields can help (enabling factors), they can also have an adverse effect by emphasizing existing boundaries (constraining factors). Demarcation of existing boundaries will not result in an integrated design. Inspired by the policy arrangement approach, the enabling and constraining factors are shown in the table below.
c) What to expect from knowledge in decision making processes
Conceptualisation of the knowledge-policy-interface
adapted after Turnhout (2007)
Knowledge use within projects results from interaction between the knowledge domain and the policy domain. This interaction results in context-specific knowledge ((Koppenjan and Klijn, 2004, In ‘t Veld 2000, Turnhout 2007). The figure represents a conceptualisation of this interface.
This section deals with
Knowledge perception in decision making
Different interpretations of knowledge emerge due to different perceptions by stakeholders, which can result in ambiguity. Each stakeholder may prefer a specific field of knowledge, methodology or research to be used. An environmental NGO, for instance, will be specifically concerned with effects on the ecosystem, while a flood authority may rather be concerned with the probability of flooding. Different parties may therefore value knowledge in a different way. Furthermore, tensions can emerge between different sources of knowledge. Some parties may prefer scientific or expert knowledge, developed by scientists and practitioners who strive for its general applicability and objectivity. On the other hand there is practical or lay knowledge, typically owned by local parties and based on experiences and local observations (Van Buuren et al, 2010; Hommes, 2008, Eshuis and Stuiver, 2005). Lastly, different disciplines may have different perceptions of knowledge. Research methods differ greatly between natural sciences and social sciences, for instance. The case study methodology, very common in social sciences, may not always align with the natural science approach of experimenting. The interaction between different disciplines is particularly relevant to Building with Nature projects, which strive for integration of functions. This includes opportunities, but also pitfalls, as discussed below.
Knowledge opportunities for decision making
Use of knowledge in BwN projects offers the following opportunities:
• Knowledge use leads to evidence based policy making and thus to effective solutions.
• Knowledge can lead to innovations which can be sold and implemented elsewhere.
• Social science can help to sort out conflicts.
The following strategies for realising these opportunities of knowledge in decision making are identified.
Cognitive and strategic learning are both needed to create a shared knowledge base (Hommes, 2008).
Knowledge pitfalls for decision making
The following pitfalls are commonly observed when applying knowledge in decision making processes:
d) How to deal with uncertainties in a BwN project?
|Uncertainty refers to an incomplete and unclear understanding of the system to be managed (Brugnach et al., 2008). More conservative scientific interpretations of uncertainty state that it relates to missing insights and facts concerning choices and their effects. Irrespective of its nature or magnitude, uncertainty can become an issue of concern if it jeopardises the success of an initiative.|
BwN-type projects have to deal with high levels of uncertainty. Firstly, no complete knowledge exists regarding the behaviour of the natural system considered. Secondly, BwN involves larger and more variable spatial and temporal scales as compared with traditional "hard" engineering projects. Thirdly, BwN requires an interdisciplinary approach, which implies that many phenomena and their mutual interactions, each inherently uncertain, need to be taken into account. Finally, uncertain contextual factors such as climate and weather conditions are 'driving forces' of BwN and are of paramount importance.
It makes no sense to deny these uncertainties, as they are inherent to the system and to BwN. It is better to deal with them by, for instance, considering different scenarios and introducing flexibility in the chosen solutions.
Not every uncertainty can be reduced by additional research. Some of the contextual factors, including human behaviour, are unpredictable. Modeling, though easily disputed, can support decision making, e.g. by exploring scenarios and uncertainty ranges.
Many decision makers do not like uncertainty, but they will accept uncertain information as long as the process remains manageable. Certainty has to be provided that, if things take an unexpected turn, measures can be reversed, or at least controlled through adaptive management.
In the literature, ambiguity is considered as a special type of uncertainty. It refers to a lack of clarity what the problem is and how it should be solved, due to the presence of multiple, equally valid knowledge frames (Dewulf et al., 2005; Brugnach et al., 2011; Brugnach and Ingram, 2012). As a consequence, multiple approaches and interpretations are promoted, and there are no criteria to distinguish between more and less valid interpretations of facts. In such situations, it is tempting for actors in the power game to question facts and knowledge, and to produce rivalry facts and knowledge. Stakeholders can hire their suppliers of knowledge to deliver knowledge that is gathered from their preferred perspective. Rivalry between governmental institutions sometimes also leads to a 'reports war' or 'dialogue of the deaf'.
Additional research usually cannot solve ambiguity. Mutual understanding is improved by dialogue and negotiation, and not by additional facts. Ambiguity can be an even more important issue for BwN than incomplete knowledge.
Following the definition of uncertainty provided above, a distinction is made between three types of uncertainty (Brugnach et al., 2008):
When identifying the most important uncertainties in a BwN project's development process, actors need to focus on the most important factors. These are the factors that can seriously hamper development, cause budget overruns or retrenchment, influence milestone decisions or even cause the cancellation of the entire project ("showstoppers"). Uncertainties in a project using BwN design principles are numerous, an inherent characteristic of this type of projects. Therefore, one should not be distracted by the many smaller issues, but focus on those uncertain factors that may become a major concern.
Beware that there is a difference between "true" uncertainty and perceived uncertainty. Some factors are "truly" uncertain, for instance because there is insufficient knowledge available. Other issues, however, can be perceived as uncertain by some actors, while there actually is sufficient knowledge available. Yet, both "true" and perceived uncertainties have the ability to influence project developments and are therefore equally relevant. Perceived uncertainty may be an ambiguity (e.g., different views about the level of certainty of a particular factor).
|Uncertainty has a meaning in policy development which goes beyond the classical scientific definition that uncertainty is just a 'deficit of knowledge'. In policy development, there are many stakeholders and actors, each with different backgrounds, values and beliefs. Therefore, multiple interpretations of an (uncertain) phenomenon are possible. As a consequence, ambiguity is often the most important type of uncertainty in BwN projects. More specifically, uncertainty becomes meaningful in policy development through its financial and social implications (e.g., swimmer safety around the Sand Engine). These are far more important than the unpredictability of weather conditions or a lack of knowledge concerning the behaviour of natural systems. BwN concerns projects with unclear temporal and spatial scales. Therefore, it is also difficult to determine which actors have to be involved in the project development process. This, in turn, can yield uncertainties if parties feel ignored and start objecting against the project.|
In the study of uncertainties in BwN project governance, no evidence was found that their size is important. No clues were detected in either documents or interviews that there is something like a maximum acceptable deviation or uncertainty bandwidth. Uncertainties are important if they have a potential effect on the success of a project. So: size does not matter: it is the (potential) effect of the uncertainties that counts.
Managing uncertainty is of major importance to BwN projects. The following general rules have to be regarded when choosing a strategy for coping with a particular type of uncertainty:
This is elaborated in further detail in the tool Visualising and managing uncertainty.
Actually, the attitude of people towards uncertainty and its acceptability needs to change in order to make BwN successful. People tend to prefer a command-and-control approach to water engineering, with hard structures such as dikes and dams, aiming at controlling the natural system and eliminating uncertainties. This suggests full predictability of the water system and a guaranteed future state of the system. However, water engineers know that the system they build is limited for economic reasons and the natural system is capable of extremes that go beyond that design.
Contrastingly, flexibility is an inherent characteristic of the BwN approach; this means that guarantees about the future state of the system involved cannot be given. Current policy practices cannot cope with high levels of uncertainty in projects / designs. One way to change this situation might be to increase the media exposure of BwN, so as to increase its visibility to the general public. Also, raising awareness of the problems associated with climate change may make the general public realise that the adaptability of BwN solutions may be a better way to cope with higher future unpredictability of the climate.
In the BwN projects analysed so far, ambiguity and social implications were found to be the most important uncertainties. This means that addressing the differences between the various actors and stakeholders offers perspectives for managing uncertainties in BwN projects. Participation and cooperation are keywords, negotiation and dialogue important tools.
Start managing uncertainty as early as possible in the project development process by stimulating participation and cooperation. This will prevent framing differences, and hence ambiguity. In the Sand Engine project, for instance, there was concern about the budget and whether dredging contractors would accept a relatively low price per m3 of sand. This potential problem was successfully coped with by early involvement of market parties, in order to prevent problems in a later phase.
Uncertainty can be a powerful tool in project development. Project opponents can use "the presence of high levels of uncertainty", or a specific "uncertain, dangerous issue" to object against promising initiatives. They may mobilise politicians that share their ideas, like in the Sand Engine case on the issues of swimmer safety. Furthermore, other experts can come up with new facts to support their case (beware: these facts can be false or subjective, but they may just as well be true!). Be prepared to recognise and further identify these problems and invest in addressing them. Avoid getting into the spiral of a reports war. Some opponents may have become so upset that they are not interested in the facts anymore, but just want to stop the project. Instead, aim at reducing the feelings of distrust and insecurity by paying proper attention to people’s concerns. Use stakeholder input as early as possible to prevent these adverse dynamics.
BwN initiatives will benefit from the following lessons and best BwN practices:
Uncertainties occur in almost every phase, but their influence on policy development is mostly indirect. Read more
Lesson 1:
Uncertainties concerning the technical aspects of a project, the project’s functionality and its effects on the ecosystem occur in almost every phase, but their influence on policy development is mostly indirect.
In policy development the emphasis is on the social implications of these uncertainties. Uncertainties tend to differ between project phases. Uncertainty management in a project should take this into account.
BwN projects, having both longer temporal and larger spatial scales are usually not yet taken into account in the policy development process. Read more
Lesson 2:
BwN projects have both longer temporal and larger spatial scales than traditional water engineering projects. Analyses from a governance perspective indicate that these scale differences are not yet taken into account in the policy development process of BwN projects.
Concerning uncertainty, focus among policy makers is on the short-term (disadvantageous) effects of the BwN projects, rather than on the long-term benefits. Short-term effects of the BwN project are inherently uncertain, meaning that it is ‘unfair’ to judge a BwN project on these characteristics only. Furthermore, communication should aim at increased understanding and negotiated acceptance of uncertainties in BwN water engineering projects.
A higher level of unpredictability requires a different approach to uncertainty. Read more
Lesson 3:
The higher level of unpredictability in BwN-type projects means that they require a different approach to uncertainty.
Current policy practices, however, are not accustomed to accepting high levels of uncertainty in projects / designs. Consequently, current strategies of coping with uncertainty are not likely to fit dealing with uncertainty in BwN projects. ‘Doing more research’, the usual response to uncertainty, is not an effective way of coping with the inherent unpredictability in a BwN project. Yet, performing social scientific studies into peoples concerns and perceptions might be a powerful instrument to manage the uncertainty in the social system that is related to the unpredictability of the natural system.
Lesson 4:
Use the media to expose the general public to the BwN philosophy.
For instance, establishing a clear link between climate change and the potential of BwN to provide sustainable solutions may increase the awareness of the general public that BwN solutions are really needed in the future. Furthermore, keeping up the speed in the policy decision process of a BwN project can be a key strategy to prevent endless discussions about uncertainty. Stress that monitoring and feedback enable finetuning and adjustments, if necessary.
Sand engine located in front of the Delfland coast,
August 2011
Building with Nature is a form of 'functional integration': combining nature and infrastructural goals in one design. The pilot Sand Engine Delfland is an example of a project (a dynamic, moving flood defence), in which multiple functions are combined: the projects aims at contributing to nature development, increased safety and recreation development. In 2011, this concentrated mega-nourishment was completed. From the perspective of knowledge arrangements, experiences are reported on
Enabling factors
Actors and coalitions
Rules and regulations
Resources
Discourse / the story about the Sand Engine
Constraining factors
Below we list a few constraining factors. It should be noted that certain factors may constrain functional integration, whereas they have a positive effect on other aspects on BwN. The ‘brains from Delft’ discourse (referring to the civil engineering expertise from Delft University of Technology), for instance, helped generating public support, but was a constraining factor in working towards an integrated approach.
Actors and coalitions
Rules and regulations
Discourse
| Uncertainty identification|
In the Sand Engine case, three uncertainties were identified as potential threats to the project (Van den Hoek et al., 2012). They were categorised as ambiguities, caused by the existence of multiple (equally valid) interpretations of the situation:
|Uncertainty management|
In order to cope with these ambiguities, the following strategies were followed: | https://publicwiki.deltares.nl/plugins/viewsource/viewpagesrc.action?pageId=132449080 |
We have 31 pairs of spinal nerves and they are named after the section of the spine they come out of.
- 8 pairs of cervical nerves (C1-C8)
- 12 pairs of thoracic nerves (T1 – T12)
- 5 pairs of lumbar nerves (L1-L5)
- 5 pairs of sacral nerves (S1-S5)
- 1 pair of coccygeal nerves (Co1)
Why do we have an 8th pair of cervical nerves if we only have 7 cervical vertebrae you ask? Well because we start at the top of the atlas and all the nerves are in between the vertebrae so the 8th pair is in between C7 and T1.
Note the difference between roots and rami (ramus is singular). The rootlets extend out of the spinal cord medially and combine to form roots. The roots combine to form the spinal nerve and then they split apart again and are now called rami (ramus for singular). The dorsal root is posterior to the ventral (front) root.
The dorsal rami innervate the deep muscles of the back for motor control, such as the erector spinae and also a horizontal strip of skin for sensory input.
The ventral rami in the thoracic region are known as the intercostal nerves. They run deep to the ribs and innervate the intercostal muscles and provide sensory input for the overlying horizontal strips of skin there as well as the abdominal wall muscles (motor) and skin (sensory). The innervation of the back, ribs, and abdominal area is shown here:
Nerve Plexuses
A nerve plexus is a network of nerves that seem to be tangled that mostly serve the limbs. Each network is a network of nerves that come together and then redistribute themselves out with a different distribution of nerves into the limbs. They are made from the rest of the ventral rami (that is, from other than the thoracic region that we haven’t talked about yet). Each end of each plexus contains fibers from several spinal nerves. The fibers from each ventral ramus travels along different routes so that each limb muscle receives innervation from more than 1 spinal nerve to have a backup plan in case of injury.
We have four plexuses: Cervical, Brachial, Lumbar, and Sacral
Cervical Plexus
This plexus is located underneath the sternocleidomastoid muscle (from C1 – C4). Most of the branches innervate the skin of neck and deep neck muscles. The Phrenic nerve (C3, C4, C5) gets special mention that innervates the top of the diaphragm (after traveling down through thoracic cavity, along either side of the heart). Note that if both phrenic nerves are cut or if the spinal cord is severed above C3, breathing stops.
The Brachial Plexus
This plexus gets contribution from the transitional area from neck into armpit (axilla) between C5 and T1. It provides almost all the innervation of the upper limb (this includes back and scapular muscles that control the limb). The organization of this plexus is also very messy. There’s mixing of branches and then a branching of branches and then mixing again. Note how there’s divisions, trunks and roots.
Five nerves innervate the muscles of the arm:
- Musculocutaneous innervates the biceps brachii and some overlying skin. (C5, C6, C7)
- Median innervates anterior forearm muscles, some intrinsic hand muscles, and skin of lateral (anatomical position/toward thumb) palm. (C5, C6, C7, C8, T1)
- Ulnar innervates intrinsic hand muscles and skin of the medial hand. (C8, T1)
- Radial travels along radius and innervates Triceps brachii and muscles of the posterior compartment, and overlying skin. (C5, C6, C7, C8, T1)
- Axillary innervates the deltoid and teres minor, and overlying skin. (C5, C6)
The Lumbar Plexus
This plexus lies within the iliopsoas muscle and comes from between L1 and L4. The main branches innervate the anterior thigh. Smaller branches innervate some of the abdominal wall and iliopsoas muscle.
Femoral nerve — innervates quadriceps femoris muscle and overlying skin
Obturator nerve — innervates adductor muscles and overlying skin
The Sacral Plexus
The sacral plexus lies caudal to the lumbar plexus (stems from L4 to S4) and is often referred together withthe lumbar plexus as the lumbosacral plexus. The branches innervate buttocks, pelvis, perineum and lower limb (except for anterior and medial thigh).
Sciatic nerve, the largest nerve of the sacral plexus is actually two nerves wrapped in one sheath:
Tibial nerve (L4,L5,S1,S2,S3) innervates posterior thigh, posterior leg (lower leg), and intrinsic muscles of foot
Common fibular (peroneal) nerve (L4,L5,S1,S2) innervates muscles of the anterolateral leg (lower leg)
And that’s that! Look into the next article about dermatomes for a continuation of the spinal nerve discussion and find out what area of skin is innervated by which spinal nerve. | https://antranik.org/peripheral-nervous-system-spinal-nerves-and-plexuses/ |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.