content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Off-campus FIU users: To download campus-access content, please use the following link to log in to our proxy server with your FIU library username and password.
Non-FIU users: Please talk to your librarian about requesting this content through interlibrary loan.
Date of Award
Spring 4-13-2020
Degree Type
Thesis
Department
Biology
Abstract
Mosquito-borne diseases are incredibly difficult to combat due to the vast array of biological tools the mosquito has for finding humans and obtaining a blood meal. Numerous modalities mediating mosquito attraction to hosts have been investigated including vision, olfaction, hygrosensation, thermosensation, audition and mechanosensation. Out of these senses, vision is known to mediate both short range and long range attraction, and therefore deserves further exploration (Bidlingmayer 1994). In this study, gravid and non-gravid mosquitoes were both tethered and placed in a virtual flight arena to examine behavior in response to a wide-field pattern and a bar pattern. Mosquitoes were also analyzed under a microscope to establish average counts for the ommatidia. After each behavior experiment, the different treatment groups were compared using a two tailed unpaired t-test. The results showed that blood-fed status alone is sufficient to suppress the response of mosquitoes to a visual stimuli (p < 0.05). Furthermore, the count of the ommatidia number per eye was found to be for females and for males. However, to know the accuracy of these counts different methods should be used in parallel since there is disagreement over the average amount of ommatidia in the literature ranging from 200 to 800 for each compound eye of the mosquito (Hu 2013; Singh et al. 2013). By investigating these topics, we hope to gain a better understanding of mosquito behavior, particularly regarding the role of vision in navigation, host-seeking, and oviposition.
Recommended Citation
Ramon, Michael, "Visual perception modulated by blood-fed status in Aedes aegypti mosquitoes" (2020). Department of Biological Sciences - Undergraduate Honors Theses. 99. | https://digitalcommons.fiu.edu/bio_honors/99/ |
Supply Chain / Procurement Industrial Placement 2021
At Boeing, we innovate and collaborate to make the world a better place. From the seabed to outer space, you can contribute to work that matters with a company where diversity, equity and inclusion are shared values. We’re committed to fostering an environment for every teammate that’s welcoming, respectful and inclusive, with great opportunity for professional growth. Find your future with us.
The role
TLCS is a Sustainment programme for UK Chinook providing air system and component maintenance, technical and supply chain support to support the 60 UK RAF Chinooks on behalf of UK MoD, providing safety critical and performance capability enhancements, and major structural repairs. This role will consist of two six month rotations within Supply Chain Management and Supplier Management for the TLCS program based in Gosport.
First Six Months:
This role will start with six months in Supply Chain Management experiencing Asset Management, Planning and Demand Forecasting.
As an asset manager you will be responsible for day to day management of the spares required to fulfill the needs for parts on the maintenance lines, supporting aircraft output and contractual requirements as well as stretch projects such as continues improvement or implementation of new processes within the team/function.
Responsibilities:
-
Day-to-day support and management of assigned parts, liaison with internal and external customers of demand priority/criticality of a Programme in the UK.
-
Utilise reporting to address any actions. This includes, but is not limited to: New Buys, Excess Requests and Allocations. Analysing Target Stock Levels, Consumption Data and Condemnation Rates for individual parts.
-
Solve complex problems alongside a number of functions to develop and form the strategic supply chain approach for Through Life Contract Support Programme.
-
Work in alignment with contractual KPIs supporting key supplier activities, developing best practice to support effective contractual execution.
-
Supporting Risk, Issue and Opportunity, identification and project management for process improvements and cost reduction initiatives.
Working within the Supply Chain Planning Team, you will ensure inventory levels are correct and pre-positioned in the right place at the right time. You will be part of a small team of Data Analysts to review performance data against contractual KPIs and also input recommendations to prevent re-occurrence of shortfalls.
Responsibilities:
-
Review all inputs into the demand forecasting tool. Align part configurations to the Engineering databases and resolve any issues where necessary. Ensure that all forecasting inputs are up to date and accurate.
-
Ensure that all forecasts and target stock levels at all supported locations are regularly updated based on the latest demands rates, inventory changes and other changes over time.
-
Transform new work requirements, relevant to TLCS, into scope of work proposals, including all material and labor estimates and plans.
-
Daily support to monitor performance data for contractual KPIs, utilising Root Cause and Corrective Action (RCCA) techniques to investigate and identify solutions.
Second Six Months:
The second half of the year placement within the Supplier Management and Procurement function. As a Procurement Agent you will be responsible for Supplier management and key procurement activities for the Chinook program.
Responsibilities:
-
Supporting UK sourcing strategy
-
Negotiating pricing and terms
-
Stakeholder management
-
Preparing and issuing contracting documentation including raising RFQ, RFI’s and Purchase Orders.
-
Managing supplier and functional performance targets
-
Supporting Risk, Issue and Opportunity, identification and project management for process improvements and cost reduction initiatives.
Expected interactions across the role
The Intern will perform a role within the TLCS programme and will be interacting with all areas of the business such as:
-
Supply Chain Management
-
Supplier Management and Procurement
-
Operations
-
Key Suppliers
-
Customer Stakeholders
Requirements
Basic Qualifications (Required Skills/Experience):
-
Strong written and oral communication skills
-
IT proficient (particularly Excel, PowerPoint)
Preferred Qualifications (Desired Skills/Experience):
-
Studying towards a business degree, with interest or focus on supply chain
-
Strong analytical skills with a focus for detail
-
Drive and enthusiasm
-
Integrity and strong ethical values
Typical Education & Experience: | https://www.brightnetwork.co.uk/graduate-jobs/boeing/supply-chain-procurement-industrial-placement-2021 |
With up to 85% of a company's costs tied up in people (pwc.com), stakeholders looking to allocate investment dollars want to understand how management sees the company’s strategic and operational requirements. The SEC recently introduced new disclosure requirements designed to provide stakeholders insight into human capital—from the operating model, to talent planning, learning and innovation, employee experience, and work environment. The disclosures may help stakeholders evaluate whether a business has the right workforce to meet immediate and emerging business challenges and the nature and magnitude of the related investments. However, there are questions as to what is required to comply with the principle-based rules.
I am particularly supportive of the increased focus on human capital disclosures, which for various industries and companies can be an important driver of long-term value
In certain SEC filings, a public company will be required to disclose:
The rules do not include a definition of “human capital” or a list of required measures to disclose. The principles-based approach reflects an expectation that disclosures will be tailored to a company’s own business or industry using management’s judgment and that they may evolve over time.
We also are not adopting a definition of the term “human capital” ...because this term may evolve over time and may be defined by different companies in ways that are industry specific. This approach is consistent with the view expressed by a number of commenters that noted that there are many definitions of human capital and that the concept, while generally well understood, is often tailored to the circumstances and objectives of individual companies.
The new rules, which are part of the SEC’s broader project to modernize Regulation S-K, become effective November 9, 2020. As a result, 2020 Form 10-Ks filed on or after this date will need to include the new disclosures.
While every company will differ, these steps can help guide your approach.
Companies are evaluating which objectives or measures to disclose to comply with the principles-based requirements and meet investor and regulator expectations. SEC Chairman Jay Clayton noted that he “expect[s] to see meaningful qualitative and quantitative disclosure, including, as appropriate, disclosure of metrics that companies actually use in managing their affairs.” But beyond that general guidance, companies have broad flexibility. What should companies include?
Human capital resources, while not defined, may include employees, non-employees, such as contract workers, and others.
The rules require disclosure of human capital objectives or measures used to manage the business if material to an understanding of the business. Companies need to consider whether to include a qualitative objective and/or a quantitative measure in each area of human capital.
Companies are required to consider the measures used by management in running the business, which may include those reported in an enterprise-balanced scorecard, or board or executive reporting, or considered in executive compensation.
Companies might also consider what aspects of human capital have been previously communicated as being critical to the business, whether in public filings, investor and employee briefings, or other public statements. For example, companies may have included explicit references to their human capital resources in their proxy filings; environmental, social, and corporate governance (ESG) disclosures; as well as during shareholder engagement.
Various resources may also help companies focus on what investors and other stakeholders consider to be meaningful:
Lastly, companies might consider whether peer disclosures create an expectation for comparable disclosures.
The requirements are rooted in materiality. The SEC considers information material if there is a substantial likelihood that a reasonable investor would consider it important in making an investment or voting decision. This may be an appropriate benchmark in identifying which human capital measures or objectives are material to the business.
The new human capital disclosures should be supported by effective controls and procedures. For example, when included in the annual report, they will be subject to the company’s disclosure controls and procedures (DCP), but when included in other filings, such as registration statements, separate controls may be needed. As your company considers the appropriate controls over these new disclosures, questions could include:
Companies will need to periodically assess whether the human capital measures disclosed continue to be the most relevant for managing the business, update them when needed, and maintain the appropriate controls and processes. Effective and transparent disclosure of human capital initiatives will provide stakeholders with a new window into how a company manages its workforce. | https://www.pwc.com/us/en/cfodirect/publications/in-the-loop/sec-new-human-capital-disclosure-rules.html |
This blog has been distilled into an animation of less than 15 mins on the Aucademy YouTube channel.
Is identifying with social groups beneficial to people’s health and wellbeing? Whilst marking undergrad essays on this question back in 2020 – my mind began to wander, as it is prone to do, to Autistic things. Although my PhD was in the field of social psychology – attempting to reduce mental health stigma with the neurodiversity narrative – I had become so engrossed in my little sliver of the field I forgot about other social psychological theories and approaches. I researched the references my students were citing and made a short Twitter thread of my thoughts regarding the psychologically important difference between being a “person with autism” and an Autistic person. The difference between belonging to a stigmatised group, and the social cure properties of strongly identifying with an Autistic identity. In this blog I will expand on that Twitter thread, there are some important concepts that I won’t explain here, but you can link to this glossary. These issues have also been expanded in an invited chapter for the Routledge Handbook of Critical Autism Studies, titled: Autistic identity, culture, community, & space for wellbeing, due to be published September 2022).
What is in a name? The process of stigma
To be a “person with autism”, a person labelled – sometimes officially – with a medical disorder, means we as Autistic people are categorised into a certain box. Even before being diagnosed or knowing of our diagnosis our behaviours are called out as “odd”, “weird”, we are labelled “standoffish”, “cold”, “unapproachable” (see picture below). This labelled box – “person/people with autism” – is imbued with meaning, with values and assumptions that dictate practice (i.e., action; Prilleltensky, 1997).
This picture of Annette’s shoulder with words written in Sharpie permanent marker is a part of a performance piece Annette performed with other Autistic people in 2019. Annette bears three words used to describe Chloe throughout her adult life. These words “cold”; “standoffish”; “unapproachable” were internalised until Chloe discovered she was Autistic in 2016.
A case in point: Greta Thunberg. As well as receiving sexist, misogynistic attacks, Greta has been harassed, stigmatised, and infantilised for being “a person with autism”, receiving the sorts of comments Autistic people hear far too often, such as how Greta: is a “mentally ill Swedish child”; “deeply disturbed”; is a “girl [who] has a cyborg face that ignores emotion” (I will not link the original perpetrators of these insults, they are undeserving of the citations).
These insults happen for a reason. Largely they are a tactic to discredit Greta’s activism. What I am highlighting, however, is the content of the attacks, the narrative that is being told, and consequently what Autistic people the world over are hearing: a pathologising “othering” of our experience of and with the world. Our difference is used against us, embedded in a narrative that we are not normal, that we are abnormal, that we are disordered “people with autism”.
“But what’s wrong with stating you’re a person with autism – it’s what you are isn’t it? And we’ve been taught it’s polite to put the person first!”.
When someone insists that I am a “person with autism” they are telling me that they believe I “have” something that if science could eradicate would mean I would be “normal”. It is not non-autistic people’s fault, the “culture of autism” (Anderson, 2013), the dominant narrative – one of many, and not even the most persuasive – tells you, tells me, that I “have an autism spectrum disorder”. Break that phrase down. I “have”, not I am, but I have. I carry, I could theoretically put down autism. And this is offered as the preferred outcome, the ability to be removed from “my autism” because I am “disordered”. Disorder, illness, sickness – something attached to me, something not desirable, not meant to be there, without which I would be well, normal, “healthy”. Disordered because the language used to describe my experience and interaction with the world is one of deficit, where I lack “typical and normal functions” dictated by a faceless society and a faceless medical body. Where I was diagnosed under these criteria:
Autism as an abstract concept is defined as a persistent impairment in reciprocal social communication and interaction; restricted and repetitive patterns of behaviour, interests, or activities; all of which may relate to hyper-reactivity (avoidance) or hypo-reactivity (sense seeking) to sensory input – with or without accompanying intellectual disability and/or language impairment. (DSM-5; American Psychiatric Association, 2013; ICD-11: World Health Organization, 2019).
Belonging to a stigmatised group and internalising the stigma negatively affects psychological & physical health
The medical diagnosis in itself is stigmatising, it ignores any possible strengths and capabilities I and my fellow Autistic community members have. Yes, including those classed as “low functioning”, those with intellectual and language disabilities. We hear the words deficit, low and high functioning (like we are robots with cogs and gears that are functioning sub-optimally), social communication impairment, restricted behaviour – we hear we are the problem, the disordered person, and we internalise this narrative as self-stigma (Corrigan & Rao, 2012).
This happens because we are led to believe there is such a thing as normal, that anything that deviates is thus abnormal. Not different, not merely divergent, but disordered and abnormal. If the dominant narrative, those around you, the films and shows you watch, the books you read, the school you are educated at, the lessons you learn as part of the curriculum, the regulations in workplaces, and the people who employ you, the police, mental health services, diagnostic manuals – everyone – is telling you, you are wrong, you “have an autism spectrum disorder”, that you are thought of and treated as less than others, where you are infantilised, or feared, avoided, or detained – it makes it nigh on impossible to have a positive sense of self, a positive social identity based on the fundamental experiences one has of the world.
The language, the narrative, feeds embodied actions of those who are non-autistic – neurotypical, neuronormative – around us, and these become internalised. I belong to the category “people with autism”. This category is imbued with stigma – negative labelling (not all labels are negative); stereotyping attitudes; prejudicial affect; and discriminatory behaviours. Belonging to this category is isolating, depressing, hopeless. I am socially cursed by belonging to the category of “people with autism”. As you can imagine, both the public and internalised, self-stigma has a negative impact on one’s psychological and physical health.
As a population, “people with autism” experience greater traumatising experiences such as bullying (Cappadocia et al., 2012; Fisher and Taylor, 2016) and loneliness (Lounds Taylor et al., 2017; Orsmond et al., 2013). For being different, we are more likely to be victims of neglect and abuse (Griffiths, et al., 2019). We experience higher baselines of anxiety than neurotypical people (Crane, et al., 2018; Strang et al., 2012), greater rates of depression, and higher rates of suicidal ideation, attempts to die by suicide, and the greatest cause of death for Autistic people without intellectual disability is suicide, where our average age of death is a mere 58 years (Cassidy et al., 2014; Hirvikoski et al., 2016; Strang et al., 2012). We experience the same mental health concerns that affect non-autistic populations, but to a greater extent because of the link to greater rates of trauma (Griffiths, et al., 2019).
As a minority group, “people with autism” are likely to experience minority stress and stigma by virtue of non-adherence to societal norms and expectations. Simply put, as a minority, “people with autism” are different to what is expected of members of society, and so we are thought of and treated differently. This stigma leads to social disadvantages: as a minority, group members experience greater stress, and due to our standing in society we do not have the resources – social; psychological; material – to manage this stress (Botha, & Frost, 2020).
Protecting yourself from stigma vs protective power of belonging
However, one can protect oneself from this stigma to some extent via different means, e.g., distancing self from the group “I am not like those low [functioning] people with autism” or more closely socially *identifying* with the group *Autistic* so as to feel the effect of group protective properties, e.g., resources, peer support, meaning, belonging etc.”. And so, there can be a social cure (Jetten, et al., 2017).
There is hope if we identify with the social identity Autistic, connecting with Autistic Culture (autism is a reified, abstract construct, Autistic people, and our culture, less so). Connecting with the Autistic community we can learn a narrative that makes logical sense of our difference, that provides connection, not isolation. An Autistic community definition of autism defines our difference within the neurodiversity paradigm, where difference is difference, not less:
[Autism is a] neurodevelopmental difference, where Autistic brains work differently to non-autistic people. There are as many different brains and ways of experiencing the world as there are different bodies. There is a variety of Autistic people, just as there is a variety of non-autistic people, but all Autistic people share some similarities. These similarities include:
- differences in experience of the sensory world,
- differences in communication,
- differences in thinking, socialising and moving
Some Autistic people need support with day to day living, and within this perspective there is no one way to be Autistic. (Autistic Self Advocacy Network, 2020)
|
|
“Culture of autism”
|
|
Autistic culture
|· Person with the disorder “autism”
|
· Disease/disorder/illness
· Mental illness
· Problem/issue
· Challenging
· Violent
· Deficit/impairment
· Low functioning
· High functioning
· Severe/mild autism
· Pathological
· Symptoms
· On the spectrum
· Cure/treatment
· Intervention/strategies
· Risk of autism
· Special interests
· Awareness
· Researched on
|· Neurodiversity paradigm – difference, social models
|
· Focus on strengths, support for challenges
· Language and customs – Autistic identification
· Stimming language and activities
· Community
· Spaces and environments
· Positive symbols
· Fluctuating support needs
· Specialisations
· Shared commonalities (no spectrum, but existing in three-dimensional space; Farahar & Foster, 2019)
· Understanding and acceptance
· Research with, for, and by Autistic people
Table representing key components of the “culture of autism” versus Autistic culture.
Evidence is mounting that what is important for Autistic wellbeing is Autistic friendship, community, and peer support (Crane et al., 2018, p.10):
“I never realised everybody felt as happy as I do when I am around autistic people”: A thematic analysis of autistic adults’ relationships with autistic and neurotypical friends and family. (Crompton, et al., 2019)
The Autistic identity, the community, help start the process of removing the life-long pain of prejudice and discrimination for being different – we start to scrub off the Sharpie drawn tattoos, together. It hurts, it takes time, there is residue [Annette figuratively still has the sharpie residue: she will still apologise for her authentic Autistic interactions], but we can start to connect and heal.
Identity and authentic selves
I see the protective, social cure properties of community and space in my co-founded So, You’re Autistic? (Farahar & Foster, Home – about SYA?, n.d.) pre/post-discovery support programme, and University of Kent Autistics group. Our aims in these community spaces are to help students foster a positive Autistic identity, to deconstruct the pathologising “person with autism” narrative, and ultimately, help bring previously isolated Autistic people together to foster a sense of community. Creating these Autistic spaces (not non-autistic “person with autism” spaces) seems to encourage its members to be their authentic selves, without judgement. Encouragingly, we also see an improvement in wellbeing, with reductions in harmful stims (self-stimulatory behaviours that inadvertently harm), depression, and burnout.
Where before we were isolated by our belonging to the group “people with autism”, we come to embrace the Autistic identity, culture, community, and space – we are no longer alone, we are connected – connected by one word: Autistic.
Evidence is also demonstrating the protective properties of a strong Autistic social identity. For instance, Cooper et al. (2017) found that participants in their study who had strong Autistic social identities had greater collective self-esteem (for the Autistic community), which in turn predicted greater positive personal self-esteem, ultimately predicting reduced levels of anxiety and depression (which are high in the Autistic community).
Ultimately, Autistic identity, community, culture, and ideally space/s protects against the stigma of belonging to the group “people with autism”. This is why, regardless of whether you personally agree that I am a “person with autism spectrum disorder” or an Autistic person, strong identification with the identity Autistic has important and protective wellbeing properties.
And so, as you can see, a rose (Autistic) by any other name (“person with autism”) reeks of stigma – suffused with negative stereotypes, prejudicial attitudes, and discriminatory behaviours. Or, why it is more important for me to be respected as Autistic rather than a “person with an autism spectrum disorder”.
Thank you for reading.
Biography
Dr Chloe Farahar: late diagnosed, perpetually, enduringly, eternally, weird, odd, standoffish, but also beautifully, irredeemably Autistic. Dr Farahar is also an Autistic academic whose research interests revolve around her Autistic specialisations (not “special interests”). Her specialisations include: reducing mental health stigma with a neurodiversity script Stigmaphrenia© (Farahar, 2012); supporting Autistic people with her co-founded So, You’re Autistic? post-diagnostic support programme; reimagining the spectrum as a three dimension Autistic space; and educating both Autistic and non-autistic learners about Autistic experience in her training courses. She also may have been in Annette’s Adventures of Super Autie Gang (things we do for our friends!). | https://blogs.ucl.ac.uk/stigma-research/2021/06/25/a-rose-by-any-other-name-would-smellof-stigma-or-the-psychologically-important-difference-between-being-a-person-with-autism-or-an-autistic-person-by-dr-chloe-farahar/ |
Also found in: Dictionary, Thesaurus, Acronyms, Wikipedia.
traffic control[′traf·ik kən‚trōl]
Traffic Control
(in Russian, dispetcherizatsiia —introduction of a dispatcher system), the centralization (concentration) of day-to-day monitoring and coordination of the control over production processes to ensure harmonious operation of the individual units of an enterprise or group of enterprises for the achievement of the highest technical and economic indexes and the fulfillment of work schedules and production programs. Traffic control is intended to provide uniformity of the work loads of all units of the enterprise; the uninterrupted, smooth, and economical implementation of all processes of the basic production cycle; and the continuous operation of auxiliary and maintenance units. As a result of changes in the composition of the production output, adjustments in technology and methods of manufacture, and the different levels of program fulfillment by various workers and production units, and also in connection with stoppages because of equipment repairs and interruptions in the delivery schedule for materials, previously established proportions and rhythm are disrupted. The task of traffic control includes the regulation of the production process to reestablish the previous ratios and rhythm in the work of an enterprise or the introduction of new ratios and rhythm. Traffic control encompasses the regulation of technological processes; the monitoring and day-to-day distribution of transportation and material and energy resources; and the recording of the operation of machines and mechanisms; it also increases the safety and precision of transportation traffic. Since it helps to prevent idleness of equipment and losses of working time and assists in the implementation of orders on schedule, traffic control has a positive influence on the economic structure of production.
The simplest form of dispatcher control originated during the Industrial Revolution of the 18th and 19th centuries in conjunction with the transition from handicraft and semi-handicraft production to factory and plant production. Originally, the basic function of dispatcher control was the distribution of manpower, raw materials, and supplies and the inventorying of the finished product. With the development of large-series and mass flow production, the emergence of production links between related enterprises, the creation of large industrial and power associations, and the rapid improvement of transportation, traffic control became essential for the day-to-day regulation of an intricate complex of technological processes and of the interaction of individual units of transportation systems. Primitive dispatcher control gave way to modern traffic control, based on advanced methods of management and supervision, using the newest means of communication, automation, closed-circuit television, telemechanics, and computer technology. Traffic control has become one of the most important means of management in industry, power engineering, transportation, construction, agriculture, and trade.
The structure of traffic control depends on the nature and scale of the management unit. The simplest type of traffic control as it is understood today is implemented mainly through two-way telephone contact with the units. Small enterprises and construction sites usually have one traffic-control station. Several local traffic-control stations and one central station, which coordinates their activity, operate at large units with ramified or multistage structures (for example, a power system).
In power engineering, traffic control implements day-today control of electric power plants and substations, transmission lines, and individual large consumer installations. Dispatcher control is called upon to ensure uninterrupted and reliable operation of the power system, the distribution of electric power according to the load schedule, maintenance of the parameters established for the power system (voltage and frequency in power systems; steam temperature and pressure and water temperature in heat systems), and maximum economy of operation of the power system through optimal use of various sources of energy (steam, hydroelectric, atomic, and other power plants; heat and electric power plants; and central boiler rooms). The dispatcher of a power system supervises and coordinates the operation of several power plants and electric power-systems within the framework of one power system. Depending on the scale of the system, its regulation may be concentrated at a single traffic-control station or at several stations, whose activities are coordinated from a central station. Any changes in the operating condition of the elements of the power system (connection and disconnection of transmission lines, shutdown and start-up of units at electric power plants, covering peak loads, the supply of fuel, and conducting preventive maintenance) are possible only with knowledge and instruction of the corresponding dispatcher. Information about the condition of units is given the dispatcher by duty workmen, engineers, supervisory technicians, and inspectors or is gathered, recorded, and processed by automated data collection and processing systems. The information received is represented by various types of displays and signals on the dispatcher’s console and on screens of television monitoring units and specialized display devices. As a rule, the traffic-control stations of large power systems are equipped with electronic regulating machines.
Industrial enterprises or groups of enterprises with continuous production processes, whose operation may be described mathematically, use logic devices or control computers for automated processing of incoming information. The problems of traffic control for enterprises with quantified production processes are somewhat different, mainly because even an article of average complexity contains scores, sometimes even thousands, of parts, with different manufacturing technology. The mathematical description of such processes for the purpose of automating the entire production cycle is very complex. In this case dispatcher control must include not only the supervision of the operation of conveyors and production lines (output of finished products) but also the coordination of the activity of all units, shops, departments, laboratories, and depots, even including the auxiliary services that ensure the smooth operation and high output of the main conveyor.
A new form of traffic control, interplant control, developed in the production of particularly complex items—units and industrial complexes in whose manufacture several independent adjacent or collaborating enterprises take part (frequently from various sectors of industry, with the participation of scientific research institutes and planning organizations). In addition to ordinary documentation and technology, interplant dispatcher control also makes wide use of the method of systems planning and management. One of the trends in the development of traffic control calls for the combination of the regulation of processes with selection of the optimal distribution of operations among machines, units, and lines, thus making possible a reduction in the time spent on retooling of equipment and an increase in labor productivity. Any stoppage of production is detected by means of traffic control, and the responsibility for losses associated with the stoppage is assigned to the units that caused the stoppage.
Further improvement in traffic control will free production managers (foremen and shop superintendents) from labor-intensive work in providing industrial units with raw materials, supplies, and semifinished products and in regulating the rate of the production process and will enable them to concentrate on work with labor groups and on the solution of technical, organizational, and economic problems.
Because of the specific requirements of individual types of transportation and differences in their technical equipment, the structure and organization of dispatcher control for motor-vehicle, air, water, and railroad transportation differ markedly from dispatcher control at an industrial enterprise. The common goal of traffic control for all types of transportation is to ensure reliability and uninterrupted service in transporting passengers and freight. A distinguishing feature of transportation traffic control is the constantly changing situation on the lines and at points of origin and termination and significant daily, monthly, and annual variations in traffic and freight schedules of transportation resources; this variation is associated with the seasonal nature of work in certain branches of industry and with the length of the workday, vacation periods, the suburban season, out-of-town trips on days off, and the weather on the route. The main tasks of transportation traffic control are the continuous monitoring of the condition and availability of vehicles and rolling stock and of the state of schedules for loading and unloading operations, the observation of traffic schedules, and the provision of tickets and the necessary travel information for passengers. At large railroad junctions, airports, and sea and river ports, the introduction of traffic control calls for the creation of several traffic-control stations, whose operation is coordinated by a chief dispatcher from a central station equipped with modern means of radio and telephone communication, automation, telemechanics, and computer technology. As a rule, separate traffic-control stations are organized in areas of loading and unloading operations, at ticket windows, in depots and garages, at bus stops, and at the auxiliary buildings at communications stations.
Traffic control in construction is implemented by modern means of communication and by automatic inventory and monitoring. The tasks of traffic control in construction include the monitoring of the fulfillment of day-to-day plans for construction, the timely provision of labor, materials, structural elements, building machines, and transportation for the construction project, and the coordination of the work of construction units and elimination of idleness of machines and workers. The traffic-control system for the management of construction encompasses all elements of the building industry and its maintenance. A general scheme of dispatcher control in a construction trust includes a chief dispatcher in the main office of the trust, a branch dispatcher in construction and assembly departments and other units, shop dispatchers at production enterprises, and transportation and other dispatchers in service industries. Each dispatcher operates within his own unit; overall operational control and supervision on the scale of the entire trust is exercised by the chief dispatcher. Traffic-control stations are equipped with modern devices for communication and monitoring, collection, and recording of information. Current inventory data, as well as a number of schedules and tables by means of which the dispatcher may determine the state of production at any moment by overseeing all work operations for individual construction units and departments and for the trust as a whole, are concentrated at the stations.
Traffic control in agriculture is implemented by the traffic-control department of a kolkhoz or sovkhoz and embraces all production units of the industry, including day-to-day planning, the collection and processing of production information, the solution of concrete problems of material and technical supply, and the elimination of the factors that cause disruptions of the operating conditions at field mills, on farms, and in brigades and departments. Traffic-control posts may be set up in individual large enterprises (departments, farms, or garages) during periods of intensive field operations. The traffic-control station is generally located at the central office. Traffic control in agriculture may embrace entire raions and even oblasts in the centralization of supervision and management of agricultural production.
REFERENCESMalov, V. S., and V. K. Meshkov. Dispetcherskie punkty energeticheskikh sistem. Moscow-Leningrad, 1955.
Eikhenval’d, A. V., and A. R. Sochinskii. Operativnoproizvodstvennoe planirovanie i dispetchirovanie na mashinostroitel’nom zavode. Moscow, 1957.
Budantsev, lu. Elektronnye pomoshchniki dispetchera. Moscow, 1963.
Babenko, A. S. Dispetcherskaia sluzhba v sel’skom khoziaistve. Moscow, 1967.
Zheleznye dorogi. Edited by M. M. Filippov. Moscow, 1968.
Tekhnologiia i organizatsiia stroitel’nogo proizvodstva. Edited by I. G. Galkin. Moscow, 1969.
Val’denberg, lu. S., A. A. Belostotskii, and R. M. Abizov. Vychislitel’naia tekhnika na promyshlennom transpose. Moscow, 1970. | https://encyclopedia2.thefreedictionary.com/Traffic+Control |
Q:
Prime ideals of the ring of rational functions
Let $A$ be a commutative ring with identity. If $f = a_0 + a_1 x + \cdots + a_n x^n \in A[x]$ is a polynomial, define $c(f) = A a_0 + A a_1 + \cdots + A a_n$ the ideal of $A$ generated by the coefficients of $f$. Consider $S$ the subset of $A[x]$ made up of primitive polynomials, i.e. polynomials $f \in A[x]$ such that $c(f) = A$. It is not difficult to prove that $S$ is a multiplicative subset of $A[x]$. Consider the ring
$$
A(x) = S^{-1} (A[x]).
$$
It is easy to show that $S$ does not contain zero-divisors of $A[x]$, hence $A \subseteq A[x] \subseteq A(x)$. If $I$ is an ideal of $A$ then $(I \cdot A(x)) \cap A = I$. If $\mathfrak{p}$ is a prime ideal of $A$ then $\mathfrak{p} \cdot A(x)$ is a prime ideal of $A(x)$. The map $\phi \colon \mathrm{Spec} A(x) \to \mathrm{Spec} A$ defined by $\phi(P) = P \cap A$ is surjective, because a right-inverse is $\mathfrak{p} \mapsto \mathfrak{p} \cdot A(x)$. It is clear that $\dim A \leq \dim A(x) \leq \dim A[x]$.
If $M$ is a maximal ideal of $A(x)$, then does there exist a maximal ideal $\mathfrak{m}$ of $A$ such that $M = \mathfrak{m} \cdot A(x)$?
Is the map $\phi \colon \mathrm{Spec} A(x) \to \mathrm{Spec} A$ injective? If $A$ is noetherian, then $\dim A(x) = \dim A$?
If $A$ is a normal domain, then is $A(x)$ a normal domain?
A:
The answer to (1) is yes. Let us first show
If $I$ is an ideal of $A[x]$ such that $I\cap S=\emptyset$, then $I$ is contained in $\mathfrak m A[x]$ for some maximal ideal $\mathfrak m$ of $A$.
Proof. Note that
$$I\subseteq \sum_{f\in I} c(f)A[x].$$
So if $I$ is not contained in any $\mathfrak mA[x]$, then $A=\sum_{1\le i\le n} c(f_i)$ for some $f_i\in I$. Fix an $m$ big enough and write
$$f_i(x)=a_{i0}+a_{i1}x+...+ a_{im}x^m$$
($a_{im}$ could be zero) and an identity
$$1=\sum_{i\le n, j\le m} \alpha_{ij}a_{ij}, \quad \alpha_{ij}\in A.$$
Consider the polynomial
$$f=\sum_{i,j}\alpha_{ij}f_i(x)x^{m-j} \in I.$$
The term of degree $m$ in $f$ has coefficient equal to $1$. So $f\in S$. Contradiction.
As any $\mathfrak m A[x]$ is prime and has empty intersection with $S$, the above result implies immediately (1).
(2) The map $\phi$ is clearly surjective (consider $\mathfrak qA[x]$ for any $\mathfrak q\in\mathrm{Spec} A$) but is not injective in general. Consider $A=k[t,s]$ over a field $k$. Then $f(x):=t+sx$ generates a prime ideal $\mathfrak p$ of $A[x]$ which doesn't meet $S$ and we have $\mathfrak pS^{-1}A[x]\cap A=\{0\}$. So the generic fiber of $\phi$ has at least two points (in fact infinitely many points).
Note however that $\phi$ is always injective over any maximal ideal $\mathfrak m$ because $\phi^{-1}(\mathfrak m)=\mathfrak mS^{-1}A[x]$.
The argument for the surjectivity of $\phi$ also shows that $\dim S^{-1}A[x]\ge \dim A$. We also have $\dim S^{-1}A[x]\le \dim A[x]=\dim A +1$ when $A$ is noetherian. I don't know whether the equality is possible.
Update: We have $\dim S^{-1}A[x]=\dim A$ when $A$ is noetherian: let $\mathfrak p_0\subset ... \subset \mathfrak p_n$ be a chain of prime ideals of $A[x]$ contained in $A[x]\setminus S$. By (1), we have $\mathfrak p_n\subset \mathfrak mA[x]$ for some maximal ideal $\mathfrak m\subset A$. Then
$$ \mathfrak p_0\subset ... \subset \mathfrak p_n\subset \mathfrak mA[x]+xA[x]$$
is a chain of prime ideals of $A[x]$. Thus $\dim S^{-1}A[x]\le \dim A[x] -1=\dim A$. Your homework is not so easy :).
| |
The River Exe, near Winsford. Showing river correctly fenced to stop cattle from polluting the river, or eroding the river banks. A healthy example of river habitat. Photo by Ross Hoddinott.
Water and wetlands are a vital part of our natural world – the lives of animals, plants and people depend on them for their survival. However, freshwater habitats like wetlands, rivers and ponds have been lost, modified and polluted - and the species that depend on them are in decline. Across the UK Wildlife Trusts are working with water companies, government agencies, landowners and other NGOs to improve our freshwater environment for wildlife and people.
Over 10% of our freshwater and wetland species are threatened with extinction in the UK, and we’ve lost 90% of our wetland habitats in the last 100 years.
Why are freshwater habitats important?
Over 10% of our freshwater and wetland species are threatened with extinction in the UK, and we’ve lost 90% of our wetland habitats in the last 100 years. The reasons for this dramatic decline include pollution from the surrounding landscape, largely from unsustainable farming and development practices, urbanisation, and modification of wetland features like adding concrete sides to streams and abstraction.
Thousands of species like otters, kingfishers, salmon, dippers, water voles and herons rely on safe wetland habitat. Healthy wetlands and rivers can also provide communities with protection from flooding by holding water in the landscape and slowing the flow of water through river systems to the sea. They can save us money by naturally filtering the impurities from our water, providing us with cleaner drinking water and reducing the amount of money that water companies need to spend on doing this work.
What do The Wildlife Trusts do?
Advise on, support and directly manage thousands of kilometres of watercourse.
Work with natural processes to restore habitats and to hold water in the landscape.
Reintroduce wetland species like water voles and beavers.
We have a long history of delivering innovative, sustainable freshwater and wetlands projects, working closely with partners and empowering communities to improve their catchment. The Wildlife Trusts want to see wildlife-rich places that hold water being widespread in the landscape, and land and watercourses managed to slow the flow of water to the sea. Restoring natural processes is a key part of this - like natural flow and floodplain connectivity.
Storms and flooding have caused significant damage across the UK, and climate change is likely to increase the frequency of extreme weather in the future, costing governments and taxpayers millions and devastating communities and businesses.
The Wildlife Trusts believe that government should invest in wilder landscapes which could provide the natural solutions to help prevent flooding in future. Habitats such as upland bogs and moors, woodlands, wetlands and species-rich grasslands act as giant sponges, absorbing and holding water and slowing down water run-off into rivers.
There are already some excellent examples of how restored landscapes have made space for water, for example, in upland areas where old drainage ditches have been blocked and overgrazing reduced. This allows vegetation like sphagnum mosses and heather and trees to regenerate, helping to hold water in the hills for longer and reducing peak flows downstream during high rainfall events.
We also work on large-scale habitat restoration schemes which slow down water and reconnect rivers with their floodplains. We need these kind of approaches to be significantly extended across the country. This can only happen if investment in flood defence is rebalanced towards these more sustainable solutions.
Read about our work to help reduce flooding by managing natural habitats, both upstream an in the floodplain.
We want to see healthy rivers, clean beaches and coastal waters, safe drinking water, less waste and thriving wildlife. We believe that our freshwater environment should be managed as whole systems, from watershed to the sea.
The health of our water bodies like rivers and lakes provides an excellent indicator of the health of our river catchments. So it is concerning that only 20% of water bodies in England and Wales currently achieve ‘good ecological status’.
Pollution continues to be the biggest problem facing the freshwater environment. In addition to the pollution pressures from agriculture, around one quarter of rivers are not in good ecological health due to sewage pollution from water companies and private sources like homes and businesses. Soil loss is also negatively impacting on the water quality of local watercourses. Recent estimates by Cranfield University shows soil degradation costing the UK an estimated £1.2bn per year.
As well as the financial cost, our wildlife is at risk from poor water quality as fish spawning grounds are lost to silt building up and feeding becomes harder as visibility is reduced. Too many nutrients in river systems can enable over zealous growth of some aquatic plants, which leads to streams and rivers becoming choked up with vegetation and a decrease in plant and wildlife diversity.
This is the aquatic equivalent of our road verges which have largely become dominated by a handful of plants (like nettles and cow parsley) that thrive in a polluted environment, at the expense of hundreds of others.
A catchment is a term used to describe an area defined naturally by where the surface water collects and flows through the landscape. Nature doesn't conform to parish boundaries or county borders!
In the past, management of the water environment has fallen to government, to private companies and to landowners, often operating in isolation. The Catchment Based Approach (CaBA) brings people together to think about each river catchment as a whole. More than 1,500 organisations are now taking this approach in over 100 river catchments across England and Wales.
The Wildlife Trusts are involved in 96% of local CaBA partnerships. This means we can work with many different organisations to develop projects collaboratively, using the different strengths of the individual partners to deliver great quality projects that really make a difference to our precious water environments.
There is an urgent need to restore our wetland habitats to help them to thrive, Species reintroduction are an important part of this and, together with a range of organisations, Wildlife Trusts are leading efforts to reintroduce two key wetland species - water voles and beavers.
Water voles are often referred to as Britain;s fastest declining mammal. Unfortunately, the future of this charming riverside creature is in peril; the water vole needs urgent help to survive in the UK. Water voles are a vital part of river ecosystems. Their burrowing, feeding and movements help to create conditions for other animals and plants to thrive - a bit like beavers do, but on a much smaller scale. The Wildlife Trusts and many other organisations are working hard to keep water voles in our rivers and streams and restore them to places where they've been lost. | https://www.wildlifetrusts.org/water |
In professions such as nursing, information and best practices change quickly. Upon graduation, the knowledge a new nurse has gained may quickly become obsolete. Staying engaged with the professional literature enables nurses and health care professionals to stay current and to continue providing the best patient care. As Dr. Shaughnessy noted in this week’s media program, baccalaureate-prepared nurses need to look at literature critically. Dr. Shaughnessy stated that baccalaureate prepared nurses need to look at a piece of published research and make their own independent assessment about whether a study was done well, whether its results can be judged as valid, and whether that piece of evidence, in addition to other pieces of published evidence on the same topic can lead us to defining what is the best nursing practice.
For this Discussion you will:
Conduct a search on a particular patient problem that is under the control of nursing (e.g, pain management, shortness of breath, lack of knowledge about lifestyle changes needed for managing diabetes).
Use two different databases (i.e. Ovid, CINAHL, etc.) AND
Use at least one popular search engine such as Google.
Use keywords such as “evidence-based practice” and “nursing” for each search.
Compare and contrast the results generated from each search.
Select a few results and evaluate for reliability or credibility (depending on whether the study is quantitative or qualitative).
Share the references for articles you find in the Library that have criteria to be used in evaluating Web sites for credibility or trustworthiness. Cite these references using APA format.
Provide specific examples of the different types of information you find in the two different types of searches, one in a professional library, and the other using a popular search engine.
Identify the level of evidence for each of the studies. Which findings are most trustworthy based upon the level of evidence?
Reflect on your professional experience as a nurse. Consider the findings from
your searching exercise and think about the credibility/trustworthiness of the information that you found. Based upon what you have learned so far:
How would you counsel patients about this topic and the information that you found? How are “individual patient needs and preferences” considered in terms of evidence based practice?
What would you say to a fellow staff nurse about using the information to change practice? In other words, is this an example that can be used as the research component of evidence based practice? | https://writemyacademicessay.com/sources-of-information/ |
What is public morality vs private morality?
What is public morality vs private morality?
The private conduct of an individual that not of concern to the society or the government and thus does not warranty an intrusion. In contrast, public morality refers to the actions that affects the society or the government.
Does private morality exist?
There can be a private morality in this sense, and it will be a pathological form of the previous one. A person’s ideals may be such that he cannot publicly disclose them because they are at odds with the social morality of his community.
Can a leaders public and private morality be distinguished?
A leader can have any combination of public and private morality. While one is seen by the public, the moral manager, the other is not seen by the public, the moral person.
What is the relationship between morality and public policy?
In response, Morality and Public Policy puts forward proposals to enhance the capacity of public policy to respond more effectively to morality and associated shifts in social mores in different cultural settings.
What do you mean by public morality?
Public morality refers to moral and ethical standards enforced in a society, by law or police work or social pressure, and applied to public life, to the content of the media, and to conduct in public places.
What is public morality crime?
Some activities are criminalized due to their tendency to disturb the peace, create public nuisance, or threaten a sense of public morality. These crimes include disorderly conduct, rioting, public indecency, vagrancy and loitering, gang activity, prostitution and solicitation, obscenity, and cruelty to animals.
What public and private morality Claudius demonstrates in Act IV?
Answer Expert Verified In Act IV, Claudius as a king (that is, a figure with ultimate earthly authority) tries to protect and preserve the public morality embodied in the social order, ensuring that transgressor – in this case, his nephew Hamlet – must be punished for murder.
What is political morality Dworkin?
Abstract: Dworkin`s political theory is characterized by the interpretative integrity of morality, law, and politics, the so-called “hedgehog’s approach”. The interpretative integrity approach functions on multiple levels.
Can a bad person be a good leader?
A “bad” person can be a good performing leader but will not be seen as an authentic leader. An authentic leader is someone who is consistent in their values, actions, beliefs and that have good moral convictions. A person who does not behave ethically does not project true leadership.
What is public order and morality?
The Ambiguity of ‘General Principles of International Law for Public Order and Morality’ The AGB refers to both ‘generally accepted legal norms of morality and public order that are recognised under principles of international law’ 35 and ‘general principles of international law for morality and public order’.
What does public interest?
noun. the welfare or well-being of the general public; commonwealth: health programs that directly affect the public interest. appeal or relevance to the general populace: a news story of public interest.
What has happened to Ophelia?
In Act 4 Scene 7, Queen Gertrude reports that Ophelia had climbed into a willow tree (There is a willow grows aslant the brook), and that the branch had broken and dropped Ophelia into the brook, where she drowned.
Why does the queen finally agree to speak with her?
She’s gone insane over her father’s death. Why does the Queen agree to go see her? Horatio suggests that she should because Ophelia might lead those with evil intentions to dangerous conclusions. To kill Claudius because he thinks Claudius killed Polonius, his father.
What is Dworkin’s view of equality?
According to Dworkin’s initial characterisation, equality of resources is the view that a distributional scheme treats people as equals when it ‘distributes or transfers resources among them until no further transfer would leave their shares of the total resources more equal’ (Dworkin, 1981a, p. 186).
Is Dworkin a legal realist?
Dworkin has never claimed Legal Realism as an influence although he is aware of its theories and has engaged with them.
Can bad people be great leaders?
Can a good leader have bad private morality?
Effective leaders come from different backgrounds with diverse private morality. Great leaders are able to chart new territory and form new policy. Unfortunately, the extreme challenge is to keep the good and avoid every kind of evil. This larger role of standing down evil is not passable with “bad private morality”. | https://holidaymountainmusic.com/what-is-public-morality-vs-private-morality/ |
Allah (all glory be to Him) tells us in the Holy Quran about Ramadan that, “(He wants you) to complete the prescribed period (of fasting), and to glorify Him in that He has guided you; and perchance ye shall be grateful.” (2:185)
Many benefits, in addition to the spiritual, result from completing this prescribed period of fasting. This article attempts to explain those related to our biological rhythms.
The Stages of Sleep
The background activity of the brain is called the electroencephalogram (EEG) and can be recorded by the use of scalp electrodes. The dominant frequency and amplitude characteristic of the surface EEG varies with states of arousal.
A person goes through five stages while going to sleep.
Calm wakefulness is accompanied by alpha waves 8-12 Hz (cycles per second) and low voltage fast activity of mixed frequency. This is called stage one. Alpha waves disappear when we open our eyes.
As sleep deepens into stage two, bursts of 12-14 Hz (sleep spindles) and high amplitude slow waves appear.
The deep sleep of stages three and four is featured by an increasing proportion of high voltage slow activity. Breathing is regular in slow-wave sleep or non-REM (Rapid Eye Movements) sleep.
Delta activity (very slow waves, 0.5-4 Hz, high amplitude) is unusual in a normal record and accompanies deep sleep i.e. stages three and four sleep.
After about 70 minutes or so mostly spent in stages three and four, the first REM period occurs, usually heralded by an increase in body movements, and a shift in the EEG pattern from stage four to stage two. These rapid low-voltage irregular waves resemble those seen in alert humans; sleep, however, is not interrupted. This is called stage 5 or REM sleep, when the EEG activity gets desynchronised. There is marked muscle atonia despite the rapid eye movements in REM sleep, and the breathing is irregular.
Theta activity with a pattern of large regular waves occurs in normal children and is briefly seen in stage one sleep and also in REM sleep.
Non-REM (NREM) sleep passes through stages one and two, and spends 60-70 minutes in stages three and four. Sleep then lightens and a REM period follows. This cycle is repeated three or four times per night, at intervals of about 90 minutes throughout the night, depending on the length of sleep. REM sleep occupies 25% of total sleeping time.
When the eyes are opened, the alpha rhythm is replaced by fast irregular low voltage activity with no dominant frequency, called the alpha block. Any form of sensory stimulation or mental concentration such as solving arithmetic problems could produce this break-up of the alpha rhythm. This replacement of the regular alpha rhythm with irregular low voltage activity is called “desynchronisation”.
Fasting Positively Affects Sleep
During the first few hours of an Islamic fast, the EEG is normal. However, the frequency of the alpha rhythm is decreased by a low blood glucose level. This may happen at the end of the fasting day towards evening when the blood sugar is low.
Fasting improves the quality and intensifies the depth of sleep, a matter of particular importance to the aged who have much less stage three and four sleep (deep sleep). The processes of repair of the body and of the brain take place during sleep. Two hours of sleep during the month of Ramadan are more satisfying and refreshing than more hours of sleep otherwise!
REM sleep and dreaming are closely associated. Dreaming may be necessary to maintain health, but prolonged REM deprivation has no adverse psychological effects. Dreaming sleep occupies 50% of the sleep cycle in infants and decreases with age. Brain synthetic processes occur in deep sleep; brain protein molecules are synthesized in the brain during deep sleep or used in REM sleep in restoring cerebral function. Fasting significantly increases deep sleep and leads to a fall in REM sleeping time or dreaming time, and also accelerates synthesis of memory molecules.
Fasting and the Circadian Rhythm
The period of the circadian pace-maker in humans is 24 hours 11 minutes. Hormonal secretion is frequently characterised by rhythmic fluctuations which may be regular or irregular in periodicity. The period of regular oscillation may be as short as a few minutes or as long as a year.
The body timing system that drives circadian rhythms is exposed to external factors ranging from the imposed activity-rest cycle, the natural light-dark cycle, and social activities outside the workplace.
There are biological pacemakers or oscillators within the body with time-keeping capacity which synchronise with the external environmental cycles such as light. Environmental cues that synchronize biological pacemakers are called “zeitgebers” (from the German “time-givers”), and the process of re-setting the pacemaker is called re-synchronization.
The light/dark cycle is a potent zeitgeber for circadian rhythm but daily cycles in temperature, food availability, social interaction (such as congregational prayers) and even electro-magnetic field strength synchronize circadian rhythm in certain species. Because of recurring cycles of light, temperature and food availability, organisms evolved endogeous rhythms of metabolism and behavior providing response to specific environmental cycles. Many biological rhythms reflect the period of one of four environmental cycles: cycles of the tide, of day and night, of moon phase and of seasons.
Muslims who have been fasting regularly since childhood, have been exposed to different sleep/wake and light/darkness cycles on a daily basis in one annual lunar month. Hence, it may be easier for such persons to synchronize their circadian, circalunar and circannual biological rhythms under difficult conditions.
Fasting, Jet Lag and Shift Work
International travel across time zones produces symptoms of jet lag such as sleep disturbances, gastro-intestinal disorders, decreased alterness, fatigue and lack of concentration and motivation.
Factors contributing to symptoms of jet lag are (1) external desynchronisaion due to immediate differences between body time and local time at the end of the flight. (2) internal desynchronisation due to the fact that different circadian rhythms in the body re-synchronise at different rates, and during the re-synchronisation period, these rhythms will be out of phase with one another.
General symptoms arising from desynchronisation include tiredness during the day and disturbed sleep and reaction time. The severity of these adverse effects and therefore the time required for re-synchronisation depends on the ability to pre-set the bodily rhythms prior to flying, the number of time zones crossed, the direction of flight, age, social interaction and activity. NASA estimates that it takes one day for every time zone crossed to regain normal rhythm and energy levels. A 6-hour time-difference thus needs 6 days to get back to normal.
Rapid adaptation to a new zone can be facilitated by maximising exposure to zeitgebers for the new cycle e.g. changing to meal times and sleep times appropriate to the new time zone. Maximising social contact and exposure to natural lgihting will result in faster resynchronisation than staying at home in a hotel and eating and sleeping without regard to local time. There are widesperead individual viariations in the rapidity of resynchronisation.
Muslims who fast regularly and who have experienced disturbed wakefulness/sleep cycles on a daily lunar annual basis, can adapt themselves much faster to different time zones during international travel and do not suffer from the ill effects of jet lag. Moreover, the social contact during the Tarawih congregational prayer and the other social-cum–spiritual activities act as zeitgebers which regulate any desynchronised biological rhythm.
Shift workers also experience similar symptoms as jet lag, especially gastro-intestinal, cardiovascular, and sleep disorders and also reproductive dysfunctions in women. The inverted schedule of sleeping and waking also results in diminshed alterness and performance during night-time work with attendant increase in the number of fatigue-related accidents during night time shift hours. Normally, a period of three weeks is required for re-synchronisation among shift workers, and as the fasting Muslim atunes himself to resynchronization processes during the space of just over four weeks in Ramadan, his health problems as a shift worker would be negligible, as his synchronization processes would be more rapid, whether during Ramadan or at any other time.
It is also a common observation that as soon as Ramadan is over, normal circadian rhythms are established in the fasted Muslims with such great rapidity as to be at par with pre-Ramadan levels on the first day of Shawwal, i.e. Eid-ul-Fitr.
Fasting and Encephalins
During fasting, certain endogenous, narcotic-like substances known as opioids (or endorphins) are released into the body. They have a tranquilizing effect as well as an elating effect on the mind. These are also probably responsible for prevention of psychosomatic diseases. The opioids have several effects, including slowing down metabolism to conserve energy. Another effect of opioids may be that, although they produce elation as well as intense hunger, they do not drive the person to eat with sheer gluttony.
Muslims in Ramadan experience an ability to intensely focus their minds on meditation, Quranic recitation and prayers. This spiritual gain during the Holy Month is despite the fact that normal sleep/waking cycles are somewhat disturbed and despite a long day of fasting. Perhaps now we have a closer idea as to the science of this miraculous process. | https://islamonline.net/en/fasting-and-your-biological-rhythms/ |
Ripple Marks are exposed on one of beds at this location.
Ripples are one of the most commonly preserved sedimentary structures,
as it takes only a small storm or other event to cover and preserve them.
Ripple Marks were formed by the actions of ancient winds, streams, waves or currents , millions of years ago.
The sediments were gradually transformed into rock by natural processes - of pressure exerted by the weight
of overlying sediments and natural cementation. | https://southwestcoastphotos.com/photo_16068780.html |
infrastructure gap in Nigeria.
Senator Omisore stated this on Monday while presenting a paper entitled “Nigeria Society of Engineers Budget Performance & Projects Monitoring Working Group (NSE-BPPMWG) attributed Nigeria’s Infrastructure Deficit mainly to “epileptic power, near absence of rail, non – motorable roads, poorly developed seaports and airports, absence of water supply, etc..
Emphasizing that it will “requires N36 Trillion annually over the next 30 years to bridge infrastructure gap; Senator Omisore stressed that meticulous Monitoring, Evaluation
and Learning (MEL) required; adding, ” NSE’s expertise can handle independent MEL for infrastructure delivery in Nigeria”.
Senator Omisore stressed that there is the need for provision of quality service to enhance professional competence &
membership development;Collaboration with, influencing and providing quality advice to Government, Industry, Commerce, academia and the Society, for uplifting Nigeria; Meaningful contributions to the
advancement of technology, locally and globally.
On budgetary challenges, Senator Omisore pointed out that with the “low allocation for Capital Expenditure (27.2% of 2021 proposed budget) and high allocation for Recurrent Expenditure;High debt service ratio (about 27% for 2021 proposed budget); Low budget implementation levels (average of 40-50%); absence of Project Management and budget Implementation Monitoring;, “NSE is well endowed with the resources to monitor budget implementation independently.
Commenting on the NSE’s mission, Senator Omisore stressed that the body is expected to “provide monthly reports on status of projects financed by public funds; be responsible to the Nigerian public; be independent of government influence and interference as well as operate as an umbrella body for NGOs/CSOs in providing value addition to infrastructure planning and delivery in Nigeria
The former deputy governor stated further that, “given the vast expertise within the NSE, the project will be implemented solely by NSE across the country;” and that “using recent Appropriation Acts, the NSE will establish the average budget implementation ratio, identify variances and then set out to support the FG to improve on its current performance;”.
“Funding (grants) will be sourced externally from Multi-lateral funding agencies (AfDB, World Bank, AFD) and International Development Agencies (DFID, USAID, ); The NSE shall galvanise its Local Branches and Divisions to ensure the success of NSE-BPPMWG; NSE Branches and Divisions shall develop detailed Programme Implementation Plans (PIP) showing measurable milestones, impacts and timelines.”
“It is imperative that the Programme implementation begins immediately given the urgency and critical importance of budget and infrastructure development to Nigeria’s economic advancement”
. | https://nationalinsightnews.com/nigeria-needs-n36trillion-for-30-years-to-bridge-infrastructural-gap-omisore/ |
Hazard: The brake component housed within the bicycle’s carbon fork can disengage from the fork and allow the brake assembly to contact the wheel spokes while rotating, posing a fall hazard.
Description: This recall involves the following nine, 2011 model year bicycles with Advanced Group carbon forks: Sirrus Expert, Sirrus Comp, Sirrus Elite, Vita Expert, Vita Comp, Vita Elite, Vita Elite Step Thru, Tricross Sport, Tricross, and Tricross Comp. All bicycles have the brand name “Specialized” on the lower front frame tube. The model name is on the top tube.
Remedy: Consumers should immediately stop riding these bicycles and return them to an authorized Specialized retailer for a free repair or replacement carbon fork. | http://www.cyclingutah.com/industry/general-bike-industry/recalls/specialized-bicycle-components-recalls-bicycles-due-to-fall-hazard-2/ |
In the healthy organism, the immune sensing systems induce the appropriate type of inflammatory response to quickly and efficiently resolve infection and tissue damage. However, in many diseases, inflammation is inappropriate in terms of type, magnitude or duration. In this research section we will focus on sterile inflammation, a process that is primarily induced and maintained by innate immune sensing pathways, independent of microbial infection. Many sterile inflammatory conditions are due to the overproduction and tissue deposition of endogenous molecules, commonly referred to as damage associated molecular patterns, that are then sensed by the innate immune system. We have established several state-of-the-art animal models to cover various important sterile inflammatory conditions that are of particular interest to this Cluster and of great relevance from a medical stand-point. We favor model systems in which a genetic mutation causes a prototypical disease by disturbing a key biological process, which then results in the accumulation of a DAMP molecule. Even though these monogenetic sterile inflammatory conditions are very rare in the human system, the associated disease pathologies are usually highly informative on a mechanistic level and can generally be extrapolated to broader disease entities. Next to our reverse genetic approach in studying sterile inflammation in animal models, we will employ a phenotype-driven forward genetic approach in the human system to identify genetic components that play important roles in sterile inflammation. With our long-standing expertise in complex genetic disorders, we will address the role of genetic predisposition in DAMP-triggered inflammation. Furthermore, we plan to participate in a large clinical study initiative to investigate how physical and behavioral environmental factors modulate baseline inflammatory conditions in the healthy state.
1. Animal models of sterile inflammation.
2. Human model systems of sterile inflammation.
3. Environmental factors influencing the immune sensory system in healthy volunteers. | https://www.immunosensation.de/research/research-program/research_area_e_consequences_of_immune_sensing_for_sterile_inflammation_in_vivo.html |
The Global Regulatory Affairs and Clinical Safety (GRACS) DDH team assists in bringing new medical advancements to the world by facilitating communications and procedures that allow swift, organized compliance across regulatory agencies. We are an international network on the leading-edge of healthcare breakthroughs that help provide new, reliable, and compliant medical products, practices, and solutions to the world through a highly regulated industry.
Position Overview:
Under the guiding direction of the Executive Director and/or Director, Device and Digital Health, the incumbent will contribute to the overarching strategy for product-specific medical device and combination products (MDCPs), device constituents, digital health solutions (DHSs), and In-vitro diagnostics (IVDs) in partnership with the GRACS Global Regulatory Leads (GRL), Quality & Compliance, Chemistry, Manufacturing, and Control (CMC), Pharmacovigilance (PV), Global Labeling (GL), and various other functional areas. The incumbent will partner with the Clinical Safety and Risk Management (CSRM) physicians and PV group, and MDCP SMEs to ensure the clinical aspects needed to support MDCP filings are planned and executed to support registration and/or maintenance of registrations.
The incumbent will assist in developing new processes and establish internal guidance/policy for Global Regulatory Affairs and Clinical Safety (GRACS) that enables timely and accurate advice to Global Regulatory Teams (GRTs) to ensure adherence to the evolving MDCP/DHS regulations globally. The Associate Director will provide support for cross-functional collaboration through the enterprise by working closely with Device Development, Clinical Development, Pharmacovigilance, Manufacturing, Policy, IT, and other areas to ensure successful execution of our product programs while maintaining regulatory and safety compliance.
Primary Responsibilities:
Support the communication and assessment of the emerging regulatory landscape and drive cross-functional implementation of existing and new requirements across the affected Global Regulatory Affairs and Clinical Safety (GRACS) functional areas for MDCP/DHSs.
Build and cultivate strong working relationships with key internal and external stakeholders.
Develop and deliver global regulatory MDCP/DHS/Diagnostic intelligence to identify upcoming regulations and pending changes that could impact products with direct engagement with relevant GRTs across the company portfolio.
Provide support to assigned products with the responsibility to bring broad-based cross-Global Regulatory Affairs and Clinical Safety (GRACS) perspective on MDCP/DHS/Diagnostic aspects impacting product development and share leading practices for teams to incorporate into their regulatory strategies.
Participate and support, as appropriate, initiatives that establish operational processes and systems to fully incorporate MDCP/DHS/Diagnostics into the company way of working across the broad product portfolio. Build and manage new processes for facilitating resources to support activities and key initiatives.
Ensure close collaboration with cross-functional and cross-divisional teams (Research Laboratories, Manufacturing, Commercial, IT, etc.) to align on and incorporate regulatory requirements into strategies for devices, device constituents of combination products, DHSs, and diagnostics to ensure successful product registrations.
Support the development of best practice guidance for regulatory deliverables for digital health, medical devices, combination products, and diagnostics to support the therapeutically aligned development teams.
Management of direct reports and/or contractors as assigned
Supports internal and external partners to ensure global regulatory risks are identified, communicated, and properly addressed.
Education:
Minimum: Bachelor’s Degree in Regulatory Affairs, Quality Assurance, Clinical Affairs, Pharmacovigilance, Biology, Engineering, Chemistry, or related science field
Preferred: Graduate degree (Ph.D., PharmD, MS, MBA) in Regulatory Affairs, Quality Assurance, Clinical Affairs, Pharmacovigilance, Biology, Engineering, Chemistry, or related science field
Preferred: RAPS RAC, ASQ Quality, or Scrum certifications
Required Experience and Skills:
Minimum of five (5) years of relevant experience in one or more of the following areas: Regulatory Affairs, Quality Assurance, Clinical/Medical Affairs, Pharmacovigilance, Medical Devices, Pharmaceuticals, Biologics, Research & Development, Manufacturing, or related fields.
Knowledgeable in global regulatory requirements and the emerging landscape for MDCP, DHS, and Diagnostic products for both new product development for initial registration, support of current registrations, and post-market compliance activities.
Relevant awareness of digital health technologies and its application to medical devices and combination products, pharmaceuticals development, and marketed biopharmaceutical products.
Problem solving skills to act logically and think outside the box
Capacity to work under pressure and with timelines, individually and within a team
Familiarity/Experience with Microsoft product suite
Project management and/or meeting facilitation skills
Preferred:
Direct personnel management experience, including mentoring, performance evaluations, and disseminating direct report responsibilities.
Professional communication and writing skills through venues such as, but not limited to, external speaking engagements and peer-reviewed publications.
Residents of Colorado
Click here (https://survey.sogosurvey.com/r/O2fDro) to request this role’s pay range.
#IND3
We are a research-driven biopharmaceutical company. Our mission is built on the simple premise that if we “follow the science” that great medicines can make a significant impact to our world. We believe that a research-driven enterprise dedicated to world-class science can succeed by inventing medicine and vaccine innovations that make a difference for patients across the globe.
Who we are …
We are known as Merck & Co., Inc., Kenilworth, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world.
What we look for …
In a world of rapid innovation, we seek brave Inventors who want to make an Impact in all aspects of our business, enabling breakthroughs that will affect generations to come. We encourage you to bring your disruptive thinking, collaborative spirit and diverse perspective to our organization. Together we will continue Inventing For Life, Impacting Lives while Inspiring Your Career Growth .
Invent. Impact. Inspire.
NOTICE FOR INTERNAL APPLICANTS
In accordance with Managers' Policy - Job Posting and Employee Placement, all employees subject to this policy are required to have a minimum of twelve (12) months of service in current position prior to applying for open positions.
If you have been offered a separation benefits package, but have not yet reached your separation date and are offered a position within the salary and geographical parameters as set forth in the Summary Plan Description (SPD) of your separation package, then you are no longer eligible for your separation benefits package. To discuss in more detail, please contact your HRBP or Talent Acquisition Advisor.
Current Employees apply HERE (https://wd5.myworkday.com/msd/d/inst/1422$1533/rel-task/3001$14.htmld)
Current Contingent Workers apply HERE (https://wd5.myworkday.com/msd/d/task/1422$4020.htmld)
US and Puerto Rico Residents Only:
Our company is committed to inclusion, ensuring that candidates can engage in a hiring process that exhibits their true capabilities. Please click here (https://survey.sogosurvey.com/r/aCdfqL [survey.sogosurvey.com]) if you need an accommodation during the application or hiring process.
For more information about personal rights under Equal Employment Opportunity, visit:
EEOC Poster (https://www.dol.gov/sites/dolgov/files/ofccp/regs/compliance/posters/pdf/eeopost.pdf)
EEOC GINA Supplement
OFCCP EEO Supplement (https://www.dol.gov/ofccp/regs/compliance/posters/pdf/OFCCP_EEO_Supplement_Final_JRF_QA_508c.pdf)
We are proud to be a company that embraces the value of bringing diverse, talented, and committed people together. The fastest way to breakthrough innovation is when diverse ideas come together in an inclusive environment. We encourage our colleagues to respectfully challenge one another’s thinking and approach problems collectively. We are an equal opportunity employer, committed to fostering an inclusive and diverse workplace.
Search Firm Representatives Please Read Carefully
Merck & Co., Inc., Kenilworth, NJ, USA, also known as Merck Sharp & Dohme Corp., Kenilworth, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails.
Employee Status:
Regular
Relocation:
No relocation
VISA Sponsorship:
No
Travel Requirements:
10%
Flexible Work Arrangements:
Flex Time, Remote Work
Shift:
Valid Driving License:
Hazardous Material(s):
Number of Openings: | https://wehireamerica-veterans.jobs/helena-mt/associate-director-gracs-devices-digital-health/0EFE8E408C834012996A2AEED4CF810F/job/?vs=28 |
What creates that classroom "magic" when the most discouraged students engage actively, critically, and creatively with the subject at hand? Specifically, what does this look like in a computer science classroom, a subject that has historically attracted only a narrow stratum of students, leaving the majority feeling that they don't belong? How can this "magic" be described, defined, and measured? And which parts of this "magic" are the most effective for broadening participation in computing?
Analysis of pre- and post-student surveys shows increased interest in and motivation to learn computer science after taking ECS.
While an engaging classroom may feel "magical," it really is not. Rather, it is the result of purposeful instructional practices and a curriculum intentionally designed for broadening participation in computing. Though computer science educators often scrutinize curricular efforts, more attention needs to be paid to the particular teacher proficiencies that are most impactful for reaching diverse learners. Our research team has been conducting research in Los Angeles Unified School District (LAUSD) Exploring Computer Science (ECS) classrooms investigating the question: "What characteristics of high school ECS teaching practices are most effective for broadening engagement and participation in computing for students traditionally underrepresented in the field?"
The Exploring Computer Science (ECS) program consists of a high school introductory computer science course combined with an accompanying teacher professional development program. ECS was developed in response to previous research, detailed in Stuck in the Shallow End, which identified disparities in CS learning opportunities that fall along race and socioeconomic lines.3 In that research we found that schools with high numbers of low-income students of color were offering keyboarding and other basic rudimentary computing skills as "computer science." Most students were not being prepared for the only available college preparatory computer science course, AP Computer Science (AP CS). To fill this need and to carry out our mission of broadening participation in computing, the ECS curriculum was written by two of our team members, Joanna Goode and Gail Chapman.
ECS consists of six units of approximately six weeks each, covering Introduction to Human Computer Interaction, Problem Solving, Web Design, Introduction to Programming (Scratch), Computing and Data Analysis, and Robotics. The ECS curriculum is structured to facilitate inquiry and equity-based instructional practices so that all students, especially those in schools with high numbers of low-income students of color, are introduced to the problem solving, computational practices, and modes of inquiry associated with doing computer science.
One metric of our success has been the LAUSD ECS student demographics that stand in sharp contrast to most other computer science courses. In 20132014, approximately 2,500 LAUSD students were enrolled in ECS, and 75% of ECS students were Latino (72% of district population), 10% were African-American (10% of district population), 9% were Asian (6% of district population), and 5% were White (10% of school population). Girls represented 45% of enrolled ECS students.
These ECS enrollment statistics are dramatically different from the participation rates of girls and students of color in national and state AP CS statistics: out of nearly 5,000 exam-takers in California last year, only 8% were Latino and 1% African-American. Only 22% of exam-takers were girls.4
Yet, even with these promising LAUSD ECS enrollment statistics, we recognize the work is not done. Teachers must work to transform ECS classroom culture and teaching so that all students experience and engage with foundational computing concepts and develop essential computational practices. Thus far, analysis of pre- and post-student surveys show increased interest in and motivation to learn computer science after taking ECS. We have partnered with SRI International to design assessment measures that will capture student knowledge, skills, and active learning.
For the past several years we have conducted intensive mixed-methods research to understand which teaching practices support broadened participation in computing. In 20112012, we conducted 219 weekly observations in nine ECS classrooms. Through this ethnographic field research, along with several years of pre- and post-student surveys, teacher surveys, and student/teacher interviews as data sources, we have identified three strands of teaching practice critical for supporting broadening participation in computing.
It is important to note these strands are interweaving and inseparable, and that no strand can exist alone.
We observed how changing from a direct instruction teaching philosophy to an inquiry- and equity-based teaching philosophy takes time.
Computer Science Disciplinary Practices. While the more traditional computer science curriculum commonly focuses on programming and the computer as a tool, ECS focuses on the underlying problem solving and critical thinking necessary to explore effectively the wide array of topics that comprise the field of computer science. The curriculum is purposefully structured so the first two units put the focus on problem-solving (often without any use of computers) as well as setting classroom norms of inquiry, collaboration, equitable practices, creativity, and cognitively demanding problem-solving. Though each of the six units has a particular computer science content area of focus, all of the units and lesson plans incorporate the following computational practices:
These practices parallel those in the guiding framework for the new Advanced Placement CS Principles course. The actual classroom integration of these disciplinary practices then depends on inquiry and equity-based teaching practices.
Inquiry Practices. Our research has found that ECS inquiry teaching is guided and its success depends on skillful teacher designing, facilitating, and assessing learning opportunities for active student learning. The inquiry practices that we identified in ECS classrooms are:
Equity Practices. Especially in computer science, and other fields that suffer from underrepresentation of females, students of color, and students with disabilities, an array of equitable teaching practices are necessary to make the classroom a welcoming and enriching learning environment for all students. The equity-based practices identified in the ECS classrooms include:
These findings support research on science learning for traditionally underrepresented students that shows how engagement with the material is facilitated and learning is deepened when the practices of the field are recreated in "locally meaningful ways" and the field is presented in a way that "allows youth to express who they are and want to be in ways that meaningfully blends their social worlds with the world of science."3
The world desperately needs diverse perspectives to be present at the design tables.
These empirical findings also contribute to the framework of culturally responsive computing education as outlined by Eglash, Gilbert, and Foster recently in Communications.2 The instructional design and pedagogy of these ECS classrooms, which purposefully combined cultural and computational practices, led to increased engagement and interest in computer science for students who historically have not had access to computing knowledge.
As there is increased recognition of the importance of K12 computer science education, the issues associated with implementation are no longer a distant concern. In particular, the CS10K community (supporting the mission of building 10,000 U.S. teachers to teach high school computer science) is considering such questions as: When we recruit teachers to teach computer science, what are the qualities we hope to recruit? How important is content and pedagogical knowledge? Likewise, these findings have implications for teacher education and professional development planning. How do we design course pathways for pre-service computer science teachers? What should be the focus of professional development? What knowledge and skill sets are needed for facilitators of professional development? How do we best support a teacher corps strong in the most effective practices for broadening participation in computing?
In addition to the teaching practices identified here, our research has found variation in implementation of these practices within and across classrooms. We observed how changing from a direct instruction teaching philosophy (for example, lectures, individual student learning, right or wrong answers) to an inquiry- and equity-based teaching philosophy takes time. The critical supports for teachers include: a curriculum and accompanying professional development program that have inquiry and equity practices as the foundation; in-classroom coaching and mentoring; and a strong and vibrant teacher professional development learning community. See http://www.exploringcs.org.
The world desperately needs diverse perspectives to be present at the design tables. Our mission of democratizing K12 CS knowledge requires making this subject accessible for all students, especially those who have been traditionally underrepresented in the field, whether they intend to become a computer scientist or not. As most professions and fields are now being transformed by computer science, students who have this knowledge have a jump start into multiple careers or academic pathways. These opportunities and contributions must not be reserved for only a narrow band of students with "preparatory privilege" that includes family resources, parental knowledge, and learning venues. This is why we advocate for computer science learning for all students.
1. Calabrese Barton, A. and Tan, E. We be burnin'! Agency, identity, and science learning. The Journal of the Learning Sciences 19, 2 (Feb. 2010), 187229.
2. Eglash, R., Gilbert, J., and Foster, E. Toward culturally responsive computing education. Commun. ACM 56, 7 (July 2013), 3336.
3. Margolis, J., Estrella, R., Goode, J., Holme, J., and Nao, K. Stuck in the Shallow End: Education, Race, and Computing. MIT Press, Cambridge, MA, 2008.
4. The College Board. California Summary of AP Program Participation and Peformance (2013); http://research.collegeboard.org/programs/ap/data/participation/2013.
Figure. Young women make up approximately half of the Exploring Computer Science student population in LAUSD.
The Digital Library is published by the Association for Computing Machinery. Copyright © 2014 ACM, Inc. | https://cacm.acm.org/magazines/2014/7/176208-that-classroom-magic/fulltext |
In some circumstances, financial advisors may come to owe their clients fiduciary duties. This is dependent on a number of circumstances and can have varying effects on the relationship and importantly, on the advisor’s responsibilities to the client. Breach of these fiduciary duties of financial advisors gives rise to various modes of recovery for the client. In this article we discuss what a fiduciary duty is, how it can arise and what fiduciary duties financial advisors may owe their clients.
What is a Fiduciary Duty?
Fiduciary duties compel the party undertaking the responsibility to place the interests of their client ahead of their own. Fiduciary duties are generally negative in nature, meaning they prevent certain actions being taken but rarely impose some positive duty to act. For example, fiduciaries must not profit to the detriment of their client and must avoid conflicts of interest. The duty is strictly interpreted, requiring the fiduciary to avoid even the perception of conflicting interests. For this reason, fiduciary duties may in some circumstances be breached even where the fiduciary has not acted dishonestly or with an intention to defraud the client, or where the client has not suffered a loss despite fiduciary misconduct.
A. Where Can Fiduciary Duties Arise?
Fiduciary relationships arise in many common professional arrangements, such as that between a company director and their organisation, between lawyer and client or between a financial advisor and client. The fiduciary will generally take some responsibility for acting in a way that can affect the client’s interests, thereby making the client reliant on the loyalty of the fiduciary. The source of the duty is the trust and reliance placed in the fiduciary by the client, as is common where retail clients consult professional service providers for advice.
B. Can Financial Advisors Owe Fiduciary Duties?
Fiduciary duties of financial advisors can arise both through the common law principles developed over the years and through the statutory scheme of responsibility outlined in the Corporations Act 2001 (Cth). At general law in cases such as Daly v Sydney Stock Exchange, where a financial services provider provides specialised advice to a client in circumstances where the client is reliant on the advisor’s expertise, a fiduciary duty can be held to arise. This has since been strengthened through legislative amendments; in particular Part 7.7A, Division 2 of the Corporations Act. Division 2 requires financial services providers to act in the ‘best interests’ of their client. This imparts something of a positive duty, in that it requires providers to act reasonably to understand the client’s needs and interests and to provide appropriate advice to them on that basis.
C. What Can Happen to Fiduciaries Who Breach their Duty?
Financial Advisors who fail to meet the high fiduciary standards of loyalty and competence can be penalised under both the general law and the Corporations Act. Fiduciaries who improperly profit can be made to provide those profits to the client, detriment suffered by a client due to fiduciary misconduct can be compensated and contracts between the parties can be terminated where beneficial to the client. Under the legislation, financial penalties can be levied and financial service providers who have acted improperly can be disqualified from practicing.
Fiduciary duties of financial advisors can arise where a party undertakes responsibility to provide professional advice to a client who is reliant on the provider’s loyalty and competence. Financial advisors who deal with retail clients are a prime example. Not every interaction between an advisor and client will be fiduciary in nature and not every action undertaken will have the protection of fiduciary duties. If you would like more information on what duties your advisor may owe you or you feel that your advisor may have acted improperly and is in breach of their obligations to you, seek legal representation.
To find out more about financial services law check out our Resources Centre. If any of the issues in this article are relevant to you please get in touch today.
This article was authorised by Warwick Heeson. | http://oppenheimlegal.com.au/fiduciary-duties-of-financial-advisors/ |
Brussels, March 6th - Friends of the Earth Europe has demanded that governments focus on the impending threat of climate change when they settle Europe's energy future at the EU Spring Council at the end of this week. As EU leaders agree on the energy Action Plan on Friday, hundreds of activists from fifteen countries across Europe will form a Giant EU Energy Flag right outside the meeting, demanding that governments "Stop Climate Change. Cut energy waste. Choose renewables."
Jan Kowalzig, climate campaigner at Friends of the Earth Europe, said:
"As EU leaders seal Europe's energy future, they absolutely must make fighting climate change the guiding imperative and should not compromise on that goal in their scramble for energy security. The EU's energy Action Plan, due to be agreed upon at the Spring Council, will fall a long way short in making Europe's energy more sustainable unless targets for both renewables share and reducing greenhouse gases are raised and tightened and a real target is adopted for cutting energy waste."
"People across Europe are sick of their energy coming from dirty sources. Friends of the Earth will be representing their views right outside the EU Spring Council on March 9th, as hundreds of activists will form a Giant EU Energy Flag and demand that their governments stop climate change, cut energy waste and choose renewables."
The Heads of States look set to adopt a unilateral target for the EU of reducing greenhouse gas emissions by only 20% by 2020, compared to 1990 levels, despite their concurrent acceptance that developed countries must cut emissions by 30% in the same timeframe to avoid catastrophic climate change. Friends of the Earth has highlighted this double standard in recent weeks and insists that the EU set itself a target to cut its domestic emissions by at least 30% by 2020, compared to 1990 levels.
"It would be a dangerous discrepancy to only commit to reducing emissions by 20% by 2020, when scientific and political analysis all point to 30% as the critical reduction needed to avoid catastrophic climate change. A target of less that 30% will indicate to the international community that Europe is shirking its responsibility on climate change." Mr Kowalzig said.
On renewables, a target is likely to be adopted to provide 20% of primary energy from renewable energy sources by 2020. Friends of the Earth continues to push for this target to be higher and for it to be toughened into a binding target. In addition, the group warns that one broad target for overall energy use will not be sufficient to stimulate investment and technological advancement across a range of varied sectors like electricity generation or heating and cooling - a problem that even the European Commission itself has acknowledged.
"Europe is waking up to the fact that renewable energy is clean, safe and economically viable, so a wise investment. But as it is a young market, governments need to secure investor confidence. Just an overall target for the share of renewable energy in the total energy mix is too vague to give clear guidance. We also need binding and separate sub-targets for of 35% for electricity production and 25% for the heating and cooling sector." Mr Kowalzig added.
Regarding energy efficiency, the European Commission and Energy Ministers alike have acknowledged that Europe has the potential to cut energy waste by 20% by 2020 at zero net costs. No doubt the Heads of States will reiterate this on Friday, but Friends of the Earth underlines that governments have so far failed to firm up this potential into an actual target. No concrete commitment has yet been made by Member States that they will actually take action to achieve this 20% saving.
"Europe has a vast potential to stop wasting energy, but EU governments constantly fail to agree concrete steps to tap into that potential. Europe's governments must swap their grand words with real action, based on binding targets and powerful legislation," Mr Kowalzig concluded .
***
NOTES:
The EU is capable of achieving 25 percent renewables share given the technological improvements and opportunities that exist. ("Target 2020 - Policies and Measures to reduce GHG in the EU"; Wuppertal Institute and WWF 2005; see http://assets.panda.org/downloads/target_2020_low_res.pdf)
The European Parliament has also adopted a resolution calling for a target of 25 percent renewable share (February 14th 2007): See text of resolution.
The European Commission's own impact assessment of the proposed "Renewable Energy Roadmap" concludes that failing to agree sector-specific targets will delay technological development and commercial deployment of renewable energies and increase climate change abatement costs in the long-term. It notes that "a single broad target is too unfocused and would fail to provide sufficient guidance and certainty to businesses operating in specific sector of the market."
See 'Renewable Energy Roadmap - Impact Assessment', SEC (2006) 1719. Furthermore, the European Parliament has adopted a resolution calling for sector specific targets for heating and cooling and electricity (February 14th 2007). See text of resolution. | http://action.foeeurope.org/press/2007/March6_JK_preSpringSummit.htm |
The role of the public sector in the development and implementation of animal health policies.
Although it is widely accepted that both the public and private sectors have a role to play in improving animal health, the debate centers on the balance between the two. The comparative advantages of each sector depend on: (i) whether the targeted disease can affect humans; (ii) its degree of contagiousness; (iii) whether it is endemic or exotic; and (iv) the economic costs associated with the disease. The rationale for public intervention is weaker for non-contagious than for contagious diseases; governments, though, can play a support role in several areas: e.g. generation and dissemination of information on health management, fostering participation of producers' organization in the eradication of endemic diseases, or helping private research institutions and funders to overcome the hurdles posed by widespread uncertainty and high costs associated with basic research. Control and eradication of contagious diseases in characterized by strong externalities; bio-security measures implemented by any producer affect his/her neighbors. A major factor affecting the design of appropriate health policies for contagious diseases is whether the disease is endemic or exotic in a particular population. The externality exists for endemic diseases--but for exotic diseases there is only the possibility of an externality (which materializes solely in the case of an outbreak). For exotic diseases, therefore, the perception of the risk of an outbreak is a major determinant of producers' behavior and of public prevention policies. The perception by producers and policy makers of the probability of occurrence of an outbreak of an exotic disease depends on the time elapsed since the last outbreak in the country or in neighboring countries. In general, perception of the risk of an outbreak will be lower than the true risk for most exotic diseases that have been absent for many years--but might be higher than the true risk if an outbreak was recently reported in the region. Taxes and private insurance have been proposed to internalize the externality; however, these policies cannot solve the health externality. Alternative programs (such as joint public-private eradication campaigns) are proposed as a means to minimize the externality.
| |
ISSN: 0885-8608.
The Natural Areas Journal is one of the leading voices in natural areas management and preservation. The Journal, published quarterly by the Natural Areas Association, provides a forum for communication among persons involved in the identification, preservation, protection and management of natural areas and natural diversity. Subscribers include: land and resource managers; federal, state and local government agencies; NGO managers and administrators; conservationists, botanists, conservation biologists, restoration ecologists, researchers, educators and students. The Natural Areas Journal includes peer-reviewed articles on applied conservation biology, ecological restoration, invasive and exotic species management, ecosystems, habitat protection, fire ecology and management, natural areas research and management, and biological and bio-diversity monitoring. Also published in the Natural Areas Journal are editorials, conference and workshop announcements, state and federal natural area activities, and book reviews. | http://journalseek.net/cgi-bin/journalseek/journalsearch.cgi?field=issn&query=0885-8608 |
Routine is our comfort zone. Most of us set an alarm for the same time every day (and with the same tune), eat the same breakfast and take the same route to and from work. What’s more, a lot of us even do the same thing every time we exercise. Doing the same exact workout every single day is no good.
WHY YOU NEED TO BALANCE EXERCISE AND RECOVERY
Before getting to the explanation for why variety is good, you first need to understand what exactly is happening to your body when you’re lifting weights, going for a run, or taking a Zumba class – and after you’re done.
When you exercise, you’re placing stress on the body, which you recover from once you finish. It’s during the downtime that your muscles repair and adapt, which is what allows you to get stronger and fitter. If you jump into another workout before your body has fully recovered from your last, you interrupt your body’s natural recovery process.
Insufficient recovery can not only cause you to plateau, but it can also cause damage to your tendons, ligaments and joints which can lead to injuries such as overuse injuries. Or even worse: Long-term under-recovering can lead to overtraining syndrome, which is essentially when the body enters a stage of chronic breakdown.
How long it takes to adequately recover after a workout depends on things like nutrition – especially protein intake, stress-levels, sleep quality and quantity, age, training age and more. As a rule: The heavier, harder, and more intense a workout is, the longer it takes your body to recover.
IS IT OK TO DO ANY KIND OF WORKOUT EVERY SINGLE DAY?
No. It is a bad idea to do the same workout seven days a week. For starters, different workouts require different recovery times. For example, a recent study published in the International Journal of Sports Physiology and Performance found it takes 48 hours to recover from a bench press workout, while another study published in the Journal of Physical Therapy Science found it took 72 hours to fully recover from a sprint workout.
Do the same workout every single day, and you’re giving your body less than 24 hours to recover. Under-recovering can result in lack of overall progress towards your goals and/or injury. You might be thinking, well, what if I am recovering properly between workouts.
Ultimately, if you’re doing a workout that’s gentle enough on the body that it’s safe to do every single day, that workout isn’t imposing enough demand on the body to make you fitter.
WHAT IF YOU’RE ONLY WORKING OUT A FEW DAYS A WEEK?
What if you only exercise four or five days a week, but every time you do, you’re doing the exact same workout? The answer doesn’t change. Whether it’s four days a week, or seven, if you do the same workout every time you exercise, you will quickly get diminishing returns on that exercise routine. Beyond that, doing the same workout every day is boring.
Doing the same workout every single day is like commuting home from work every day, at a certain point you zone the whole thing out because it’s so tedious. If you’re slinging around weights or logging miles when your mind isn’t in it, you’re one misstep or bad rep away from injury. Plus, exercising without being in the zone makes the workout less effective.
Take the deadlift, for example: You may be able to stand the weight up without being mentally engaged, but if you lift without first bracing your core and squeezing your shoulder blades together, you reduce the movement’s muscle-building potential.
CAN YOU DO THE SAME ACTIVITY BUT A DIFFERENT WORKOUT?
What if you’re really in love with running? Or you’re truly passionate about lifting weights? It’s OK to do the same style of workout every day, but not the exact same workout.
For example, if you run the exact same route, at the exact same pace every single day, you will plateau quickly. However, if your weekly run schedule alternates between fartlek runs, hills and tempo run, varying distances and routes, you can become a better runner quickly. Ideally, though, your program shouldn’t just include running.
Someone training for a running race will become a better runner if their program includes yoga and strength training. Another example: strength training. You can do a strength or weight workout every single day, so long as you alternate the muscle groups you’re working. That allows you to rest one muscle group while working the other. If you do leg day on Monday, on Tuesday, when you’re targeting your back and biceps, your legs are recovering.
As with running, though, a balance of strength and cardio is optimal. While strength training can be taxing on your cardiovascular system, it’s not the most efficient form of cardio. In general, most people are better off also doing 15 to 20 minutes of more traditional cardio two or three days a week.
WHAT ABOUT HIIT WORKOUTS?
The one activity you really shouldn’t be doing every single day, even if you switch up the movements? High-intensity interval training (HIIT). True HIIT training should only be done, even by elite athletes, two to three times a week, with an emphasis on recovery in between.
HIIT training four to five times a week for the average athlete can be extremely detrimental to reaching their goals. HIIT training – much more so than lower-intensity exercises like yoga, Pilates, or jogging – damages the muscle tissues and drains them of stored energy. Because there is more damage, more time is needed for adequate recovery.
If you do a HIIT workout on Monday, instead of another one the next day, you should be doing a lowerintensity workout. You can’t recover from a HIIT workout while doing another, but you can recover from it while on a long walk. If walking isn’t your thing, try biking, swimming, jogging, gentle yoga, or tai chi.
THE BOTTOM LINE
When it comes to exercise, smarter and harder is generally better than same and more. That means switching up your workouts each day (at least the muscles they target) so that you can go hard enough in one workout to need at least 24 hours to recover from it. To get fitter, you need to impose stress on the body.
If you do something so easy that you’re not actually fatiguing your body, you’re not reaping most of the benefits of exercise. Ultimately, the best workout schedule comes down to your goals. If you’re a bodybuilder or powerlifter training for the stage or a competition, your program is going to look different than that of someone who’s training for a marathon or someone who wants to be able to squat snatch 1.5 times body weight.
But for the average exerciser – two to four days of strength training (half lower-body days, half upper-body days), two days cardio training (think: running, biking), and one day of “body movement training,” which includes things like yoga, martial arts, dance, and tai chi. While this is what “an ideal week” would look like, how everybody responds to an exercise program or workout is different, Hale says.
It’s important to check in with your body every day and ask it what it truly needs that day. If it’s telling you to take it easy on a specific day, you’d be smart to listen. | https://www.3dleisure.com/how-bad-is-it-to-do-the-same-workout-every-day/ |
Q:
Intersection angle for two orbits?
If there are two circular orbits, each with the same semi-major axis, and the two orbits only differ in inclination and RAAN; what is the intersection angle between the two? Example: two satellites in two such orbits, both with RAAN=0 and one with inc=0 and one with inc=90; these two satellites would have a strike angle of 90 degrees relative to their velocity vectors. But what is the formula for calculating the intersect angle for any given RAAN and inclination?
A:
The angle at which the orbits intersect is the same as the angle between their planes, which is the same as the angle between their normal directions.
Thus the intersection angle $\alpha$ is given by
$$\cos\alpha=\hat{\mathbf{n}}_1\cdot\hat{\mathbf{n}}_2=\cos\theta_1\cos\theta_2+\sin\theta_1\sin\theta_2\cos(\phi_1-\phi_2)$$
where $\theta$ is the inclination, $\phi$ is the RAAN, and
$$\hat{\mathbf{n}}=(\sin\theta\cos\phi,\sin\theta\sin\phi,\cos\theta)$$
is a unit vector which is normal to the orbit.
| |
What is the composition of the earth's lithosphere?
1 Answer
Answer:
Rocks and upper mantle.
Explanation:
The name 'lithosphere' comes from the Greek words lithos, meaning 'rocky,' and sphaeros, meaning 'sphere'.
The lithosphere is Earth's outermost layer, composed of rocks in the crust and upper mantle that behave as brittle solids.
The parts of the crust that contain the world’s oceans are very different from the parts that form the continents. The continental crust is 10-70 km thick, while oceanic crust averages only 5-7 km in thickness.
The outermost part of the earth, known also as the lithosphere, is broken up into plates that are supported by the underlying mantle. New crust is formed where plates move away from each other under the oceans, and old crust is recycled back into the mantle as where plates moving in opposite directions collide. | https://socratic.org/questions/what-is-the-composition-of-the-earth-s-lithosphere |
These activities include brainstorming activities, further reading, weblinks to external sites, and enable you to examine and relect upon the methods of both real-world studies and the methods chosen by fictional nursing and midwifery students introduced in chapter one.
Activity 23.1: Example of Research Report Guidelines
See as an example, the NIHR guidelines for writing research reports:
http://www.journalslibrary.nihr.ac.uk/information-for-authors
Activity 23.2: Pros and Cons of Different Dissemination Methods
What are the advantages and disadvantages of the different ways in which a research study may be disseminated?
Activity 23.3: How to Write an Abstract
For further guidance on writing an abstract see:
http://www.academic-conferences.org/policies/abstract-guidelines-for-papers/
Happell, B. (2008) A no tears approach to writing an abstract for a conference presentation. International Journal of Mental Health Nursing 16(6): 447–452.
Activity 23.4: What to Consider before Submitting for Publication
The following paper explores issues to consider when embarking on writing for publication:
Clark, A.M. and Thompson, D.R. (2012) Making good choices about publishing in the journal jungle. Journal of Advanced Nursing 68(11): 2373–2375.
For a comprehensive list of resources that are relevant for nurses and midwives see the link below. The resources include links to journal articles and video tutorials:
http://www.rcn.org.uk/development/research_and_innovation/kt/dissemination/publish
Activity 23.5: Comparing and Identifying Submission Criteria of Publications and Planning Your Writing Strategy
Jasmine and Charles from the class of 2016 are thinking about where they could publish their studies.
Jasmine’s study is exploring newly delivered mothers’ experiences of perineal discomfort. Charles’s study is exploring teenage girls’ experiences of anorexia.
Make a list of the journals Jasmine and Charles could consider for the publication of their studies. In addition to nursing and midwifery journals, identify potential journals which cover related subject areas.
Select two journals from your list. Ideally select contrasting journals for example:
- A high impact journal and a low, or no impact journal
- A nursing / midwifery journal and a journal covering a related subject area or discipline
- A UK and an international journal
- An Open Access and a non-Open Access journal
Compare and contrast the criteria for publication and the guidelines for authors for the two journals. List the similarities and the differences.
Which of the two journals would you recommend to Jasmine or Charles for publication?
Carl and Amy have to complete a 6,000 word literature review for their third year research module. The assignment has been launched and the submission date is in nine months’ time. Below is their course plan for the next nine months. Suggest a plan of work which will enable them to incrementally complete their assignment and submit on the required date. | https://study.sagepub.com/harveyandland/student-resources/chapter-23/web-activities |
Recent rainfall throughout the East Kootenay and the subsequent rising water levels has prompted the City of Kimberley to urge residents to take extra caution around creeks and streams or avoid them altogether.
The City said that creeks are continuing to rise, and with more rain forecast over the week, water levels are not expected to fall any time soon.
It added that people need to be very cautious around creeks now that they are deeper, moving faster than normal.
“It is especially important to keep children and pets away from rising creeks waters as they are at higher risk of falling in and getting swept downstream. Erosion is also possible with increased potential for banks giving away or debris to accumulate and break apart at any time creating extremely dangerous conditions for anyone near the creek,” said the City of Kimberley.
Kimberley said that while it does not anticipate major flooding, those that have had experience with flooding in the past should prepare in case of extreme rainfall.
A sandbag filling station has been set up by the RDEK at Centennial Hall, but visitors must bring their own shovels and gloves and maintain physical distancing, due to the ongoing COVID-19 pandemic. | https://www.myeastkootenaynow.com/8395/news/kimberley-encouraging-residents-to-stay-away-from-fast-moving-water/ |
I started my first job out of UC Berkeley in July, 1989, working as a tech writer at Boeing on the B-2. Six companies and 14 years later, on February 23, 2003, I was hired full time at Wells Fargo to work in community affairs. Today is my 15th anniversary as an employee. That means that sometime in the last few months, I officially passed the point where I have been a Wells Fargo employee longer than I have not been a Wells Fargo employee since graduating college.
Five years after being hired, I was promoted to manage the team and then, along with dear friend Melissa Buchanan, I co-led the integration of Wachovia’s and Wells Fargo’s employee giving and volunteer programs. The next year, 2009, the employee giving campaign rose to United Way Worldwide’s #1 ranking in the US for the first time ever.
This week, Wells Fargo announced that our workplace giving campaign was recognized as #1 in the US for the 9th year in a row… every year I’ve managed the group. Also, in 2017 our volunteer program recorded over 2 million hours for the first time ever.
I’ve been privileged to work with an incredible team of wonderful people–each one brilliant, dedicated, hard working, high integrity, and overflowing with compassion. It’s hard to leave such a team of people I respect deeply and am proud to call my friends, but it’s time for me to “lose sight of the shore” to discover new oceans. I will enjoy an enduring pride for all I helped build at Wells Fargo, and I know I will take a wealth of knowledge and experience into whatever I build next. I go into a new, as yet uncharted, adventure with tremendous gratitude for all the wonderful people I have worked with the last 15 years, and all the opportunity and memories the company provided. | https://blog.peterdudley.com/2018/02/23/number-one-workplacegiving-campaign-9-years-running-two-million-volunteer-hours-micdrop/?replytocom=2159 |
The Minnesota Vikings were expected to defeat the Buffalo Bills with ease on Sunday. Likewise, it was safe to assume that most Vikings’ players would be sure bets to have big fantasy football outings against a porous Buffalo defense that had allowed 78 points through the season’s first 2 games.
That, as the saying goes, is why the games aren’t played on paper.
The Bills dominated from the start, winning 27-6 in one of the largest upsets in NFL history when taking the point spread (16.5) into account. As a result, many of those “safe” bets let fantasy football players down, as only three Vikings managed to make it into double-figures in fantasy scoring for the week.
Here were the best Vikings players in fantasy football this week.
QB Kirk Cousins
Cousins came in to the game averaging 27 fantasy points per week, scoring 20 in a victory over the San Francisco 49ers before adding 34 in a tie against the Green Bay Packers. On Sunday, Buffalo forced him into 3 turnovers—2 lost fumbles in the game’s first two possessions to go with an interception—and held him to 90 yards passing entering the fourth quarter. While Cousins was able to rack up some solid garbage-time stats to make his fantasy line respectable, his overall day (296 yards, 1 touchdown, the aforementioned turnovers) led to an 11-point outing against the Bills.
TE Kyle Rudolph
The Bills have really struggled this year to defend the middle of the field, especially in the intermediate areas, so the possibility existed that Rudolph would have a big day. He didn’t, but he salvaged his line by catching a 4-yard touchdown pass from Cousins with 2:59 seconds to go in the game. Overall, Rudolph hauled in 5-of-6 targets, totaling 48 yards and that score. He scored 13.3 fantasy points on the day, which was good for the fourth-highest total at his position for the week.
WR Adam Thielen
As we predicted, Tre’Davious White shadowed Stefon Diggs, leaving Thielen to work against the Bills’ second corner and slot corner throughout the game. As we predicted, White was able to take Diggs out of the game, limiting him to 4 catches and 17 yards on the afternoon. And as we predicted, this would leave Thielen able to have a big day. While Ryan Lewis performed well throughout the portion of the game that mattered, as did rookie slot corner Taron Johnson, Thielen benefited from a lopsided score and an absurdly high target share to have a big day. Cousins threw 19 passes Thielen’s way, and he hauled in 14 of them for a total of 105 yards. While he didn’t score a touchdown on the afternoon, he did manage to score 17.5 fantasy points, and that’s in leagues that only award .5 points per reception. In leagues that give out bonuses for 100-yard performances or give a whole point reception, Thielen obviously scored even more. | https://www.buffalorumblings.com/2018/9/25/17900198/buffalo-bills-opponent-fantasy-football-recap-adam-thielen-scores-big-kyle-rudolph-kirk-cousins |
Fibonacci Numbers and Technical Analysis
While the relationship between Fibonacci numbers and technical analysis does get a considerable amount of attention, the concept can be confusing at first. As it pertains to stock pricing, the idea behind Fibonacci analysis is that the price changes in stocks (or other market-traded securities) exhibit connections to Fibonacci numbers. For technical analysts, the importance of the relationship lies between the ratios between each of the numbers in the series, rather than in the numbers themselves.
Definition of Fibonacci Numbers
Fibonacci numbers or the “Fibonacci sequence” is a set of numbers that starts with 0 and 1 with each subsequent number being the sum of the previous two. The Fibonacci sequence is often denotes as F (n) where n represents the first number in the sequence. Starting with 0, the sequence is as follows:
Rather than focus on the sequence of numbers though, mathematicians focus on the quotient between each of the adjacent terms, which is about 1.618 or, taking the inverse, 0.618. This proportion, known as the “golden ratio” has proven to be a dimensional property that is consistent throughout nature, from the smallest building blocks (atoms) to the largest celestial bodies known to man. The study of finance and pricing patterns is no exception to this phenomenon.
Using Fibonacci Retracements to Identify Support and Resistance
For technical analysts, identify areas of price support and resistance is key to developing trading strategies.
Fibonacci analysis the ratios provide indications of levels of support and resistance to technical analysts. Fibonacci ratios are determined within the series with the most commonly used ratios of .382%, .50%, .618%, 1.00%, 1.272% and 1.618%.
A Fibonacci retracement reflects a stock price reversal. When a stock price rises from low to high, the tendency is for that price to correct or “retrace” to some percentage. Fibonacci tools can assist investors in determining the percentage to identify a potential support area and whether to go long on that stock. An extension refers to retracements in excess of 100% and projections help estimate an end point for the current price move.
______________________________________________________________
The above information is educational and should not be interpreted as financial advice. For advice that is specific to your circumstances, you should consult a financial or tax advisor.
Leave a Comment
You must be logged in to post a comment. | http://stockresearchpro.com/fibonacci-numbers-and-technical-analysis/ |
The race was organized on December 12, 2017 when 872 birds were released from Weng Yai, 330 km northeast of the loft location in Bangkok. The field is reduced to 62 percent of the starting registered number of 1,425 birds. Prior to the race day, the birds were trained 22 flights from 20 km to 250 km with total combined air distance or about 2,200 km. Ninety percent or 1,293 birds were basketed for the first road training in mid-October when the weather condition was still rough and unpredictable resulting in high percentage of losses, the same situation experienced by all club races in Bangkok around that time.
Weather on the race day was quite acceptable, neither too hot nor windy. This year was the first time that we change the route by racing from the northeast direction instead of from the north. This should be easier for the birds because they will fly with the wind in the back. Liberated at 6.45 am, the first batch of 19 pigeons arrived home at 11.06.00 am The first bird attained the speed of 1263.0773 mpm. Positions were separated by fractions of second while the first 50 birds were clocked within three minutes only.
The first prize winner, C17-15602, belongs to Mr. Robert Neuschwander, a regular participant and a long time expatriate residing in Pattaya. Followed half a second later was INA17-512 an Indonesia ringed pigeon raised in Thailand and registered as a local bird. The third prize winner H17-42189, only one second behind, was a local bird entered by ‘Dream Team’. The fifth place and the first real foreign bird was entered by Hardy Kruger/Oliver Eschenberg, a new comer but very well known in OLR racing around the globe. Team Bagillit, last year final race winner, scored 6th place in this race which is the same position they got in last year first hot spot race. Jassim from Kuwait, Klap-Phetsuwan, Harrie Van Boxmeer, Jos & Lars Vercammen and Premier Stud/Mike Cooney are all familiar names who had their places in the first fifty birds whilst local Blue Blood team raked in 6 prizes in the fist 50.
Sixty three percent of the winged racers made it home in the first day indicating the race was not easy. In all, 736 birds returned and they would be trained three more to get ready for the Hot Spot 2 race scheduled on December 26, 2017. Please note also that the final race from 530 Km will be on January 9, 2017. | http://www.thailandoneloftrace.com/2017/12/2017-loft-report-hot-spot-1/ |
William was born to parents William Taylor Shirreff (a physician) and Grace Ann (nee Ballantyne) on 14 November 1910 in Carleton County, Ontario. In the 1921 census, the family is shown living at 74 Third Ave, Ottawa Ontario.
Service
- - Attended the Royal Military College of Canada (joined in 1929, student number 2117).
- - HQ Militia District No. 3 in Kinston Ontario in May 1938.
- - 7 Nov 1939 - Left Toronto to report to Barriefield Camp to join 2 Company, "G" Section, 1st Canadian Divisional Signals
- - 24 Nov 1939 - Lt. posted to No. 1 Coy, 2 Div Sigs
- - Apr 1940 - Capt with 2 Div Sigs
- - 13-22 May 1940 - proceeded overseas
- - Sep 1940 - Part of 2nd Canadian Divisional Signals. Attached to Canadian Section, GHQ effective 11 Sep 1940.
- - 23 Dec 1940 - Posted to command 2 Company, 2 Div Sigs
- - Apr 1941 - Capt with 2 Div Sigs
- - 22 May 1941 - returned to Canada
- - Dec 1941 - a Major with 5th Canadian Armoured Divisional Signals, No. 3 Squadron
- - Sep 1942 - Major. proceed from 5 Div Sigs to Senior Officers Course
- - Oct 1943 - Lt-Col at 4 Div Sigs
- - 18 Jul 1944 - arrived France 4 Cdn Armd Div Sigs
- - 31 Jan 1945 - left 4 Div Sigs (goodbye visit to No. 4 Coy)
- - 22 Mar 1945 - Chief Instructor No. 7 Canadian Signals Training Centre
- - 4 Dec 1945 to 18 April 1946 & 16 Sep 1947 to 20 Sep 1948 - Commandant Canadian Signal Training Centre
Officer of the Order of the British Empire Citation
The citation for his Military Medal read:
- Lt-Col Shirreff has displayed outstanding qualities as a comd, and great ability and energy in performing the functions of C R Sigs of this fmn throughout the whole period of it's ops in NW EUROPE. Owing to long rapid advs, constantly changing deployment and regrouping of the div, the problem of maintaining comns has, at all times, been extremely onerous. Due very largely to his untiring efforts and the keenly able and versatile mind, which he has devoted to the countless difficult and at times wholly unpredictable problems which arose, this fmn has invariably been able to operate without concern for that fundamental essential of successful ops, good comns. During the latter part of Oct and the early part of Nov 44, 4 Cdn Armd Div was given the difficult task of clearing the area NE of ANTWERP to STEENBERGEN. The enemy had ample opportunity to mine and booby trap all likely lines of adv and lateral routes. Lt-Col Shirreff's keen foresight and ingenious planning resulted in the maintenance, at all times, of good fwd and lateral comns, despite the constant changes of plan which became necessary. He has, at all times, insisted upon the highest standard of technical efficiency and soldierly conduct of the offrs and ORs under his comd. Due greatly to his own personal example and ability to draw from all whom he comds the very best of service, the sigs of this fmn have won the greatest respect and confidence of all comds of the div. Lt-Col Shirreff exemplifies the very highest tradition of service of his Corps. It can be truly said of him that he has contributed greatly to the success of this fmn's ops. [4th Canadian Armoured Divisional Signals]
Personal Life
Married Madalin Carruthers (daughter of Mr and Mrs. John Carruthers) on 17 October 1938 at St. Andrews Church in Kingston.
1974 Voters list has him living at 163 Churchill Cres in Kingston Ontario and his occupation as Real Estate.
Madalin's obituary appeared in the Kingston Whig Standard on December 3, 2005. "SHIRREFF, Madalin Carruthers A Memorial Service to celebrate the life of Madalin Shirreff will be held on Saturday, December 10th at 2 p.m. The Service will be held at Chalmers Church, corner of Clergy and Barrie Streets. If desired, a donation in lieu of flowers to the Alzheimer Society of Kingston would be gratefully appreciated." | http://www.rcsigs.ca/index.php/Shirreff,_William_Percival |
There are tons of restaurants in Las Vegas, from vegan to steak and potatoes only, with all manners of cuisine and pricepoint in between. So it’s safe to say that I’ve eaten at some seriously disappointing/overpriced/not a vegetable in sight kinds of places on The Strip. But I’m trying to keep this blog positive. So while I have tons of advice for places to stay away from, you’ll only find great vegetarian and vegan spots to eat at here.
Why? It seems counterproductive to write reviews of places you should avoid. I’d rather offer constructive ideas and tips for places that are worth checking out. Also? Writing negative reviews is exhausting and makes me angry ‘cuz I have to go back and remember how awful the service/food/drinks/all of the above was.
This also explains why sometime I won’t have a new review right away…it’s safe to assume that means I recently went somewhere I wouldn’t suggest you visit. Maybe some day I will include “negative” reviews as guidance for restaurants, chefs or hotels to stay away from. And by no means have I tried every restaurant in Vegas, so don’t assume that the absence of a review means it’s no good…it’s possible I just haven’t gotten there yet!
If you’d like to know about a specific restaurant or chef, feel free to tweet me @VegetarianVegas or leave a comment on a post and I’ll let you know if I’ve been there and my honest (off the record) thoughts. | http://vegetarianinvegas.com/2012/03/26/the-good-the-bad-and-the-not-so-veggie-friendly/ |
?
A relatively permanent change in behaviour and knowledge that occurs as a result of experience
What are 3 behaviours not dependent on learning?
Reflex Actions
Fixed action patterns
Behaviour dependent on maturation
What are reflex actions? Provide an example
Reflex actions
innate, automatic and involuntary reactions
to environmental stimuli, which
do not require prior experience and conscious processing by the brain
.
They involve a
simple
,
rapid
response to a specific stimulus and
are
adaptive for survival.
eg. Blinking in response to having air blown into your eyes
What are fixed action patterns? Provide an example
Fixed action patterns are
inborn, predispositions
to behave in a certain way when appropriately stimulated. They are
complex, sequential behavioural responses
that are unique to a particular species where every member of the species inherits the behaviour
eg. A funnel web spider creates its characteristic tubular web
What are behaviours dependent on maturation? Provide an example
Behaviours dependent on maturation are behaviours that are
genetically predetermined to occur at certain stages of an organism’s lifespan
; they require the organism to be sufficiently mentally and/or physically developed before the action can be undertaken
eg. Humans cannot walk until they are sufficiently developed mentally and physically
What are neural pathways?
An
interconnected group of neurons
organised as a network that is active during the learning process
When learning, a new neural pathway is either created or existing ones are strengthened
What is a synapse?
The
junction
where the axon terminals of the presynaptic neuron comes into close proximity with the dendrites of post synaptic neurons
What is synaptogenesis?
The
formation of new synapses and change in neural pathways
, particularly during the early brain development
What are neurotransmitters? Provide examples
Chemical substances that carry information between neurons
Glutamate
: An
excitatory
neurotransmitters that strengthens connections of synapses. It makes
pre-synaptic neurons
more likely to
fire
Dopamine
: Prompts the
growth of dendritic spines
in the post synaptic neuron
What does
plasticity of the brain
refer to?
Refers to the way the brain changes is response to stimulation form the environment. Occurs at the synaptic connections in the brain
What is developmental plasticity?
Refers to the brain's ability to modify synaptic connections as a result of learning and experiences during the growth or development of its neural structure.
What are the 5 stages of plasticity?
1. Proliferation
: where unborn baby cells become neurons and divide and multiply
2. Migration
: newly formed neurons move to their destined location
3. Circuit formation
: the axons of the new neurons form synapses with target cells
4. Circuit pruning
: Where neurons who have not made a connection die and connections are either strengthened or weakened based n whether the neurons fire together
5. Myelination
: Where the axons of the neurons become covered in myelin. It protects axons from interference and speeds up the transmission. Begins from occipital lobes to frontal lobes
What is adaptive plasticity and reorganisation?
Refers to
changes
in the
neural stucture of the brain to enable adjustments to experiences and to compensate and/or maximise remaining functions in the event of brain damage
Reorganisation
: a shift in neural connections that alter the function of a particular area of the brain
What are sensitive periods?
A specific time in development when an organism is
more responsive to learning
than any other time of development
What is experience expectant and dependent learning?
Experience expectant learning
: Occurs during sensitive periods and refers to experiences necessary for learning to occur. eg. Learning to speak the native tongue as a child
Experience dependent learning
: A form of learning that can occur at anytime eg, learning to read or write in one's native tongue
What are critical periods?
A very narrow period of time in an animal's development in which the animal is preprogrammed for learning to occur
eg. Young birds imprinting to the first moving object they see after they hatch from an egg
Brain development during adolescence
Cerebellum
: increase in the number of neurons and synapses in the cerebellum.
Amygdala
: becomes
more active during adolescence.
Corpus callosum
: thickens and there is an increase in the number of connections between the two
hemispheres.
Frontal lobe (prefrontal cortex)
: motor
movement and higher order thinking.
What is rerouting and sprouting to compensate for loss of function due to brain damage
Rerouting
: when an undamaged neuron that has lost connection with an active neuron due to damage, it seeks a new active
neuron to connect with instead.
Sprouting
: growth of new, bushier connections on a neuron’s dendrites.
What is LTP?
The long-lasting strengthening of synaptic connections between neurons, resulting in enhanced/more effective neural functioning.
Functional and structural changes include: | https://freezingblue.com/flashcards/226632/preview/mechanisms-of-learning |
Ugandan leaders joined other local and regional leaders from around the world to sign the Bonn-Fiji Commitment on Sunday at their UN Climate Change Conference summit to take further, faster action to deliver the Paris Agreement at all levels of government.
The ceremony took place on Sunday at 23rd UN Climate Change Conference of the Parties (COP23) currently taking place in Bonn, Germany from 6th – 18th November 2017.
The Ugandan delegation was led by Elias Lukwago, the Lord mayor of Kampala City Council Authority and it included Kayanja Vincent De Paul, mayor, Entebbe Municipality, Margaret Serunjoji, Mayoress Kampala Capital City Authority, Emmanuel Serunjoji, Mayor Kampala Capital City Authority and Joseph Lomonyang, Vice President Uganda Local Government Association.
According to the carbonn Climate Registry, the Kampala Capital City Authority (KCCA) has committed to reduce its Green House Gas (GHG) emissions by 22% by 2030, committed to increase its consumption of energy from renewable energy sources in Local Government by 109500 MWh by 2020 and also committed to increase its energy efficiency in Primary energy and Local Government energy consumption by 50% by 2020 compared to 2015 levels.
However, no other cities from Uganda have registered with the carbonn Climate Registry, the global reporting platform for cities, towns and regions tackling climate change which was created to support transparency, accountability and credibility.
With more than half the global population living in cities and expected to approach two thirds by 2050, the Bonn Fiji Commitment of Local and Regional Leaders to deliver the Paris Agreement pushes forward efforts to advance sustainable urban development as an integral part of urgent global climate action and the inter-linked goals of the 2030 Agenda for Sustainable Development.
This is particularly focused around Sustainable Development Goal 11 – to make cities and human settlements inclusive, safe, resilient and sustainable.
The commitment encompasses 19 initiatives, listed below, including The European Covenant of Mayors and Compact of Mayors joining forces to create the Global Covenant of Mayors for Climate & Energy - the largest coalition of over 7,400 cities from six continents and 121 countries to reduce emissions and make societies and economies resilient to climate change.
Cities are responsible for as much as 70 percent of greenhouse gas emissions from fossil fuels used for energy and transport, and 13 percent of the global urban population lives in vulnerable low-elevation coastal areas.
As of today, more than 1,000 local and regional governments from 86 countries, representing over 800 million people, have reported emissions reduction targets on the Carbon Climate Registry, which, once achieved, would result in a reduction of 5.6 gigatons of CO2 equivalent (GtCO2e) by 2020 and 26.8 GtCO2e by 2050.
Additionally, the aggregated impact of cities and local governments under the Global Covenant of Mayors for Climate & Energy (GCoM), an initiative served by the registry and two other reporting platforms, could collectively achieve a cumulative total reduction of 15.64 GtCO2e between 2010 and 2030.
Nevertheless, there are still gaps in the regulatory and financial mechanisms needed to scale up sustainable urban development.
City governments often have limited control over sectors such as energy, transport and finance, which directly and indirectly affect urban development, while only about a quarter of countries have national urban policies.
Additionally, city access to finance has thus far been limited, despite the high demand for low carbon, resilient infrastructure.
The Urban Climate Change research network says an estimated 80 percent of the costs of adapting to climate change are needed in urban areas. But much of the estimated USD 80 to 100 billion financing needed per year remains inaccessible to city governments and there is also a lack of bankable local projects reaching investors.
This week in Bonn, cities and regions have not been alone in rallying behind urban action. The Climate Summit of Local and Regional Leaders, hosted by the City of Bonn and the State of North Rhine-Westphalia, and the Marrakech Partnership Global Climate Action Agenda SDG 11 Day featured ministers and business leaders alongside mayors and city representatives.
The European Covenant of Mayors and Compact of Mayors have joined forces to create the Global Covenant of Mayors for Climate & Energy, the largest global coalition of over 7,400 cities from six continents and 121 countries advancing city-level transitions to low emission and climate resilient economies through voluntary action.
The Urban Leadership Council – a group of representatives from city networks, urban think tanks, and the private sector launches today, aiming to build high-level political commitment to sustainable urban development in rapidly urbanizing countries and provide guidance to the Coalition for Urban Transitions, an initiative overseen by C40, the WRI Ross Center for Sustainable Cities and the New Climate Economy.
R20 and Blue Orchard Finance have created the African Sub-national Climate Fund to bridge the gap between infrastructure demands and the low number of bankable projects reaching investors, by providing ready-to-invest projects and funds to support the implementation of at least 100 infrastructure projects by 2020.
ICLEI and GLISPA are launching Front-Line Cities and Islands, a coalition of coastal cities and islands on the front lines of climate change, working to build resilience across small islands through coastal city-to-island partnerships.
RegionsAdapt led by nrg4sd is pushing ahead as the first global initiative for regional governments to take concrete action, cooperate and report efforts on climate adaptation.
The West African Economic and Monetary Union (WAEMU) and FMDV are launching the WAEMU Regional Partnership for Localizing Finance to advocate fiscal decentralization and innovative financing strategies and mechanisms.
The City Climate Planner program from WRI, GBCI and ICLEI will raise the global talent base of city climate planning professionals through training and professional certifications.
PLATFORMA is the pan-European coalition representing over 100,000 local and regional governments from Europe that engage in international action. PLATFORMA is a political voice that monitors and informs European Union development policies and that has a specific focus on partnerships for climate action.
The Covenant of Mayors in Sub-Saharan Africa (CoM SSA), a regional body of the Global Covenant of Mayors for Climate & Energy, is opening the door for more Sub-Saharan cities to join efforts to expand access to sustainable and efficient energy services.
BMZ, the German Federal Ministry for Economic Development and Cooperation, has launched the Green People’s Energy for Africa to decarbonize the African energy sector.
BMZ is also convening leading institutions under the Transformative Urban Mobility Initiative (TUMI) to support the construction and expansion of sustainable mobility systems in developing and newly industrialized countries.
Climate Chance is mobilizing African cities and regions to advance implementation of the Paris Agreement.
DST, the Association of Germany Cities, is developing Sustainable Development Goal indicators for German municipalities to ensure they can align with and track progress towards global targets.
ICLEI is launching the Urban Transitions Alliance, a group of industrial and former industrial cities making a transition to become global leaders in sustainable urban development.
The SuRe Standard, developed by the Global Infrastructure Basel (GIB) Foundation is being launched to strengthen sustainable and resilient infrastructure development by guiding project owners in accounting for social, environment and governance criteria, while enabling them to communicate benefits to potential investors.
The One Planet City Challenge, an initiative of WWF and ICLEI, combines a friendly biannual competition, capacity building, technical support and public promotion, provides a way for cities to engage in long term reporting of their climate performance.
The Climate Reporting Partnership brings together CDP and the ICLEI carbonn Climate Registry, two of the leading climate reporting platforms in the world, in an effort to build a robust database of self-reported climate commitments, actions and performance tracking by public and private actors.
Planners for Climate Action, from UN-Habitat, helps ensure urban and regional planners can play a strong role in advancing global climate and sustainability goals. To this end, this initiative will improve urban and regional planning practice and planning education. | https://earthjournalism.net/stories/ugandan-leaders-sign-commitment-for-faster-climate-action |
---
abstract: 'We investigate the effects of disorder on driven lattice gases with open boundaries using the totally asymmetric simple exclusion process as a paradigmatic example. Disorder is realized by randomly distributed defect sites with reduced hopping rate. In contrast to equilibrium, even macroscopic quantities in disordered non-equilibrium systems depend sensitively on the defect sample. We study the current as function of the entry and exit rates and the realization of disorder and find that it is, in leading order, determined by the longest stretch of consecutive defect sites (single-bottleneck approximation, SBA). Using results from extreme value statistics the SBA allows to study ensembles with fixed defect density which gives accurate results, e.g. for the expectation value of the current. Corrections to SBA come from effective interactions of bottlenecks close to the longest one. Defects close to the boundaries can be described by effective boundary rates and lead to shifts of the phase transitions. Finally it is shown that the SBA also works for more complex models. As an example we discuss a model with internal states that has been proposed to describe transport of the kinesin KIF1A.'
address:
- '$\ast$ Fachrichtung Theoretische Physik, Universität des Saarlandes, 66041 Saarbrücken, Germany'
- ' Institut für Theoretische Physik, Universität zu Köln, 50937 Köln, Germany'
- ' Interdisziplinäres Zentrum für komplexe Systeme, 53117 Bonn, Germany'
author:
- 'Philip Greulich$\ast$ and Andreas Schadschneider'
title: 'Single-Bottleneck Approximation for Driven Lattice Gases with Disorder and Open Boundary Conditions'
---
Introduction
============
Driven diffusive systems play an important role in non-equilibrium statistical physics [@schmittZ; @gs]. Due to broken detailed balance they allow to investigate non-equilibrium effects. In addition, they serve as models for various transport processes ranging from vehicular traffic [@css; @book] to biological transport by motor proteins [@frey1; @lipowsky; @physlife]. The paradigmatic model is the *totally asymmetric simple exclusion process (TASEP)* which was first introduced to describe protein polymerization in ribosomes [@mcdonald]. It was solved exactly [@derrida1; @schuetz] which allows to study generic properties like the phase diagram and *boundary induced phase transitions* [@krug1] that also occur in more complex driven systems without resorting to approximations or simulations.
In contrast to the homogeneous case, much less is known for the TASEP with inhomogeneous hopping rates, i.e. disorder. Here in principle one has to distinguish particle-dependent and site-dependent hopping rates. The former case is simpler since it can be mapped onto an exactly solvable zero-range process [@evans1; @krugferr; @evans2; @evanshanney][^1]. Therefore, at least for periodic boundary conditions, this case is well understood. In contrast, in the latter case exact results are known only for a single defect in an otherwise deterministic system with sublattice-parallel dynamics [@schuetz93a; @schuetz93b; @hinrichsen]. For the general case, several numerical and (approximate) analytical investigations [@barma3; @lebowitz; @lebowitz2; @krug] have revealed interesting behaviour already for single defects and periodic boundary conditions. However, far less is known for finite defect densities or open boundary, and, especially a combination of both.
Apart from the fundamental theoretical interest in disorder effects in nonequilibrium systems, which are far from being well understood [@stinchcombe], these are also of direct relevance for applications. Typical examples are found in intracellular transport processes where molecular motors often move along heterogeneous tracks like DNA or mRNA (see e.g. [@kafri]).
In this work we consider systems with [*binary*]{} disorder, i.e. with transition rates that can take two possible values that are randomly assigned to the sites. Sites with a lower transition rate are called *defect sites* (or *slow sites* due to their influence on the average velocity), while those with the higher transition rate are *non-defect sites*.
For periodic boundary conditions the influence of single defect sites has been clarified by Janowsky and Lebowitz [@lebowitz; @lebowitz2]. The current through the system is limited by the transport capacity of the defect site leading to a density-independent current at intermediate densities. The corresponding steady state phase-separates into a high and low-density region separated by a shock. In contrast, at high and low densities the system is only affected locally by the presence of the defect.
The effects of finite defect density in a periodic system have been studied in detail in [@barma; @barma2; @krug], mainly numerically. For binary distributions of defects, Tripathy and Barma [@barma; @barma2] have classified two different regimes: 1) a homogeneous regime with a single macroscopic density and non-vanishing current, 2) a segregated-density regime, with two distinct values of density and non-vanishing current. Considering the partially ASEP where disorder was realized by inhomogeneous hopping bias, they also found a vanishing-current regime which shows two distinct densities, but with a current that vanishes asymptotically for ($L\to\infty$). They argue that phase separation can be understood by a maximum current principle: For a given mean density the system settles in a state which maximizes the stationary current. Thus the largest stretch of slow bonds acts as current limiting segment. For the same system, Juhász et al. [@juhasz1] introduced an effective potential and determined trapping times in potential wells to investigate the vanishing of the current in a finite-size scaling.
In the case of open boundary conditions, not only detailed balance but also translational invariance is broken. Although in principle one expects the same phases as in the pure system, the phase boundaries and the nature of the transitions might change. For equilibrium systems the Harris criterion [@harriscrit] allows to decide whether critical behaviour is altered by weak disorder. For nonequilibrium systems no such general statements are currently available [@stinchcombe].
As in the periodic case, for a single defect site generically disorder-induced phase separation into macroscopic regions of different densities is observed in certain parameter regimes. The presence of defects leads to a decrease of the transport capacity and the maximum current phase is enlarged compared to the pure system [@kolomeiski2]. These results have been generalized to systems with a single stretch of consecutive defects, called *bottleneck*, or two defect sites (or bottlenecks) [@chou; @dong; @dong2; @ourpaper]. It has been shown that for such systems reliable analytical approximations exist which go beyond a simple mean-field approach to take into account the relevant correlations [@chou; @ourpaper].
For open systems with a single defect (or bottleneck) the current depends on the position of the defect [@dong; @dong2; @ourpaper] if it is located close to a boundary. This *edge effect* due to the interaction between the defect and the boundary also occurs in systems with many defects and can be accounted for by *effective boundary rates* [@ourpaper].
The focus of most previous investigations was on individual realizations of defect distributions while statistical properties of defect ensembles were not considered. Numerical investigations on ensembles have been made in [@derrida2], where the influence of defects on the phase transition between low- and high-density phase of the randomly disordered TASEP *with open boundary conditions* was studied. It was shown that the position of this phase transition is sensitively sample-dependent, even for large systems. This effect is due to defects near the boundaries which is consistent with the results in [@ourpaper]. Krug [@krug] conjectured that also the maximum current is sample-dependent and is mainly determined by the longest bottleneck. In [@dong; @ourpaper] this was shown to be correct, at least for two bottlenecks which are not too close to each other. These observations lead to the *Single Bottleneck Approximation (SBA)* which is supported in this work by numerical and analytical arguments.
For applications to real systems, macroscopic parameters and quantities are most relevant. Since we have seen that macroscopic quantities can depend on microscopic ones that can differ for different defect samples, we are mainly interested in determining statistical properties, e.g. probability distributions and expectation values, of relevant quantities taking an ensemble of systems rather than looking at single samples. We therefor consider in this work a large ensemble of individual finite but large systems, while the individual values of these quantities might vary for different samples.
The goal of this work is to understand the phase diagrams of driven lattice gases and give quantitative approximations for the expectation values of critical parameter values and the maximum current. Using Monte Carlo (MC) simulations, we therefore check the validity of the SBA and the concept of effective boundary rates on individual samples not only in the disordered TASEP, but also in a more complex model with internal states (NOSC model without Langmuir kinetics [@NOSC1; @NOSC2], see \[app-NOSC\]), which is a model for intracellular transport with KIF1A motor proteins[^2]. With the help of extreme value statistics these principles are used to derive approximations for expectation values (Sec. \[expect val Jmax\]). After checking the accuracy of the SBA we discuss in Sec. \[sec-corr\] the relevance of various possible corrections, e.g. through edge effects or effective interactions between the bottlenecks. Finally, in Sec. \[exp\_PD\] the influence of the disorder on the phase diagram is investigated in more detail.
Model definition {#sec-def}
================
Although our considerations are rather general, we focus here on the prototypical driven lattice gas, the *totally asymmetric simple exclusion process (TASEP)*. The TASEP is defined on a lattice of $L$ sites which can either be empty or occupied by one particle. A particle at site $j$ can move forward to its neighbour site $j+1$ if this site is empty. The corresponding hopping rate is denoted by $p_j$. At the boundary sites $j=1$ and $j=L$ particles can be inserted and removed, respectively. If site $1$ is empty a particle will be inserted there with rate $\alpha$. On the other hand, if site $L$ is occupied this particle will be removed with rate $\beta$. Here we will use a random-sequential update corresponding to continuous-time dynamics.
In a schematic form the transition rules read $$\label{TASEP rules}
\begin{array}{lll}
\mbox{Forward hopping in the bulk:} & \quad 10\to 01 &
\mbox{with probability } p_i\Delta t \\
\mbox{Entry at the left boundary:} & \quad 0\to 1 & \mbox{with probability }
\alpha \Delta t \\
\mbox{Exit at the right boundary}: & \quad 1\to 0 & \mbox{with probability }
\beta \Delta t\,.
\end{array}$$ As the indices indicate, the hopping rates $p_i$ are site dependent in the disordered TASEP. Other transitions are prohibited.
We will also investigate a generalization of the TASEP where each particle can be in two different states $1,2$. This model, which is defined in \[app-NOSC\], has been proposed to describe the dynamics of KIF1A motor proteins on microtubules [@NOSC1; @NOSC2]. In the NOSC model the forward-rebinding rate $\omega_f$ is a parameter controlling the average velocity of single particles for which we allow disorder.
In this paper we focus on *binary disorder* for which the hopping rates on each site can take the two possible values $p$ and $q<p$ that are randomly distributed by the rule $$p_j=
\left\lbrace
\begin{array}{l}
q \qquad\mbox{\,\, with prob. $\phi$} \\
p \qquad\mbox{\,\, with prob. $1-\phi$}
\end{array}
\right. \,.$$ The parameter $\phi$ is the *defect density*. Sites with reduced hopping rate $q$ will be called *defect sites*, or *slow sites*, while those with hopping rate $p$ are *non-defect sites* or *fast sites*. In the following we will set $p=1$ which can always be achieved by rescaling time.
For convencience a sequence of $l$ consecutive defect sites will be called *bottleneck of length $l$* in the following. A bottleneck of length $l=1$ corresponds thus to an isolated slow site.
We will focus on *“finite but large”* systems here, i.e.we neglect terms of magnitude ${\cal O}(1/L)$, but keep terms ${\cal O}(1/\ln L)$. This is motivated by the facts that (a) the maximum current decreases with increasing bottleneck length and (b) the length of the longest bottleneck grows logarithmically in $L$.
Single Bottleneck Approximation {#sec-SBA}
===============================
Besides the macroscopic structure of the stationary state in dependence of the system parameters, i.e. the phase diagram, the main focus of our investigation will be the (stationary) maximum current $J^*$ for fixed bulk parameters $p$ and $q$: $$J^* = \max_{\alpha,\beta}J(\alpha,\beta)\,.$$ In analogy with the terminology used in traffic engineering, we will call $J^*$ the *(transport) capacity*. Besides the macroscopic structure of the steady state, the transport capacity will serve as main quantitative indicator for disorder effects. Furthermore the critical values $\alpha_c$ and $\beta_c$ where the transport capacity is reached are of interest. In the pure TASEP one has $J^* = J(\alpha=1,\beta=1)=1/4$ and $\alpha_c = \beta_c = 1/2$. Both will change in the presence of defects and, based on previous results, could even be sample dependent.
Investigations in several works [@krug; @barma; @ourpaper] indicate that in the TASEP with many defects, the longest stretch of consecutive defects (*bottleneck*) is the quantity that contributes most to the transport capacity. This is plausible if one assumes a local character of the bottlenecks by characterizing them by an individual transport capacity $J^*_j(l)$ depending on the length $l$ and (possibly) position $j$. In the stationary state the total current is constant in space and is restricted by all bottleneck capacities, i.e. it can not exceed the minimum of all $J^*_j(l)$. Since the transport capacity is decreasing monotonically with bottleneck size as was shown in [@ourpaper], the minimum of $J^*_i(l)$ corresponds to the transport capacity $J^*(l^*)$ of the longest bottleneck which consists of $l^*$ consecutive defects. Smaller bottlenecks do not contribute much as long as they are not too close to the longest one [@ourpaper]. This motivates the *Single Bottleneck Approximation (SBA)*:
> \[SBA-quote\] The transport capacity $J^*$ of a disordered system with randomly distributed defects is the same as the transport capacity $J^*_{\rm
> SBA}$ of a system with a single bottleneck if the length of this bottleneck is the same as that of the longest bottleneck in the disordered system.
A similar conjecture has been made by Krug for periodic systems [@krug].
The SBA reduces the problem to the much simpler one of a single bottleneck in a system. In particular for the TASEP, efficient methods have been developed recently, namely the [*finite segment mean field theory (FSMFT)*]{} [@chou] and the *interaction subsystem approximation (ISA)* [@ourpaper].
We expect the SBA to work for generic driven lattice gases, especially for low defect density $\phi$, where the average distance between defects is large and their interactions can be neglected. As an example we have tested it not only for the TASEP, but also the disordered NOSC model in the limit of vanishing Langmuir kinetics. In both systems the average velocity of the particles is dependent on one or more transition rates. In the TASEP the hopping rate $p$ is such a parameter, while in the NOSC model the forward-rebinding rate $\omega_f$ is a parameter controlling the average velocity.
$L$ $\phi$ $l^*$ distance length $J^*_{\rm MC}$ $J^*_{\rm SBA}$ $J^*_{\rm ISA}$
------ -------- ------- ---------- -------- ---------------- ----------------- -----------------
1000 0.05 2 2 1 0.2174 0.2294 0.2229
1000 0.1 3 12 1 0.2080 0.2131 0.2080
1000 0.2 3 2 2 0.1963 0.2131 0.2080
3000 0.1 3 4 1 0.2048 0.2131 0.2084
3000 0.2 5 5 1 0.1866 0.1925 0.1901
: \[table1\]Comparison of Monte Carlo (MC) and SBA results for the transport capacity $J^*$ in the disordered TASEP with different system sizes $L$ and defect densities $\phi$. The transport capacity $J^*_{\rm MC}$ was obtained by Monte Carlo simulations for $\alpha=\beta=0.5$ (column 6) for fixed slow hopping rate $q=0.6$. This is compared with MC results ($J^*_{\rm SBA}$, column 7) and the results obtained by ISA [@ourpaper]($J^*_{\rm ISA}$, column 8) for a single-bottleneck system with one bottleneck in the bulk whose length is the same as the longest defect in the simulated disordered TASEP (column 3). Columns 4 and 5 give the distance and length of the bottleneck next to the longest one.
$L$ $\phi$ $l^*$ distance length $J^*_{\rm MC}$ $J^*_{\rm SBA}$
------ -------- ------- ---------- -------- ---------------- ----------------- --
1000 0.05 2 4 1 0.07923 0.08179
1000 0.1 3 2 1 0.07451 0.07643
1000 0.2 6 3 1 0.06659 0.06717
3000 0.1 4 6 1 0.07205 0.07213
3000 0.2 6 3 1 0.06677 0.06717
: \[table2\] Same as in Table \[table1\], but for the NOSC model without Langmuir kinetics. The forward hopping rate is inhomogeneous with $\omega_f^{\rm fast}\Delta t=0.58$ and $\omega_f^{\rm
slow}\Delta t=0.32$. The other parameters are fixed: $\omega_h\Delta t=0.8, \,
\omega_s\Delta t=0.22, \, \omega_b=0$.
First we consider a fixed realization of disorder with small defect density $\phi$. In this case we have a system with dilutely distributed bottlenecks of different lengths. We want to test the SBA for the disordered TASEP and the NOSC model. For this purpose we simulated systems with different disorder samples and compared the results for the transport capacity $J^*$ with numerical and analytical results of systems with single bottlenecks in Table \[table1\]. For each sample we identified the longest bottleneck $l^*$ and calculated the transport capactity $J_{\rm SBA}^*(l^*)$ in a single-bottleneck system with just one bottleneck of size $l^*$. One observes a quite good agreement, although the SBA seems to overestimate the transport capacity systematically. This is not surprising since effective interactions of the bottlenecks will lead to an additional decrease the current. From the results in [@ourpaper] we expect that the main effect comes from bottlenecks near the longest one. There it was shown that for systems with two bottlenecks that, although the main reduction of the transport capacity comes from the longer one, the transport capacity will further be reduced if the distance between the bottlenecks is small. To illustrate this effect we included the distance of the nearest bottleneck in Table \[table1\]. Since it is more probable to find a bottleneck close to the longest one for larger defect density $\phi$, the results tend to be less accurate with increasing $\phi$.
Surprisingly it seems that the values $J^*_{\rm ISA}$ obtained by the semi-analytical ISA method [@ourpaper] are more accurate than the numerical ones ($J^*_{\rm SBA}$) of the single-bottleneck system. This is because ISA usually underestimates the value of $J^*(l)$ in the TASEP with one bottleneck, while SBA overestimates the current. Thus errors cancel.
Probability distributions and expectation values in SBA {#expect val Jmax}
=======================================================
As we have seen, the transport capacity depends quite strongly on the particular sample of the defect distribution, i.e. the size of the longest bottleneck. Usually in real systems the exact distribution of defect sites is not known, particularly the size and position of the longest defect can not be identified. Then a statistical treatment, i.e. considering an ensemble of systems with fixed defect density, is more appropriate. It allows to determine expectation values for quantities like currents and effective boundary rates (see Sec. \[eff\_bound\_sect\]). This is especially relevant for applications e.g. to intracellular transport on cell filaments. Each cell consists of a large number of filaments that serve as tracks for motor proteins, and often inhomogeneities play an important role [@kafri]. Therefore each filament can be modeled by a driven lattice gas on a linear chain [@NOSC1; @frey2] and the quantities of interest are averages rather than the properties of individual chains.
In this section we want to approximate the expectation value of the transport capacity $J^*(q,\phi,L)$ for fixed defect density $\phi$ and finite but large system size $L$. In the last section we have shown that for small $\phi$ the capacity depends approximately on the size of the longest defect. Therefore we first determine the expectation value for the size of the longest defect in such a system.
We now consider a given sample at defect density $\phi$ and system size $L$. The $k$-th bottleneck has length $l_k$ and in the following two consecutive fast sites $j,j+1$ will be interpreted as a bottleneck of length $l=0$ located at site $j$. This implies that the number $N_b$ of bottlenecks is equal to the number $N_f$ of fast sites, since each bottleneck is followed by a fast site [^3]. The bottleneck length $l$ is a random variable with distribution $$P_\phi(l)=\phi^l(1-\phi) \,.$$ Since on average the fraction of fast sites is $(1-\phi)$, the mean number of fast sites is $\langle N_f\rangle=(1-\phi)L$. The length of the longest bottleneck is $l^*=\max\lbrace l_k| k=1,...,N_f \rbrace$. The statistics of the maximum of independently distributed random values is governed by extreme value statistics [@sornette]. It says that for a continuous probability distribution $P(l)$ that decays exponentionally or faster for $l\to\infty$, the probability density of $l^*$ being the maximum value of $N$ independently distributed random values is for large $N$ asymptotically described by the *Gumbel distribution* [@sornette] $$G(u)=e^{-u}e^{-e^{-u}}
\label{ref-gumbel}$$ where $u=u(l^*)$ is a rescaled and shifted function of $l^*$ depending on the details of the probability distribution $P(l)$.
However, since in our case the probability distribution is discrete we need to be careful. Therefore, following the derivation used in [@sornette] for continuous distributions, we derive the probability distribution of the maximal bottleneck length explicitly in order to control errors made by approximations. This will also provide an explicit expression for $u(l^*)$.
The probability of a bottleneck being shorter than $l'$ is $$\begin{aligned}
\label{P<}
P_{<}(l') &=& \sum_{l=0}^{l'-1} P_\phi(l)
=1-\phi^{l'}\,.\end{aligned}$$ Since the $l_k$ are independently distributed, we have the probability that all $l_k$ are smaller than $l'$: $$\begin{aligned}
H_{<}(l') &=& P_{<}(l')^{N_f}=\exp\left(N_f\ln(1-\phi^{l'})\right) \nonumber\\
&=& \exp\left((1-\phi)L\ln(1-\phi^{l'}))\right)\,.\end{aligned}$$ For large $L$ this probability is significantly larger than zero only for $\phi \ll 1$ and we can use the approximation $\ln(1-\phi^{l'})\approx
-\phi^{l'}$, thus $$H_{<}(l')\approx \exp(-\phi^{l'}(1-\phi)L) \, .$$ As was shown in [@sornette], the error of this correction is ${\cal O}(1/L^2)$ for exponential $P(l)$. Thus we can neglect finite size corrections.
The probability that *all* values are smaller than $l'$ is equal to the probability that the maximum $l^*$ is smaller than $l'$, $$H_{<}(l')=\sum_{l^*=0}^{l'-1} {\cal P}(l^*) \,.$$ ${\cal P}(l^*)$ is the probability that the longest bottleneck has length $l^*$ which is explicitly given by $$\begin{aligned}
\label{P(lmax)-discrete}
{\cal P}(l^*) &=& H_{<}(l^*+1)-H_{<}(l^*) \\
&=& H_{<}'(l^*+\frac{1}{2}) + {\cal O}\left((\Delta l^*)^3\right)\nonumber\\
&\approx& -L (1-\phi) \phi^{l^*+\frac{1}{2}} \ln \phi \exp\left(-\phi^{l^*+
\frac{1}{2}}(1-\phi)L\right) \nonumber\\
&=& -\ln\phi\, e^{-u} e^{-e^{-u}}
=-\ln\phi\, G(u)
\label{eq-approxP}\end{aligned}$$ where $G(u)$ is the Gumbel distribution (\[ref-gumbel\]) and we have introduced the function $$u(l^*)=-\left(l^*+\frac{1}{2}\right)\ln\phi-\ln(1-\phi)-\ln L\,.$$
Now we assume this probability distribution to be continuous. Using the Euler-Maclaurin formula the expectation value of $l^*$ becomes $$\begin{aligned}
\langle l^* \rangle &=& \sum_{l^*}^L l^*{\cal P}(l^*)
\approx \int_{0}^{L} l^* {\cal P}(l^*) \,dl^* \nonumber\\
&=& \left. l^* H_{<}(l^*+\frac{1}{2})\right|_0^L
-\int_0^L H_{<}(l^*+\frac{1}{2}) \, dl^* \end{aligned}$$ since $H_{<}(l^*+1/2)$ is the cumulative distribution function of ${\cal P}(l^*)$. Therefore we have $\lim_{l^*\to\infty} H_{<}(l^*)=1$ and it is bounded. Hence $$\begin{aligned}
\langle l^* \rangle &=& L H_{<}(L+\frac{1}{2})
-\int_{1/2}^{L+1/2} H_{<}(l^*) \, dl^* \nonumber \\
&=& L H_{<}(L+1/2) - \frac{{\rm Ei}(-L(1-\phi)\phi^{L+\frac{1}{2}})
-{\rm Ei}(-L(1-\phi)\phi^\frac{1}{2})}{\ln\phi} \end{aligned}$$ where ${\rm Ei}(x)$ is the exponential integral function. It can be expanded [@gradshteyn1]: $$\begin{array}{ll}
{\rm Ei}(-x)=\gamma_e+\ln(x)+{\mathcal O}(x) &
\mbox{ for small }|x|,\,x>0 \\
{\rm Ei}(-x)={\mathcal O}(e^{-x}) & \mbox{ for large }|x|,\, x>0
\end{array}$$ where $\gamma_e\approx 0.5772$ is the *Euler-Mascheroni constant*.
With these expansions we have for large $L$ $$\begin{aligned}
\langle l^* \rangle &=& L-\frac{\gamma_e+\ln(L(1-\phi)\phi^{L+\frac{1}{2}})
+{\mathcal O}(e^{-\ln\phi L})-{\mathcal O}(e^{-L(1-\phi)
\sqrt(\phi))}}{\ln \phi} \nonumber\\
&=& L-\frac{\gamma_e+\ln L+\ln(1-\phi)+\ln \phi (L+1/2)
+{\mathcal O}(\frac{1}{L})}{\ln \phi}\end{aligned}$$ For finite but large systems, we can neglect terms of order ${\mathcal O}(1/L)$. Thus we obtain for the expectation value of the longest bottleneck $$\label{lmax-exp}
\langle l^* \rangle=\frac{\ln L+\ln(1-\phi)+\gamma_e}{\ln(1/\phi)}
-\frac{1}{2}\, .$$ $\langle l^*\rangle $ diverges for infinite systems, as expected. However, it grows only of order ${\cal O}(\ln L)$, so that we have to keep this term in finite but large systems.
If we approximate the transport capacity $J^*(\phi)$ for small $\phi$ by the corresponding current $J_{\rm SBA}^*$ of a system with one bottleneck, the expectation value is given by $\langle J^*(\phi)
\rangle=\sum_{l^*=0}^\infty J_{\rm SBA}^*(l^*)\,{\cal P}(l^*)$. Due to the approximation by a continuous function, the norm $\sum_{l^*=0}^\infty {\cal P}(l^*)\neq 1$ can significantly deviate from one. In order to reduce this error we divide the result by $\sum_{l^*=0}^\infty {\cal P}(l^*)$ $$\label{Jmax-exp}
\langle J_{\rm SBA}^* \rangle(\phi)
=\frac{\sum_{l^*=0}^\infty J_{\rm SBA}^*(l^*)\,{\cal P}(l^*)
}{\sum_{l^*=0}^\infty {\cal P}(l^*)}\,.$$ We can now either take numerical values for $J^*(l^*)$ or (semi-) analytical ones from [@ourpaper] or [@chou]. Since ${\cal P}(l^*)$ decays fast around $\langle l^* \rangle$ it is sufficient to take into account only few terms in (\[Jmax-exp\]) in the vicinity of $\langle l^* \rangle$.
In order to display the generic character of the SBA, we show results for the transport capacity not only for the TASEP but also for the disordered NOSC model without Langmuir kinetics (Tables \[table1\] and \[table2\]). We observe a good agreement in both systems while the errors are of the same magnitude as for individual samples. This indicates that the probability distribution function for the longest bottlenecks is an appropriate approximation.
$L$ $\phi$ no. of samples $\langle J^* \rangle_{\rm MC}$ $ \langle J_{\rm SBA}^* \rangle_{\rm MC}$
------ -------- ---------------- -------------------------------- ------------------------------------------- -- -- --
500 0.1 200 0.2099 0.2244
1000 0.2 100 0.1918 0.2024
3000 0.1 100 0.2018 0.2110
3000 0.2 50 0.1866 0.1960
: \[table3\]Comparison of disorder averages in MC results and SBA results for the expectation value of the tranport capacity. The defect hopping rate is $q=0.6$. Column 4 shows the numerical results from MC simulations of the disordered TASEP. Column 5 displays results by SBA using the probability distribution (\[eq-approxP\]). []{data-label="Jmax_av table"}
$L$ $\phi$ no. of samples $\langle J^* \rangle_{\rm MC}$ $ \langle J^*_{\rm SBA} \rangle_{\rm MC}$
------ -------- ---------------- -------------------------------- ------------------------------------------- -- -- --
500 0.1 200 0.07495 0.08010
1000 0.2 100 0.06852 0.07258
3000 0.1 100 0.07438 0.075553
3000 0.2 50 0.06852 0.07258
: \[table4\]Same as in Table \[table3\] but for the NOSC model without Langmuir kinetics. The forward hopping rate is inhomogeneous with $\omega_f^{\rm fast}\Delta t=0.58$ and $\omega_f^{\rm slow}\Delta t=0.32$. The other parameters are fixed: $\omega_h\Delta t=0.8, \, \omega_s\Delta t=0.22, \, \omega_b=0$.
Corrections to SBA {#sec-corr}
==================
In the following we consider corrections to the SBA and check the quality of this approximation and the range of its validity by statistical means.
In principle, corrections to the transport capacity could come from the following effects:
- The longest bottleneck (length $l^*=\max\{l_1,l_2,\cdots\}$) is located near the boundary, not in the bulk as assumed in SBA. Since the probability that a bottleneck at a given site is smaller than $l$ is $P_<(l)=1-\phi^l$ (see (\[P<\])), the probability of finding the first longest bottleneck[^4] of length $l$ at distance $x$ from a boundary is $P(x)=(1-\phi^l)^x \phi^l$. Therefore the average distance of the longest bottleneck can be approximated as $$\begin{aligned}
\langle x\rangle &\approx& \int_0^\infty x (1-\phi^{\langle
l^*\rangle})^x\phi^{\langle l^*\rangle} \,dx=\frac{\phi^{\langle
l^*\rangle}}{(\ln(1-\phi^{\langle l^* \rangle}))^2} \nonumber
\\ &\approx& \phi^{-\langle l^*
\rangle}=\phi^{1/2}L(1-\phi)e^{\gamma_e}={\mathcal O}(L)\end{aligned}$$ where we approximated the longest bottleneck by its expectation value (\[lmax-exp\]). That means for large systems the longest bottleneck is, on average, far from the boundaries. However we see that for *finite* systems and small defect densities $\phi\ll 1$, $\langle
x \rangle$ is becoming small, so that the boundaries might affect the transport capacity. This is due to a kind of “degeneracy” of the longest bottleneck, since for small defect densities the probability that there are *many* longest bottlenecks is high (e.g. for $l^*=1$ this degeneracy is ${\mathcal O}(L)$), thus contributions of samples with a longest bottleneck near a boundary are relevant. We therefore expect deviations from the SBA for very small defect densities in finite systems. The effect should vanish in the limit $L\to\infty$ for fixed $\phi$.
- Other smaller bottlenecks near the boundary can be treated by introducing effective boundary rates (see next section).
- Corrections from other bulk defects, i.e. “defect-defect interactions”. Candidates for the leading contribution from this type of correction would be a) other long defects, i.e. defects of length $l \leq l^*$, and b) defects (of arbitrary) located in the neighbourhood of the longest one. The results of [@ourpaper] indicate that the second correction is more important.
In order to estimate the corrections we consider an ensemble of systems which all have a longest bottleneck of length $l^*$ and defect density $\phi$. The slow hopping rate $q$ is considered to be fixed. The longest bottleneck (or one of them in case of degeneracy) is located at an arbitrary position and the distribution of the other defect sites is not restricted. For this ensemble the average transport capacity is given by $$\label{eq1}
\langle J^*\rangle (\phi,L,l^*) = {\sum_{\mathbf{x}}}^{\prime}
J_{l^*}^*(\mathbf{x})P_{\phi}(\mathbf{x})$$ where $\mathbf{x}=(x_1,\ldots,x_N)$ denotes a defect configuration with defects at sites $x_j$. The sum is restricted to such configurations for which the longest bottleneck has length $l^*$ (and therefore $N\geq l^*$). $P_{\phi}(\mathbf{x})$ is the probability to find the configuration $\mathbf{x}$.
Denoting the transport capacity in SBA by $J_{SBA}$ we have $$\label{eq2}
\langle J^*\rangle (\phi,L,l^*) = J^*_{SBA}(l^*) + {\sum_{\mathbf{x}}}^{\prime}
\Delta J^*_{l^*}(\mathbf{x})P_{\phi}(\mathbf{x})$$ with $\Delta J^*_{l^*}(\mathbf{x}) = J^*_{l^*}(\mathbf{x}) - J^*_{SBA}(l^*)$. The expection value for the corrections to SBA is then $$\label{eq3}
\langle \Delta J^*\rangle (\phi,L,l^*) = {\sum_{\mathbf{x}}}^{\prime}
\Delta J^*_{l^*}(\mathbf{x})P_{\phi}(\mathbf{x})
= \sum_{N^*}{\sum_{\mathbf{x}_{N^*}}}^{\prime}
\Delta J^*_{l^*}(\mathbf{x}_{N^*}) P_{\phi}(\mathbf{x}_{N^*}),$$ where $N^*=N-l^*$ is the number of defects besides $l^*$ and $\mathbf{x}_{N^*}$ denotes the positions of these defects. In case of a degeneracy one of the longest bottlenecks is chosen arbitrarily.
Since $P_{\phi}(\mathbf{x}_N)=\phi^N(1-\phi)^{L-N}=\mathcal{O}(\phi^N)$, the leading correction in ${\mathcal O}(\phi)$ comes from configurations with one additional defect: $$\label{eq4}
\langle \Delta J^*\rangle (\phi,L,l^*) \approx
{\sum_{x_1}}^{\prime} \Delta J^*_{l^*}(x_1)P_{\phi}(x_1)
= \left( {\sum_{x_1}}^{\prime} \Delta J^*_{l^*}(x_1)\right)P_{\phi}(x_1)\, ,$$ where we have used that $P_{\phi}(x_1)$ does not explicitly depend on $x_1$ (all allowed defect positions are equally probable).
As long as the longest bottleneck is far from the boundaries, which we can be assumed for large systems, the transport capacity does not depend explicitly on its position [@ourpaper]. Hence, instead of $x_1$ we can also use the relative position $d$ of the additional defect to the longest bottleneck to characterize the configuration. If the defect is right of the longest bottleneck, we have $d>0$, else $d<0$. Then we obtain the following necessary condition for the SBA to work for large systems ($L\to\infty$): $$\label{eq5}
{\sum_{d=-\infty}^\infty}^{\prime} \Delta J^*_{l^*}(d) < \infty$$ This condition is fullfilled if the “bottleneck-bottleneck interaction” $\Delta J^*_{l^*}(d)$ decays faster than $|d|^{-1}$ for large $|d|$, which is an restriction on the interaction strength of defects. In [@ourpaper] it was shown numerically that in the TASEP this function indeed decays faster than $|d|^{-2}$, so that (\[eq5\]) is fullfilled for the TASEP.
We can further quantify the contribution of the first defect near the longest bottleneck as $P_{\phi}(x_1)=\phi(1-\phi)^{L-N}=\phi+{\mathcal
O}(\phi^2)$. Since we have to take into account defects to the right and the left of the longest bottleneck, we obtain in leading order $$\label{firstorder}
\langle J^* \rangle(\phi,l^*)\approx\left[\,{\sum_{d}}^{\prime}
\Delta J^*_{l^*}(d)\right]\phi \, ,$$ where contributions with a defect on an adjacent site of the bottleneck (i.e. $d=1$ and $d=-1$) do not appear in the sum, since they belong to longer bottlenecks. Note that this approximation does not depend on $L$.
Unfortunately currently no analytical results for $\Delta
J^*_{l^*}(d)$ are available. Therefore we have to rely on the results of MC simulations to test the considerations made in this section. We simulated systems with one bottleneck at a position far from the boundaries ($>200$ sites) and one single defect for several bottleneck lengths $l^*$ and defect position $d$ relative to the bottleneck to obtain $J^*_{l^*}(d)$. The interaction function is then obtained as $\Delta J^*_{l^*}(d)=J^*_{l^*}(d)-J^*_{l^*}$, where $J^*_{l^*}$ is the transport capacity of a single bottleneck. Since $\Delta J^*_{l^*}(d)$ should decay fast with increasing $|d|$ (see also [@ourpaper]), it is sufficient to take into account only defects within a finite distance to the bottleneck[^5]. In order to obtain the expectation value $\langle J^* \rangle(\phi)$ for arbitrary configurations, one has to average over $l^*$ in the same manner as in eq. (\[Jmax-exp\]).
In Fig. \[fig-SBA+corr\] we have plotted average values of the transport capacity obtained by MC simulations in dependence on the defect density as well for the disordered TASEP and the NOSC model. Each data point has been obtained by simulating 50 samples. For comparison the results in SBA and the leading order corrections obtained by (\[firstorder\]) are included. We see that while already the SBA appears to be a good approximation, the accuracy of the corrections over a wide range of defect densities is astonishing. It comes as a surprise that in the TASEP for larger defect densities the leading order correction, which takes into account only one additional defect, is extremely accurate. This is not expected since for larger $\phi$ there is a higher probability of having more than one defect in the vicinity of the longest bottleneck. However, these results indicate that the position of other defects beyond the first one do not significantly contribute to the transport capacity. Furthermore we see that the deviation of the SBA approaches a rather constant value for larger $\phi$, despite the factor $\phi$ in (\[firstorder\]). This indicates that for larger bottlenecks, the influence of single defects on the transport capacity is weaker than for small bottlenecks, which is consistent with results in [@ourpaper]. For small defect densities configurations where the longest bottleneck is near a boundary bottlenecks become relevant as was argued in the beginning of the section, thus a deviation of the SBA arises in this region, although the distance of other defects from the longest bottleneck is large on average.
![First order corrections to SBA as function of the defect density $\phi$ for the disordered TASEP (top) and the disordered NOSC model (bottom) using the probability distribution (\[P(lmax)-discrete\]) for averaging over $l^*$. The slow hopping rates are $q=0.6$ in the TASEP and $\omega_f^{\rm slow}\Delta t=0.32$ in the NOSC model. The system size is $L=1000$ in each case.[]{data-label="fig-SBA+corr"}](Jmax_phi_L=1000_asepdis.eps){width="65.00000%"}
![First order corrections to SBA as function of the defect density $\phi$ for the disordered TASEP (top) and the disordered NOSC model (bottom) using the probability distribution (\[P(lmax)-discrete\]) for averaging over $l^*$. The slow hopping rates are $q=0.6$ in the TASEP and $\omega_f^{\rm slow}\Delta t=0.32$ in the NOSC model. The system size is $L=1000$ in each case.[]{data-label="fig-SBA+corr"}](Jmax_phi_L=1000_noscdis.eps){width="65.00000%"}
The phase diagram of disordered driven lattice gases {#exp_PD}
====================================================
The phase diagrams of driven diffusive lattice gases that have exactly one maximum all have the same topology. This is based on a maximum current principle and shock dynamics [@gs; @popkov1; @diplom]. The class of DLGs meeting this condition includes many weakly interacting lattice gases, e.g. the TASEP and the NOSC model [@NOSC1; @NOSC2]. If disorder is included, some conceptual problems with the expression *phase diagram* arise. Usually a *phase transition* is identified by a non-analytic behaviour of a macroscopic quantity. In driven lattice gases these can be discontinuities in the density (first order transitions) or kinks in the dependence of the current on the system parameters (second order transition). Strictly speaking these transitions only occur in infinite systems, since non-analyticities can only in the *thermodynamic limit*. In disordered systems, however, there is no unique way of taking the limit $L\to\infty$ since this can not be done with a fixed defect sample and, as we have seen, macroscopic quantities like the transport capacity may be sample-dependent. Indeed, the process of taking the thermodynamic limit has to be specified, since it is ambiguous how the “new defect sites” by increasing $L$ are included. Enaud et al. [@derrida2], e.g. discussed two possibilities of defining a limit $L\to\infty$ and showed that if this limit is taken by including sites at the boundaries there actually is no unique phase transition *point* if exit rate $\beta$ is fixed and $\alpha$ is varied. For infinite systems, according to equation (\[lmax-exp\]), the length of the maximum bottleneck is infinite and thus the transport capacity would be the same as the one of a pure system with hopping rate $q$, $J^*=q/4$. In this work, however, we are explicitely interested in “finite but large systems” and we are considering ensembles, not individual samples. Since the longest bottleneck increases as ${\mathcal O}(\ln L)$, the transport capacity approaches its asymptotic value only logarithmically: $J^*(L)=q/4+{\mathcal
O}(1/\ln L)$ (see also [@krug]). For finite but large systems we have to take into account terms of the order ${\mathcal O}(1/\ln L)$. Hence in this view, we want to consider an explicit dependence on the system size and cannot take the thermodynamic limit to obtain phase transitions. In [@ourpaper] it is shown that if a single bottleneck is near a boundary, phase separation cannot occur. In this case the character of phase transitions is different, since the current is not limited by the bottleneck anymore but by the bulk exclusion like in the pure system. In this case the phase transition is of second order. On the other hand, if the bottleneck is far from the boundaries at a distance $d={\mathcal O}(L)$ there is not only a sharp kink, but also macroscpic phase separation occurs accompanied by a steep increase of the average density, indicating a first order transition.
In Sec. \[sec-corr\] we have seen that the average distance of the longest bottleneck from the boundaries is ${\mathcal O}(L)$. Hence on average we have a sharp transition for large $L$. Therefore we call this a phase transition for finite but large systems at the critical point $\alpha_c$ where the current reaches $J^*$, although this point depends on the system size.
Effective boundary rates {#eff_bound_sect}
------------------------
Investigations in a TASEP with one and two bottlenecks far from the boundaries (distance ${\mathcal O}(L)$) [@ourpaper; @dong] showed that the transport capacity only depends on the longer bottleneck, while outside of the maximum current phase the current only depends on the position of a bottleneck that is near a boundary. This *(negative) edge effect* is considerable for defects not more than $\sim$ 20 sites away from the boundaries. The observation of this effect motivates the concept of *effective boundary rates*: If the system is not in the maximum current phase, it can be treated as a pure TASEP with effective boundary rates $\alpha_{\rm
eff},\beta_{\rm eff}$ that depend on the distance and size of a bottleneck from the boundary and differ from the real boundary rates $\alpha$ and $\beta$. The concept was tested in [@ourpaper] for single bottlenecks and yielded good results. The transition from low- to high-density phase was shown to be at the line $\alpha_{\rm
eff}=\beta_{\rm eff}$ which in general does not correspond to the diagonal $\alpha=\beta$ in the phase diagram. The observations of Enaud et al. [@derrida2] in the disordered TASEP for different defect samples indicate that the concept of effective boundary rates can also be applied for the disordered TASEP.
Taking into account defects near the boundary, we can write the current in the form $J(\alpha)=\alpha(1-\alpha)+\Delta J_{\alpha}({\mathbf
x})$. Here $\alpha$ is the entry rate in the low density phase. However due to particle-hole symmetry[^6] we can transfer this result to $\beta$ and the high density phase. The defect configuration $(x_1,x_2,...)$ is defined in the same manner as in Sec. \[sec-corr\]. Indeed, taking the expectation value we can proceed analog as in the last section to obtain the average corrections in leading order $$\label{aeff-corr}
\langle \Delta J_{\alpha} \rangle(\phi)\approx \phi \left[\sum_{d_1}
\Delta J_{\alpha}(d_1)\right]$$ where $d_1$ is the position of the first defect and $\Delta
J_{\alpha}(d_1)=J_{\alpha}(d_1)-\alpha(1-\alpha)$. Thus the corrections by defects near the boundaries are of the same magnitude as the corrections to SBA, while the “defect-boundary interaction” $\Delta
J_{\alpha}(d_1)$ is in general not the same as the “defect-defect interaction” $\Delta J_{l^*}(d_1)$. Fig. \[J(phi)\_a=0.2\] shows that results obtained from (\[aeff-corr\]) yield an accurate approximation for the expectation value of the current for low entry rates.
The expectation value of the effective entry rate can then be obtained if the current density relation of the pure system $J(\rho)$ is known.
![Disorder average of the current in dependence of the defect density in the disordered TASEP with $q=0.6$, $\alpha=0.2$ (i.e. $J<J^*$). MC simulations are compared with leading order corrections to the pure current obtained by (\[aeff-corr\]).[]{data-label="J(phi)_a=0.2"}](J_phi_a=0.2.eps){width="65.00000%"}
If the relations $\alpha_{\rm eff}(\alpha),\,\, \beta_{\rm eff}(\beta)$ and their inverses $\alpha^{-1}(\alpha_{\rm eff})$ and $\beta^{-1}(\beta_{\rm eff})$ are known as well as the transport capacity $J^*$, we are in principle able to map the problem of determining the phase diagram of a disordered system on a pure system with a known dependence of the current on the boundary rates $J(\alpha,\beta)$:
1. If the system current $J(\alpha_{\rm eff},\beta_{\rm eff})<J^*$ the system globally has the same properties as the pure one if one replaces the real boundary rates by the effective ones.
2. At the points in the $\alpha-\beta$-space where $J(\alpha_{\rm eff},\beta_{\rm eff})=J^*$, a phase transition occurs to a phase separated phase occurs in which the current is independent on the boundary rates and maximal.
In particular in the TASEP we can determine the expectation value of the effective boundary rates $$\label{aeff-equ}
\langle \alpha_{\rm eff} \rangle=\frac{1}{2}-\sqrt{\frac{1}{4}-
\langle J_\alpha \rangle}$$
There is a phase transition from low density to high density phase for $\alpha_{\rm eff}(\alpha')=\beta_{\rm eff}(\beta')\Leftrightarrow
\alpha'=\alpha_{\rm eff}^{-1}(\beta_{\rm eff}(\beta))$ which in general is not on the diagonal $\alpha=\beta$. Nonetheless we have *on average* due to particle-hole symmetry $\langle J_\alpha
\rangle=\langle J_\beta \rangle$ that leads to $\alpha'=\beta'$ on average. The transition to the phase separated phase is determined by $\alpha_c(1-\alpha_c)=J^*$ or $\beta_c(1-\beta_c)=J^*$. Unfortunately, we are not able to determine the functions $\alpha_{\rm
eff}(\alpha),\beta_{\rm eff}$ explicitely, since for each $\alpha,\beta$ we need to obtain a set of functions $\Delta
J_{\alpha,\beta}$ which requires much computational effort, as long as no analytical results are available. Nonetheless, the concept of effective boundary rates can be used to extract some qualitative properties of the phase diagram, though obtaining quantitative results is difficult.
However, since corrections of the SBA are of the same order as corrections to the boundary rates, we can approximate $\alpha_{\rm
eff}\approx \alpha$ and $\beta_{\rm eff}\approx \beta$ in order to find $\alpha_c$ and $\beta_c$. In Fig. \[mass+J(a)\] we plotted the current and the average density in dependence on the entry rate $\alpha$. One observes a steep increase in the average density at the point where the plateau begins. Thus we can can characterize this transition as a first order phase transition.
![Mean density $\langle \rho \rangle$ and current $J$ in dependence of $\alpha$ for fixed $\beta=0.9$, $q=0.6$ and $\phi=0.05$ obtained by MC simulation of a system with $L=2000$ and fixed defect sample. One observes a steep increase in at the same point where the current reaches the plateau.[]{data-label="mass+J(a)"}](mass+J_a_q=0.6_phi=0.05.eps){width="65.00000%"}
Fig. \[PD D-TASEP\] displays a sketch of the phase diagram of an individual defect sample in the disordered TASEP. The transition line between HD and LD is distorted compared to the homogeneous case. Taking the disorder average, the transitions are again on the diagonal line $\alpha=\beta$. The maximum current phase is enlarged and can be characterized as a first order transition compared with the pure system, since a jump of the average density occurs at this line.
![Schematic phase diagram of the disordered TASEP for a single defect sample. It is obtained by taking the phase diagram of the TASEP in dependence of $\alpha_{\rm eff}$ and $\beta_{\rm eff}$ with one bottleneck that corresponds to the longest one and rescale the axis by $\alpha_{\rm
eff}\to\alpha,\,\beta_{\rm eff}\to\beta$. For comparison we included the phase transitions of the homogeneous TASEP with $p=1$ (dashed lines).[]{data-label="PD D-TASEP"}](PD1_tasep_dis.eps){width="70.00000%"}
Discussion and Outlook
======================
We have investigated disorder effects in driven lattice gases using the TASEP with binary hopping rates as paradigmatic example. Our results indicate that good approximations for the expectation value of the transport capacity (and other quantities) of an ensemble of driven diffusive lattice gas systems can be obtained with low effort (no averaging over disorder distribution).
The basic idea stems from the observation that the longest bottleneck (consecutive string of slow sites) is the current limiting factor. This suggests the possibility of calculating the transport capacity of given defect samples by the Single Bottleneck Approximation (SBA). It allows to use known results for systems with only one bottleneck, which are usually much better understood than the disordered ones, as an efficient and accurate description. With the help of extreme value statistics one obtains the probability distribution for the longest bottleneck from which the expectation value of the transport capacity in the SBA can be determined. Since for finite systems only a small range of bottleneck lengths gives relevant contributions to the expectation value, it is sufficient to have the results for a small number of single bottleneck systems. So even for systems for which no analytical results are available, one can get SBA results by once simulating a small number of single bottleneck systems. Using these data approximations of the transport capacity for arbitrary system size and defect density (but fixed transition rates $p$, $q$) can be obtained.
We emphasize that the results obtained here are useful in two different situations: a) for a fixed realization of disorder, if the longest bottleneck can be identified, and b) for ensembles of systems with fixed density. In the first case, one can directly identify the disordered system with the appropriate single-bottleneck case. In the second case, which is also relevant for many realistic scenarios, one can use the statistical description developed here to obtain predictions for the ensemble.
The accuracy of the SBA can be systematically improved by taking into account various corrections. We found that for small defect densities the most important correction is due to the first defect next to the longest bottleneck. It can be expressed in terms of functions $\Delta J^*(x_1)$ that measure the contribution of a single defect at position $x_1$ relative to the bottleneck. A rather general argument indicates that the SBA is applicable to a generic driven lattice gases if these functions decay faster than $d^{-1}$ with increasing distance. Indeed for both cases studied here explicitly, the disordered TASEP and the NOSC model with vanishing Langmuir kinetics, the SBA yields good results and thus we can expect it to work even for generic driven lattice gases. Surprisingly, the leading order corrections appear to be quite accurate in both systems also for larger defect densities $\phi\approx0.5$. This indicates that other defects than the first one only have very small influence on the transport capacity if large bottlenecks are present[^7]. However for finite systems at small defect densities deviations from the SBA occur that cannot be explained by defects near the longest bottleneck. Here interactions of the boundaries with (one of) the longest bottleneck can not be neglected which lead to relevant deviations (see Sec. \[sec-corr\]).
We observed that deviations from the current of the pure system also occur if the current is less than the transport capacity. However, these deviations are smaller in magnitude. This effect is due to defects near the boundaries, which was already shown before in systems with single bottlenecks [@ourpaper; @dong]. They can be treated in the same manner as corrections to the SBA and we see that in this case the first defect near the boundary is the most relevant contribution as expected from the results before. The effect can be encompassed in terms of effective boundary rates. In principle for known relations between boundary rates and transport capacity, the problem of determining the phase diagram can be mapped on a pure system using these quantities instead of the ones of the pure system[^8]. Though usually it is difficult to determine effective boundary rates explicitely that concept is useful to obtain qualitative properties of the phase diagram.
From a theoretical point of view the SBA and its corrections as well as the effective boundary rates are interesting since by these concepts disordered systems can be treated in terms of systems with single bottlenecks and two-bottleneck systems. These are much easier to investigate since one has to consider fixed defect configurations. This follows the tradition of statistical physics since microscopic properties of particles as well as particle-particle interactions (here “bottleneck-bottleneck interactions” in form of the functions $\Delta J(x)$) are used to obtain macroscopic quantities using statistics. The concept presented in this work is rather generic provided that microscopic properties can be obtained. This can for example be done by numerical simulations.
Driven diffusive systems are used as models for active intracellular transport processes. These are characterized by the directed motion of motor proteins on microtubules. However, usually the microtubuli are not homogeneous, but there are other microtubule associated proteins (MAPs) that are attached to the microtubules and can form obstacles that correspond to defects on the modelling level, impeding forward movement of motor proteins. One example is the aggregation of tau proteins in neurons of organisms suffering of Alzheimer’s disease [@mandelkov]. Furthermore there are experiments that show that modified kinesin molecules can immobilize moving kinesins which thus form obstacles on the microtubule track [@boehm]. For living organisms the current of transported objects is a measure for the performance of the transport system, which may not fall below a threshold for maintaining cell metabolism and enable cell division. Hence, the maximum current is a measure for the *transport capacity* of a microtubule. Since binding and unbinding of molecules to microtubules and kinesin occurs stochasticly depending on temperature and concentration, this system meets the criterion of a randomly disordered system. In a living organism there can be trillions of microtubules, thus the expectation value of the maximum current is a crucial quantity. The defect density rather than the individual sample of defects on a microtubule is a measurable quantity determined by the concentration of defect molecules and temperature.
Nonetheless systems with particle conservation in the bulk are not sufficient to serve as models for intracellular transport. One crucial property intracellular transport exhibits is the attachment and detachment of motor proteins. That means that one has to include these effects in the models allowing particle creation and annihilation that leads to a spatially varying current. The so called PFF model [@frey1] includes Langmuir kinetics to the TASEP and virtually takes into account the attachment and detachment of moter proteins. In [@frey2] this model was investigated with one defect site. The NOSC model in its original form [@NOSC1] also includes creation and annihilation of particles and was used to model the dynamics of the KIF1A motor protein using some kind of Brownian ratchet to perform directed movement. The success of the SBA provoces the assumption that the defects locally impose a maximum transport capacity, so that the spatial varying current may not exceed the transport capacity at any point. This problem is currently under investigation and the results may help to improve our understanding of intracellular transport with particle creation and annihilation in the presence of defects or disorder.
The NOSC model {#app-NOSC}
==============
The NOSC model is used for modelling the dynamics of KIF1A motor proteins on microtubules. These motor proteins can be in a strongly bound state (1) where movement parallel to the microtubule is not possible, and a weakly bound state (2) where it can diffuse along the microtubule. cyclic transitions between these to states leads to a directed net motion using a Brownian ratchet due to an asymmetric binding potential. The transitions rules are in the bulk $$\label{NOSC-bulk rules}
\fl
\begin{array}{lll}
\mbox{Transition to weakly bound state (hydrolysis):} & 1\to 2 &
\mbox{ with probability } \omega_h \Delta t \\
\mbox{Transition to strongly bound state on site $i$:} & 2\to 1 &
\mbox{ with probability } \omega_s \Delta t \\
\mbox{Transition to strongly bound state on site $i+1$:} & 20\to 01 &
\mbox{ with probability } \omega_f \Delta t \\
\mbox{Diffusion to the right:} & 20\to 02 & \mbox{ with probability }
\omega_b \Delta t \\
\mbox{Diffusion to the left:} & 02\to 20 & \mbox{ with probability }
\omega_b \Delta t
\end{array}$$ at the right boundary (site 1): $$\label{NOSC-left_rules}
\begin{array}{lll}
\mbox{Entry at the left boundary:} & 0\to 1 & \mbox{with probability }
\alpha\Delta t \\
\mbox{Detachment:} & 1\to 0 & \mbox{never } \\ \nonumber
\mbox{Diffusion out of the system:} & 2\to 0 & \mbox{never }
\end{array}$$ at the left boundary (site $L$): $$\label{NOSC-right_rules}
\begin{array}{lll}
\mbox{Exit} & 1\to 0 & \mbox{with probability } \beta\Delta t \\
\mbox{Attachment} & 0\to 1 & \mbox{never} \\ \nonumber
\mbox{Diffusion out of system} & 2\to 0 & \mbox{never}
\end{array}$$ In the original NOSC model [@NOSC1] also creation and annihilation of particles, i.e. Langmuir kinetics, is included, $$\label{Att/Det-rules}
\begin{array}{lll}
\mbox{Creation:} & 0\to 1 & \mbox{with probability } \omega_a\Delta t \\
\mbox{Annihilation:} & 1\to 0 & \mbox{with probability } \omega_d \Delta t \\
\end{array} \,,$$ but here we focus on the case $\omega_a=\omega_d=0$. In our simulations we have considered disorder in the forward-rebinding rate $\omega_f$ which is one of the parameters that control the average velocity of a particle. The standard parameter values are $\omega_f^{\rm fast}=0.145$ ms$^{-1}$ for the fast rate and $\omega_f^{\rm slow}=0.08$ ms$^{-1}$ for the slow rate. In this work we used a timestep of $\Delta t=4$ ms, thus the transition probabilities are obtained by four times the rates.
Acknowledgments {#acknowledgments .unnumbered}
===============
This paper is dedicated to Thomas Nattermann on the occasion of his 60th birthday. We like to thank J. Krug, L. Santen and E. Frey for helpful discussions.
References {#references .unnumbered}
==========
[99]{}
B. Schmittmann and R.K.P. Zia: *Statistical mechanics of driven diffusive systems*, in: [*Phase Transitions and Critical Phenomena*]{}, Vol. 17, eds. C. Domb and J.L. Lebowitz (Academic Press, 1995)
G.M. Schütz: *Exactly solvable models for many-body systems far from equilibrium*, in: [*Phase Transitions and Critical Phenomena*]{}, Vol. 19, eds. C. Domb and J.L. Lebowitz (Academic Press, 2000)
D. Chowdhury, L. Santen, and A. Schadschneider: *Statistical physics of vehicular traffic and some related systems*; Phys. Rep. [**329**]{}, 199 (2000)
D. Chowdhury, K. Nishiniri, L. Santen, and A. Schadschneider: *Stochastic Transport in Complex Systems: From Molecules to Vehicles*, Elsevier (2008)
A. Parmeggiani, T. Franosch and E. Frey: *Phase coexistence in driven one dimensional transport*; Phys. Rev. Lett. [**90**]{}, 086601 (2003)
R. Lipowsky, S. Klumpp, and T. M. Nieuwenhuizen: *Random walks of cytoskeletal motors in open and closed compartments*; Phys. Rev. Lett. [**87**]{}, 108101 (2001)
D. Chowdhury, A. Schadschneider, and K. Nishinari: *Physics of transport and traffic phenomena in biology: from molecular motors and cells to organisms*; Phys. of Life Rev. [**2**]{}, 318 (2005)
C. MacDonald, J. Gibbs, A. Pipkin: *Kinetics of biopolymerization on nucleic acid templates*; Biopolymers [**6**]{} 1 (1968)
B. Derrida, M.R. Evans, V. Hakim, V. Pasquier: *Exact solution of a 1D asymmetric exclusion model using a matrix formulation*; J. Phys A [**26**]{} 1493-1517 (1993)
G.M. Schütz, E. Domany: *Phase transitions in an exactly soluble one-dimensional exclusion process*; J. Stat. Phys. [**72**]{}, 277 (1993)
J. Krug: *Boundary-induced phase transitions in driven diffusive systems*; Phys. Rev. Lett. 67, 1882 (1991)
M.R. Evans: *Bose-Einstein condensation in disordered exclusion models and relation to traffic flow*; Europhys. Lett. [**36**]{}, 13 (1996)
J. Krug, P.A. Ferrari: *Phase transitions in driven diffusive systems with random rates*; J. Phys. A [**29**]{}, L465 (1996)
M.R. Evans: *Exact steady states of disordered hopping particle models with parallel and ordered sequential dynamics*; J. Phys. A [**30**]{}, 5669 (1997)
M.R. Evans, T. Hanney: *Nonequilibrium statistical mechanics of the zero-range process and related models*; J. Phys. A [**38**]{}, R195 (2005)
R. Juhász, L. Santen, F. Iglói: *The partially asymmetric zero range process with quenched disorder*; Phys. Rev. [**E72**]{}, 72 (2005)
G.M. Schütz: *Generalized Bethe ansatz solution of an one-dimensional asymmetric exclusion process on a ring with a blockage*; J. Stat. Phys. [**71**]{}, 471 (1993)
G.M. Schütz: *Time-dependent correlation functions in a one-dimensional asymmetric exclusion process*; Phys. Rev. E [**47**]{}, 4265 (1993)
H. Hinrichsen, S. Sandow: *Deterministic exclusion process with a stochastic defect: Matrix product ground states*; J. Phys. A [**30**]{}, 2745 (1997)
M. Barma: [*Driven diffusive systems with disorder*]{}; Physica A[**372**]{}, 22 (2006)
S.A. Janowsky, J.L. Lebowitz: *Finite-size effects and shock fluctuations in the asymmetric simple-exclusion process*; Phys. Rev. A [**45**]{}, 618 (1992)
S.A. Janowsky, J.L. Lebowitz: *Exact results for the asymmetric simple exclusion process with a blockage*, J. Stat. Phys. [**77**]{}, 35 (1994)
J. Krug: *Phase separation in disordered exclusion models*; Braz. J. Phys.[**30**]{}, 97 (2000)
R. Stinchcombe: [*Disorder in non-equilibrium models*]{}, J. Phys. Cond. Matt. [**14**]{}, 1473 (2002)
Y. Kafri, D.R. Nelson: *Sequence heterogeneity and the dynamics of molecular motors*, J. Phys. Cond. Matt. [**17**]{}, S3871 (2005)
G. Tripathy, M. Barma: *Steady State and Dynamics of Driven Diffusive Systems with Quenched Disorder*; Phys. Rev. Lett. [**78**]{}, 3039 (1997)
G. Tripathy, M. Barma: *Driven lattice gases with quenched disorder: Exact results and different microscopic regimes*; Phys. Rev. E [**58**]{}, 1911 (1997)
R. Juhász, L. Santen, F. Iglói: *Partially Asymmetric Exclusion Models with Quenched Disorder*; Phys. Rev. Lett. [**94**]{}, 010601 (2005)
A.B. Harris: [*Effect of random defects on the critical behaviour of Ising models*]{}, J. Phys. C[**7**]{}, 1671 (1974)
A.B. Kolomeisky: *Asymmetric simple exclusion model with local inhomogenity*; J. Phys. A [**31**]{}, 1153 (1998)
T. Chou, G.W. Lakatos: *Clustered bottlenecks in mRNA translation and protein synthesis*; Phys. Rev. Lett. [**93**]{}, 198101 (2004)
J.J. Dong, B. Schmittmann, R.K.P. Zia: *Towards a model for protein production rates*; J. Stat. Phys. [**128**]{}, 21 (2007)
J.J. Dong, B. Schmittmann, R.K.P. Zia: *Inhomogeneous exclusion processes with extended objects: The effect of defect locations*; Phys. Rev. E [**76**]{}, 051113 (2007)
P. Greulich, A. Schadschneider: *Phase diagram and edge effects in the ASEP with bottlenecks*; Physica A (in press)
C. Enaud, B. Derrida: *Sample-dependent phase transitions in disordered exclusion models*; Europhys. Lett. [**66**]{}, 83-89 (2004)
K. Nishinari, Y. Okada, A. Schadschneider, D. Chowdhury: [*Intra-cellular transport of single-headed molecular motors KIF1A*]{}; Phys. Rev. Lett. [**95**]{}, 118101 (2005)
P. Greulich, A. Garai, K. Nishinari, A. Schadschneider, D. Chowdhury: [*Intra-cellular transport by single-headed kinesin KIF1A: effects of single-motor mechano-chemistry and steric interactions*]{}; Phys. Rev. [**E75**]{}, 041905 (2007)
P. Pierobon, M. Mobilia, R. Kouyos, E. Frey: *Bottleneck-induced transitions in a minimal model for intracellular transport*; Phys. Rev. E [**74**]{}, 031906 (2006)
D. Sornette: *Critical Phenomena in Natural Sciences*; Springer, Berlin-Heidelberg (2000)
I.S. Gradshteyn, I.M. Ryzhik: Table of Integrals; Formula 3.328 and 3.481; Academic Press, Inc. London (1965)
V. Popkov, G.M. Schütz: *Steady-state selection in driven diffusive systems with open boundaries*; Europhys. Lett. [**48**]{}, 257 (1999)
P. Greulich: Diploma Thesis, Cologne University (2006)
E.-M. Mandelkow, K. Stamer, R. Vogel, E. Thies and E. Mandelkow: *Clogging of axons by tau, inhibition of axonal traffic and starvation of synapses*, Neurobiology of Aging, [**24**]{}, 1079-1085 (2003)
K.J. Böhm: private communication
[^1]: For investigations of *disordered* zero-range processes, see e.g. [@lusa].
[^2]: These motor proteins belong to the kinesin family.
[^3]: We neglect the possible exception at the right boundary.
[^4]: There can be more than just one longest bottleneck.
[^5]: In our computations we simulated systems from $d=-20$ to $d=20$.
[^6]: Note that for individual defect samples, particle-hole symmetry is broken, but for large ensembles it is restored.
[^7]: The average length of the longest bottleneck increases with increasing defect density.
[^8]: One still has to be careful since the characteristics of the phases can be different in the disordered system, although the topology is the same.
| |
The total area of the Bunaken National Marine Park is 89 065 ha and includes the five islands of Bunaken, Siladen, Manado Tua, Montehage and Nain, as well as parts of the coastal area of North Sulawesi mainland. There are more than 40 dive sites around the islands and along Manado Bay.
The eastern side of Bunaken Island offers superb wall diving and excellent snorkelling. The vertical wall has many cracks and small caves and is covered with soft and hard corals, gorgonians and huge sponges. Fishes are so abundant that it is impossible to list all the species found here.
Some examples are: barracudas, triggerfishes, parrotfishes, surgeonfishes, unicornfishes, wrasses, drummers, butterflyfishes, trumpetfish, trevallys, groupers, snappers, sweetlips, angelfishes, needlefishes and batfishes.
Possible encounters include turtles, whitetip and blacktip reef sharks bumphead parrotfish, napoleon wrasse, eagle rays and blue-spotted stingrays. The shallows are unbelievably colourful and full of life. Excellent spot for night dives, too.
The Southern side of the island has beautiful coral slopes in a deep calm bay, as well as vertical winding walls with stronger currents. This side of the island has a high diversity of fishes, corals and sponges, and good spots for snorkelling. There are huge schools of fusiliers, pyramid butterflyfishes, bannerfishes and damselfishes.
Other species you might bump into are reef sharks, napoleon wrasses, hawksbill and green turtles, great barracudas, eagle rays, snappers, scorpionfishes and leaf fishes. Invertebrates include a variety of differently shaped hard corals, black corals, gorgonians, giant barrel sponges, nudibranchs and giant clams.
The dive sites on the western and northern sides of Bunaken are vertical walls abundant with reef fishes, sharks, lobsters, whip corals and giant gorgonians with tiny Pygmy sea horses. You might also see large emperors, red snappers, groupers, dogtooth tuna, eagle rays, giant trevally, turtles and barracudas. Even manta rays, mola mola, hammerhead sharks and whalesharks have been seen around Bunaken.
The dive sites on the coast of the mainland, vary from sloping beautiful coral walls, rich with large tabular Acropora sp., reef fishes, nudibranchs, ribbon eels and unusual green tree corals, to sandy bottom environments. There are many excellent muck-diving sites, favourites among uw photographers. Giant frogfish, ghost pipefish, sea horses, mimic octopus, Spanish dancer and many, many more.
The Wreck − Half way to Manado on the coast of the mainland lays a 60-m long W.W.II shipwreck at 25-40 meters depth. The wreck is covered with colourful soft corals and it is a perfect hiding place for reef sharks and numerous other fishes. Highlights are different colour leaf fishes, scorpion fishes and nudibrachs. Next to the wreck on a sandy slope you can find an unbelievable variety of coral crabs, shrimps, nudibranchs, pipefish, ghost pipefish, crocodilefish, ribbon eels and garden eels as well as other interesting creatures.
The southern side of Siladen Island has a vertical wall in large steps. The reef top is spectacular with a huge variety of hard and soft corals, and it is therefore an excellent spot for snorkelling, too.
The northern side of the island has a reef flat with sand, gravel and massive corals. Enjoy your dive amongst reef fishes, moray eels, ribbon eels, garden eels, anemonefishes, dogtooth tuna, stingrays and turtles.
The dive sites around Manado Tua have stunning steep vertical winding walls with many cracks, canyons and small caves. You can enjoy beautiful hard and soft corals, reef fishes, turtles and reef sharks. Occasional strong currents at some sites bring big schools or barracudas and trevallies together with sharks right in front of your eyes.
Here you can expect to see very large schools of blackfin barracudas, giant and big-eye trevally, dogtooth tuna, great barracudas, napoleon wrasses, emperors, turtles, eagle rays and schools of bumphead parrotfishes. Hammerhead sharks have been encountered in the deeper waters. The amount of different coral species on the eastern side of the island has astonished even the most experienced marine biologists!
The island is surrounded by huge fields of hard corals, an amazing diversity of invertebrate fauna, big fishes and deep canyons - to be discovered by you once you get here! | https://livingcoloursdiving.com/en/diving-snorkling/diving-bunaken |
Q:
What's your opinion on MS CAB (Composite Application Block)?
I'm in the process of evaluating the use of CAB for a new .net 3.5 winform project
I plan to use the Infragistics toolset, which is known to be 'CAB compliant'
While CAB has the immediate upside of letting me focus on my business instead of coding basic docking/login/etc code, I feel like I would be able to achieve the same level of functionnality quite radpidly by myself (with the added flexibility/reactivity bonus you have when you 'own' the code).
I'm seeking some feedback on Microsoft's CAB from people using it :
Have you experienced problems/bugs ?
Do you feel like CAB saved your time ?
Are there extra functionalities I don't know about (beside Docking/Login/WorkerThreads best practices?)
A:
I had some experience using CAB a couple of years ago and my conclusion was that it too complex and had a steep learning curve. As such the benefits it offered just weren't worth the price of getting up to speed with it. However don't take my word for it, try following some of their labs and see what you think.
Jeremy Miller wrote an excellent series of blog posts about building your own CAB
http://codebetter.com/blogs/jeremy.miller/archive/2007/07/25/the-build-your-own-cab-series-table-of-contents.aspx
these are worth a look as you could just take from there what you need.
My advice would be to get on with your project rather than build a framework up front. As the project develops you should spot opportunities to refactor code into base classes and effectively harvest a framework from your application.
That way you will end up with a framework that meets your needs, and that everyone on the development team will understand. Whatever you do don't build a framework up front - there lies the path to ruin :-)
A:
We have used CAB+SCSF for a couple of projects. The learning curve is indeed steep. You will probably be up to speed after the first month.
Other cons:
Too much complexity
Pattern-itis
Code generation bloat
Hard to debug
The pros:
Follows the best practices architectural design patterns in the industry:
Model-View-Presenter
UI Composition
Dependency injection, Inversion of control
Loosely Coupled Events
Modularity
etc...
Using CAB-SCSF in the long run will mean less bugs and more maintainable code. If your project can afford the initial hit of the learning curve I will definitely recommend it.
| |
This is the second in a three part series comparing the online banks I’ve used. The first part was on ING and the third review, of SmartyPig, is coming on Thursday.
This post has been edited to provide the current interest rates for the listed companies. They are correct as of 6-2-2009.
The second bank account I opened was with HSBC. I had been using ING for a few months, but hoped to get a better rate of interest on my deposits. I looked around for other online banks, and came across HSBC as a possibility. I opened an account, and have been using it primarily as an emergency fund (although, as of late, I’ve had to take out most of the money to cover my regular expenses).
What’s the overall view of HSBC? Well, let’s see…
Ease of Use: HSBC is a bit less user -friendly than ING, requiring more time to learn how to transfer funds and use the other features of the account. It isn’t extremely complicated, but the learning curve is steeper, expecially if you’re not used to online banking.
Transfer Speed: HSBC is somewhat slower than ING, taking about three business days for deposits or withdraws to clear. While not a huge problem, this does make it more difficult to use, especially if you need to make frequent or quick money transfers.
Interest Rates: HSBC does tend to offer higher rates than ING, usually by about 0.25% to 0.50% during the time that I’ve been using it. although within the past few . (Currently, the HSBC rate is 1.55% vs. 1.50% for ING.) It’s the not the highest rate possible (SmartyPig, for one, typically offers much higher interest rates (3.05% currently)), but does tend to be fairly solid.
Extras: HSBC does seem to have slighly more security than ING or SmartyPig, requiring an extra security key (entered using the mouse) on top of the password. The effort may be enough to make you feel more comfortable about putting your money into their online account.
Overall: 3/5 The extra interest boost is nice, but the added difficulty of using the site and the time needed to transfer money decrease its utility. It’s probably best to leave it as a secondary account, and use another account for most of your online banking services. | https://www.theamateurfinancier.com/blog/online-bank-comparisons-hsbc/ |
At Brigtsen's in New Orleans, chef Frank Brigtsen makes a version of this dish with duck, accompanied by corn bread and pickled onions. Offer those sides as well as some green beans, then finish with pecan pie.
I've previously left a review of this recipe many years ago, and it's still a go-to dish. It's easy, quick, has a short shopping list, and as long as you season and taste as you go (especially while mixing together the mustard, honey, and hot sauce for the sauce), it's amazingly flavorful. I like serving it with some basmati rice that soaks up the sauce, and am partial to habanero hot sauces that don't have a lot of flavor outside of the vinegar and habanero.
This was delicious and since I doubled the recipe I'm enjoying the leftovers for lunch. I did marinate the chicken thighs for about an hour because I had a lot of orange juice I needed to use up. (that is what made me search for a recipe with chicken thighs and orange juice). The marinade was orange juice, a bit of olive oil and lots of salt. Then I drained that off and followed the recipe using the grainy mustard and adding some minced garlic and a bit more of the hot sauce. My husband liked it too and he is not a fan of fruity chicken. Just the right amount of sweet and heat.
Very good recipe. Do double the sauce. I think the grained mustard is the best for this recipe. (I didn't have any, but will try it next time.) The sauce will thicken nicely if you will just let it cook down 8 to 12 minutes. I used frozen orange juice, diluted 2 to 1, instead of 3 to 1. The sauce didn't taste like orange, but had a taste of it's own. Very good recipe.
Added 1/2t more pepper sauce, and did not have the complete 1/4c whole grain mustard, so added dijon to complete. This is very good for a quick and tasty meal. Served with garlic green beans and cornbread.
One of my favorites! If oranges aren't at their sweetest, I just use orange juice in the fridge section. I have found that weak juice from out of season oranges just doesn't give a good enough orange pow in this dish. This is my go-to recipe when thighs are on sale cuz it's so good and so darned easy!
Doubled the recipe for 8 thighs, made no changes to the ingredients. Sauce thickened up just fine, you have to let it boil while whisking continuously. Served over rice. Sauce was very tasty but a little too hot for me. If I make again I'll reduce the amount of pepper sauce. The problem with this recipe is that the sauce does not go well with chicken thighs. I have yet to find a recipe that I like for boneless skinless thighs. They have a weird, almost mealy texture. I might try this recipe with bone-in skin-on chicken breasts next time as I think this sauce is better suited to white meat.
I was looking for something different to do with chicken, and this turned out very well. The sauce did not thicken for me, so I used the old stir-fry standby of 1 T cornstarch mixed with 1/4 cup water. In minutes the dish was on the table. Quick and easy. Next time I will serve it over rice.
I can't tell you the number of times i have made this recipe! I usually buy the frozen package of bone in thighs, and then rip the skin off. i've been adding some paprika and dry mustard to the salt and pepper before cooking the chicken. I try to cook that really hot, so it gets a nice browned outside. I use stone ground mustard, easiest to find, and ALWAYS double the sauce recipe. Kids love it and call it, "Chicken with the red dots" because of the mustard seeds. Lots of jasmine rice, usually green beans, and sometimes corn bread. Love this meal!
Fast and flavorful. I used bone in thighs and drums, just cooked a little longer. I would use boneless thighs next time (as per the recipe), as their "lower profile" would simmer in the sauce a bit better.
I have a bunch of packages of chicken thighs I need to use and came across this recipe - excellent! I doubled the recipe, added about a tsp of minced garlic (which I add to just about everything), and used orange peel, as other reviewers have recommended, the peel of one orange. I also used orange juice concentrate, diluted with two cans of water rather than three, to get more orange flavor in, and upped the hot sauce. Really good, this one will be making a regular appearance at my table.
So easy and very flavorful. Using the temps and timing to pan fry the thighs gives them a great texture that you often don't get with skinless thighs. As for the degree of sweetness, I don't use prepared orange juice because I don't keep it around. I used navel oranges and squeezed 2 1/2 for the recipe. The fruit flavor, honey and mustard (used brown dijon which was great but would be even better with the textured stuff) balanced out wonderfully. Seriously good, seriously easy. Boiling the sauce down at med-high heat took the 7 minutes specified. Sauce would definitely be good on other things but we just really liked this dish.
Husband and kids loved it! Easy! Fast! Served it with jasmine rice and a side of quickly sauteed green pepper, onion and celery. Added some orange zest, which looked pretty, too. I doubled the recipe and agree that it takes longer than stated to thicken the sauce. Delicious!
This recipe is great! And when my 8 year old grandson is here, I add a little extra honey and he loves it, too!
Tasty-quick, yummy with an extra star for the quickness! One reviewer did not make the recipe as he or she thought it would be too sweet, so she suggested duck and all kinds of other changes. I would say this is NOT an overly sweet recipe, would others agree or disagree? With the grainy mustard, it doesn't seem too sweet at all to me - and I don't like fruity sweet chicken dishes.
Delicious, very easy to make. My family likes spicy, zippy food and this was perfect. They gobbled it up. Economical, too!
Not as orangey as I might like but tasty nonetheless. I might add some orange peel next time.
A good recipe that'd be better, as written, with the rich flavor of duck rather than chicken. I knew it'd be too orangey & sweet for chicken, even thighs, so I used tomato juice instead of orange & added fresh thyme & garlic, plus a bit of balsamic. Turned out good. OK. I guess I didn't really make this recipe, lol, but I would ... with duck. But I'd add ginger. Cooking is fussing to taste, & this is the best website for ideas!!
Easy recipe that delivers great flavor. I made with package of 12 thighs so I doubled the sauce -- didn't need to do that. No changes to the recipe -- reducing, thickening the sauce took a while longer that the 7 minutes, but don't skip this step. This is perfect weekday dinner for family or for company.
Delicious as is! I made some Israeli couscous...cooked in chicken broth with finely diced onion, garlic and some chopped up leftover broccoli...served the chicken and sauce over it and it was very good. I'm thinking the sauce, prepared without the chicken in it, would be tasty over grilled salmon.
I made this exactly as called for in the recipe and it was very good. For flavor and presentation, I would give it 3 forks, but I give it an extra fork because it is so easy and fast to prepare and because I was able to make it with ingredients I generally have on hand. I might try more hot sauce next time because we like a bit more kick. I also prefer chicken breasts to thighs, so might do that next time, but obviously reduce the cooking time.
If you stick to the recipe you get a wonderfully complex combination of flavors and some very tender morsels of dark meat chicken. My only deviation from the recipe was to hold it covered, in a 325 degree oven for about half an hour. Served with brown rice.
Also didnt care for the blend of these flavors, too much mustard.Added a little powdered creole spice mix, a little better but still too sweet sour. | https://www.epicurious.com/recipes/food/views/Chicken-Thighs-with-Creole-Mustard-Orange-Sauce-5665 |
Situated on a prominent corner site just off the A24 Horsham Road fronting Spook Hill on the corner of Bentsbrook Road the plot enjoys a prominent frontage approx. 2 miles south of Dorking town centre in a semi-rural and yet convenient location. Brickworks House has excellent road access via A24 to M25 and M23 and is close to the village amenities in North Holmwood with a convenience store just across the road.
DESCRIPTION
Brickworks House is a delightful two storey attached property with brick elevations and having formed offices for the brickworks offers a striking façade with marvellous detailing and arched frontage and wide feature integral porch. The premises is currently arranged as a self-contained office building over ground and first floors with two office rooms on the ground floor, storeroom, kitchen, shower room and two WC’s . There is a spiral staircase leading up the the first floor which is set out as an appealing open plan office to the front with velux windows to the front elevation and skeeling and further office/meeting room to the rear. The building benefits from charm and character with timber internal doors and exposed brick features, gas fired central heating and front courtyard garden.
Our Client as an office owner occupier did secure planning consent approval for conversion and change of use of the premises under Mole Valley District Council planning ref: MO/2004/1554 with decision date 9.11.04 to provide for three residential flats arranged as a studio flat, one bed flat and a two bed flat but due to his needs to continue in occupation for his business the consent expired. He is now retiring hence the sale with full vacant possession.
EXISTING OFFICE ACCOMMODATION
Ground floor
Room 115’5” x 12’ This is a dual aspect room to the front with suspended ceiling and built in safe.
Room 217’6” x 15’6” Dual aspect office room to the rear with suspended ceiling and fabulous feature brick open fireplace with hearth and mantle.
Inner lobby This offers a further external door and provides independent access to either the front or rear office room if required.
Store room 13’5” x 9’3” with further recess but little natural light hence store.
First Floor
Room 331’5” x 12’3” widening to 15’1” . This is the delightful triple aspect main office room to the front of the building approached via the open plan spiral staircase opening into the room with skeeling, two velux windows to the front and one to the rear.
Room 417’2 x 9’5” plus eaves. Dual aspect room to the rear latterly used as a meeting room.
PROPOSED ACCOMMODATION (from the expired consent)
UNIT NO BEDS
GIA (sq ft)
GIA (sq m)
1 1 BED
484
45.00
2 STUDIO
334
31.00
3 2 BED
624
58.00
GUIDE PRICE
Offers in the region of £340,000 for the freehold interest, subject to contract with full vacant possession upon completion.
COMMUNITY INFRASTRUCTURE LEVY (CIL)
We are advised that a CIL Liability would apply to a new scheme and the buyer must make their own investigations in this regard.
TITLE
The site is available for sale freehold with full vacant possession upon completion under the existing Title SY452543.
VAT
We are advised that the premises are not elected for VAT and therefore VAT will not be charged on the sale.
BUSINESS RATES
The premises are current listed with a Rateable Value of £11,500.
VIEWING
Strictly by appointment with the Landlord’s Sole Agents Robinsons, telephone 01308 884685.
EPC
The property has a rating of D (92) and is valid until 15.9.31. A copy of the EPC is available. | https://www.robinsonsmb.com/property-details/1326/surrey/dorking-76 |
In the last edition of The Big PictureTM, we began a series of articles focusing on Behavioural Finance. We explored what we mean by Behavioural Finance and how the concept of ‘bias’ can influence our financial decision-making. If you haven’t managed to read that article yet, you can catch up with it here.
Now we’re going to delve deeper into the first of our four categories – self-deception. It’s interesting to consider the impact these biases have on our own financial behaviour.
Biases
Key to the study of behavioural finance is the concept of behavioural bias.
Research shows that we are all hard-wired with certain preconceptions and biases. These influence the way we see ourselves and the world around us, which in turn, cause us to act in a particular way. These biases often run counter to rational thinking and logic but can be extremely powerful influences in our lives.
Self-deception is one such example of this biased thinking.
Self-deception
Research from 1980 found that 93% of Americans thought they were in the top 50% of drivers. A second piece of research, conducted in 2006, found that 74% of the 300 professional fund managers questioned, believed they had performed above average.
Both cases highlight our propensity to over-inflate our own abilities. Two common ways this can show up, are overconfidence bias and confirmation bias.
Overconfidence
It can be all too easy to fall into the overconfidence trap.
How many of us have said we don’t need the instruction manual that came with a piece of IKEA furniture, because we’re sure we can manage without – only to discover that we can’t? Or, refused to ask for directions because we’re so sure we have a fantastic internal Sat Nav that never lets us down – which leaves us in the middle of nowhere and more lost than ever?
Sometimes, overconfidence has benefits; it can allow us to sail through a situation where we might otherwise crumble under the weight of anxiety; public speaking for example. It encourages people to take the leap into the unknown, which can pay off.
But overconfidence can quickly cause problems when it means we’re not properly prepared for a situation, or we enter an environment we’re not equipped to handle. For example, deciding to take a swim in the open sea, with only modest swimming abilities and no knowledge of the undercurrents, would be a dangerous amount of overconfidence.
But overconfidence also affects decision-making in the corporate world. A study from 2000 found that entrepreneurs are more likely than others to display overconfidence bias. It’s this character trait that allows them to take risks that many would find simply too great to contemplate. Overconfidence, it is often said, drives the economy.
So, what about investors?
Overconfidence can cause investors to be unrealistic about their ability to second guess the market or a particular stock. This can lead to trading too frequently or making large bets on the short-term direction of an asset. Such decisions can have very expensive consequences.
Over-confidence bias and you
How might overconfidence affect our financial decision-making? And how can we prevent it being a problem?
As with all biases, the key is spotting when it creeps in. We can’t beat our biases per se – they are automatic and subconscious most of the time. However, what we can do, is become aware of them and create strategies to mitigate their negative effects.
Ask yourself the following questions…
- When in the past have I made a decision that has turned out, in hindsight, to have been a flawed decision?
- What influenced my decision?
- What, with the benefit of time and distance, can I see now that I couldn’t see then?
- Is it possible to have some checks or balances in place that would help me take a different approach next time?
Spotting that a bias has crept in can sometimes be enough to redress the balance. The more disciplined we become at noticing the bias, the less it will be an automatic, unconscious behaviour. Biases are at their most dangerous when deeply entrenched in our subconscious, firing on auto-pilot. Bringing them to the front of our minds, allows us to challenge their usefulness in any given situation.
Confirmation bias
Next, confirmation bias.
This is a psychological phenomenon that explains why people tend to seek out information that confirms their existing opinions and overlook, or ignore, information that disproves their beliefs; creating the proverbial ‘echo chamber.’
Those, for example, who are of the opinion that all women are bad drivers might ignore evidence of the contrary – all the cars being well driven by women – and only notice the bad drivers who happen to be female. They may also assume that it would be external factors that cause a man to drive badly, effectively applying different criteria when drawing conclusions.
I’ll leave you to debate among yourselves who’s the better driver in your household, but, confirmation bias will almost certainly come into play in your discussions!
In the world of investing, confirmation bias means that investors are more likely to seek out information that supports their original idea rather than look for information that contradicts it. And in the face of contradictory information, investors will either choose to ignore the information or interpret it in a way that supports their original view. This leads to flawed decisions based on one-sided information and an incomplete picture of the situation.
Confirmation Bias and you
Again, simply becoming aware of confirmation bias is the starting point to mitigating the negative effects it could cause us.
Ask yourself the following questions…
- Do I say things like, “the traffic lights are always on red for me” or “the cash machine is always busy when I’m in a hurry” or “all Millennials are lazy and entitled”? These beliefs may stem from confirmation bias.
- Do the newspapers or other media I follow only support my existing views or do they offer the chance to build my knowledge?
- Do I find myself tuning out when someone starts giving an opinion I don’t agree with and that I’d rather not hear?
- When I make decisions, do I ‘go with my gut’ and act on impulse, or do I actively engage in a logical and methodical approach? Relying on our gut instinct makes us more prone to self-deception and less likely to challenge our inbuilt biases and emotional influences.
Seeing the whole picture
When we act overconfidently or mistakenly think we know more than we do, we close our ears to alternative viewpoints and risk missing vital information to make informed decisions.
Behavioural biases are a part of human nature; we all have them and there is no avoiding them. However, with awareness and understanding, there are ways to navigate biases and avoid the possible pitfalls they can create.
It’s not always possible to see our biases when our only perspective is our own point of view. The behavioural coaching and lifestyle planning we incorporate into our client conversations is geared towards supporting great decision-making, in turn maximising the likelihood of successful outcomes.
Sometimes taking a moment to pause and take a step back, can allow us to see the whole picture. | https://lifemattersfp.com/behavioural-finance-series-how-our-beliefs-influence-our-financial-behaviour/ |
Old Fred Harvey Era Turquoise Bracelet With Arrows And Stamp Work
This is a beautiful example of an old Fred Harvey era cuff bracelet bezel set with an oval shape turquoise cabochon.
Below the turquoise is a pair of crossed arrows that were soldered onto the bracelet and sit above one long arrow with feathers.
The outside edge along the top and down the sides of the bracelet are decorated with Navajo design stamp work.
The top is 5/8 inch wide and the ends are 1/4 inch wide.
Diameter is 2 3/8 by 1 9/16 inches with a 1 1/4 inch opening for a circumference of 6 1/2 inches.
There are no makers marks or silver marks but this piece has been tested and guaranteed to be coin silver or higher. | https://gregdemark.com/collections/archive/products/old-fred-harvey-era-turquoise-bracelet-with-arrows-and-stamp-work |
Install / update XMapTools (Windows)
Follow the procedure below to update XMapTools 4. It only takes a few minutes to update to the latest version of XMapTools.
Step 1: Eliminate any previous version of XMapTools 4 beta (mandatory) by uninstalling the application in Settings > Apps > Apps & features.
Step 2: Begin the installation of XMapTools using the installer XMapToolsInstaller_WIN.exe (double click to open).
Note: If you get the message Windows Protected your PC, select More info and then Run anyway. Then, you need to allow this app to make changes to your device (click Yes)
Step 3: Click Next
Step 4: Select the installation folder for XMapTools C:\\Program Files\\XMapTools (default), and click Next
Step 5: If the MATLAB runtime libraries are already installed in your computer, a message indicating the installation folder for the libraries (MATLAB Runtime) will appear automatically: C:\\Program Files\\MATLAB\\MATLAB_Runtime. Click Next.
Otherwise, you must (read and) agree with the License agreement MATLAB RUNTIME LICENSE
Step 6: A confirmation window opens showing a summary, click Install
Step 7: Click Finish
You are ready to use the most recent version of XMapTools.
Thanks for updating! | https://xmaptools.ch/update-windows/ |
Write a 7 page essay on Business Law.
Joseph buys a Tefal Pan Actifry. The pan catches fire and burns the members of the family. There are three questions, the first question pertains to the moral obligation which the company owes him, the second question pertains to negligence of the product and the third question pertains to the legal contract between Joseph and the product seller.
Joseph Price was a purchaser of Tefal Actifry. He contended to the quality and way the product was made, and therefore the company was under a moral and legal obligation to sell him good quality product.
However, in the use of the product, it turned out to be a faulty one and therefore under the Sale of Goods Act 1979, the consumer, which in this case is Joseph Price, has a right to avail from the manufacturers of the faulty goods, which in this case is Tefal Actifry.
Under the law laid down in Section 48 (b) of the Sale of Goods Act, it is pertinent to note that the law allows the consumer to file for complaints when the goods sold by the seller turns out to be faulty and wrongly made. Acting on behalf of Jospeph as his legal advisor, I would advise him to file a suit against Tefal Actifry and hold them liable under Section 48 (b) in which case they shall be punished by the Court of law.
The seller in this case has to replace the goods since the actifry turned out to be non-functional, dangerous, and extremely faulty for the people who use it. Even though the company claims that only 0.4 per cent of the products are faulty, it does not rule out the fact that those who used it and in the case my client Joseph Price, and to those it had turned out to be faulty, the company should incur the damages and replace the faulty product with a better fool proof product. In the case of Bowes v Richardson & Son Ltd, 28 January 2004 the consumer was allowed to reject the faulty car after a period of 7 months. | https://dandysciencewriters.com/write-a-7-page-essay-on-business-law-joseph-buys-a-tefal-pan-actifry-the-pan-catches-fire-and-burns-the-members-of-the-family-there-are-three-questions-the-first-question-pertains-to-the-moral-obli/ |
Anyone coming here would know that I’d like the story of Lonnie Mason and his dedication to pursuing his skill long after he retired. If you’ve been coming here for a while you’d understand that I believe one of the worst things that has happened to law enforcement is the extensive reliance on informants. I’ve often called them the lazy cop’s tool.
Last Sunday I wrote about Robert Blakey and how he was instrumental in getting law enforcement the wiretap statute and the RICO law. How he worked at doing it is spelled out in the book Five Families written by Selwyn Raab. Once those laws were enacted, the federals were able to go about busting up the New York Mafia. What I found intriguing about the story that Raab tells is that this was done without any “high level informants.” It was mostly accomplished by hard and determined police work.
That’s why I have long maintained that the FBI’s top echelon informant program was misguided. That this is the case is well documented by what we saw in the Whitey case. It wasn’t high level informants that led to the destruction of the Whitey and his friends. It was a solid investigative plan and hard work.
The top echelon informant program came about because J. Edgar Hoover panicked. He’d just lost his ability to use bugs and phone taps, ELSUR in the FBI language. His brain trust convince him that using top gangsters who hung around with the top gangsters as partners with the FBI would replace the bugs. He gave up his forebodings that having his agents deal too closely with top criminals would result in them being corrupted. Old and losing it, he decided to let them partner with them. Even though it is abundantly clear the program doesn’t work, the FBI still uses it today.
The way crime is solved is not by going into business with the criminal but it’s through the hard detective work as shown by Lonnie Mason the retired New Jersey detective that enabled the police to nab a clever silver thief, Blane Nordahl. Mason had previously arrested Nardahl a couple of times . He spent his career tracing his movements. He convinced a group of southern detectives that the silver thefts were the work of Nordahl and to catch him they had to be prepared to run a marathon, that they needed patience and dedication.
Nordahl, 51, has been stealing silver pieces since he was 21 years old. It is suspected that he has stolen silver worth in the many millions of dollars and some pieces that are priceless. This case aside from showing that the tedious work of doing the job right and following leads can solve crimes, it also shows some of the other things I have found disheartening.
It should have been obvious to people that Nordahl would continue to commit crimes as soon as he was back on the street. Although he’s not violent, he does put himself in a position where violence could occur, breaking into private homes. He does violate one’s feeling of safety and well-being. He does take irreplaceable treasures from people that had been in their family for generations. He’d be someone I’d characterize as a bad person who having shown his true colors should be sentenced to the maximum amount of prison time each time he is convicted.
The NY Times article noted this: “In 1998, Mr. Nordahl, in return for a lighter sentence, made a deal with federal prosecutors that involved detailing how he had burglarized more than 100 homes.”
Now I ask you, does that sound like effective prosecution work? They have this lifelong burglar cold and tell him that if he tells them how he did it they’d let him do easy time. It’s not like giving some computer genius a break because he knows how to invade the banking system and by doing so you’ll learn something that will stop others from doing it. Nordahl’s style was unique to him so his disclosure of his methods leads to nothing other than satisfying some prosecutor’s curiosity.
As part of the deal with the federals, he avoided charges in 50 burglaries in 5 states. He got 5 years from the federals in 2000 and was released in 2001. He continued to burglar places. In 2004 he got grabbed again and got 8 years. He was out in 2010 and continued to burglar places until caught on Monday.
It’s worth considering his case. There were no informants, he worked alone. Hard work and patience brought him down. Prior deals with him led to more people being violated because he wasn’t recognized for what he is. It seems its another case of federals giving deals to bad guys that make no sense. We’ve got a long way to go. | http://mattofboston.com/lonnie-mason-shows-the-way-20075/ |
The painting “Silence” was written by Isaac Levitan in 1898. It is not widely known, however, it is an acknowledged masterpiece of the late period of the artist’s life. In these years for Levitan was typical appeal to the “twilight” theme, and the picture “Silence” is also devoted to an amazing time when the day has already died, and the night has not yet begun.
The creation of the canvas was preceded by a long work with etudes, and thanks to this on the canvas the artist was able to accurately reproduce the mood of tranquility and silence. Levitan shows the wise silence of nature awaiting the approach of night. The night has not fully come into its own.
Slowly sinking to the ground, she brings peace and tranquility. The river is stationary, reflecting the twilight darkened sky with shaggy clouds and a yellow moon. On the far shore, the village froze motionless, and near it there was a plowed field and a grove.
The artist uses a rather rich color scheme in the painting. The canvas may seem too decorative due to a combination of very juicy colors: a brown village, red shores and a leaden sky and water. The artist uses a free, wide and soft brushstroke, the finest shades and color transitions. Levitan avoids the details – they seem to be hidden by the night mist – and strives for simplicity of the motive. All these artistic techniques help to achieve generalization and express the most important thing that exists in life, in nature.
The painting “Silence” is a deep and complex story about the life of nature. In it – the clarity and wisdom of a great artist who realized the beauty and harmony of the world around him. | https://en.home-task.com/the-composition-of-levitan-s-painting-silence/ |
The point is one of the basic elements in most every geometrical system. Essentially, it is a location on a plane surface or in the space that a person is studying. The primary thing that a point indicates is location, as points do not have measurements such as area, perimeter, volume, length, or any other. Excuse the pun, but a point is the starting point for geometry.
Lines
Another fundamental concept in geometry is the line, which is a straight arrangement of points, or points all on the same level that extends infinitely in both directions. A line segment represents that portion of a line found between two specific points and all the points in between them. Lines have no thickness, and they have no curves.
Angles
Angles are likewise basic and important in the study of geometry. An angle is created when two lines intersect but they do not lie on a straight line relative to one another. The angles that we often think of consist of two rays that have the same endpoint and extend out in different directions without lying on a straight line. However, angles exist wherever two lines cross one another. Two true lines that intersect, for example, will create four angles with the lines' intersection point at their center.
Plane Shapes
Plane shapes are objects in two dimensions that are made up of line segments or curved segments or both that are all connected at corners or vertices. Plane shapes are very familiar to us, and include such things as triangles, circles, rectangles, squares, and other polygons. They can be drawn on a flat surface, known as a plane.
Measurements
The study of geometry is often the study of the measurements of plane shapes and solids. Perimeter measures the distance of an object's sides; area measures the coverage of a flat surface; and volume is the measurement of how much a solid can contain. Being able to accurately measure shapes and solids has dozens of practical applications, including the calculation of the area of a room, determining how much liquid will fit in a particular bottle, and much more.
Symmetry
Symmetry is related to measurement, and occurs in several different forms. In mirror symmetry, the two halves of an object mirror one another exactly so that they can fold over and line up precisely. Rotational symmetry occurs when an object can be rotated and maintain the same appearance as one continues to view it from the same angle.
Solids
Solids are essentially three-dimensional forms of plane shapes. They have properties such as volume and surface area. Familiar solids include pyramids, cylinders, spheres, cones, cubes, and many others. We see solids all the time, with everything from construction materials to toy building blocks being examples of such solids.
Parallel Lines
Lines are important for geometry, and there are many ways in which lines can be related to one another in the same plane. Parallel lines are two lines that do not intersect and have the same distance between every single point on both lines. For example, two lines are parallel if all the points on line A are equally distant from their corresponding points on line B.
Transformations
A transformation occurs when you change the position of a shape within a plane of coordinates. Basically, transformations occur whenever shapes move from one place to another. Change the location points of the vertices of a shape in an x-y coordinate system, for example, and you will have a transformation.
Coordinates
Coordinates are used to determine a specific point or other element of geometry in a specific space. The most common coordinate system uses an x axis and a y axis to locate various shapes and points. The z axis is added to create three-dimensional objects and graphs.
Resource Links: | https://www.magnatag.com/blog/post/whiteboard-learning-the-basics-of-geometry |
Understanding customers is a key step to success, and organizations do it best when they have a customer experience department in place. This department is tasked with analyzing customer feedback and data and disseminating its findings to improve the organization’s processes, products, and services.
Furthermore, customers remember their good and bad experiences with brands. Having the right people in your customer experience team not only strengthens your relationship with your customers but also encourages them to become repeat customers of the brand. This means they will voluntarily advocate for your brand and promote your business by word of mouth.
Here’s your ultimate guide on how to build a customer experience department.
Having the right people behind your customer experience department is vital. But when you’re looking for new people to fill roles your organization has never had, it can be quite a challenge.
We’ll walk you through the key steps to building a successful customer experience department in this guide. We will discuss topics such as defining the department’s goals and objectives, assessing the current state of customer service, and developing a strategy.
These preliminary steps will help you create a customer experience department that meets your customers’ needs and achieves your business goals.
Before you start looking for people or draft your CX strategy, your first step should be to clarify and understand the wider objectives of your organization.
What does the company want to achieve? This is true both in terms of Customer Experience – e.g., are there strategic goals around CSat or NPS? -, and in terms of broader business objectives – e.g., increasing market share, reducing churn, cutting costs, etc.
Whether your company is using the Balanced Scorecard, OKRs (Objectives and Key Results), SMART, or simple KPIs, this will help you align the work of your future customer experience department to goals everyone in the company cares about. And it will make it easier to build strong relationships and a strong culture of customer centricity.
What’s more, it will help you build a link between your CX team goals and the broader company goals. For example, you will be starting to ask questions like: how does a shorter average response time help us achieve better retention? How is NPS increase related to revenue increase or reduced churn? And so on.
To gain a better understanding of how exactly your customers interact with your business, you will need to map out the current customer journey. A customer journey map provides a detailed visual representation of how your customer moves through each interaction with your brand and what experiences they have.
There are different ways to create a customer journey map, and it’s essential to keep in mind that the customer journey is not always linear. Different types of customers will interact with your brand in various ways, they might go back and forth between different touchpoints, and that’s why mapping can be quite the challenge.
One way or the other, mapping your customer journey means answering the following questions:
Without going too much into details here, it’s also worth remembering that there are four ways to map customer journeys.
Utilize your customer journey to its full potential by identifying the data you collect at each stage and determining what more information you need to gather.
Remember, not all data is created equal. Set clear start and endpoints for your data collection efforts.
Tracking website visitor data over a long period of time, for example, requires setting up the necessary tracking mechanisms.
In contrast, if you are running a specific campaign and need customer experience data for a limited time, then you should focus your efforts on that period. If you collect data intentionally and selectively, you will gain valuable insights that will help you improve the customer experience and drive business success.
Customer experience extends beyond a company’s customer-facing roles. In an organization, there are different employees handling customer data or interacting with customers at various points in their journey. To ensure customer satisfaction, key members of different departments who have direct contact with customers should be involved.
The departments may include customer-facing functions such as marketing and customer service, as well as internal functions such as product development, manufacturing, and fulfillment. They play an important role in shaping the overall customer experience, and it is crucial that they know what their role is in the customer experience strategy and how it impacts the brand.
Also, their understanding and engagement in the company’s customer experience strategy is vital to its success. Here’s when you can leverage your knowledge and understanding of the broader company goals.
Pro Tip: Building strong relationships with other departments is not a one-off thing. To ensure alignment between the strategy and the needs of these employees and their customers, regular feedback should also be collected from them and they should always be kept in the loop. It’s hard work, we know!
Are you ready to kick customer experience up a notch? Sure, customer service is important, and that’s a fantastic first step for many companies. But what would your business look like if you set the bar even higher and started building an entire department that focused on creating great customer experiences?
Some think having a focused CX team can be expensive, yet they don’t realize that no matter what size of a business they are, having an effective CX strategy and team is essential. Dedicating time and resources to build out their customer experience isn’t just important now – it’s downright paramount for businesses who want to stay ahead of their competitors in our ever-evolving digital age. So, let’s get started!
Here’s what you need to keep in mind as you build a customer experience team.
The department’s role in implementing changes is crucial, so you’ll want to fill it with people who are up to the task. Your team must be skilled in market research and analysis, be the voice of your consumers, and be the driving force behind change and the elimination of pain points.
For these reasons, customer experience departments will benefit from people who have a background in:
A recent report on customer experience professionals supports the areas listed above by stressing how the people you hire for your CX department should be able to:
Ideally, you will hire people who have already worked in Customer Experience, Customer Service, Customer Insights, and other related fields. But since that is not always possible, prioritize the skills we listed above, as those will ensure you have the right background in your newly formed customer experience department.
Pro tip: If your customer journey is mostly digital (e.g., website, apps, etc.), you may want to consider looking for people with relevant skills and experience. For example: website optimization, content marketing, and digital analytics.
The titles and the structure you will be giving to your CX team will of course depend on the size of it, and ultimately on the size of your organization.
Compared to a large organization, a startup’s customer experience department may be smaller and less formal. Structures may be more flat and cross-functional, with employees wearing multiple hats and some of them also dedicating only half of their time to customer experience initiatives.
Here’s an example of how a startup’s customer experience department might be structured.
Customer Experience Manager / Director
This leadership role is responsible for overseeing the CX team, setting up the key processes and goals, establishing relationships with the rest of the organization, and reporting to executives and the board. They have responsibilities for both people management and project management.
Voice of Customer / Customer Insights Manager
This is the more analytical role, and it needs someone skilled at understanding data, analytics, taxonomies, and in general customer feedback. They also need to be able to make sense of them, build reports, and recommend actions.
User Experience Specialist or Manager
This position is in charge of improving the customer experience through human-centered, design-thinking methodologies. Throughout all touchpoints and channels, the User Experience Specialist is responsible for creating an enjoyable, seamless, and intuitive customer experience. The role might need the support of a User Interface designer or a Digital designer, if your company’s offering is mainly digital.
Customer Experience Specialists
Depending on your budget or company size, you might be able to hire additional Customer Experience Specialists to complete your Customer Experience Departments. Their duties are various, they have a supporting function, and they help implement the overall CX strategy. In this sense, it is good to look for junior people who can complement the skills of the other members of the team and can grow within the organization.
Typically, a large organization’s customer experience department has a complex structure and is a significant part of the company. In addition, it may be composed of a number of teams and functions, each with a specific role and responsibilities.
Here’s an example of how an enterprise customer experience department might be structured.
Chief Experience Officer (CXO)
The Chief Experience Officer is the highest level and is responsible to promote Customer Experience in the organization, while at the same time ensuring that the Customer Experience team has everything they need to achieve their targets and execute on their strategy.
An organization’s Chief Experience Officer (CXO) is responsible for the organization’s overall customer experience strategy and direction. Typically, the CXO is a member of the senior leadership team and is responsible for ensuring the customer experience is integrated across the entire company. For that reason, a big part of their responsibility is to sell the value of customer experience to other stakeholders.
A CXO must develop a long-term vision for customer experience and ensure that it aligns with the organization’s overall goals and strategy.
Note that large organizations often also have a Chief Customer Officer (CCO), and their responsibility is mainly related to managing the customer service and customer support function of the company. In some cases, the two roles might be combined though.
Customer Experience Operations Manager (CXOM)
Data and methods of data gathering can vary per department, which can create silos. The CX operations manager’s role is to unify everyone involved and guide the team in the best ways to use the tools available to the company. These tools can be automation software, communication apps, or help desk suites.
While the CXO is responsible for the overall customer experience strategy, the CXOM is responsible for the day-to-day operations and management of the customer experience team. The two positions work closely together to ensure that the customer experience is aligned with the organization’s overall strategy and goals.
Customer Experience Analysts / Voice of Customer Managers / Customer Insights Managers
This role utilizes advanced analytics and research techniques to analyze customer feedback to identify areas for improvement. They also monitor customer behavior and trends in order to inform product decisions and track changes in customer sentiment over time.
Additionally, they use surveys, focus groups, and other methods of soliciting direct customer input to create actionable plans that drive better experiences for customers. Ultimately, their goal is to provide strategic recommendations based on meaningful insights that will help shape the future growth of the business.
As we are addressing the needs of a larger organization, there might be 4 to 8 such professionals in a customer experience departments, each one responsible for a specific business unit, or part of the offering.
Service Design Managers and/or UI Managers
They are responsible for creating and maintaining a customer-centric service design process, as well as managing, monitoring and evaluating the performance of services and products against set goals.
With the help of analysts in the team, they research and analyze current trends in the market and in service design, and then identify areas for improvement within the existing products and services. Additionally, they are responsible for working with cross-functional teams to ensure cohesive delivery.
Customer Experience Managers and Customer Experience Specialists
They are in charge of executing against the overall strategy and implementing initiatives that translate data and insights coming from the analysts into concrete actions. They manage projects of different complexity, often involving other stakeholders and departments.
Their primary goal is to ensure that customer experience is alive within the organization, and that customers actually perceive the company and brand as active and proactive in understanding their needs and wants.
Customer Support
In some cases, the customer support function might be part of the larger customer experience department. When this happens, the size of the department increases exponentially, including roles such as: Head of Customer Support, Customer Support Managers, Technical Support Specialists, Customer Support Representatives, Head of Quality Assurance, Quality Assurance Specialists, and more.
It is worth noting that most companies keep customer experience and customer support separated, each one of them reporting to different executives. This is mainly because the customer support function can be extremely complex. The overall goal is nonetheless the same: creating experiences for customers that exceed their expectations and make them want to come back for more.
Crafting the customer experience is a combination of many different processes that need to be in place. These processes are:
1) Feedback and Data Collection
Having processes in place to facilitate consumer feedback collection is essential. You can collect feedback through customer interviews, polls, reviews, surveys, or installing the proper customer feedback tools. It’s important to remember that your organization probably already has a lot of customer data available, so starting with an assessment of what is there and what instead might be missing is a good first step.
2) Feedback and Data Analysis
The next question is, how do you make sense of all the data you’ve gathered? In order for the team to derive insights from the data, it must first be organized and compartmentalized. It requires the expertise of a data analyst, an agency, or an automation tool.
3) Feedback and Data Reporting
This stage is about developing methods for translating the insights into a digestible format that makes sense to those consuming it. You will soon realize that there is no one-size-fits-all report that you can distribute to everyone.
This is why it is important to establish relationships with the different stakeholders and clearly understand their goals and motivations. Build this aspect into your processes.
4) Closing the Loop and Measuring Success
Data collection, analysis, and reporting is nothing without action. When you build a customer experience department, make sure you have processes in place to translate data into actions, and actions into successes, both for your team and for the company.
Another crucial step as you build a customer experience department is to figure out what tools and software your customer experience department needs to implement its strategy.
Depending on the maturity of your company, you or other colleagues might already be using some of the following tools, so even in this case it is worth it to start with an assessment of what tools and systems are already in use.
Before we get to the different categories of tools you might consider, be aware that there are solutions that aim to cover the full spectrum of needs of a customer experience department.
Platforms such as Lumoa allow customers to:
The real benefit of these platforms is that they consolidate customer data in one place, therefore making it easier to establish a real customer-centric culture that goes beyond the customer experience department.
Now that you know how to look at customer experience tools holistically, here is a brief review of the main areas where tools are available.
Survey tools are used to collect and analyze data. They allow users to create surveys, polls, and questionnaires that can be distributed online or via print. They also typically provide basic reporting capabilities. Some of the most popular tools are:
The importance of feedback analytics tools lies in the fact that they allow organizations to collect and analyze customer feedback in a systematic and efficient manner. Moreover, they can identify patterns and trends in customer satisfaction, dissatisfaction, and preferences, thereby improving their products, services, and overall customer experience.
Furthermore, these tools can be used to identify areas for improvement in an organization’s business, as well as track progress over time.
Here are some examples of tools you may want to take into account:
Lumoa, for example, looks at any customer interaction, automates the analysis, and highlights the items with the biggest impact on your key KPIs. This is a huge help, not only when trying to take ownership of customer experience metrics such as NPS or CSat, but also when attempting to have customer experience impact business metrics.
Because of the sheer amount of tasks that will fall under the customer experience team‘s purview, a tool that helps you keep projects, tasks, milestones, and deadlines on track will be indispensable.
Here are a few stellar choices:
By presenting data insights in a visually appealing way, insights can be easily understood. Those who are less familiar with data analysis can benefit from this by making the data more accessible and engaging.
Here are some examples of tools you might consider:
Pro tip: Remember also to determine whether there are any other company-wide tools (such as CRM or help desk software) where important customer data might be stored. Integrating CRM of helpdesk software with a feedback analytics tools such as Lumoa, for example, will unlock the possibility to look at insights by customer segment or customer value, therefore improving your chances to determine real business outcomes with your customer experience initiatives.
To measure customer experience efforts, Ed Thompson, Distinguished VP Analyst at Gartner, recommends the following six categories and practices:
This is a basic metric that gauges how well your company has satisfied- or met- the demands of its customers. CSAT can be obtained by surveying consumers and asking them to rate their degree of satisfaction with each item. For instance, “On a scale of 1 to 10, how satisfied are you with our service?”
To calculate your CSAT score, divide the positive replies by the total number of responses, then multiply by 100. Your answer should be in percentage.
This considers how many customers come back and stay regular customers and how many stop using your company’s products or services over a certain period. Some measurements to use are purchase frequency, average order size, repeat orders, and the number of loyalty program members.
This determines the customer’s willingness to recommend your products or services. Some metrics you can use are price sensitivity, social media sentiment scores, trust ratings, and event attendance.
This looks at how well your products or services meet customer standards and requirements. Thompson says that when a product or service fails to meet those standards, the customer experience will be terrible no matter what is done to fix it.
When employees see many failed attempts to improve customer experience or experience executives who only want quick results, they can get disengaged. Employee engagement then becomes a CX strategy challenge. In fact, 86% of organizations have cited employee engagement as having an equal or more significant impact than other CX challenges.
To the list by Thompson, we believe it is worth adding the Net Promoter Score, which many consider the gold standard to measure Customer Experience.
If you’re a business looking for ways to measure customer loyalty and satisfaction, Net Promoter Score (NPS) is your go-to metric. NPS relies on asking customers to rate their likelihood of recommending a business or product on a 0-10 scale. Ratings from 9-10 are considered “Promoters,” 7-8 are “Passives,” and 0-6 are “Detractors.” The Net Promoter Score is then calculated by subtracting the percentage of Detractors from the percentage of Promoters. With this metric, you can gain insight into how satisfied customers are with your business or product.
Collaboration among cross-functional team members can help the team flourish. For the team as a whole to succeed, members must learn to work and rely on each other. But first, the team should mutually respect each other’s contributions and place in the team.
A good strategy to foster these cross-functional relationships is to have team members regularly celebrate the successes of their colleagues. One approach is through the use of a communication platform that enables members to recognize one another publicly.
Data reporting is a crucial skill that entails gathering, evaluating, and structuring data into an understandable format. It is a process that helps analyze team performance and supports decision-making; thus, it must be done effectively.
As statistics and data can become dull over time, more and more businesses are turning to storytelling to improve employee engagement. When the speaker can elicit emotion from their audience, they can present the report more effectively. People will remember the insights better if they can relate to them than if the information was just read to them.
To keep the team motivated, you need to invest in their growth. Keep track of your team’s progress by establishing clear career paths that will help them move up in their positions. This means giving members goals to work toward and telling them what skills, knowledge, and experience they need to move forward.
While data is the backbone of building a successful customer experience strategy, letting the team experience firsthand what customers do can be an eye-opener. To give them a real-world experience they can learn from, encourage members to assume the role of the consumer and make a purchase or inquiry.
This should enable them to identify any room for growth and areas where the company thrives.
A customer experience department is essential for any company that wants to retain happy and loyal consumers.
To develop and implement a customer experience strategy, a company must understand its goals and current status in order to build a customer experience department.
As a result of the investment in customer experience, customers will develop brand loyalty, act as brand ambassadors, and advocate for the company, increasing customer retention and overall business success.
Finally, remember that it’s important for companies to understand that investing in building a customer experience department is not only a cost but also an investment in long-term growth and success. | https://www.lumoa.me/blog/how-to-build-customer-experience-department/ |
The grand finale for the Season 2 of Adom TV’s fashion show, Adepam came off on Sunday, September 25, 2022, at the forecourt of the Multimedia Group Limited.
The five finalists took to the runway to display out-of-the-world outfits that cemented their talents in the fashion world.
Fashion designer, Kbaw was adjudged the winner for the Season 2 of the most-watched fashion designing show in the country.
Check out photos from the event below: | https://www.adomonline.com/adom-tvs-adepam-finale-2022-in-pictures/ |
Filter by:
Content type:
ALL
Problems
Articles
Games
Stage:
All
Stage 1&2
Stage 2&3
Stage 3&4
Stage 4&5
Challenge level:
Starting with the number 180, take away 9 again and again, joining up the dots as you go. Watch out - don't join all the dots!
Can you make a cycle of pairs that add to make a square number
using all the numbers in the box below, once and once only?
Choose a symbol to put into the number sentence.
Can you see why 2 by 2 could be 5? Can you predict what 2 by 10
will be?
If you have only four weights, where could you place them in order
to balance this equaliser?
Here is a chance to play a version of the classic Countdown Game.
Imagine a pyramid which is built in square layers of small cubes. If we number the cubes from the top, starting with 1, can you picture which cubes are directly below this first cube?
The letters in the following addition sum represent the digits 1
... 9. If A=3 and D=2, what number is represented by "CAYLEY"?
Find the values of the nine letters in the sum: FOOT + BALL = GAME
In a square in which the houses are evenly spaced, numbers 3 and 10
are opposite each other. What is the smallest and what is the
largest possible number of houses in the square?
If you take a three by three square on a 1-10 addition square and
multiply the diagonally opposite numbers together, what is the
difference between these products. Why?
Can you put the numbers 1 to 8 into the circles so that the four
calculations are correct?
Start by putting one million (1 000 000) into the display of your
calculator. Can you reduce this to 7 using just the 7 key and add,
subtract, multiply, divide and equals as many times as you like?
Place the numbers from 1 to 9 in the squares below so that the difference between joined squares is odd. How many different ways can you do this?
Place the numbers 1 to 10 in the circles so that each number is the
difference between the two numbers just below it.
Make your own double-sided magic square. But can you complete both
sides once you've made the pieces?
This article gives you a few ideas for understanding the Got It! game and how you might find a winning strategy.
This magic square has operations written in it, to make it into a
maze. Start wherever you like, go through every cell and go out a
total of 15!
You have 5 darts and your target score is 44. How many different
ways could you score 44?
Add the sum of the squares of four numbers between 10 and 20 to the
sum of the squares of three numbers less than 6 to make the square
of another, larger, number.
Look carefully at the numbers. What do you notice? Can you make
another square using the numbers 1 to 16, that displays the same
properties?
Can you each work out the number on your card? What do you notice?
How could you sort the cards?
A game for two people, or play online. Given a target number, say 23, and a range of numbers to choose from, say 1-4, players take it in turns to add to the running total to hit their target.
Can you find which shapes you need to put into the grid to make the
totals at the end of each row and the bottom of each column?
There were chews for 2p, mini eggs for 3p, Chocko bars for 5p and
lollypops for 7p in the sweet shop. What could each of the children
buy with their money?
Winifred Wytsh bought a box each of jelly babies, milk jelly bears,
yellow jelly bees and jelly belly beans. In how many different ways
could she make a jolly jelly feast with 32 legs?
Lolla bought a balloon at the circus. She gave the clown six coins
to pay for it. What could Lolla have paid for the balloon?
There are 44 people coming to a dinner party. There are 15 square
tables that seat 4 people. Find a way to seat the 44 people using
all 15 tables, with no empty places.
Place six toy ladybirds into the box so that there are two ladybirds in every column and every row.
A group of children are using measuring cylinders but they lose the
labels. Can you help relabel them?
A game for 2 people using a pack of cards Turn over 2 cards and try
to make an odd number or a multiple of 3.
What do you notice about the date 03.06.09? Or 08.01.09? This
challenge invites you to investigate some interesting dates
yourself.
There are 78 prisoners in a square cell block of twelve cells. The
clever prison warder arranged them so there were 25 along each wall
of the prison block. How did he do it?
Use your logical-thinking skills to deduce how much Dan's crisps and ice-cream cost altogether.
Can you put plus signs in so this is true? 1 2 3 4 5 6 7 8 9 = 99
How many ways can you do it?
What do the digits in the number fifteen add up to? How many other
numbers have digits with the same total but no zeros?
How have the numbers been placed in this Carroll diagram? Which
labels would you put on each row and column?
Here you see the front and back views of a dodecahedron. Each
vertex has been numbered so that the numbers around each pentagonal
face add up to 65. Can you find all the missing numbers?
Exactly 195 digits have been used to number the pages in a book.
How many pages does the book have?
In this game, you can add, subtract, multiply or divide the numbers
on the dice. Which will you do so that you get to the end of the
number line first?
This dice train has been made using specific rules. How many different trains can you make?
First Connect Three game for an adult and child. Use the dice numbers and either addition or subtraction to get three numbers in a straight line.
Got It game for an adult and child. How can you play so that you know you will always win?
Find the sum and difference between a pair of two-digit numbers. Now find the sum and difference between the sum and difference! What happens?
This challenge focuses on finding the sum and difference of pairs of two-digit numbers.
Can you arrange 5 different digits (from 0 - 9) in the cross in the
way described?
This Sudoku, based on differences. Using the one clue number can you find the solution?
Arrange eight of the numbers between 1 and 9 in the Polo Square
below so that each side adds to the same total.
In a Magic Square all the rows, columns and diagonals add to the 'Magic Constant'. How would you change the magic constant of this square?
This task follows on from Build it Up and takes the ideas into three dimensions! | http://nrich.maths.org/public/leg.php?code=31&cl=2&cldcmpid=1279 |
World-famous detective Benoit Blanc heads to Greece to peel back the layers of a mystery surrounding a tech billionaire and his eclectic crew of friends.
Smile
After witnessing a bizarre, traumatic incident involving a patient, Dr. Rose Cotter starts experiencing frightening occurrences that she can't explain. As an overwhelming terror begins taking over her life, Rose must confront her troubling past in order to survive and escape her horrifying new reality.
Jeepers Creepers: Reborn
Forced to travel with her boyfriend to a horror festival, Laine begins to experience disturbing visions associated with the urban legend of The Creeper. As the festival arrives and the blood-soaked entertainment builds to a frenzy, she becomes the center of it while something unearthly has been summoned.
The Batman
In his second year of fighting crime, Batman uncovers corruption in Gotham City that connects to his own family while facing a serial killer known as the Riddler.
Hellraiser
A young woman struggling with addiction comes into possession of an ancient puzzle box, unaware that its purpose is to summon the Cenobites, a group of sadistic supernatural beings from another dimension.
Enola Holmes 2
Now a detective-for-hire like her infamous brother, Enola Holmes takes on her first official case to find a missing girl, as the sparks of a dangerous conspiracy ignite a mystery that requires the help of friends — and Sherlock himself — to unravel.
The Infernal Machine
Reclusive and controversial author Bruce Cogburn is drawn out of hiding by an obsessive fan, forcing the novelist to confront a past that he thought he could escape, and to account for events set in motion by his bestseller decades earlier. Cogburn's search for who is behind the manipulation and mental torment he encounters leads to an emotional roller-coaster ride full of fear and danger, where things are not always as clear as they seem to be, and where past deeds can have dire consequences.
Dragon Fury
A group of soldiers are taken to the mountains of Wales to investigate a strange looking monster.
Dark Spell
Terror strikes when a heartbroken woman uses black magic to get her husband back.
The Unholy
Alice is young hearing-impaired girl who, after a supposed visitation from the Virgin Mary, is inexplicably able to hear, speak and heal the sick. As word spreads and people from near and far flock to witness her miracles, a disgraced journalist hoping to revive his career visits the small New England town to investigate. When terrifying events begin to happen all around, he starts to question if these phenomena are the works of the Virgin Mary or something much more sinister.
Black Water: Abyss
An adventure-loving couple convince their friends to explore a remote, uncharted cave system in the forests of Northern Australia. With a tropical storm approaching, they abseil into the mouth of the cave, but when the caves start to flood, tensions rise as oxygen levels fall and the friends find themselves trapped. Unknown to them, the storm has also brought in a pack of dangerous and hungry crocodiles.
X
In 1979, a group of young filmmakers set out to make an adult film in rural Texas, but when their reclusive, elderly hosts catch them in the act, the cast find themselves fighting for their lives. Hilarity ensues.
Knowing
A teacher opens a time capsule that has been dug up at his son's elementary school; in it are some chilling predictions -- some that have already occurred and others that are about to -- that lead him to believe his family plays a role in the events that are about to unfold.
Emancipation
Inspired by the gripping true story of a man who would do anything for his family—and for freedom. When Peter, an enslaved man, risks his life to escape and return to his family, he embarks on a perilous journey of love and endurance.
The Witch: Part 2. The Other One
A girl wakes up in a huge secret laboratory. then accidentally meets another girl who is trying to protect her house from a gang. The mystery girl overthrows the gang with her unexpected powers, and laboratory staff set out to find her.
Spiral: From the Book of Saw
Working in the shadow of an esteemed police veteran, brash Detective Ezekiel “Zeke” Banks and his rookie partner take charge of a grisly investigation into murders that are eerily reminiscent of the city’s gruesome past. Unwittingly entrapped in a deepening mystery, Zeke finds himself at the center of the killer’s morbid game.
The Whole Truth
When two siblings stumble on a strange hole in the wall of their grandparents' house, horrifying incidents reveal sinister secrets about their family.
Straight Outta Nowhere: Scooby-Doo! Meets Courage the Cowardly Dog
With Mystery, Inc. on the tail of a strange object in Nowhere, Kansas, the strange hometown of Eustice, Muriel, and Courage, the gang soon find themselves contending with a giant cicada monster and her winged warriors.
Deep Water
Vic and Melinda Van Allen are a couple in the small town of Little Wesley. Their loveless marriage is held together only by a precarious arrangement whereby, in order to avoid the messiness of divorce, Melinda is allowed to take any number of lovers as long as she does not desert her family.
The Visitor
After a series of tragedies including the death of his father-in-law, Robert and his wife Maia leave their home in London to move back to her childhood home. But when Robert discovers an old portrait in the attic of a man who is his spitting image, he goes down a rabbit hole to discover the identity of this mysterious doppelganger known only as the visitor. It isn’t long until he realizes – where the visitor goes, death follows.
Naruto Shippuden the Movie: Blood Prison
After his capture for attempted assassination of the Raikage, leader of Kumogakure, as well as killing Jōnin from Kirigakure and Iwagakure, Naruto is imprisoned in Hōzukijou: A criminal containment facility known as the Blood Prison. Mui, the castle master, uses the ultimate imprisonment technique to steal power from the prisoners, which is when Naruto notices his life has been targeted. Thus begins the battle to uncover the truth behind the mysterious murders and prove Naruto's innocence.
Trick or Treat Scooby-Doo!
Mystery Inc. has cracked the case to top all cases! They’ve tracked down Coco Diablo, the head of a notorious costume crime syndicate. With Coco and her kitty in prison, Mystery Inc. thinks that they can finally enjoy a break. Wrong! Suddenly, menacing doppelgänger ghosts of the Scooby crew and favorite classic foes show up in Coolsville to threaten Halloween. Now it’s up to the meddling kids to unmask the latest scoundrel and save Halloween!
It Follows
When carefree teenager Jay sleeps with her older boyfriend for the first time, she learns that she is the latest recipient of a fatal curse that is passed from victim to victim via sexual intercourse. Death, Jay learns, will creep inexorably toward her as either a friend or a stranger. Jay's friends don't believe her seemingly paranoid ravings, until they too begin to see the phantom assassins and band together to help her defend herself.
Umma
Amanda and her daughter live a quiet life on an American farm, but when the remains of her estranged mother arrive from Korea, Amanda becomes haunted by the fear of turning into her own mother.
Gasoline Alley
A man implicated in the triple homicide of three Hollywood starlets begins his own investigation. Needing assistance, he enlists the two detectives on his tail in order to expose a conspiracy more explosive than any of them imagined.
Host
Six friends hire a medium to hold a séance via Zoom during lockdown — but they get far more than they bargained for as things quickly go wrong. When an evil spirit starts invading their homes, they begin to realize they might not survive the night.
Harry Potter and the Order of the Phoenix
Returning for his fifth year of study at Hogwarts, Harry is stunned to find that his warnings about the return of Lord Voldemort have been ignored. Left with no choice, Harry takes matters into his own hands, training a small group of students to defend themselves against the dark arts.
Scream
Twenty-five years after a streak of brutal murders shocked the quiet town of Woodsboro, a new killer has donned the Ghostface mask and begins targeting a group of teenagers to resurrect secrets from the town’s deadly past.
Zone 414
In the near future on a colony of state-of-the-art robots, a private investigator is hired by the colony's creator to bring his missing daughter home.
Last Night in Soho
A young girl, passionate about fashion design, is mysteriously able to enter the 1960s where she encounters her idol, a dazzling wannabe singer. But 1960s London is not what it seems, and time seems to be falling apart with shady consequences.
Fear Street: 1994
After a series of brutal slayings, a teen and her friends take on an evil force that's plagued their notorious town for centuries.
The Stranger
Two strangers strike up a conversation on a long journey. One is a suspect in an unsolved missing person’s case and the other an undercover operative on his trail. Their uneasy friendship becomes the core of this tightly wrought thriller, which is based on the true story of one of the largest investigations and undercover operations in Australia.
Prometheus
A team of explorers discover a clue to the origins of mankind on Earth, leading them on a journey to the darkest corners of the universe. There, they must fight a terrifying battle to save the future of the human race.
The Nun
When a young nun at a cloistered abbey in Romania takes her own life, a priest with a haunted past and a novitiate on the threshold of her final vows are sent by the Vatican to investigate. Together they uncover the order’s unholy secret. Risking not only their lives but their faith and their very souls, they confront a malevolent force in the form of the same demonic nun that first terrorized audiences in “The Conjuring 2” as the abbey becomes a horrific battleground between the living and the damned.
The Maze Runner
Set in a post-apocalyptic world, young Thomas is deposited in a community of boys after his memory is erased, soon learning they're all trapped in a maze that will require him to join forces with fellow “runners” for a shot at escape.
I See You
When a 12-year-old boy goes missing, lead investigator Greg Harper struggles to balance the pressure of the investigation and troubles with his wife, Jackie. Facing a recent affair, great strain is put on the family that slowly gnaws away at Jackie's grip on reality. But after a malicious presence manifests itself in their home and puts their son, Connor, in mortal danger, the cold, hard truth about evil in the Harper household is finally uncovered.
Fear Street: 1978
In 1978, two rival groups at Camp Nightwing must band together to solve a terrifying mystery when horrors from their towns' history come alive.
Death on the Nile
Belgian sleuth Hercule Poirot boards a glamorous river steamer with enough champagne to fill the Nile. But his Egyptian vacation turns into a thrilling search for a murderer when a picture-perfect couple’s idyllic honeymoon is tragically cut short.
No Exit
Stranded at a rest stop in the mountains during a blizzard, a recovering addict discovers a kidnapped child hidden in a car belonging to one of the people inside the building which sets her on a terrifying struggle to identify who among them is the kidnapper. | https://nz.gowatching.com/genre/70-mystery/ |
Ovens are handy appliances to have in the kitchen as they can be used for many different things. Oftentimes, people use ovens for cooking their favorite foods or heating up pre-made meals from the store so they don’t have to eat out every night.
Preheating an oven takes more than just turning the dial to a certain temperature. The entire process can take anywhere from 10 – 20 minutes, depending on how large your oven is and what you are cooking.
It’s important to remember this so your food is cooked properly and evenly throughout without being overcooked on one side while undercooked on another.
The most commonly called temperature setting is 400 degrees Fahrenheit (204 degrees Celsius). This is the best temperature to cook most foods at so they are baked evenly.
On average, the length of time you need to preheat to 400-degrees is usually around 17 minutes.
Since most ovens take about 15 – 20 minutes to preheat, it’s important to remember when you need an oven so you don’t forget and overcook your food.
If your food needs half of that time in order to cook properly, set the timer for 10 minutes so you don’t have to keep coming back and checking your food.
After the time is up, check the oven by inserting a pick into the center of your food. If it comes out clean, your food is probably done cooking. To make sure, slide the pick over to one side of the food; if it comes out clean on the other side too, your food is ready to serve and eat.
However, if you’re not sure about the state of your food’s readiness, leave it in for a few more minutes and check it again.
Every oven is different so some might take longer than 20 minutes while some may take less time than 10minutes. It depends on the size, make, and model of your oven.
Newer oven models are made to be more efficient and in some cases might require less time.
Once done cooking and serving, be sure to clean your oven because if not taken care of immediately, burnt-on food from cooking could be a big problem when trying to clean later.
Do new ovens take longer preheat?
In reality, ovens can take anywhere from 15 minutes to half an hour to fully preheat. The length of time it takes for your oven to preheat depends on the type of heating element it has, as well as how much power the oven draws.
Unfortunately, there isn’t really a way that you can speed up this process without lowering the quality of your food or paying more money for an efficient model.
To make cleaning your oven an easier process, new ovens often have a heating element that is hidden away to avoid contact with oil and grease. The additional layer for protection can make the preheating process longer depending on the make and model.
While the amount of time needed to preheat doesn’t vary much between different brands, it is worth doing a bit of research before buying your oven.
New ovens that have multiple heating elements are often more efficient than those with one, as there is more than one source of heat. This helps have a shorter preheating time and is a great bonus for those who find themselves in a hurry when cooking.
Do electric ovens preheat faster?
One advantage to owning an electric oven is that it will maintain a consistent temperature throughout the whole cooking process. This can be advantageous if you want to cook multiple dishes at different temperatures without adjusting your oven’s setting for each dish.
Electric ovens, however, do not heat up quicker than gas ovens. The material making up the heating element has an effect on your oven’s preheating speed. Ovens with a single, circular heating element made from one solid piece of metal, will heat faster.
Ovens that do not have a lining to protect the heating element, take longer to preheat than those with this kind of protection. This is because there is nothing blocking the heating element from coming into contact with food and other oil and grease residue.
Even if you own an oven with a single heating element, it will still take an average of 15 to 20 minutes to go from cold to preheating.
You can check if your new oven is faster by preheating and then checking the oven with an internal thermometer. If you find that your new oven is indeed much faster than your old one, take advantage of lower tem
Can you put food in the oven before it’s preheated?
It’s a common misconception that you can put food in the oven before it has reached the set temperature. You need to allow at least 20 minutes for your oven to preheat so that the food cooks evenly and doesn’t risk burning on one side while remaining raw on another.
So the answer to this question depends on what type of oven you are using and if you plan to use a cooking rack or not. For example, you should never cook something on a baking sheet while your oven is completely cold.
However, if you put an empty pan in the oven and turn it on, there should be no problem with doing so unless your recipe specifically calls for preheating. This is because different types of pans can react differently to sudden temperature changes.
If you are planning on cooking in your oven and require it to be in a certain temperature range before you put in the food, always check what type of pan is best suited for that specific dish.
How to know when an oven is preheated?
When you use an oven, it is important to know if it has been preheated.
Most ovens have indicators and symbols on the LCD screen that will show if it has been preheated. Some newer oven displays show the full word as “Preheating” or the abbreviation “PrE”.
Many ovens also beep twice when the preheating process has been completed. The beep can indicate either when the oven is heating up or when it is at its set temperature and ready to cook food.
The key to this is to ensure that your oven and the recipe you’re using are compatible, and understand how long it takes for different types of ovens to reach a preheating temperature.
There are also specific symbols for the different oven settings so you will know when your oven is ready to use after choosing a setting and pressing start.
If you have an older oven without these features, your best option is to use a kitchen thermometer.
Insert the probe in the center of the oven and wait for 10-20 minutes before checking its temperature with your thermometer. If your oven does not have a built-in thermostat or timer, you can also use this same method to determine when it has reached desired temperature.
Place one hand behind the door while opening it and then check for heat coming out from under your fingers on your other hand. This will help you identify if there is any heat being emitted from inside of the oven which means that it’s fully heated up.
What does it mean to preheat oven for 10 minutes?
Whether you’re cooking, baking, or roasting food, it’s always a good idea to know how to operate your oven.
Preheating your oven for 10 minutes is a great way to get started with cooking. It helps make sure that your oven reaches its highest possible temperature, which is essential if you want delicious baked goods or roasted meats.
The oven has to be heated up to at least 350 degrees Fahrenheit before you put in your dish so that it can cook properly and reach its maximum temperature for optimal baking or roasting.
There is a chance that your oven will need to be preheated for longer than 10 minutes, depending on how old your oven is and what type of recipe you are using.
Be sure to check with your recipe for more specific instructions regarding the recommended amount of time that your oven should be heated up before placing your food in.
While most ovens will beep twice once it reaches the correct temperature, you can also use your kitchen thermometer to determine when it has reached optimal heat.
How can to check oven temperature without a thermometer?
With a traditional oven, you’ll need to insert an oven thermometer to determine if it has been preheated.
However, what are your options for checking the temperature of your oven without a thermometer? All you need to do is crack an egg into a bowl and drop it in the oven while it preheats. The egg will start to cook at whatever temperature the oven is set at.
If the egg starts cooking too quickly or slowly then adjust the heat accordingly. When the egg is cooked, it’s at your desired temperature.
If you don’t have any eggs, then an alternative simple way that you can check your oven temperature without a thermometer:
- Place two pans of water at least 12 inches apart in your oven and set your oven for 350°F;
- if they boil after 30 minutes then it’s safe to assume that this is true for all portions of the oven (typically only one or two parts fail).
- The other way is by using something like a cake pan with clean wet sand in it. If the sand is dry after 10 minutes, your oven is at 350 degrees
Note: This only gives you an approximate value to bake with and should not be used as a substitute for using a thermometer to ensure that your oven is at its highest temperature.
Note: If your oven has a fan, the temperature will be about 25 degrees lower than what you set it at or as long as one hour for temperatures under 400 degrees. | https://warmastoast.com/how-long-oven-to-preheat/ |
The focus of Transportation Research: Part C is high-quality, scholarly research that addresses development, applications, and implications, in the field of transportation, of emerging technologies from such fields as operations research, computer science, electronics, control systems, artificial intelligence, and telecommunications, among others. The interest is not in the individual technologies or methodologies per se, but in their ultimate implications for the planning, design, operation, control, management, maintenance and rehabilitation of transportation systems, services and components. Of particular interest are the impacts of emerging technologies on transportation system performance, in terms of level of service, capacity, safety, reliability, resource consumption and the environment, economics and finance, privacy, standards, and liability. Submissions in the following areas of transportation are encouraged by Part C: the impact of emerging technologies for all modes and for intermodal transportation; intelligent transportation systems; real-time operations; logistics; resource management; consumer/traveler adoption, acceptance and usage of new technologies; infrastructure applications of emerging technologies.
Cars could soon negotiate smart intersections without ever having to stop
Sick of waiting at traffic lights? The semi-autonomous driving aids being fitted to many new cars could consign the red light to history, A*STAR researchers report. According to their modeling, a system in which each car ...
Consumers are willing to pay $4,900 extra for a car that drives itself
The average consumer would be willing to pay $4,900 more for a car that had self-driving technologies, and $3,500 more for crash avoidance, according to a new study published in Transportation Research Part C: Emerging Technologies.
Groundbreaking review on counteracting mobile phone distraction while driving
With mobile phone use by drivers now a reality, a groundbreaking QUT review looking at the issue as a task-sharing problem has recommended further research into how to make the practice safer.
Mathematicians develop a new 'third way' to improve airplane boarding
Lead researcher Dr Tie-Qiao Tang said while modelling had previously been done on factors such as luggage congestion, routing, and takeoff runway scheduling, his study was the first to look at boarding. | https://phys.org/journals/transportation-research-part-c-emerging-technologies/sort/date/6h/ |
Q:
Define a new column in pandas dataframe dynamically
Say I define the following dataframe:
df = pd.DataFrame({'AAA' : [4,5,6,7], 'BBB' : [10,20,30,40],'CCC' : [100,50,-30,-50]})
print(df.head())
and I want to generate a new column by using some condition on the existing column(s)
df['XXX'] = df.AAA < 6
print(df.head())
where the output generated would be:
AAA BBB CCC XXX
0 4 10 100 True
1 5 20 50 True
2 6 30 -30 False
3 7 40 -50 False
I'd like to be able to generate these conditions dynamically, for example by passing something like
"AAA < 6"
or
"AAA < 4 & BBB == 10"
and have these conditions evaluated accordingly.
Does pandas provide some mechanism to allow something like this? I know eval() could be an alternative, but also note that the above strings would also need to be given the df as a context, ie: "AAA < 6" => "df.AAA < 6"
Alternatively, could someone recommend me a package which would allow me to define these conditions and then generate a lambda or similar which could be used to evaluate?
Thank you
A:
Use DataFrame.eval:
df = pd.DataFrame({'AAA' : [4,5,6,7], 'BBB' : [10,20,30,40],'CCC' : [100,50,-30,-50]})
df['a'] = df.eval("AAA < 5 & BBB == 10")
df['b'] = df.eval("AAA < 6")
df['c'] = df.eval("AAA < 4 & BBB == 10")
print (df)
AAA BBB CCC a b c
0 4 10 100 True True False
1 5 20 50 False True False
2 6 30 -30 False False False
3 7 40 -50 False False False
More information about using this function with alternatives is Dynamic Expression Evaluation in pandas using pd.eval()
A:
You could use pandas' eval, which can evaluate a string describing operations:
cond = "AAA < 6"
df.eval(cond)
0 True
1 True
2 False
3 False
Name: AAA, dtype: bool
cond = "AAA < 6"
df.assign(XXX = df.eval(cond))
cond = "AAA < 4 & BBB == 10"
df.assign(XXX = df.eval(cond))
AAA BBB CCC XXX
0 4 10 100 False
1 5 20 50 False
2 6 30 -30 False
3 7 40 -50 False
| |
The hypoxia-associated behaviors of the ctenophore Mnemiopsis leidyi are not well understood, despite the ecological significant of this species and the widespread nature of hypoxic (low oxygen) events. The interface of hypoxic and normoxic water (the oxycline) is also associated with suspended sulfur-reducing bacteria, which provide a source of food to plankton and other animals. Wild-caught specimens of M. leidyi were exposed to an artificially-created oxycline (PO2 >140 Torr above, <60 Torr below) in the laboratory and the time the animals spent physically touching this oxycline was quantified. We found that these animals spent a disproportionate amount of time in the oxycline location, suggesting that they are able to sense the oxycline based only upon the oxygen gradient. M. leidyi specimens were also exposed to an artificial, discrete oxygen source in order to mimic the availability of oxygen from aquatic photosynthetic plants and algae. Animals associated with this oxygen source apparatus by wrapping their oral lobes around it or lingering within 2 cm. Specimens in hypoxic (<60 Torr PO2) conditions were 18.7 times as likely to associate with this apparatus as animals in aerated water (>140 Torr PO2) (p=0.0088), suggesting that M. leidyi may be able to utilize aquatic photosynthetic plants and algae as an oxygen source during hypoxic events. Given the increases in marine hypoxia worldwide, these behaviors by a well known invasive species may represent a previously unexplored ecological impact. | https://etd.auburn.edu/handle/10415/5371 |
The average price for acquired shares amounts to 150.14 SEK per share, and the total amount is 32,341,091 SEK. The transactions have carried out on Nasdaq Stockholm.
Nordnet did not previously hold any shares, and Nordnet’s total holding after the repurchase transactions amounts to 215,413 shares. The total number of outstanding shares in Nordnet amounts to 250,000,000.
The repurchases have been carried out as follows: | https://nordnetab.com/press_release/nordnet-has-repurchased-own-shares/ |
This rating is a weighted average of commute time, crime rate, population, median salary, and more.
Overall value
This score adds annual household income and cost of living to the city rating.
Density (Population per mile²)
Compared to New York, Portales has a very low population density. Portales is perfect for those who like a quiet city.
City Info
Portales, NM is a great place to live. It has its pros and cons like any city, but with a quality of life rating of 9/10 and an overall value of 8/10, it’s no surprise why so many people choose to live here.
Population density is a way of determining how crowded an area is. Portales has a population density of 1,793, with 12,283 current residents.
Out of the 12,283 current residents, 49% are male and 51% are female. 54% of the residents are married and 46% are single.
Residence
Air quality
Weather
- 75% Sun
- 17% Rain
- 9% Snow
Condition
57°F average temperature
- 40 years Median home age
- $65,930 Median home price
- -3.41% Home appreciation rate
- 4.77% Annual property tax
-
45.9%Homes owned
-
38.7%Homes rented
-
15.4%Homes vacant
Residence
As for living in Portales, the air quality is 97% and the weather, on average, is 75% sunny, 17% rainy, and 9% snowy. The average temperature is 57°F.
Whether you’re looking to buy or rent a home in Portales, you should know that 45.9% of homes are owned while 38.7% of homes are rented, and 15.4% of homes are vacant. The median price of a home is $65,930, the median age of homes is 40 years, the annual home appreciation is -3.41% and the annual property tax is 4.77%.
Community
Religious diversity
-
Crime rate (per 100,000)4
-
Average age26
-
Political majorityRepublican
Community
When looking at the community of Portales, it’s important to determine the crime rate. Portales’s crime rate is 4 total number of crimes reported per 100,000 total population. The average age of residents in Portales is 26 years and the breakdown of political affiliations is 34.27% Democratic, 64.15% Republican, and 1.58% Independent.
Locale
Unemployment
Education
Student teacher ratio 1:15
Occupation
-
Management, Business, Art & Sciences
6.2%
-
Sales & Office Occupations
25.5%
-
Service Occupations
15.6%
-
Production, Transportation & Material Moving
12.1%
-
Natural Resources, Construction & Maintenance
9.6%
-
74%High school diploma
-
7%Some college or associates degree
-
14%Bachelors degree
-
11%Graduate or professional degree
Locale
When looking at Portales, it’s important to understand employment statistics. 4.70% of residents are unemployed in Portales (which does not include the percentage of residents who are no longer in the labor force). Of the employed Portales residents: 6.2% of employed residents work in the management and business field, 27.76% are in the arts and sciences field, 15.6% are in the customer service field, 25.5% are in the sales field, 3.20% work in farming, fishing, and forestry, 9.6% of employed residents work in the construction field, and 12.1% work in production. When it comes to education, the ratio of teachers to students is 1:15. The percentage of residents who have graduated high school is 74.36%, 6.89% of residents have an associate’s degree, 14.40% of residents have a bachelor’s degree, and 10.94% have a master’s degree.
Transit
Average commute time
Daily breakdown: by transport type
-
Public
transportation
-
Car
-
Carpool
-
Work at home
Transit
If you plan on commuting to work in Portales, you should be aware that the average commute time is 17 minutes, compared to the national average commute time of 26 minutes. When it comes to commuting, residents of Portales have a few different options. 78% of commuters use their own cars, 14% of commuters carpool, 0% of commuters use the transit system, and 2% of residents work from home. | https://www.homeyou.com/portales-nm |
"School's out for summer, school's out forever" ~Alice Cooper
Awe, I love the smell of the ocean. The weather in California has been amazing. After church today, my sister and I went for a drive down by the beach and had lunch.
It ALWAYS brings back memories, of that warm summer day...
I had just graduated from High School. I was 17 and I had my whole life ahead of me. I love the beach and I spent most of my time there, that summer.
I have always felt God's presence at the beach and I think it IS one of His most BEAUTIFUL creations.
My friends and I would hang out at the same place, in the same spot, every summer. The Huntington Beach Pier was the place to be and all of the rockers would be there to pass out flyers for their upcoming gigs. ;)
I awoke early that July morning and like any other summer day, I packed up my beach towel, radio, baby oil (haha), grabbed my beach chair and jumped into my red Corvette.
When I arrived at the beach, I stepped out onto the sand and I sensed something different about this day. It seemed quiet and peaceful or maybe it was just me, feeling the freedom of being out of school?!
I put my hair up in a pony tail, took off my tank top and daisy dukes, laid back in my chair and turned the radio on.
I could feel the ocean breeze and hear the waves crashing upon the shore, as I dozed off...
Night Ranger ~ Sister Christian
STRANGER: Hey, aren't you ___________ sister?
I was startled as I opened my eyes... I saw this tall guy with long brown hair, wearing a white tank shirt and blue swim trunks, standing above me. I put my hand in front of my eyes to block the sun's rays that was shining all around him.
ME: I'm sorry, I was almost asleep. What did you say? I sat up in my chair.
STRANGER: Hey, come check out this band at the Troubadour tonight. He handed me the flyer.
I glanced at the flyer...
ME: This looks like the same singer I saw in the band __________________ a few months ago?
STRANGER: Yeah, yeah it is him... the two bands kinda joined forces and became one band, come check 'em out.
ME: He's going to be famous.
STRANGER: Who?
ME: The singer...
STRANGER: You think so?
ME: I know so! I knew the first time I saw him at Madame Wong's. I told all of my friends that night. He is a very gifted singer, mesmerizing and he has an anointing upon him.
STRANGER: Whoa, that's not something you hear everyday. Maybe you'll be their good luck charm? hahaha So you'll be there tonight, then?
ME: Haha... Yes, sure I'll be there.
STRANGER: Cool C-ya.
I put the flyer in my bag and headed down towards the water, as the stranger walked away.
The water was so refreshing. I remember thinking that I could be anything I wanted to be and all of my dreams would come true... or would they???
As I got out of the water and started walking back up the beach, I noticed a box sitting on my beach towel and chair.
On the outside of the box it said... "#17 wait for the key"
I opened up the box to find a heart locket with a gold chain inside, along with a letter.
THE LETTER READ:
Sweet as sugar and spice and everything nice
Your life has just begun
This is the locket taken from his right thigh
Tie it around your neck
Don't forget to smell the roses
For he is a performer and a king
You cannot open the locket and look inside
Or you will break the seal of destiny
Do not enter his courts
Until he has called you by name
For there is an appointed date in time
Remember, honor is above all fame
Mistakes will be made and heartache will come
As you grow weary and he exhausts every other key
Hold onto hope and always believe
For this promise is given, unto thee
Your test begins, this very day
So gain wisdom, strength and pray
For your faith is everything he needs
To unlock this "locket" full of dreams
It is entrusted unto you
But what good is it, without his key?
Hanging on the chain of his pocket
Is your heart, life and future... to be
I will appear to you, once again
On the day, he uses the "locket" key
For I am his Angel
The Stranger you met, at Sea
Until that day comes...
Forever,
Locket #17
Tim McGraw ~ Forever Seventeen
"All those years around your eyes,
always take you by surprise
You've been living in a dream,
You've been living in a dream,
forever seventeen" | http://www.farfalladreams.com/2011_01_01_archive.html |
Printed in Practical Homeschooling #74, 2007.
Tweet
The job of teaching math is not the same as it was when I went to school. Shortly after I graduated elementary school back in the 1960s the new math was invented, and in the new millennium we have "New-New Math" (which some have renamed "Know No Math").
By far, the most significant innovation to come along in elementary school math is the widespread use of calculators. Some people, in fact, have advocated eliminating the teaching of arithmetic altogether. They claim that calculators have made knowing how to do arithmetic an archaic skill. You wouldn't walk thirty miles if you could drive, or drive 4,000 miles if you could fly. Why add numbers on paper, if you can use a calculator?
Harm or Help?
Adding machines have been around almost forever, especially if you count abacuses. Scientific calculators have been around since just after I was an undergrad, thirty plus years ago, when those nifty devices replaced the slide-rules on engineering students' belts. They have had decades to prove their worth as educational tools.
What are the results?
For those who learn how to do the arithmetic first, and then learn to use a calculator, we have the testimony of Susan Richman in the Pennsylvania Homeschoolers Winter 2006-2007 newsletter:
As with many skills, proficiency in mathematics depends more on the ability of the person holding the tool than it does on the tool.
For those who don't learn the arithmetic, you get high-school students who, in actual truth, can't multiply six times four without a calculator. This doesn't bother the publishers of elementary school math textbooks. Everyday Mathematics: Teacher's Reference Manual Grades 4-6, published by SRA McGraw Hill says,
Textbook series like this claim that calculators are an absolute necessity.
Even textbooks that teach "algorithms" for doing arithmetic aren't necessarily trustworthy. It depends on which ones they teach. Beware of textbook series that use methods for long multiplication such as: "cluster problems," "partial products method" (one textbook says, "If this method becomes too cumbersome, use a calculator"), or "lattice method" (elegant, but time-consuming). For division, beware of "cluster problems" or "partial quotients" methods. For a complete explanation of why these other methods confuse kids see the 15-1/2-minute video "Math Education: An Inconvenient Truth" at www.youtube.com/watch?v=Tr1qee-bTZI.
My conclusion: Calculators should never be used to teach elementary school mathematics. The purpose of elementary school math is to teach the arithmetic skills essential for high-school mathematics. Kids will never learn these skills if their math is all in their calculators and not in their heads.
I'll take this one step further: Elementary-school kids shouldn't be allowed to use calculators at all, at least not in school. A child prodigy who does the family accounting and taxes can use a calculator for that, but no problem in an elementary school math program should require the use of a calculator.
Calculating on Paper
What is the traditional way to teach children to multiply two numbers? First, teach the multiplication tables from zero to nine. A paper math drill product such as Calculadder, or a software drill product such as Math Drill Express or Barnum Software's Quarter Mile can help. See other Reader Award winners in the Math Drill category on page 52. Or just make your own flashcards or worksheets.
Second, teach them to multiply a multi-digit number times a single-digit number. Multiply one digit at a time from right to left. If the product is one digit long, write it down. If it is two digits long, write down the second digit and carry the first one. When you multiply the next digit, add the carry to the result, then write down the second digit and carry the first again. the result looks something like this:
1
4132
x 4
-----
16528
1
4132
x 4
-----
16528
Third, learn to do step two without writing the carries. You won't be able to write carries once you get to step four, because you will be multiplying by the top number more than once.
Fourth, multiply a multi-digit number by another multi-digit number. You multiply the top number by each digit of the bottom number, making a "partial product," lining it up so the last digit of the partial product is under the digit being multiplied. Then add the partial products to get the answer. The result looks like this:
4975
x 37
------
34825
14925
------
184075
4975
x 37
------
34825
14925
------
184075
And that's all there is to multiplication!
Kids of this age don't need to understand why this works. In fact, most of them get confused when adults try to explain it. However, a child who is proficient at long multiplication using the standard method I just demonstrated will have no trouble at all understanding how place value works with partial products, once he or she is old enough to do algebra.
Teaching long division is done just the same way. First you teach "the division tables," for example, how many times does 7 go into 42? Then you teach your student to divide one digit into two with a remainder, e.g. 53 ÷ 8 = 6 r5. Finally you teach long division:
152 r2
----------
24)3650
24
--
125
120
---
50
48
--
2
152 r2
----------
24)3650
24
--
125
120
---
50
48
--
2
That's all there is to it... without a calculator.
Was this article helpful to you?
Subscribe to Practical Homeschooling today, and you'll get this quality of information and encouragement five times per year, delivered to your door. To start, click on the link below that describes you:
USA Individual
USA Librarian (purchasing for a library)
Outside USA Individual
Outside USA Library
Yes, I Am a Religious Homeschooler
Slackers Need Heroes
You've Got a Friend
Revenge of the Nerds
Getting Ready for (Gasp!) Algebra & Beyond
Teaching Algebra: The Search for X
Teaching Geometry: Measuring Up, Proving Yourself
Advanced Math: Trig, PreCalc, and more!
Calculus: The Bridge to College Math and Science
High School Science
High School Biology
High School Chemistry
Teaching Physics at Home
Calculate This!
Graph This
The Foundations of Science
Why You Need Lab Science
Middle School Science
How to Get into Medical School
The Great Probeware Scam
What College Math Majors Don't Know
Math Wars
Statistics Can Be Sweet
Getting Ready for Algebra
The National Bible Bee
It's a Wonderful Second Life
Our Children's Inheritance
Considering a Career Change?
It’s Time for Homeschool Teacher Appreciation Day!
Is STEM in Your Future?
Why the Internet will Never Replace Books
Combining Work and Homeschool
Bears in the House
The Charlotte Mason Method
AP Courses At Home
The Benefits of Cursive Writing
I Was an Accelerated Child
A Reason for Reading
Whole-Language Boondoggle
Critical Thinking and Logic
Interview with John Taylor Gatto
Joyce Swann's Homeschool Tips
Can Homeschoolers Participate In Public School Programs?
How to "Bee" a Spelling Success
Who Needs the Prom?
Columbus and the Flat Earth...
The Charlotte Mason Approach to Poetry
Give Yourself a "CLEP Scholarship"
Teach Your Children to Work
A Homeschooler Wins the Heisman
Classical Education
Top Jobs for the College Graduate
Teaching Blends
What We Can Learn from the Homeschooled 2002 National Geography Bee Winners
Narration Beats Tests
Art Appreciation the Charlotte Mason Way
Don't Give Up on Your Late Bloomers
The Equal Sign - Symbol, Name, Meaning
Laptop Homeschool
Phonics the Montessori Way
The Gift of a Mentor
The Benefits of Debate
Shakespeare Camp
Montessori Language Arts at Home, Part 1
Getting Organized Part 3
Montessori Math
Character Matters for Kids
Getting Organized Part 1 - Tips & Tricks
Discover Your Child's Learning Style
Saxon Math: Facts vs. Rumors
Patriarchy, Meet Matriarchy
What Does My Preschooler Need to Know? | https://www.home-school.com/Articles/calculate-this.php |
The invention discloses an environmentally friendly multi-functional mower for landscaping. The multi-functional mower comprises a rack, a mowing device is arranged on the rack, and the mowing devicecomprises a supporting frame fixed to the rack; a first motor is installed on the supporting frame, a rotary cylinder body is fixedly connected to an output shaft of the first motor, and a follow-up shaft sleeve is arranged inside the rotary cylinder body; the follow-up shaft sleeve comprises a spherical platform part and a clamping part, two spherical platform guide columns used for being connected with the spherical platform part are symmetrically arranged on the side wall of the rotary cylinder body, and a connecting line between the two spherical platform parts penetrates through the sphere center point so that the sphere center point position of the spherical platform part cannot be changed when the spherical platform part and the rotary cylinder body make relative movements. The mowing device can adjust the operation range of cutting tools so that the mowing operation is more flexible, and the adaptability range of the mower is wider. | |
I purchased this eyepiece to supplement my TMB 175 f/8 APO refractor. Even though the focal length of this e.p. is not too different from my Panoptic 27 , I wished to obtain an eyepiece with fewer optical elements and higher light transmission by virtue of fewer elements and air/glass surfaces. I really did not know what to expect in performance. My favorite items for viewing are globular clusters , bright nearby galaxies , and double stars.
My first trial of this eyepiece (56x in my TMB) was very encouraging ; I was able to clearly resolve M8 , M22 , and M13 into a fine dust of individual pinpoint stars! I was expecting to need a Barlow on M13 , but it really gave me an awesome view of the cluster. Very bright and contrasty against an almost velvet black. As a comparison , I tried my Televue Panoptic 27 on the same objects. I found M8 and M22 resolved , and M13 as a grainy disk verging on resolution. Score one for the TMB aspheric ortho.
I also tested the TMB on Rasalgethi (alpha-Herculis) , an approximately 4" seperation double. To my amazement , I saw a TINY dot of light almost touching the primary. Not touching , not a figure 8 , but clearly split! I ususlly need my Nagler 12 T4 to split this double (117X). Score 2 for the TMB.
I finally tried a look at M33 in Triangulum ; the skies were not really great for galaxy hunting that night , but the view that I was able to obtain in the TMB Aspheric Ortho was the best of the 3 ep's I used that night ( Panoptic 35 , and Panoptic 27). II was able to clearly see NGC 604 , an emmission nebula in the galaxy.This is an outstanding eyepiece.
Technical data: Field stop: 24 mm ; Tube diameter 1.25 " ; Focal length : 25 mm ; FOV : 55 degrees : Eye relief : 20 mm.
>I also tested the TMB on Rasalgethi (alpha-Herculis) , an approximately 4&quot; seperation double. To my amazement , I saw a TINY dot of light almost touching the primary. Not touching , not a figure 8 , but clearly split! I ususlly need my Nagler 12 T4 to split this double (117X). Score 2 for the TMB.
There must be something wrong with your 7-inch TMB APO if it usually needs a power of 117x to cleanly split a wide double of 4 arcseconds, such as Ras Algethi. Please check again and take high-end orthos, but not Naglers. In my 6-inch f/9 Meade ED APO, Ras algethi is cleanly split at 55x and 76x using Kasai Ortho 25mm and Baader Genuine Ortho 18mm (same as UO HD Ortho), respectively. | http://excelsis.com/1.0/entry/tmb-aspheric-ortho-25mm-22-609.html |
What is NaOH?
NaOH is the chemical formula for sodium hydroxide. This chemical substance is also known as caustic soda or lye. In its pure state, sodium hydroxide is white in color and is commonly found in the form of pellets, granules, or flakes. Sodium hydroxide is also highly soluble in water and has high alkaline levels which make it very delicate to handle. People handling this chemical must wear protective clothing as it may cause serious skin irritation. If irritation does occur, experts advise that the skin part be soaked in warm water to rinse off the chemical.
There are various uses for sodium hydroxide and these include the manufacture of paper-based items, the making of soaps, detergents, and other cleaning products, and in purifying water among many other applications. In one’s household, one may find sodium hydroxide as part of the ingredients for products like dishwashing liquid, laundry detergents, and bath soaps. But these household products typically contain only a small amount of the sodium hydroxide substance to counter its skin-irritant properties.
The food industry also makes use of sodium hydroxide for a variety of purposes. Fresh fruits and vegetables may be rinsed off with a solution that contains this particular chemical. Some have also used this chemical in solutions that help soften the texture of some fruits and crops. Other traces of this chemical can also be found in hair strengtheners, paint stripping products, and many paper products.
Aside from the chemical’s common use in the food, paper, and household products, many have also taken advantaged of sodium hydroxide in terms of its ability to dissolve other things and substances. In the case of farming for example, this chemical is mixed with water to dissolve the tissues of some animals. Sodium hydroxide can also react with other chemicals and compounds making it ideal for etching and/or altering a metal’s finish. | https://infomory.com/what-is/what-is-naoh/ |
Managing an executive calendar can be challenging. Many people and tasks vie for your time, and you want to make the most of every day. Staying on schedule is essential—lateness or missed meetings send a message to clients and employees that they are not valued, and over time can erode your reputation.
At the same time, creating time and space for everything and staying on track can make your life and your work much more manageable.
Here are thirteen tips to manage your calendar for maximum productivity.
1. Prioritizing Calendar Management
The first step in calendar management is to prioritize people and tasks in your business. Who are the people you need to spend time with directly? What meetings or duties are not worth your time?
A valuable tool for prioritizing is the Eisenhower Matrix, named for the famous former general and president who said, "I have two kinds of problems: the urgent and the important. The urgent are not important, and the important are never urgent." The Eisenhower Matrix divides priorities into four segments:
- Urgent and Important: these are priorities that only you can address and require immediate attention. Examples include board meetings or calls or investor calls. These should get to the top of your inbox and on the calendar right away.
- Important but not urgent: these priorities require your attention, but you can schedule them for later, within a week or so. You can schedule a meeting request from a direct report or a check-in with a critical customer for a later date.
- Urgent but not important: these are priorities that others can do, and you delegate them to someone else. For example, if you have an executive assistant, you can offload scheduling meetings, planning travel, and preparing documents.
- Neither important nor urgent: these are priorities that you should not do at all. You can save an awful lot of time by removing busy work from your inbox and calendar. If you are asking yourself, "Why am I in this meeting?" Skip the next one.
It can be super helpful to build out this matrix and keep it handy when you are bombarded with requests and need to prioritize. You create four quadrants:
- Urgent and important in the top left quadrant
- Important but not urgent in the top right quadrant
- Urgent but not important in the bottom left quadrant
- Neither urgent nor important in the bottom right quadrant
2. Document Your Meeting Preferences
Everyone works differently and has different tolerances for meetings. It is helpful to document your meeting preferences to make the best use of your time. You can share these preferences with your team so that you are all on the same page—especially when you share your calendar with others to facilitate scheduling.
- Times of day: what times of day do you like to meet?
- Duration for diverse types of meetings: not all meetings need to last an hour. You can save a lot of time with shorter sessions.
- Meeting locations: if meeting at restaurants or coffee shops, which are preferred? Do you like video meetings or in-person? This preference may vary depending on the contact and the nature of the meeting.
- Buffer time between meetings: Frequent back-to-back meetings often get executives behind schedule. Transitioning from one call to another takes time, and a break between sessions can work wonders for your focus and attention. Five to 15-minute buffers between meetings work wonders.
- Restricted times: An effective way to make sure you can focus on key projects is to block off time for "deep" work like strategy and planning.
- Out-of-office notifications: some executives are happy to stay connected while out of the office for work or personal reasons, while others are not. If you are out of the office and others can see that on your calendar, make it clear whether you will respond and what kind of response expectations people should have.
3. Calendar More than Meetings
You do not have to limit your executive calendar to business meetings. Having your entire schedule in one place will make it easier for you to stay on track and avoid missing events or double booking. Non-meeting tasks that you can add to your calendar include:
- Exercise
- Personal appointments
- Deadlines
- Family commitments
- Networking with colleagues
- Meals
4. Color Code Meetings in Your Calendar
Color-coding calendar events can provide a quicker view of your schedule and make it easier to rearrange meetings and commitments when needed. For example, since a deadline is not a meeting, you can quickly see that you are available at the time scheduled as a deadline. You can color-code events by:
- Type of activity (business, personal, health, deadline, etc.)
- Priority level
- Internal or external
- Onsite or off-site
- Recurring meeting
5. Send Reminders and Confirmations
One of the most powerful ways to save time is sending reminders about upcoming meetings and meeting confirmations to attendees. Attendance no-shows can be a huge time drain and demoralizing, especially when you travel to a meeting.
In most calendar platforms, you can automate sending reminders to yourself—defining when and how many reminders to send. You may want to send yourself, for example, a reminder 24 hours in advance and 15 minutes in advance.
Also, it is best to send a confirmation request at least one day before a meeting to make sure it is on the radars of all the attendees.
6. Create Templates for Calendar Invitations and Confirmations
Your life will be much easier if you develop templates for calendar invitations and confirmations. If you have a template, you will not have to start over every time you send a confirmation email, and you will not forget to include valuable information.
A confirmation template can consist of:
- A message that says you are looking forward to your meeting.
- The day and time
- Location
- Any phone numbers or video call links
- A request to respond to confirm or change plans
7. Gather Documents for Executive Meetings
Another way to improve your efficiency is to make sure any required documents and information will be ready for the meeting. You can use the meeting invitation or confirmation to note anything attendees should bring. Meeting documents include:
- Minutes from the previous meetings (if recurring)
- Profiles of the attendees that are unfamiliar to you
- Agendas
- Financial or committee reports
Trying to get this information on the fly during the meeting will waste time and slow you down.
8. Review Your Executive Calendar Daily
Review a summary of tomorrow's schedule at the end of the day. Reviewing the next day's schedule in the afternoon is recommended because it allows you time to notify people if your plans have changed and a meeting needs to be rescheduled or canceled.
9. Privacy in Shared Executive Calendars
If you share your executive calendar with others, be careful about any meetings you don't want others to see. For example, if you are securing loans and other financial transactions, you can be vague about an individual or firm involved. If you are traveling, there are personal security issues to consider. Do you want people to know when you are away from your home and your family? At the very least, make sure anyone you share your calendar with knows your preferences for your location information.
10. Delegate Wisely, and Kindly
In earlier times, executives had secretaries and receptions that served as their gatekeeps. The gatekeepers were the ones who said "no" to requests for an executive's time. If you are the one saying "no," use delegation to help requesters get what they need. You can do this by:
- Redirecting the person to a more appropriate resource as a starting point
- Offer help connecting them with a more appropriate resource
- Explain how the person will get better results with a more appropriate resource
- Offer support if the person hits roadblocks with the resource you recommend
11. Create Meeting-Free Blocks in Your Calendar
Research from Atlassian found that the average employee attends sixty-two meetings a month, about half of which are considered a waste of time either due to a meeting not being necessary for the topic discussed or meetings consuming far more time than they need to.
All of this wasted time prevents people from focusing on the deep work that drives their success.
One way to limit this productivity killer is to create meeting-free blocks on your calendar and resolve more conversations through asynchronous methods like email and chat.
Depending on your role, you can adjust this productivity strategy in two ways:
- Determine if your meeting-free block should have zero meetings or if you'll allow ones that are tied directly to your success, such as prospect presentations if you're a salesperson, and disallow internal meetings.
- Decide how much time you need for deep work. If you're in a highly collaborative role, one or two mornings a week may be enough to make significant progress on your independent projects. However, if you're a creator, strive for an entire day or two of now meetings to fully focus on your projects.
Once you've determined how much meeting-free time you need to amplify your productivity, add blocks to your calendar for deep work and inform the people you work with closely.
You'll have to make exceptions if an urgent issue comes up, and you need to connect with your team to solve it. These meetings at least align with your goal of dedicating time to your most critical tasks.
12. Schedule Time to Handle New Requests
No matter how well you plan your days, unexpected problems and requests will threaten your productivity. To ensure you stay on track even on chaotic days, put time on your calendar to address sudden tasks.
The length of time you block off and at what frequency depends on how unpredictable your workload is. If your responsibilities are generally stable, you may only need an hour every two or three days to tackle unexpected tasks. However, if solving urgent issues is a vital part of your role, you may want to leave two or three hours a day free to tackle them. You can use any extra time to get ahead on projects.
Blocking off time also lets you set expectations with people regarding when you'll complete their requests, which prevents you from holding them back.
13. Hire a Virtual Assistant For Calendar Management
Calendar management can be a paradox because it requires a significant time investment to save time. Suppose you develop processes and habits that allow you to quickly plan out your optimal schedule. In that case, you'll easily net positive and experience the psychological benefits of a well-organized calendar.
However, if you struggle to stick with this kind of time management system, attempting to optimize your calendar can be stressful and even hurt your productivity.
To yield the benefits without having to invest the time, offload calendar management to a virtual assistant. Once you share your preferences for activities like deep work, meetings, task-batching (or not), etc., they'll ensure that every appointment is scheduled at the optimal time and prevent you from ever being double-booked again.
The Value of Executive Calendar Management
Managing your calendar may seem like a headache, but "the seat of your pants" is not a good operating model. Doing some front-end organizing and standardization will go a long way to boost your productivity and relieve stress. You will have the peace of mind that comes from knowing that everything is under control--as much as possible.
If it all seems like too much, consider outsourcing your executive calendar management. Prialto has provided virtual assistants to U.S. executives since 2008 and, in that time, has mastered calendar management along with a host of admin work.
Click here to learn more about working with a Prialto virtual assistant to gain leverage with calendar management. | https://www.prialto.com/blog/executive-calendar |
In the “Input field” in the left top of the sheet, type the name of the beginning cell and then the name of the ending cell of the desired range, separated by a colon (:), e.g. A1:A20, and press the Enter key.
You can also select the range with the mouse, or by clicking in the top-left cell in the range and shift-clicking in the bottom right cell in the range, if you do not have the cell references memorized.
Afterwards, it will be easy to select the range by double-clicking its name in the Range names section in the Navigator.
Select a cell range and choose the Edit menu then the Fill sub-menu and the Series… item.
Four types of series Linear, Growth, Date and AutoFill are available.
The automatic filling is done from a sort list.
You can see all the available lists by selecting Sort Lists in the NeoOffice Calc section of the Preferences sub-menu of the NeoOffice menu.
The new series will be available via the Series… item in the Fill sub-menu of the Edit menu by checking the case AutoFill in the Series type section and choosing the first element of the list as the Start value.
The Fill function allows you to apply a recurrent formula to a cell range.
Select the range A1:A20, enter 1 in A, choose the Edit menu then the Fill sub-menu, click Series.
Set up the Type to Linear, the Start value to 1, the End value to 20 and the Increment to 1.
The series of the first 20 integers appears in the selected range.
Enter 1 in the cell B1.
Select the cell B2 and enter in the formula line, in the top of the page : "=B1+A2" (without quotes). Press Enter. The sum 3 appears in the cell B2.
Select the range B2:B20, choose the Edit then the Fill sub-menu and the Down item. Now every cell of the selected range contains the sum of the successive integers and the cell B20 contains the sum of the first 20 integers, i.e. 210.
You will find the definition of absolute and relative references in NeoOffice help: go to the Help menu, then NeoOffice Help. In the drop-down menu select NeoOffice Calc, click on Find and enter References in the Search field. Select Adresses and References, Absolute and Relative.
Click in the cell D1 and fill the range D1:D5 by using drag/and/fill. The cell D2 shows the value (A2+B2+C2)*$E$1. Without using absolute references, D2 would show (A2+B2+C2)*E2.
You get the corresponding results in the cells D3 to D5.
You can use the Paste Special function to perform arithmetic operations on the values of a cell range. Examples follow.
N.B. The selected cell range must form a matrix.
==>The range A1:B2 contains now the products A1*C1, A2*C2, B1*D1 and B2*D2.
If in the View section of NeoOffice Calc of the Preferences sub-menu of the NeoOffice menu, you check the Value highlighting option, the cells which contain values will be displayed in blue, and those which contain formulas in green. If you choose that option, you'll not be able to change the character color in those cells.
This page was last modified 12:25, 22 August 2008. | https://neowiki.neooffice.org/index.php/Selecting_and_Filling_a_Cell_Range |
Q:
Creating a Dice Roller in Java. Help me understand why this works?
I stopped programming a few years ago because I didn't think I would get to graduate. Surprise, now I am, and I have to brush up on rusty novice skills. I decided to start with a dice rolling program written in Java. The first version of this program is just supposed to spit out a random number between 1 and 10. As I go I plan to expand it with a GUI that allows the user to select the number and type of dice to roll.
The first version of this program works. My problem is that I don't know why it works. I was first going to use java.util.random and use random.nextInt() but the range was enormous and I couldn't figure out how to limit it to a specific range.
I searched online and found something that worked. Here's what I have.
class DiceRoller {
public static void main(String[] arguments){
int min = 1;
int max;
int result;
result = rollDice(10, min);
System.out.println(result);
}
public static int rollDice(int maximum, int minimum){
return ((int) (Math.random()*(maximum - minimum))) + minimum;
}
}
The specific part that I found to make this work is:
public static int rollDice(int maximum, int minimum){
return ((int) (Math.random()*(maximum - minimum))) + minimum;
}
But I don't understand why it works. Is it something with random() within the Math class itself that differs from Random in java.util? Why is it necessary to take the random number and multiply it by the difference of the maximum and minimum, then add that result to the minimum? To be honest I feel stupid for asking but I want to understand why this works rather than just take the code and use it because it does.
Edit: I know.. I know.. I should've just read the class documentation. Thanks for humoring me and answering anyway. I appreciate the replies, and thank you Aaron for the explanation.
A:
Math.random() returns a random number between 0 and 1.
So if you want a random number between 0 and n instead, you just have to multiply by n.
Now if you want a number between m and n, you will want to do what is done there : multiply by n - m, then add m.
Example with a roll between 2 and 5 :
I've got my random number between 0 and 1
I multiply it by 5 - 2 = 3. Now I've got a random number between 0 and 3
I add 2. Now I've got a random number between 2 and 5
| |
The Roots of Competitive Rowing
Rowing is a water sport which uses oars to propel boats or specially designed racing shells. Shells are usually classified for either sculling (two oars or sculls, one in each hand) or rowing (one oar, held by both hands). Sculling shells can either include single, double or quadruple people.
Competitive rowing was introduced to North American port cities; such as Saint John, Halifax and Boston, as early European immigrants introduced their sporting customs.
In the 19th century, the economy of Saint John, New Brunswick (located on the Bay of Fundy), was dependent on water-based industries such as fishing, shipbuilding and shipping. The ocean provided not only a means of living, but also opportunities for recreation. Watersports were popular pastimes, rowing in particular, and participants employed their strength, knowledge of the water and skills in boat designing in local competition. Winners of local rivalries typically moved on to compete against teams elsewhere in the region.
The first recorded rowing race in Saint John, New Brunswick was on August 18, 1819 and the first regatta-styled event took place in 1836. There were many skilled oarsmen from the Saint John, New Brunswick area at that time but it would be four in particular who would put Saint John on the map in the international rowing community.
George Price, Samuel Hutton, Elijah Ross and Robert Fulton rowed with several different crews, but in the summer of 1866 they joined forces at a rowing regatta dubbed “Father Dunphy’s Picnic,” and their victories were so commanding they were hailed for having what was considered an unbeatable combination. Although the newly formed team was identified by several different names, over time they became more commonly known as the Carleton Crew. | https://www.communitystories.ca/v2/the-paris-crew-of-saint-john_le-paris-crew-de-saint-john/story/chapter-1/ |
I always wanted to have a backyard pond so I decided to learn how to build a pond. And since I had a turtle which outgrown my turtle tank I just had to build a pond for my turtle. I liked the idea of having my own pond full of fishes swimming around and my turtles bathing in the sun.
So I did a little research on topic on how to build a pond. I read a lot of pond building articles, watched some YouTube videos and finally I had enough info to make a pond myself. I combined all pond building information and made a plan on how to build a turtle pond.
In this article I will try to give you some tips and ideas so that you too can make your own pond. All by yourself. Of course I am still far away from being expert or anything close to that. I simply made a small pond for my turtle. And I think I did it really good and I am happy with the results.
So let’s start and look how to build a pond!
How to Build a Pond – My way of building a turtle pond
Decide where to build a pond
First thing to do is to find a good place for your pond. ideally you should look for a place that gets some shadow during the day. It is not recommended for your small pond to be on all day sun exposure. You can quickly get problems like algae growth, too warm water, and animals also need a shadow. You can control sun exposure later on with plants like water lilies or lotus.
I didn’t really have much choise where to build a pond. This was only place available so I needed to make a smaller pond. I was also limited in depth of the pond (plumbing installation under).
Mark shape and size
Next I marked the outline of the pond with a garden hose. You can use a rope (much better suited for outlining the pond). Here you can experiment and try different shapes and sizes. Anything goes. As long you have enough space available.
Dig a hole
Once I had outlined my pond I started to dig. Yeah. There was a lot of digging. I started from outside in. I digged in layers so that pond would have slopes.
Clean the hole from sharp objects
When done making the hole I made sure there are no sharp stones left in the pond. You don’t want anything sharp to tear pond foil later on.
Lay down some sort of soft materials to protect the pond foil
Next I laid some old sheets, curtains and other soft material. For pond foil protection. I guess I did overdo it.
Pond Foil
Now it’s time to put pond foil over the hole. I recommend to get foil specially for ponds (pond foil is thicker and more resistant). Normal foil can quickly tear or gets damaged. And you don’t want foil damaged once you have pond full of fish or other animals.
Fill in the water to evenly stretch the pond foil.
Finally I started to fill my pond with water. Before you go to next step be sure your pond foil is not damaged (mark the water level and check back in a few hours). If foil is damaged you need to patch it up or replace. Better to do that now when just starting. It’s kinda hard to go and tear your whole pond down once you finished it just because foil had a tiny hole and was leaking.
Use stones to cover the foil
In this step I got a lot of stones from nearby river and one by one I stacked them up so the pond foil was not visible anymore (without slopes I would not be able to do that). Looks more natural this way. I did that with water in the pond but I guess it would be much easier to empty it before laying stones.
Waterfall
I wanted to have some kind of water fall so I stacked some larger rocks together and installed water pump. I used rocks to hide electrical cable and hose connected to pump. Nothing hard. Just make sure when working in water to turn off water pump. Safety first.
Plant Plants
All I needed to do know was to plan some plants inside and around the pond. I mainly used plants from a swamp nearby. Such plants are not hard to maintain and are nice addition to your pond. I also planted some larger bushes for partial sun protection. Remember, you don’t want your pond to be exposed to sun all day long.
Fence for turtles
Before I let my turtles into the pond I also installed a fence. So that my turtles don’t get any silly ideas. If your pond has only fishes then you don’t need the fence.
That’s basically all you need to know how to make a simple backyard pond. It is really easy to make, fairly cheap and you can make it in no time.
What About Pond Cleaning?
After the first winter I decided to clean my pond. How did I do that? Simple! I just pumped out the water, cleaned the pond surface with garden hose and shovel and filled the pond with new water.
Of course, first I had to catch all the fishes and my turtles and remove them from the pond.
First you need to pump out the water
Then clean the pond and refill with water
Before you start cleaning your pond, make sure to remove all fish and other animals
Now you know how to build a pond and how to take care of it. I hope this article helped you and that you learned some new stuff. If you have any questions or you think I did something wrong while building a pond – please leave a comment.
More pictures of my pond:
Happy turtles in a new home
Winter time
This spring
This is how my turtle pond looks now ( 1 year after I build it)
Thanks for reading my “how to build a pond” guide. You like it? Please comment.
| |
Welcome to another edition of Master Chef! This time the students participated in a mystery basket challenge. Students were challenged to create a dish using the four mystery basket ingredients. They also had access to the Impact pantry. The mystery basket ingredients the students had to work with were: pretzels, shortcake, caramel candies and canned peaches! Check out the pictures below of the kid's creations!
|
|
Master Chef: Mystery Basket
5/2/2019
Comments are closed. | https://www.bascisd.com/ims-mpact-blog-2019-2020/master-chef-mystery-basket |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
1. Field of the Invention
The present invention relates to a circuit for driving a stepping motor to return efficiently a needle of a meter used especially in a vehicle to a zero position when starting to drive.
2. Description of the Related Art
Meters mounted in a vehicle, such as a speedometer to indicate a vehicle drive speed or a tachometer to indicate an engine rotation speed or the like have recently used a stepping motor to meet the requirement of response speed or indicating accuracy. However, for indicating preciously with a stepping motor, synchronizing of timing, on which a stopper piece rotating together with a stepping motor abuts on a fixed stopper, and a specific step of excitation signals to drive the stepping motor is required.
Such synchronization is usually accomplished by sensing a timing on which said stopper piece abuts on the fixed stopper to monitor induced voltage in coils by a stepping motor rotation when a battery is turned ON or ignition is switched ON/OFF.
Operation of the return of a needle or a stopper piece to a zero position defined by a fixed stopper and synchronizing a timing to abut on the fixed stopper with a specific step of excitation signals is called a “return-to-zero process” or simply “return-to-zero” herein.
The method of sensing induced voltage in the prior art, as mentioned above, has several drawbacks, such as requiring much time for return-to-zero process at battery turn on; needle continuously oscillating each time the ignition is turned ON/OFF; requiring much time for return-to-zero because of the necessity for keeping suitable rotating speed of a rotor to sense induced voltage securely; indication error caused by an inaccurate stepping motor; imprecise judging to abut on a stopper by means of unclear distinction of induced voltage level on a stepping motor with a rotor of a large numbers of magnetized poles and a large reduction gear ratio or complicated circuit required by induced voltage sensing coil and a sensing circuit.
The present invention has been accomplished to overcome the above drawbacks and an object of the present invention is to provide a drive circuit for a stepping motor to eliminate sensing function for induced voltage and to reduce any oscillatory motion of a needle on return-to-zero process and to reduce process time with a simple circuit structure.
In order to attain the above objects, a drive circuit for a stepping motor according to the present invention controls a position of a needle of a meter mounted in a vehicle by needle control signals and comprises an excitation signal generating means for generating excitation signals, wherein one electrical cycle is formed by a plurality of excitation steps supplied in drive coils to rotate a rotor with N-poles and S-poles, magnetized equally and alternately, of a stepping motor and a first excitation signal supply controlling means for controlling the excitation signal generating means to supply the excitation signals to the drive coils, wherein said needle is connected to the rotor through a speed change gear and rotates correspondingly to the rotor rotation, so that the excitation signals correspond to a needle rotating angle more than a maximum needle rotating angle toward a zero position to respond to the needle control signals generated at a timing when a vehicle battery turns ON.
According to the present invention, the excitation signals corresponding to rotating the needle with an angle more than the maximum needle rotating angle toward a zero position are supplied to the drive coils by means of controlling the excitation signal generating means with the first excitation signal supply controlling means at a timing when a car battery turns ON. When the excitation signals corresponding to an angle more than the maximum needle rotating angle are supplied to the drive coils, the needle is always set at the zero position.
Therefore, setting a zero position is accomplished without sensing induced voltage and then a time for returning the needle to the zero position is extremely shortened. Then, the circuit structure becomes simpler and unit size becomes smaller because sensing coils for induced voltage and sensing circuit are not required. Furthermore, in case of using an inaccurate stepping motor or a stepping motor with a rotor have a large number of magnetized poles and a large reduction gear ratio, return-to-zero can be done securely. Furthermore, when connecting a vehicle battery or replacing it, the present invention is very effective to set a zero position of a stepping motor.
In order to attain the objects, a circuit for driving a stepping motor according to the present invention is for controlling a needle position of a meter mounted in a vehicle by needle control signals and comprises an excitation signal generating means for generating excitation signals, wherein one electrical cycle is formed by a plurality of excitation steps supplied in drive coils to rotate a rotor with N-poles and S-poles, magnetized equally and alternately, of a stepping motor and a first excitation signal supply controlling means for controlling the excitation signal generating means to supply the excitation signals to the drive coils, wherein said needle is connected to the rotor through a speed change gear and rotates correspondingly to the rotor rotation, so that said excitation signals correspond to twice said one electrical cycle rotating toward a zero position to respond to the needle control signals generated at a timing when an ignition turns ON or OFF.
According to the present invention, the excitation signals corresponding to twice one electrical cycle rotating the needle toward a zero position are supplied to the drive coils by means of controlling the excitation signal generating means at a timing of turning ignition ON or OFF by the first excitation signal supply controlling means. When the excitation signals corresponding to twice one electrical cycle are supplied to the drive coils, the needle is almost usually set at the zero position.
Therefore, setting a zero position is accomplished without sensing induced voltage and viewing improves because a needle is not oscillating continuously each time the ignition is turned ON/OFF. Furthermore, the circuit structure becomes simpler and unit size becomes smaller because sensing coils for induced voltage and sensing circuit are not required.
In order to attain the objects, a drive circuit for a stepping motor according to the present invention has an excitation signal generating means, comprising a filtering means for filtering the needle control signals to move the needle faster to the zero position, and a SIN/COS table for generating SIN/COS data corresponding to the excitation signal of micro-steps based on filtering result by means of the filtering means and an output circuit for outputting excitation signals supplied into the drive coil as a required voltage value to rotate the rotor based on SIN/COS data by the SIN/COS table.
According to the present invention, because the excitation signal of micro-steps is supplied into the drive coil by the filtering means, the SIN/COS table and the output circuit in the excitation signal generating means, the oscillatory motion of the needle during return-to-zero is reduced. Because the vibrated motion of the needle becomes small, the needle oscillation may cease completely.
In order to attain the above objects, the drive circuit for a stepping motor according to the present invention, has a filtering means comprising a first filter for filtering the needle control signals to add or subtract predetermined value corresponding to change values of the needle control signals, a second filter for smoothing data change value to weighted-average filtering results by the first filter every predetermined time period and a third filter for weighted-averaging filtering results by the second filter every predetermined time period to prevent out-of-step of a stepping motor and sending the data to the SIN/COS table.
According to the present invention, because the needle control signals are filtered by two steps of the first filter and the second filter, the change values of the needle control signals are smoothed. Furthermore, out-of-step of a stepping motor is prevented by weighted-averaging two steps filtered needle control signals by the third filter. Thus, return-to-zero is done smoothly and securely.
In order to attain the above objects, the rotor is magnetized equally and alternately in N-pole and S-pole to pair of 5 poles, wherein the excitation signals is generated to be formed with equally-divided 32 excitation steps, based on a sine wave shape.
FIGS. 6 and 7
According to the present invention, the rotor is magnetized equally alternately in N-pole and S-pole to pair of 5 poles and the excitation signals are generated to be formed with equally-divided 32 excitation steps and then return-to-zero is performed smoothly as shown in .
In order to attain the above objects, the drive circuit for a stepping motor according to the present invention comprises a second excitation signal supply controlling means for controlling the excitation signal generating means to supply to the drive coils the excitation signals for moving the needle in an amount based on a measured signal toward the zero position or counter to the zero position, in response to the needle control signals generated based on the measured signals supplied by a measurement unit in a vehicle.
According to the present invention, the second excitation signal supply controlling means controls the excitation signal generating means to supply to the drive coils the excitation signals for moving the needle in an amount based on a measured signal. The similar excitation signals used for return-to-zero can be also used for indicating in a meter, responding normal measured signals. Therefore, the same rotation controlling of the rotor is applied on return-to-zero and normal condition and then the processing can be simplified and a CPU load for rotation controlling of a rotor is enhanced.
In order to attain the above objects, the drive circuit for a stepping motor according to the present invention comprises the drive circuit for a stepping motor mentioned above, wherein an amount of the excitation signal corresponding to rotating the needle more than the maximum needle rotating angle is the amount to rotate the needle 360 degree.
According to the present invention, the excitation signal corresponding to rotating the needle 360 degree toward the zero position is supplied to the drive coils. Therefore, a needle of any meter is always set on the zero position securely since usually a needle does not rotate over 360 degree in maximum and the excitation signal corresponding to rotating the needle 360 degree is supplied into the drive coils.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
is a block diagram, showing a preferred embodiment of the present invention;
FIG. 2
FIG. 1
is a flowchart, showing an example of a process by a CPU in according to the preferred embodiment;
FIG. 3
FIG. 2
is a flowchart, showing an example of the first filter processing in the flowchart shown in ;
FIG. 4
FIG. 2
is a flowchart, showing an example of the second filter processing in the flowchart shown in ;
FIG. 5
FIG. 2
is a flowchart, showing an example of the third filter processing according to process shown in ;
FIG. 6
is a graph, showing an example of angle control by return-to-zero processing at battery ON; and
FIG. 7
is a graph, showing an example of angle control by return-to-zero processing at ignition ON.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT
A preferred embodiment of this invention will now be described with reference to the attached drawings.
FIG. 1
is a whole block diagram, showing a preferred embodiment according to the present invention.
FIG. 1
1
1
2
2
1
1
1
In , a motor driver for driving a stepping motor supplies excitation signals to drive coils C, C for rotating a rotor . The excitation signals are formed with equally-divided 32 excitation steps generated fundamentally based on sine and cosine wave shapes, to be described in more detail later. The motor driver comprises a CPU for filtering process, later described, and data conversion as basic functions of the driver and then the motor driver may be described as a driver CPU or simply CPU in later some descriptions.
2
1
2
2
3
4
4
5
The rotor , driven by the drive coils C, C placed 90 degrees apart from one other, is magnetized equally alternately in N-pole and S-pole to pair of 5 poles, herein. The rotor is connected with an intermediate gear and an output gear . The output gear is provided with a needle or a stopper piece .
5
2
6
5
The needle or the stopper piece rotates together with rotation of the rotor corresponding to excitation signals at a zero position determined by a fixed stopper and indicates a (not-shown) required scale. For example, the needle or the stopper piece rotates clockwise, as shown by an arrow when accelerating speed and inversely rotates counterclockwise by an inverse direction of an arrow when decelerating.
1
8
8
81
9
91
1
8
5
1
2
1
9
5
1
2
The motor driver is connected to an ignition switch (IGN ) through I/F and with a speed sensor through I/F . The motor driver , responding to ING turning ON or OFF, generates excitation signals to return the needle or stopper piece to a zero position and supplies the signals to the drive coils C and C. The motor driver also receives a sensor output (speed pulse) corresponding to a vehicle speed from the speed sensor and generates excitation signals to move the needle or stopper piece correspondingly to a vehicle speed and supplies the signals to the drive coils C and C.
1
71
7
1
5
71
8
1
2
FIGS. 2-7
The motor driver is supplied electric power through a 5V power supply IC from a car battery . The motor driver generates excitation signals to return the needle or stopper pieces to a zero position at a timing of the power supply IC turning ON or the IGN turning ON or OFF and supplies the signals to the drive coils C and C, later described more with reference to .
1
10
10
5
6
The motor driver is connected with a E2PROM . The E2PROM is a rewritable memorizing means and stores data of corresponding relation between timing of the needle or stopper piece abutting on the fixed stopper and later-described a stable step of excitation signals.
1
1
2
3
4
5
6
In the preferred embodiment, the motor driver controls only one kind of motor elements or devices (drive coils C, C, C, C, C and C) corresponding to a speedometer. Preferably, controlling a tachometer, a fuel meter, a thermometer or the like including the speedometer by a time sharing control method is possible.
1
11
12
13
14
15
16
17
1
9
1
The motor driver is provided with a first filter , a second filter , a third filter , a SIN/COS table , an output circuit , a speed filter , a ROM and registers -. The motor driver is basically structured with a CPU and generates excitation signals to drive a stepping motor.
11
11
12
11
12
11
12
12
The first filter controls the maximum motor rotating speed and, when a remainder of subtracting the absolute value of previous angle data from the absolute value of new angle data is positive and 8 degrees more, the first filter adds 8 degrees to previous angle data and sends the data to the second filter or, when the remainder is not over 8 degrees, the first filter sends the new angle data to the second filter . When a remainder of subtracting the absolute value of previous angle data from the absolute value of new angle data is negative and 8 degrees or more, the first filter subtracts 8 degrees from previous angle data and sends the data to the second filter or, when the remainder is not over 8 degrees, sends the new angle data to the second filter .
12
13
The second filter is for smoothing a motor rotation and smooths data changing every about 20.48 msec by ⅛ weighted-average filtering and sends the data to the third filter .
13
14
The third filter is for smoothing more a motor rotation and smooths data changing every about 0.256 msec by {fraction (1/512)} weighted-average filtering to prevent out-of-step of a stepping motor. Thereafter, a remainder of the data divided by 32 is sent to the SIN/COS table .
11
12
13
Two steps filtering by the first filter and the second filter , as mentioned above, smooths data changing very much. Furthermore, weighted-average filtering by the third filter prevents a stepping motor from getting out-of-step. Therefore, return-to-zero can be done securely and smoothly.
1
2
1
2
13
15
0
4
8
12
16
20
24
28
14
The SIN/COS table converts output data to drive coils C, C and sends output data to C, C (SIN/COS conversion data) corresponding to received data from the third filter to the output circuit . S, s, s, s, s, s, s and s, described in the table , show step numbers by every 4 steps in 32 steps forming said excitation signals.
0
31
30
29
28
27
26
25
24
23
22
21
20
19
18
17
16
15
14
13
12
11
10
9
8
7
6
5
4
3
2
1
2
3
0
4
Actually, one electric cycle of excitation signals is formed with 32 steps of divided equally s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s, s and s. Then, there are more steps between above each 4 steps, for example, s and s between s and s, however, steps between each 4 steps are omitted for simplifying the description herein.
15
1
2
14
1
2
The output circuit supplies excitation signals of a motor controlling output to the drive coils C, C and supplies voltage values of D/A or PWN conversion data from the SIN/COS table to the coils C, C.
11
12
13
14
15
Because micro-step excitation signals are supplied to drive coils by means of the filter , , , the SIN/COS table and the output circuit as mentioned above, the oscillatory motion of the needle during return-to-zero is reduced. Because the oscillatory motion of the needle becomes small, the needle oscillations may cease completely.
1
2
15
1
2
1
2
2
2
The excitation signals supplied to the coils C, C from the output circuit are formed into a wave shape based on two sine waves phase shifted 90 degrees from each other. Which excitation signal is supplied to the coil C or the coil C is determined by conditions of the position of coils C, C against the rotor and the rotating direction of the rotor .
5
6
1
2
1
2
2
0
1
2
0
31
30
5
4
4
4
When the needle or stopper piece abuts the fixed stopper , cosine values of the above two phase waves are each set to 1 and 0 as an initial condition. In this condition, steps of excitation signals supplied to the coils C, C are referred to as a stable step. Supplying such excitation signals to the coils C, C, the rotor moves by changing the rotating pattern for each step. According to angle signals from a meter, the excitation signals are supplied in order of s, s, s or inversely in order of s, s, s. The direction of rotation ofthe rotor is changed correspondingly to the supplied order of steps and the needle or stopper piece connected with the output gear finally is moved correspondingly to the rotating direction. If the rotor is magnetized equally alternately in N-pole and S-pole to pair of 5 poles, the output gear rotates 2 degree per electric cycle at gear ratio 36:1. One electric cycle is formed with 32 equal steps and then the output gear rotates 0.0625 degree by one step.
FIGS. 6
7
Forming the rotor into pair of 5 poles and one electric cycle into 32, steps as mentioned above, return-to-zero is accomplished smoothly, as shown in , .
2
The excitation signals generated as mentioned above are not only for rotating toward the zero position at return-to-zero, but also are generated to rotate the rotor clockwise or counterclockwise based on angle data generated by a car speed or the like. The same hardware and software can be used to generate the data by controlling angle data (corresponding to needle control signal in claims). Therefore, controlling rotor rotation during both conditions of return-to-zero and normal can be done by the same way and then processing data is simplified, and the load on CPU for controlling rotor rotation is reduced.
Processing to generate excitation signals on return-to-zero corresponds to a first excitation signal supply controlling means and processing to generate excitation signals on normal condition corresponds to a second excitation signal supply controlling means.
16
9
11
A speed filter converts a speed pulse, supplied by said speed sensor , to angle data and outputs the data to the first filter .
17
5760
64
A ROM stores data required for CPU processing, such as a target angle data of excitation signals generated on return-to-zero. In the preferred embodiment, data and corresponding to each 360 degree and 4 degree are stored therein. The reason of 360 degree and 4 degree will be described later.
11
12
13
1
8
9
10
FIGS. 2-5
The first, second and third filters , and have registers - for temporarily storing data generated during the above filtering process. A register temporarily stores motor stable position data transferred from E2PROM in the excitation signal generating process. Specific functions of these registers will be described clearly in .
FIG. 1
FIGS. 2-5
FIG. 2
FIG. 1
FIG. 3
FIG. 4
FIG. 5
2
2
2
The CPU processing in according to the preferred embodiment, which is return-to-zero processing done at timing of battery turning ON and ignition turning ON or OFF, will be described with reference to . is a flowchart showing an example of the CPU processing in according to the preferred embodiment. is a flowchart showing an example of the first filter processing shown in the flowchart of FIG. . is a flowchart showing an example of the second filter processing shown in the flowchart of FIG. . is a flowchart showing an example of the third filter processing shown in the flowchart of FIG. .
FIG. 2
71
1
2
2
10
9
3
3
5760
17
2
4
4
5760
3
5
Return-to-zero processing at battery turning ON is described first. As shown in , when turning ON of a 5V power supply IC is sensed in step S, the process proceeds to step S. In step S, a stable position data (stable step data) stored in the E2PROM is transferred to the resister and the process proceeds to step S. In step S, data , corresponding to 360 degree, stored in a ROM is transferred to the resister and the process proceeds to step S. In step S, the data is transferred to the resister and the process proceeds to step S.
5
2
4
6
6
2
7
7
7
9
1
8
11
In step S, data by multiplying data, stored in the resister , by 8 is transferred to the resister and the process proceeds to step S. In step S, data by multiplying data, stored in the resister , by 512 is transferred to the resister and the process proceeds to step S. In step S, data stored in the resister is transferred to the resister and the process proceeds to steps S-S.
8
11
9
10
8
4
11
12
4
11
9
3
12
4
In steps S-S, the first filter processing (step S) and the second filter processing (step S) are repeated every 20.48 msec (step S) if data stored in the resister is not smaller than 8 (N of step S) and the process proceeds to step S when data stored in the resister becomes smaller than 8 (Y of step S). The first filter processing in step S, as mentioned above, is basically to control the maximum rotating speed of a motor and an example will be described later with reference to FIG. . The second filter processing in step S, as mentioned above, smooths motor rotation and an example will be described later with reference to FIG. .
12
13
After waiting 250 msec in step S, the CPU is shifted to sleep mode in step S and all process is finished.
FIG. 3
FIG. 1
In the first filter processing shown in , as mentioned with reference to , when a remainder from subtracting an absolute value of previous angle data from an absolute value of new angle data is positive and 8 degree or more, the previous angle data added by 8 degrees is transferred to the second filter processing or, when the remainder is not over 8 degree, the new angle data is transferred to the second filter processing. When a remainder of subtracting an absolute value of previous angle data from an absolute value of new angle data is negative and 8 degree or more, the previous angle data subtracted by 8 degrees is transferred to the second filter processing or, when the remainder is not over 8 degree, the new angle data is transferred to the second filter processing.
FIG. 3
2
1
901
902
901
901
905
With reference to , an absolute value of a remainder of subtraction of data stored in the register and the register is judged over 128 or not in step S. If the absolute value is over 128, the process proceeds to step S (Y of step S). If not (N of step ), the process proceeds to step S.
902
1
2
902
903
904
903
2
2
904
2
2
In step S, a remainder of subtracting data stored in the resister from data stored in the resister is judged over zero or not. If the remainder is over zero (Y of step S), the process proceeds to step S. If not, the process proceeds to step S. In step S, data, stored in the register , added 128 is transferred to the resister and the process returns to the main flowchart. In step S, data, stored in the register , subtracted 128 is transferred to the register and the process repeats.
905
1
2
In step S, data, stored in the register is transferred to the register and the process
FIG. 4
FIG. 1
In the second filter processing shown in , as mentioned with reference to , data changing is smoothed by ⅛ weighted-average filtering and transferred to the third filter processing.
FIG. 4
101
2
3
102
102
4
5
103
103
5
4
4
104
105
4
3
4
105
105
4
6
With reference to , in step S, data stored in the register is transferred to the register and the process proceeds to step S. In step S, data, stored in the register , divided by 8 is transferred to the register and the process proceeds to step S. In step S, data of subtracting data stored in the register from data stored in the register is transferred to the register and the process proceeds to step S. In step S, data of adding data stored in the register to data stored in the register is transferred to the register and the process proceeds to step S. In step S, data, stored in the register , divided by 8 is transferred to the register and the process repeats.
FIG. 5
FIG. 1
14
In the third filter processing shown in , as mentioned with reference to , data changing is smoothed by {fraction (1/512)} weighted-average filtering about every 0.256 msec to prevent out-of-step of a stepping motor. The remainder of dividing the data by 32 is transferred to the SIN/COS table . The third filter processing is repeated about every 0.256 msec during the first and second filter processing with multi-programming or the like.
FIG. 5
201
202
7
8
203
203
8
7
7
204
204
7
6
7
205
With reference to , after waiting 0.256 msec in step S, in step S, data of dividing data stored in the register by 512 is transferred to the resister and the process proceeds to step S. In step S, data of subtracting data stored in the register from data stored in the register is transferred to the register and the process proceeds to step S. In step S, data of adding data stored in the register to data stored in the register is transferred to the register and the process proceeds to step S.
205
7
8
206
206
8
14
207
207
14
15
201
In step S, data of dividing data stored in the register by 512 is transferred to the register and the process proceeds to step S. In step S, a remainder of dividing data stored in the register by 32 is transferred to the SIN/COS table and the process proceeds to step S. In step S, SIN/COS data given by the SIN/COS table is transferred to the output circuit and the process returns to step S.
As mentioned above, the excitation signal corresponding to rotate the needle 360 degrees toward the zero position is supplied into the drive coils. Therefore, a needle of any meter is always set on the zero position securely because usually a needle does not rotate over a maximum of 360 degrees and the excitation signal corresponding to rotate the needle 360 degrees is supplied into the drive coils.
In the embodiment mentioned above, by a viewpoint of a needle of any meter not rotating over 360 degrees, the excitation signal corresponding to the maximum value of 360 degrees is supplied into the drive coils. If the maximum indicating angle, for example, 300 degrees, of a meter is known previously, supplying the excitation signal corresponding to 310 degrees into the drive coils, a needle can be set on the zero position securely and effectively. Thus, the value of excitation signals supplied at timing of a car battery ON may be fixed correspondingly to 360 degrees for assurance or may be adjusted occasionally such as correspondingly to 310 degrees.
Because a zero position setting can be done without sensing induced voltage at timing of battery ON, a time for returning a needle to a zero position is extremely reduced. Circuit structure is also simplified by requiring no sensing coil for induced voltage and no sensing circuit and then a unit size can be miniaturized. Advantageously, in case of using an inaccurate stepping motor or a stepping motor with a rotor having a large number of magnetized poles and a large reduction gear ratio, return-to-zero can be done securely. Furthermore, when connecting a vehicle battery or replacing it, this invention is very effective to set a zero position of a stepping motor.
Return-to-zero process at timing of ignition ON or OFF will be described next.
1
3
4
13
8
1
3
4
64
17
2
3
13
4
The processing at ignition ON can be done by altering steps S, S, S and S in return-to-zero process at battery ON, mentioned above. Regarding the process at ignition ON, IGN is sensed ON in step S. In steps S and S, data corresponding to 4 degrees, stored in the ROM , is transferred to the registers and . In step S, the process does not proceed to CPU sleep mode such as at battery ON but proceeds to needle control process in normal measuring mode. The 4 degrees is determined to rotate the output gear two degree by one electric cycle. In general, a needle can be set in a zero position by one electric cycle, however in this embodiment, excitation signals corresponding to two electric cycles are supplied for assurance.
1
3
4
8
1
3
4
64
17
2
3
On the other hand, the processing at ignition OFF can be done by altering steps S, S and S in return-to-zero process at battery ON, mentioned above. Regarding the process at ignition OFF, IGN is sensed OFF in S. In steps S and S, data corresponding to 4 degrees, stored in the ROM , is transferred to the registers and .
Thus, by supplying excitation signals corresponding to double of one electric cycle to drive coils, a needle is almost always set on a zero position. Because a zero position setting can be accomplished without requiring to sensing of induced voltage, a needle continuously wobbling each time to turn ignition ON/OFF is enhanced and viewing is improved. Circuit structure is also simplified by requiring no sensing coil for induced voltage and no sensing circuit and then a unit size can be miniaturized.
FIGS. 1-5
In case of a needle control processing in normal measuring mode to control a needle correspondingly to a car speed or the like, by altering angle data for above return-to-zero into angle data corresponding to measurement value in above process from the end of processing at ignition ON to ignition OFF, needle control can be done similarly to the processing shown in .
FIG. 6
FIG. 7
Examples of needle control result by above return-to-zero processing at battery ON and ignition ON will be shown. is a graph showing an example of angle control by return-to-zero process at battery ON. is graph showing an example of angle control by return-to-zero process at ignition ON.
FIG. 6
FIG. 6
In the example of angle control at battery ON, shown in , A is an example of angle control by the first and second filter and B is an example of angle control by all filters including the third filter. As shown in , 360-degree angle control by filtering with all filters including the third filter is done very smoothly. After the data by the first and second filter becomes zero, the data by the third filter becomes zero about 250 msec later.
FIG. 7
FIG. 7
In the example of angle control at ignition ON, shown in , C is an example of angle control by the first and second filter and D is an example of angle control by all filters including the third filter. As shown in , 4-degree angle control by filtering with all filters including the third filter is accomplished very smoothly.
FIGS. 1-5
FIGS. 1-5
In the present invention, the parameter values shown in may be not limited. For example, in case of a motor with large maximum pull-in pulse ratio (maximum drive pulse ratio for starting motor rotation) or large maximum pull-out pulse ratio (maximum drive pulse ratio to prevent out-of-step of rotating motor), the parameter values in can be adjusted occasionally.
1
2
1
2
Furthermore, pole locations of drive coils C, C and fixed stopper position are not limited in this embodiment. Pole locations of drive coils C, C and fixed stopper position can be altered occasionally. | |
In the last post, we briefly touched upon the concept of MLOps and one of its elements, namely the Feature Store. We intend to cover a few more interconnected topics that are key to successful ML implementations and realizing sustained business impact.
At Affine, we ensure that a lion’s share of our focus in a ML project is on:
- Investing more time on building Great Features and Feature Stores (than ML algos – yes, please don’t frown upon this ? ).
- Setting up Robust and Reproducible Data and ML Pipelines to ensure faster and accurate Re-training and Serving.
- Following ML and Production Standard Coding Practices.
- Incorporating Model Monitoring Modules to ensure that the model stays healthy.
- Reserving the last hour of each business day on Documentation.
- And last but not the least, Regularly reciting the Magic words – Automate, Automate, Automate! ?
The following architecture is an attempt to simplify and encapsulate the above points:
This is the Utopian version of the ML architecture that every team aspires for. This approach attempts to address 3 aspects with respect to ML Training and Serving – Reproducibility, Continuous (or Inter-Connected-ness) and Collaboration.
Reproducibility of model artifacts/predictions – The ML components (Feature Engineering, Dataset Creation, ML tuning, Feature Contribution, etc.) should be build in such a way that it is simple to reproduce the output of each of those components seamlessly and accurately, at a later point in time. Now, from an application standpoint, this may be required for a root-case analysis (or model compliance) or re-trigger creation of ML pipeline on new dataset at a later point in time. However, equally importantly, if you can reproduce results accurately, it also guarantees that the ML pipeline (Data to ML training) is stable and robust! This also ultimately leads to reliable Model Serving.
Continuous Training aspect – This is known as Continuous Integration in the context of software engineering, and refers to automation of components like code merge, unit/regression testing, build, etc. to enable continuous delivery. A typical ML pipeline also comprises of several components (Feature Selection, Model Tuning, Feature Contribution, Model Validation, Model Serialization and finally Model Registry and Deployment). The Continuous aspect ensures that each module of our ML pipeline is fully automated and fully integrated (parameterized) with other modules, such that Data runs, Model Runs, and ML Deployment Runs happen seamlessly when the pipeline is re-triggered.
However, it all starts with “Collaboration” – Right Team and Right Mindset!
Before we delve deeper into each of these points, it is essential to touch upon one more topic – the need for a tightly-knit cross-functional team. It’s not pragmatic to expect the Data Scientists to handle all of the above aspects and the same is true for ML engineers. However, for a successful MLOps strategy, it’s important to get outside of our comfort zones, learn cross functional skills and collaborate closely. This means that the Data Scientists should learn to write production grade codes (modularization, testing, versioning, documentation, etc.) Similarly, the ML engineers should understand ML aspects like Feature Engineering and Model Selection to appreciate why these seemingly complex ML artifacts are critical in solving the business problem.
As for managing such a cross functional team of people that bring different niches, we need people who thrive in this knowledge-based ecosystem, where the stack keeps getting bigger every day. We need a ‘Jack of all Trades’, someone who knows a little bit of everything and possess the articulation skills to bring out the best from the team. | https://affine.ai/making-our-data-scientists-and-ml-engineers-more-efficient-part-2/ |
In response to the increasing number of attacks on cyberspace, public and private organizations are encouraged to share their cyber-threat information and data with each other. Although there are long-term interests in sharing security related information, it places organizations at risk regarding the protection of their data and exposure of other vulnerabilities. This project designs, develops and implements a CYBersecurity information EXchange with Privacy (CYBEX-P) platform using trusted computing paradigms and privacy-preserving information sharing mechanisms for cybersecurity enhancement and development of a robust cyberinfrastructure. The outcome of this project has a broader impact on the development of a novel cybersecurity information-sharing platform with privacy preservation and a robust governance structure. The project also has direct impact on undergraduate and graduate student education and training, emphasizing the engineering development of minorities and women, by providing a real-world platform for investigation and management of cyber threats.
Envisioning that effective and privacy-preserving threat intelligence sharing can be instrumental for auditing the state of the threat landscape and helping to predict and prevent major cyber-attacks, this project provides a service for structured information exchange. The CYBEX-P platform provides valuable measurable information about the security status of systems and devices together with data about incidents stemming from cyber-attacks. To develop and implement such an environment across statewide organizations, then across the nation, this research project incorporates blind processing, privacy preservation and integrity of shared incident data by ensuring that only trusted processes access the raw data and only anonymized data are shared with other operators. Blind processing enables the advantages of additional information exchange while respecting organizational constraints and trust boundaries. This research also establishes a flexible governance framework that includes both policies and procedures to protect the data and provide all customers with the tools to demonstrate they are complying with both regulatory and internal data governance requirements. Specifically, the outcomes of the project demonstrate: i) CYBEX-P infrastructure development with affordable scalability, secure data exchange, and analytic components, ii) Privacy-preserving information sharing via blind processing and anonymization, and an iii) CYBEX-P governance framework.
Robust cybersecurity information sharing infrastructure is required to protect the firms from future cyber attacks which might be difficult to achieve via individual effort. The United States federal government clearly encourage the firms to share their discoveries on cybersecurity breach and patch related information with other federal and private firms for strengthening the nation's security infrastructure. The goal of this project is to develop an interdisciplinary research platform to investigate the framework and benefits of breach-related vulnerability information sharing and analyze the effect of not participating in the process of information exchange. The outcome of this project has a profound impact on the evolution of CYBer security information EXchange (CYBEX) architecture and the level of interaction desired among firms (private, public or federal) to defend proactively in the ever-growing cyberspace. The research has both direct and indirect impact on mentoring, hands-on learning, education and training. Graduate and Undergraduate students (including minority and women) participating in this project are involved in interdisciplinary research and learning problem solving skills taking into account different viewpoints, namely, cybersecurity, information-exchange, economics, decision analysis and practical system implementation.
Upcoming smart technologies such as Smart Cities, Internet of Things, and Unmanned Aerial Vehicles digitize current technologies and require cybersecurity-aware multi-disciplinary engineering experts to ensure the security of such devices. As devices become smart and interconnected to provide improved services, they also become greater targets of cyber-attacks. Ensuring proper operation of smart technologies requires well-trained, proactive engineers, who are knowledgeable on core engineering principles, cybersecurity risks associated with their designs, and risks from other interconnected disciplines. The goal of this collaborative project is to develop and adopt interdisciplinary cybersecurity curriculum by fostering a holistic approach through collaboration across engineering disciplines. By bringing scholars from different engineering disciplines, this project explores unique ways to engage students in interdisciplinary cybersecurity-aware engineering education. The knowledge units developed at the University of Nevada, Reno will be disseminated to engineering colleges nationwide to sustain long-term research and education partnerships in secure engineering.
Cybersecurity research and its applications are highly relevant in all areas of engineering, including computer, electrical, mechanical, civil and biomedical disciplines. Researchers will develop knowledge units to introduce and reinforce the importance of cybersecurity to undergraduate students across several engineering disciplines with a focus on Smart Cities, Internet of Things, and Unmanned Aerial Vehicles. These three broad technological areas require expertise in multiple engineering fields and go from macro-level view to micro-level view where each of the sectors encompass the next one. Cybersecurity awareness will be injected organically in a boot camp for incoming engineering freshman, a freshman experience course on Introduction to Engineering, and discipline-specific technical engineering courses, typically during junior and senior years. The project will bring together engineering faculty to develop knowledge units that can be seamlessly adopted across various engineering disciplines. Instruction will be augmented with hands-on activities to create an interactive cybersecurity education environment and stimulate learning. A "Connected Cities" playing arena will be developed, comprising various cyber physical systems that are integrated for hands-on cybersecurity engagement. Through interdisciplinary educational modules and hands-on activities developed via this project, students will obtain a solid grasp on the interplay between different engineering disciplines and obtain critical knowledge and skills needed to engineer smart technologies that are resilient to cyber-attacks.
This funding establishes a new Research Experience for Teachers (RET) Site at the University of Nevada, Reno (UNR). The primary objective of this RET site is to explore unique ways to engage middle and high school teachers in summer research experiences that emphasize cybersecurity. The teachers will spend six weeks in the summer participating in research experiences and developing classroom modules and materials which will be implemented in their classrooms during the academic year. The UNR team will use inter-personal role-playing and cybersecurity games to help the teachers learn about cybersecurity and its importance to our nation. The project involves a partnership between the university, the school districts in the surrounding Nevada counties, industrial associates, and the Nevada Department of Education. The project will develop a community of teachers who are passionate about cybersecurity and who can translate this excitement to their students through engaging, high-quality inquiry learning experiences. This RET Site is co-funded by the Secure and Trustworthy Cyberspace (SaTC) program.
The project is anchored by a research area this is compelling and exciting for teachers and K-12 students and by faculty team that has demonstrated expertise in both research and education. The goals of the project are to: recruit a cohort of middle and high school teachers interested in introducing cybersecurity and computer science topics into their classrooms; engage the recruited teachers in research experiences with applications in various modern day systems and security; develop instructional modules that can be incorporated into a variety of grades/classes; initiate collaboration and engagement with all schools in Nevada and other stakeholders in the country to promote and disseminate the results to a large group of middle and high school teachers; and sustain long term partnerships between the RET Site teacher participants, the UNR mentor team and industry partners, in order to bring the excitement of computing, problem solving and research to students and encourage them to pursue STEM related careers. The site features projects that are teacher accessible as well as connected to current research and practice. The RET site includes sound evaluation and dissemination plans that will provide models for integrating cybersecurity concepts into the middle and high school curricula. Teachers will develop and hone their research, communication, and presentation skills, all of which are essential to their professional growth and success. The project will build the technical capacity of teachers so they are capable of developing and implementing new, exciting inquiry-based learning activities at their schools. The project team will disseminate the project materials through the TeachEngineering digital library and a dedicated local website and server repository that will be shared with a wider audience of teachers at annual workshops and meetings. The team will also disseminate project results through high-quality journals and professional meetings. | https://www.unr.edu/cse/research/cybersecurity-networks/network-projects |
Write the name of the person you are wondering about on a piece of paper. Fold the paper in half, then half again. Draw an eyeball on the outside of the folded page. Slip the page under your pillow and before bed and chant:
"With dreamers eyes I seek to see what this person thinks of me. Be it good or be it will reveal to me as is my will."
Close your eyes and picture this person sitting across a crowded room. The room is all a buzz with conversation you cannot hear clearly. This is gossip about you that this person started. It may be good things and/or it may be bad. As you move towards the person let yourself fall asleep.
When you wake, jot down what you heard in your dream, particularly anything she or he said or did. Your answer will reveal itself. If you do not get the answer to your questions, consider what was revealed to you instead. Perhaps there is a truth you are missing that is more compelling then the one you seek. Blessed be!
ABOUT THE AUTHOR
Last edited on Aug 13, 2019
Part of the Spell Casters Library.
#3012 - Herbal Magic
Herbs can be mixed and combined to produce a "recipe" that's just right for each of us.
Since the Sun sign you were born under has such an amazing influence on your health and
well-being, using the herbs that correspond with that sign alone can be a tremendous help in
times of stress or illness. Here's a short list of herbs that seem to be tailor-made for each of the
signs, due to their associations with both the planetary ruler and the positive qualities of that sign.
ARIES - MARS
Allspice, basil, cayenne, garlic, ginger, mustard, onion, pepper.
It's no secret that Aries is the astrological equivalent of a bullet.
It's a red-hot burst of energy that's capable of overcoming any
obstacle by charging straight for it. The ruler of Aries is Mars, the "red"
planet, the ancient god of war who was known for his equally fiery
temperament. No wonder, then, the herbs that correspond with your sign
are also a bit "hot" to the taste. Use them in cooking to raise your
endorphins, the substance Mars loves best.
TAURUS - Venus
Apple, apricot, blackberry, cherry, heather, hibiscus, raspberry, rose.
Taurus is the sign that's fondest of the pleasures that life inside
these bodies can provide. Whether it's a blazing sunset, a symphony by
Mozart, or a delicious meal, you folks are experts at enjoying the
physical delights of the senses. It's no surprise that the herbs you'll
enjoy most are the sweet ones, since your planet, Venus, is the
purveyor of sweetness. Use each of them to satisfy that sweet tooth.
GEMINI - Mercury
Clover, eyebright, fennel, lemongrass, lemon verbena, marjoram, parsley.
Your quick-witted, fleet-footed energy just loves variety - in fact, the
expression "variety is the spice of life" was written with you in mind.
Each of these herbs provide a different type of taste, and most can be
combined in a light, aromatic tea you can sip on the run. Use clove or
slippery elm to protect against gossip and to keep your thoughts and
actions grounded.
CANCER - Moon
Aloe, lemon balm, chamomile, mimosa, lavender, lilac.
Nurturing is your business, Cancer, and you distribute your soothing
touch to one and all. There's nothing you like better than a home that
smells good, too, whether it's because there's something wonderful
simmering on the stove, a vase of fresh flowers on the dining room
table, or a warm, fragrant bubble bath waiting for you upstairs. Each
of the herbs listed above are known for their ability to calm, heal, or
bring a wonderful aroma to the environment. Use aloe to soothe burns
and scrapes and chamomile for a wonderful bedtime tea.
LEO - Sun
Chicory, cinnamon, goldenseal, rosemary, St. John's Wort, sandalwood.
Your planet is the Sun, Leo, the source of life and warmth that keeps
us all alive and provides us with the energy we need to keep pursuing our
life's quest. It makes perfect sense, then, that the bright, cheerful
sunflower would be the perfect representation of your equally bright
and happy sign. Herbs like goldenseal and St. John's Wort are tailor-made
for you, too, since their ability to keep the body resistant to illness
and depression are well known. Mix a bit of chicory with your morning
coffee to help remove any obstacles that come up.
VIRGO - Mercury
Caraway, dill, eyebright, horehound, lily of the valley, marjoram, savory.
Your quick-thinking meticulous sign likes nothing better than a mental
challenge, Virgo, whether it's organizing a pile of papers at the
office, solving a puzzle, or learning a new skill. The herbs listed
above are all well known for their subtle abilities to strengthen the
mind, and many can be mixed together in teas to give you a boost you
often need at the end of a long day. The lily of the valley seems
perfect for you, too, with its subtle, "clean" scent and delicate flowers.
LIBRA - Venus
Catnip, passion flower, persimmon, rose, sugar cane, violet.
There's no sign as fond of pleasing others as yours, Libra, whether it's
by saying just the right thing to bring warring factions together, or by
using your polite charm to draw the object of your desires closer. Of
course, catnip is famous for its effects on our feline friends, but its
also traditionally used in conjunction with rose petals to bring loving
relationships that last forever. Since you're ruled by Venus, you're
capable of being every bit as sweet as the sugar cane - but if you need
a bit of help to attract a beloved, use this potent plant (sugar cane)
that's long been used to conjure love - sweetly.
SCORPIO - Pluto/Mars
Ginseng, dill, patchouli, pomegranate, saffron, vanilla.
As fond as you are of intensity and intimacy, Scorpio, it's no wonder
the herbs you'll love best are famous for their use in stirring up
passion. Drink ginseng tea (or offer some to your beloved) to induce a
magnetic physical attraction. Wear patchouli to arouse lust and silently
conjure the magic of the Beltane rituals. Present the object of your
desire with a pomegranate, the fruit traditionally associated with
seductive Pluto, your ruling planet.
SAGITTARIUS - Jupiter
Anise, clove, fig, hyssop, mugwort, myrtle, nutmeg, rosemary, sage.
There's no sign that hangs on to youth with more fervency and
determination than yours Sagittarius. To keep that youthful appearance
and disposition going as you travel the world in search of yet another
experience, drink a tea made of anise, rosemary, and Vervain. To aid in
making your dreams more prophetic than they already are, use mugwort.
Burn clove incense to attract the wealth you'll need to pay for your travels.
CAPRICORN - Saturn
Comfrey, horsetail, mint, poppy, sassafras, woodruff.
You've always been described as a very "focused" sign, Capricorn, intent
on self-sufficiency and material success. The influence of your planet,
Saturn, gives you the ambition and self-discipline to attain those
goals, and to ensure success and prosperity in business matters, too.
Each of the herbs mentioned above are known for their ability to attract
that success, and most can be mixed together in a tea.
AQAURIUS - Uranus/Saturn
Anise, bittersweet, citron, dandelion, lemon verbena, rosemary, sage.
Your sign is a cerebral one, Aquarius, and your ability to turn "odd" or
eccentric ideas into strokes of genius is well known. Since
communication (and mass communication in particular) is your specialty,
the herbs above are all associated with the air principle, which rules
the intellectual side of life. To increase your already powerful
intuition, use citron, clover, or rosemary. Above all else, listen to
that intuition. It will seldom prove to be wrong.
Pisces - Neptune/Jupiter
Aloe, bay, cotton, eucalyptus, lavender, Norfolk Island pine, rue.
As the most sensitive and psychic of all signs, Pisces, yours is the one
that requires help to ward off the adverse thoughts and intentions of
others. Since you have no boundaries to keep you separate from others,
you also need protection against negative influences. To that end, use
rue, a powerful herb known to ward off ills of every kind. To stay
positive and healthy keep a lavender plant growing either outside or inside your home.
ABOUT THE AUTHOR
#3013 - My Body Steady My Magic Ready
Before casting a spell, simply chant: "My body steady, my magic ready" and focus on the intent on the second spell you wish to cast.
ABOUT THE AUTHOR
Last edited on May 29, 2016
Part of the Spell Casters Library.
#3014 - Appealing Reveal
Yell, "To my appeal, make all reveal". Concentrate and scan the area.
ABOUT THE AUTHOR
Last edited on May 29, 2016
Part of the Spell Casters Library.
#3015 - Forest Fertility
First burn the sage and meditate think about fertileness afterwards get or take a bucks antler and grind it to a fine powder mix with the milkshake and the power of the nuck should take effect within the next new moon.
ABOUT THE AUTHOR
#3016 - Wishing Spell
Step one: Shuffle the tarot card deck, filling it with positive energy.
Step two: Place one card in front of you, the deck to your right.
Step three: Place the crystal on top of the card.
Step four: Place the relating item below the crystal, but still on the card.
Step five: Say the following incantation:
"Beautiful Goddess and powerful God, hear me please. May I borrow your power to recieve (say item you are wishing for here). I will be forever grateful, may it be so. Thank you Goddess and God."
Step six: Place the quartz crystal on top of the deck.
Step seven: Place the relating item below the crystal, but still on the deck.
Step eight: Flip the tarot card over.
Step nine: If the reading is positive, your wish will come true. If the reading is negative, try again tommorow.
Notice: Don't use your tarot cards until the spell is complete, meaning your wish comes true.
ABOUT THE AUTHOR
#3017 - Guive Manye
Put the water in the pan and boil, after being 10 minutes to boil and place the note verf 5 minutes after placing the currency and allow it saying the following words:
"Abra Cadabra money comes to me I will not tell nobody!"
After the mean put the water in the toilet verf with the note and coin, wait.
ABOUT THE AUTHOR
#3018 - Bad/Good Drink
This will make a drink taste awful or fantastic.You don't need to chant but it helps. Focus on how the drink will taste,now focus on the drink.Chant "Oh drink on my command you shall taste like (whatever you want it to taste like)."Say or think that at least 3 times and it'll taste at least a little different.
ABOUT THE AUTHOR
#3019 - Angel
Put three candles in the highest place you have at home, inside a plate with sugar all around the candles. Light the candles. Ask for three wishes to the angels St. Rafael, St. Michael and St. Gabriel. Ask one wish for business, one wish for love, and one impossible wish. Publish this spell on the third day after you requested the wishes (by mailing it to another person, posting it to a usenet newsgroup, or announcing your thanks to the saints in a newspaper classified ad) and see what happens on the fourth day.
ABOUT THE AUTHOR
#3020 - Wish
Light the candle and chant: "Goddess, grant me this wish I write. Make it come true, day or night". Recite this as many times as you feel needed. Now write your wish on the paper and burn it. Hold the paper until you cannot stand the heat anymore, then put it in the bowl to finish burning. | https://www.spellsofmagic.com/covens/spell-casters/spells/life-spells/302/ |
Home - Intro - Press/Misc - History/Tech - Resources/Model - Photos/Paper - SIA - Where are they?
My father gets the keys from Mr. Sturm.
*Remarks by J.M Sturm, Manager - Plymouth Product Planning and Chief Engineer, Chrysler Corporation, in connection with the delivery of a Chrysler Corporation Turbine Car to a selected Duluth motorist at the Edgewater Motel, Duluth, Minnesota, May 13 1965.
Good Morning. As you know, we are here today to deliver a Chrysler Corporation Turbine Car to a resident of this area. Before I introduce the local motorist who will receive a turbine car, I would like to briefly review our turbine program.
The delivery of a Chrysler turbine car to a selected Chicago motorist on October 29, 1963, marked the launching of a market evaluation program which we believe is unique in the history of the automobile business. It was the first time that an automobile company has ever undertaken to place such a new and revolutionary type of vehicle in the hands of the average motorists to study driver reaction under normal, everyday driving conditions.
Our decision, announced* on February 14, 1962, to build 50 specially designed turbine cars for consumer testing marked the culmination of over a decade of intense turbine research by George Huebner and his staff. Since that decision, we have made rapid progress. The special turbine car created by our styling staff has been equipped with an entirely new turbine engine which is advanced in every way beyond that shown to the public in 1962. This latest gas turbine engine -- which some of you have already seen -- is in most respects equal and in many ways superior to the piston engine which had been in use nearly three-quarters of a century. I is the most practical turbine engine ever designed for a passenger automobile.
Fifty turbine cars have been built and are being distributed to about 200 motorists on a rotating system over a two year period. Each selected motorist receives the car for a period of three months under a no-charge use agreement with the company. It then is re-assigned to other users to provide a broad sampling base. The last turbine delivery is scheduled for the fall of this year.
The objective of our turbine program is to test driver and market reaction to turbine power and to obtain service data an operating experience with the turbine car under a wide variety of geographical conditions. It is designed to provide some of the answers needed as a basis for decisions on the future of our turbine car. The results of this evaluation may result in an acceleration of the program. On the other hand, we may decide that further research is required before the turbine car can be put into volume production.
The accounting firm of Touche, Ross, Bailey and Smart makes the random selection of turbine users form our file of unsolicited requests from persons wanting to drive a turbine car. This file currently contains over 30,000 names. Under the selection procedure, we instruct the accounting firm as to the time and place of each delivery. Random selection of user candidates for each location is then made by the accounting firm according to the criteria specified by us to meet market test objectives.
The consumer survey is under the direction of our Marketing and Consumer Research Department. It is aimed at typical motorists whose interests and knowledge of automobiles are confined to their use as personal transportation. We expect the participants to submit the cars to normal everyday driving, and not to put them to any kind of abnormal use such as racing or hauling.
As of today, turbine cars have been delivered to 160 different families in 114 cities in 44 states and the District of Columbia. Three of the cars are in their second use period, eleven in the third period, eleven in the fourth period, ten in the fifth period.
The 158 motorists who received turbine cars prior to today have driven their cars a total of approximately 770,000 miles.
Today a turbine car is also being delivered in Newport News, Virginia.
The people participating in this program come from all walks of life.
A young computer systems engineer received the first car in Chicago. Turbines have since been delivered to an admiral in Washington, D.C.; a lady industrial designer in New York City; a barber in Detroit; an interior decorator in Los Angeles; a missile designer in Orlando; and a housewife in Tacoma.
These examples demonstrate the broad sampling of typical motorists selected for the program. Eventually, turbines will be delivered in most of the nation's major population centers.
Sixty per cent of the turbine testers owned Chrysler products as their personal cars at the time they applied to us to drive a turbine. The other 40 per cent owned competitive makes. The people selected have ranged in age from 21 to 70 years, and approximately 10 per cent of them have been women.
When a turbine is delivered, the motorist is acquainted with our requirements concerning general use of the car. A Turbine Service Coordinator from one of six centers strategically located across the country is designated to maintain contact with the user and provide instruction in the operation of the vehicle.
To qualify as a prospective test driver, a candidate must be a car owner, or a member of a household in which a car is owned by the head of the household, and must have a valid driver's license. In order to ensure a high degree of market exposure and to test the cars in a variety of climatic and geographical conditions, the turbine users are picked from the major population centers throughout the 48 adjacent United States.
Selection is based on market location and on the make, price-bracket and age of the car owned at the time of the application. By selecting people whose car ownership patterns reflect the great variety of cars on the road today, we extend the study to encompass a broad cross-section of the automobile market.
Since we look forward to the day when the gas turbine may be an accepted power plant for family cars, we designed the turbine car as a typical family passenger vehicle. For all practical purposes, the car provides a familiar motoring concept for its driver so as not to divert attention from the performance characteristics of the engine. Styling, while unique, is functional and uncontroversial in order to allow the public to make an objective evaluation of the car as a means of passenger transportation.
The fourth-generation gas turbine which powers the car represents knowledge gained from ten years of intensive research and development. It is considerably advanced beyond the engine first shown to the public in 1962. For instance, weight has been reduced by ten percent to 410 pounds and size has been reduced by twenty-five per cent. The engine housing has been made symmetrical by the use of twin regenerators and a centrally located burner.
The response time, or gas generator acceleration time, from idle to rated speed , had been significantly reduced. Torque had been increased 50 foot pounds to 425 foot pounds.
This new turbine delivers 130 rated horsepower to the rear wheels of the car. Because of the turbine's torque characteristics it produces car activity equivalent to a 230-horsepower V-8 piston engine, but weighs only half as much.
I'm sure that the performance of the Chrysler Turbine Car you will drive this morning will impress you. I'd especially like you to observe the smooth response to the accelerator, the absence of engine vibration, and the low engine noise at normal operating speeds.
We are now ready to introduce to you the Duluth motorist who will put the turbine car int use here for the next three months.
(At this point my family was introduced to the news media at the meeting.)
*Taken from my fathers copy of the remarks given to him by Mr. Sturm.
Use the Back Button to return or click here to return to the Olson's story.
* see press release or just click on the link here for a new page.
Home - Intro - Press/Misc - History/Tech - Resources/Model - Photos/Paper - SIA - Where are they? | https://www.turbinecar.com/deltur.htm |
If purchased elsewhere please follow this advice.
Purchases made between now and 23rd December can be returned by 7th January 2019.
In Line with our order terms and conditions any goods must be returned to us within 14 days of you receiving them. Items MUST be returned in an unused state still bearing all original tags and packaging.
All goods purchased online must be returned to the Return Address and using the Return Checklist shown below.
Please obtain proof of postage for your returned items as we cannot be held responsible for any returns that are lost or damaged in transit, so please take care when returning items to us, as such we advise any returns are sent using recorded delivery. A refund will only be issued on receipt of goods in the condition described above.
Please note that the carriage costs are non-refundable on non-faulty items.
Firstly, we apologise that you have received a damaged or faulty product. On return of the product to our offices and after assessment we will happily replace the product (providing it is in stock) or issue a refund.
If your product develops an issue within the first six months of use you may return it under warranty. Please follow the advice in the section below on how to do this.
Where possible we will aim to replace your item. If this is not possible we will refund you the price of the item.
We will not charge you for the cost of returning the item(s) provided we organise the collection of the item(s). If you organise the return of the item independently we may well issue a refund but only to a reasonable value (usually to the value it would have cost us if we had arranged a collection on your behalf). As such please keep a copy of the receipt for any postage.
Please follow the Return Checklist to prepare your return for collection.
If you wish to return the items to us directly please follow the Return Checklist to do so.
For products received as gifts please as the first option contact the purchaser of the gift and ask for them to follow the returns process.
In cases where this is not possible please contact us directly at returns@artsac.co.uk. Please include the name of the person who purchased the gift in your correspondence.
What should go in / on my returns package?
Do you accept returns from items purchased from retail stockists?
In the case of goods purchased elsewhere, the products must be returned to either the respective shop or online retailer they were purchased from, and it is the stockist's returns policy that applies.
I purchased on artsac.co.uk, can I return to a retail stockist?
Unfortunately not, our stockists - both retail shops and online are not responsible for accepting or crediting any returns purchased directly from this website. Instead please follow the advice for Unwanted Items or Faulty Items. | https://www.artsac.co.uk/content/6-returns |
Thursday August 13th saw the publication of the 2015 A level results. It was, on the whole, very good news all round. But as in previous years, the numbers studying languages show a continual decline. As we have retreated from Empire, so our desire to learn the languages of anyone else appears to have withered.
One of the problems of acquiring verbal proficiency in a foreign language is that everyone speaks English and is exposed to the English and American media from an early age. If everyone abroad speaks your language, why bother to speak theirs?
In a recent British Council Poll (from a sample of 2,000), over 25% of UK respondents said that speaking a foreign language made them feel nervous, and 19% of the sample deliberately chose a holiday destination where there was no need to speak a foreign language. This fear of “having a go” is not shared by foreigners. Unlike the British, they are eager to practice even a rudimentary knowledge of English and are not embarrassed to make mistakes.
We know that high grades are increasingly demanded to gain a place at a prestigious university, and so the choice of subject for A level is vital. It is also known that it has become increasingly difficult to gain these high grades in language exams. Why risk, then, getting a B in French or Spanish, when you can realistically hope for an A or A* in what are perceived to be easier subjects? Similarly, it makes little sense to choose a language to study when universities are only eager to extend their bursaries and grants to students predicted to achieve three A’s or A*, A*, A*, A*. This also suggests that the choice of a language at A level would disadvantage students from poorer backgrounds.
A number of languages have almost disappeared from the school curriculum. Examples include German; those taking German at A level fell by 4.3% this year, compared to 2014, and this is a long term trend. Russian (relatively strong in the 1960’s) and Italian both show the same decline.
Nevertheless, it is not all bad news. The numbers taking Spanish are increasing – albeit at the expense of French. In the long term, the introduction of the English Baccalaureate exam to be taken in 2020 might make some difference, too, though it will likely only be marginal.
If we are to expand our global trade, we need to engage foreign business people at all levels in their own languages. the fact is that they like you to do this, even if they speak good English themselves. In an increasingly integrated world, both commercially and culturally, the ability to communicate in the native language is becoming more and more prized.
Terry Jones taught History to adult students taking Foundation courses at a College of Higher Education prior to their entry into full-time degree courses at Warwick and Coventry Universities. Since taking early retirement, he has travelled widely in Eastern Europe, pursuing a life-long interest in 19th and early 20th century European history. He has been a GCSE and "A" level tutor with OOL since 1996. | https://www.ool.co.uk/blog/do-you-speak-english/ |
Published at Wednesday, January 16th, 2019 - 00:45:10 AM. Furniture. By Colleen J Booker.
Frequency of usage If you use your home office furniture more than is customary, then you must purchase furniture that is of higher quality. If you wish to purchase a desk for minimal use, then you can opt for a less expensive desk. Choose the furniture that gives you an adequate amount of space to work at. The purchase of furniture is not something that is done frequently as it is an expensive exercise. Furniture is purchased and should be expected to last a long period of time. Therefore the material used in manufacturing home furniture should be inspected very carefully. The material of the furniture should be manageable as well as maintainable. Have you ever heard about ergonomic office furniture? Ergonomic furniture helps you to reduce stress and strain from certain parts of your body. It reduces stress from the body of the user and also gives the required comfort. You spend a lot of time working, so your office chair should feel good, comfortable and should be adjustable.
Wood and How it is Jointed. Choosing the correct wood is an art in itself, and fashioning an elegant piece of furniture using traditional carpentry joints that is as sturdy and strong as you require it to be is a sign of a master-craftsman. This is the quality only attainable with handmade furniture, no matter where it is crafted. Britain, the USA and Scandinavia are noted for the high quality of their craftsmanship, and France, Germany and Holland have all had their moments in furniture history. Today it is predominantly the first mentioned three that provide most of the higher-end handmade furniture. It is difficult to beat the craftsmanship of American furniture firms such The Custom Shoppe, American Craftsman and Stickley, while Southwood are without doubt the premier producer of reproduction furniture in the USA. There are many Amish furniture retailers that market products that have been handmade by individual craftsmen, using the traditional techniques passed down from father to son. The old jointing techniques are the best because they have been devised over time to provide the strongest and most enduring joint between two or more pieces of wood.
Recent Post
Category
Monthly Archives
Static Pages
© Easttnguns.com Allright Reserved. | https://easttnguns.com/egress-window-covers/egress-window-covers-beautiful-basement-egress-window-cover-natashamillerweb/ |
How technology is protecting endangered species
Cambodia is home to 16 globally endangered species, like the Asian elephant, tigers, and leopards. Conservationists there are working with a Harvard computer scientist to stop the poaching that is pushing so many species to the brink of extinction.
It's just one of a growing number of collaborations bringing technologists and conservationists together to fight to protect wildlife from being wiped off the face of the planet. Environmentalists have long had a daunting challenge ahead of them when it comes to protecting animals from poachers, habitat loss, pollution, and climate change. They're now hoping, though, that technologies like artificial intelligence (AI), drones, GPS trackers, smart cameras, and the cloud could give them the upper hand they've been looking for.
"It is horrifying to think about the possibility that we may be leaving a world behind where keystone species like tigers, elephants, and rhinos may just be gone," says Milind Tambe, the Gordon McKay Professor of Computer Science and director of the Center for Research in Computation and Society at Harvard University. "We don't want to have to tell our children, 'Well, they're all gone.' We don't want a world like that."
According to the United Nations Environment Programme, which coordinates the organization's environmental activities, the earth is in the midst of a crisis, with 150 to 200 species of plants, insects, birds, and mammals reportedly going extinct every 24 hours. Biologists say that's 1,000 times the rate that's considered natural extinction. And a 2019 U.N. report notes that approximately 1 million animal and plant species are threatened with extinction, many within decades. More recently, research from the University of Arizona suggests that one-third of plant and animal species could be gone in 50 years.
Here are some more alarming numbers:
- In 2018, three bird species vanished from the earth.
- In Tanzania, the elephant population has dropped by 20 percent in recent years.
- Because of widespread poaching for their horns, as of 2018, there were only two northern white rhinos—both female and incapable of natural reproduction—left in Kenya.
- An estimated 100 African elephants are killed each day by poachers seeking ivory, meat, and body parts.
- Fewer than 450 North Atlantic right whales, including a little more than 100 breeding females, remain. With so many dying and so few being born, scientists warn that the species may not survive more than another 25 years.
With numbers so staggering and dire, conservationists around the globe increasingly are turning to technologists and tech to protect endangered animals and hopefully save them from extinction. Seeing the plight of many species, tech-savvy people are offering their time and expertise to track animals, analyze their habitats and availability of food, and better understand population dynamics.
It's not new for wildlife conservationists to draw on technology like cameras and tracking collars. What's new is the explosion in technologies like AI, machine learning (ML), the Internet of Things, 5G, wireless, and the cloud. And that explosion is touching many industries, including conservation.
"Every industry is going to be changed by it," says Jeff Kagan, an independent industry analyst. "It's transforming so much. It only makes sense that it's transforming wildlife protection. Where before they could never really follow the animals and the paths they take, and the things they're eating, and how they're living, now we can see exactly where these animals are and what they're doing. And think about how much it will advance in the next 10 years."
Outsmarting the poachers
Professor Milind Tambe (right) during patrol in Malaysia. Image credit: Milind Tambe
Tambe, who for the past 15 years has been working on how AI can benefit society, made a slight turn six or seven years ago when he began to wonder how technology could be used to protect animals.
The computer scientist is the creator and driving force behind Protection Assistant for Wildlife Security (PAWS), predictive AI software geared to analyze massive amounts of data and then use ML, game theory, and mathematical modeling to take on the poachers decimating many species of animals around the world, including Cambodia.
For instance, intensive poaching of both Cambodian tigers and their prey have caused a rapid decline in the big cats. Today, the World Wildlife Fund reports that there are no longer any breeding populations of wild tigers left in the country, making them functionally extinct there. As for wild elephants, it's generally estimated that only 300 to 600 remain in Cambodia, down from 2,000 in 1995 and 500 to 1,000 in 1999, according to the Food and Agriculture Organization of the U.N.
Normally, park rangers and environmentalists study maps trying to figure out where poachers may be laying traps or lying in wait to kill protected animals. The PAWS system goes beyond human gut instinct and crunches data to predict where the poachers will be working, where the animals are in the most danger, and the best patrol routes for the rangers.
Tambe has been extensively testing PAWS in Cambodia. Conservationists there are finding poaching traps five times more today than they were before they began using his AI-based system.
"I kept saying, 'I think AI can help,'" he says. "Where are the poachers going to hit next? There are thousands of square kilometers in national parks. There are hundreds of rangers. They can't be everywhere. If we can tell them where they need to be [to stop the poaching], that's important."
Now, Tambe's PAWS system is being adapted to work with 800 global national parks that use SMART (Spatial Monitoring and Reporting Tool) software to measure and evaluate the effectiveness of conservation and wildlife law enforcement. With the help of an AI engineer from Microsoft, Tambe has been working for the past six to eight months to integrate PAWS with the SMART software and enable it all to run in the cloud. The system, which so far has been running only on an experimental basis, is scheduled to launch this spring.
"We are honored to be able to contribute," he says. "Some people think of AI being a technology that might be harmful in some ways, maybe taking jobs away. It's a surprise to people that you can apply AI to protect wildlife and use it for social good. The gift to us, as AI researchers, has been opening the door to new AI research challenges so we can advance the state of the art in artificial intelligence."
Saving the salmon
In the Northern California foothills of the Sierra Nevada range, a group of conservationists, the Friends of Auburn Ravine, has been working to protect the local wild Chinook salmon, also known as king salmon. The salmon's numbers have been slashed by logging, dams, overfishing, and pollution. Scientists estimate that 29 percent of the Pacific salmon populations have become extinct in the past 240 years.
The group of volunteers set up cameras to record video of the fish as they migrate upstream to spawn every fall and winter. They were trying to collect data on the number of salmon swimming through, to garner support to improve habitat and facilitate natural migration of adult and juvenile salmon.
The problem was that volunteers were sitting and staring at a seemingly endless amount of video to count fish swimming by.
"It's boring work looking at the videos," says Brad Cavallo, president of Cramer Fish Sciences and a board member of the Friends of Auburn Ravine. "It's easy to miss something because you just space out, but estimates are important so we know how to set harvest limits and how the fish are doing."
Eric Hubbard, a technologist who has worked at Hewlett Packard Enterprise since 1999, came along and changed that boring, but important, work.
Hubbard says two or three years ago, his dad, who is a volunteer with Friends of Auburn Ravine, told him about video watch parties where volunteers ate pizza and counted fish.
"It was a cool volunteer effort," says Hubbard. "I saw their enthusiasm and effort, but it hurt me to see them doing it so inefficiently. It took huge amounts of hours to look at videos to count these fish. I knew we could automate this and make it so much easier on them."
Hubbard, using the annual 60 hours of paid volunteer time he receives from HPE through the company's community involvement program, HPE Gives, traded out the volunteers' security cameras, which used proprietary protocols that were difficult to work with, for new digital underwater and overhead cameras—dubbed salmon cams—with standard protocols and formats.
Using the Java programming language, Hubbard wrote 5,000 lines of code to create a software program, called FishSpotter, to detect and document passing fish. Raw digital video is uploaded to the cloud, where FishSpotter processes it. Using advanced image recognition to detect activity and identify salmon, FishSpotter automatically produces short GIF highlights of any passing salmon, so humans can then review it to confirm the fish species.
A passing fish captured by FishSpotter, a software program created by HPE's Eric Hubbard. Image credit: Friends of Auburn Ravine
The 2018-2019 migration season was the first to be monitored with the new digital system.
By eliminating the need to watch this large batch of data, FishSpotter was able to pare down 1.6 terabytes and 2,416 hours of raw data into just 101 gigabytes and 20.4 hours of GIF highlights for volunteers to vet and verify as salmon (or other wildlife or activity). In future seasons, Hubbard hopes to further refine FishSpotter's image recognition capabilities to narrow this data set of possible suspects down even further to further accelerate insights.
"I live in a real tech bubble," says Hubbard. "Everyone around me is tech-savvy. I look at these nonprofits and they're outside that bubble. They don't necessarily have the expertise to know what's possible. It's been very gratifying. Initially, it started out as helping people more than the salmon. Then as I got more involved, I was drawn into how important these fish are."
Tech to protect polar bears and rhinos
Colby Loucks, vice president of the Wildlife Conservation Program at the World Wildlife Fund U.S., says technology is increasingly a vital tool in wildlife conservation. And as a leader in the organization's Wildlife Crime Technology Project, which focuses on using cutting-edge technology to fight poaching, he says tech advancements have opened doors.
That's what led the group to create WildLabs.net, a global online community joining conservationists with technologists, engineers, data scientists, and entrepreneurs. With more than 3,000 active users, the group's mission is to use technology to tackle conservation issues, like illegal wildlife trade and poaching.
"We had conservationists trying to use technology, but they weren't technologists by training," says Loucks. "There were a lot of technologists around the world who have the skill sets, knowledge, and desire to help in conservation. WildLabs.net is about connecting those communities. We're piecing together innovative ideas between people with a conservation background and a technology background."
For instance, Loucks says conservationists are combining cameras with ML software trained to distinguish between animals and people. When the system identifies humans, as opposed to zebras or rhinos, passing by a camera, rangers are notified so they can check to see if the people are poachers.
Others in Africa are using thermographic cameras that use infrared radiation to detect elephant and rhino poachers.
Loucks notes that the smart thermal camera technology was installed in 2016 in two different areas of Kenya's Lake Nakuru National Park, a site known for its rhino conservation work. The year before the technology was installed, there were 17 attempted poaching events in the park, he says. The year the system was installed, two poachers were caught, and after that, there were no poaching incidents for the rest of the year and none in 2017 and 2018. In 2019, the system was used to catch another four poachers.
"We feel like that is a big success," says Loucks.
Installing tech near Lake Nakuru, Kenya. Image credit: James Morgan / WWF-US
Some scientists are even using environmental DNA (eDNA) technology, which can detect genetic material, such as traces of biological tissue and mucus, obtained directly from environmental samples like soil, sediment, and water. Loucks explains that scientists studying polar bears can scoop samples from streams or footprints in the Arctic snow. From that, they can pull up DNA and use that information to identify what the bears have been eating and even identify individual bears.
"The dream is that you might not see a bear, but if you get a polar bear footprint, you could still know quite a lot about it, which would be a big leap forward for tracking polar bears and seeing how climate change is impacting them," says Loucks. "It is an exciting time to be in the wildlife conservation space right now. We've seen a lot of developments and efforts using technologies to solve problems."
Related reading:
HPE here to help on the occasion of World Earth Day
This article/content was written by the individual writer identified and does not necessarily reflect the view of Hewlett Packard Enterprise Company. | https://www.hpe.com/us/en/insights/articles/how-technology-is-protecting-endangered-species-2002.html |
Research Interests: Fiction, Nonfiction, Poetry, Scriptwriting, Comics, Fairy Tale Studies, Science Fiction and Fantasy, Creative Writing Pedagogy.
Research Interests: Creative Writing - Poetry, fiction, the biography, Journalism, History of Ideas/Black intellectual experience, Modernity, post-colonial, National, Cultural & literary theories; African, African-American, Diaspora, and contemporary Trans-Atlantic Literatures.
Research Interests: Magical Realism, Fabulism, Science Fiction & Fantasy, Speculative Fiction, Literary Fiction, Postcolonialism, Diaspora Studies, Latinx Fiction, Latin-American Fiction, Graphic Novels, Screenwriting, Novel Structure, Transmedia Narrative, Fiction Writing, Flash Fiction, Nonfiction Writing, Editing & Publishing, Creative Writing Pedagogy.
Latino/a Literature, writing, women writers of color, Emergent American Literature and women's studies.
Research Interests: Fiction, memoir, and personal essay; medical humanities, disability studies, representations of health and illness; images and physical aspects of home and place; the relationships between genres (e.g., architecture and narrative, painting and digital art, fiction and nonfiction); and twentieth-century American literature and women's studies.
Research Interests: Fiction writing, screenwriting, contemporary fiction.
Research Interests: Writing for Video Games, Screenwriting, Fiction Writing.
Creative nonfiction: memoir, essay, segmented forms (braided, collage, lyrical), and literary journalism. Fiction: short stories, flash fiction. | http://english.cah.ucf.edu/staff.php |
TECHNICAL FIELD
BACKGROUND
SUMMARY
BRIEF DESCRIPTION OF DRAWINGS
DESCRIPTION OF EMBODIMENTS
This application relates to the terminal field, and in particular, to a message processing method and an apparatus.
Currently, more applications may be installed on a mobile phone. A user receives various information or notifications every day. When the user sees various notifications in a drop-down list, because there is a great amount of information, the user usually needs to spend some time and energy in distinguishing important information or notifications, wasting time and energy.
Embodiments of this application provide a message processing method and an apparatus, to display a non-unimportant unread message instead of an unimportant unread message on a particular user interface when a preset operation is received.
A first aspect of the embodiments of this application provides a message processing method, including: performing, by a user, a first operation on a terminal, where the first operation performed by the user on the terminal may be turning on a screen, performing tap to open a first user interface, or performing another operation so that the terminal displays a first user interface, and this is not limited herein; and the first user interface is a drop-down message notification bar or a HiBoard; and in response to the first operation, and displaying, by the terminal, a first unread message and a second unread message on the first user interface. The terminal may receive a plurality of messages. The first unread message and the second unread message are used as an example for description.
After the first user interface is exited, the user performs a second operation on the terminal. Similarly, the second operation may also be turning on the screen, performing tap to open a second user interface, or performing another operation so that the terminal displays a second user interface, and this is not limited herein; and the second user interface is a drop-down message notification bar or a HiBoard. If the first unread message and the second unread message are not read or deleted by the user through tapping and are still unread messages, the first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message, the terminal displays the first unread message instead of the second unread message on the second user interface.
Alternatively, when the first user interface is not exited, in response to a second operation performed by the user on the terminal, if the first unread message and the second unread message are still unread messages, the terminal stops displaying the second unread message, and maintains displaying of the first unread message on the first user interface of the terminal. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
Specifically, the second operation is at least one of: shaking the terminal by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the terminal; or sending preset audio information to the terminal.
In the technical solution provided in this embodiment of this application, after the first operation and the second operation, the terminal may not display a displayed unimportant unread message on the second user interface. Therefore, even if when there are a large quantity of unread messages, in order neither to miss non-unimportant unread messages nor to be interfered by unimportant unread messages, the terminal can automatically identify unimportant unread messages, and the user does not need to identify or delete the unimportant unread messages one by one. This saves time and energy, and ensures great convenience and good user experience.
In an implementation of the first aspect of the embodiments of this application, the method further includes: determining, based on at least one of: a source function of the first unread message, a source application of the first unread message, or whether the first unread message includes a preset field, that the first unread message is the non-unimportant unread message; and determining, based on at least one of: a source function of the second unread message, a source application of the second unread message, or whether the second unread message includes a preset field, that the second unread message is the unimportant unread message. In this case, when there are a large quantity of unread messages, the terminal can automatically identify unimportant unread messages, and the user does not need to determine the messages one by one. This saves time and energy, and ensures great convenience and good user experience.
In some feasible embodiments, before the response to, after the first user interface is exited, a second operation performed by the user on the terminal, the method may further include: determining that the second operation occurs after preset duration that elapses after the first user interface is exited. In this case, the user can consider and determine, within the preset duration, whether to read an unimportant unread message.
A second aspect of the embodiments of this application provides a message processing apparatus. The apparatus includes a receiving module and a display module.
The receiving module is configured to receive a first operation performed by a user on the apparatus. The display module displays a first unread message and a second unread message on a first user interface of the apparatus based on the first operation. The first user interface is a drop-down message notification bar or a HiBoard. After the first user interface is exited, the receiving module receives a second operation performed by the user on the apparatus, so that if the first unread message and the second unread message are still unread messages, the display module displays the first unread message instead of the second unread message on the second user interface. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message. The second user interface is a drop-down message notification bar or a HiBoard.
If the first user interface is not exited, when the receiving module receives a second operation performed by the user on the apparatus, if the first unread message and the second unread message are still unread messages, the display module stops displaying the second unread message, and maintains displaying of the first unread message, on the first user interface. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
The second operation may be at least one of: shaking the apparatus by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the apparatus; or sending preset audio information to the apparatus.
In the technical solution provided in this embodiment of this application, after the first operation and the second operation, the apparatus may not display a displayed unimportant unread message on the second user interface. Therefore, even if when there are a large quantity of unread messages, in order neither to miss non-unimportant unread messages nor to be interfered by unimportant unread messages, the apparatus can automatically identify unimportant unread messages, and the user does not need to identify or delete the unimportant unread messages one by one. This saves time and energy, and ensures great convenience and good user experience.
In an implementation of the second aspect of the embodiments of this application, the apparatus further includes a determining module. The determining module is configured to determine, based on at least one of: a source function of the first unread message, a source application of the first unread message, or whether the first unread message includes a preset field, that the first unread message is the non-unimportant unread message; and determine, based on at least one of: a source function of the second unread message, a source application of second unread message, or whether the second unread message includes a preset field, that the second unread message is the unimportant unread message. When there are a large quantity of unread messages, the apparatus can automatically identify unimportant unread messages, and the user does not need to determine the messages one by one. This saves time and energy, and ensures great convenience and good user experience.
In some feasible embodiments, the determining module may further determine that the second operation occurs after preset duration that elapses after the first user interface is exited, so that the user can consider and determine, within the preset duration, whether to read an unimportant unread message.
including a first operation performed by a user on the apparatus, where the first operation performed by the user on the apparatus may be turning on a screen, performing tap to open a first user interface, or performing another operation so that the apparatus displays a first user interface, and this is not limited herein; and the first user interface is a drop-down message notification bar or a HiBoard; and in response to the first operation, displaying, by the apparatus, a first unread message and a second unread message on the first user interface, where the apparatus may receive a plurality of messages, and the first unread message and the second unread message are used as an example for description; and
after the first user interface is exited, the user performs a second operation on the apparatus, where similarly, the second operation may also be turning on the screen, performing tap to open a second user interface, or performing another operation so that the apparatus displays a second user interface, and this is not limited herein; and the second user interface is a drop-down message notification bar or a HiBoard; and if the first unread message and the second unread message are not read or deleted by the user through tapping and are still unread messages, the first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message, displaying, by the apparatus, the first unread message instead of the second unread message on the second user interface.
A third aspect of the embodiments of this application provides a message processing apparatus, including a touchscreen, a memory, one or more processors, a plurality of application programs, and one or more programs. The one or more programs are stored in the memory; and the apparatus is configured to perform the following steps:
Alternatively, when the first user interface is not exited, in response to a second operation performed by the user on the apparatus, if the first unread message and the second unread message are still unread messages, displaying of the second unread message is stopped, and displaying of the first unread message is maintained, on the first user interface of the apparatus. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
Specifically, the second operation is at least one of: shaking the apparatus by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the apparatus; or sending preset audio information to the apparatus.
In the technical solution provided in this embodiment of this application, after the first operation and the second operation, the apparatus may not display a displayed unimportant unread message on the second user interface. Therefore, even if when there are a large quantity of unread messages, in order neither to miss non-unimportant unread messages nor to be interfered by unimportant unread messages, the apparatus can automatically identify unimportant unread messages, and the user does not need to identify or delete the unimportant unread messages one by one. This saves time and energy, and ensures great convenience and good user experience.
According to the apparatus in the third aspect of the embodiments of this application, the at least one processor executes several instructions to enable the apparatus to further perform the following step: further including: determining, based on at least one of: a source function of the first unread message, a source application of the first unread message, or whether the first unread message includes a preset field, that the first unread message is the non-unimportant unread message; and determining, based on at least one of: a source function of the second unread message, a source application of the second unread message, or whether the second unread message includes a preset field, that the second unread message is the unimportant unread message. When there are a large quantity of unread messages, the apparatus can automatically identify unimportant unread messages, and the user does not need to determine the messages one by one. This saves time and energy, and ensures great convenience and good user experience.
In some feasible embodiments, before the response to, after the first user interface is exited, a second operation performed by the user on the terminal, the method may further include: determining that the second operation occurs after preset duration that elapses after the first user interface is exited. In this case, the user can consider the messages within the preset duration, and determine whether an unimportant unread message needs to be read.
A fourth aspect of the embodiments of this application provides a computer program product. When the computer program product is run on a verification device, the verification device is enabled to perform the method in the foregoing aspects.
A fifth aspect of the embodiments of this application provides a computer readable storage medium, including an instruction. When the instruction is run on a verification device, the verification device is enabled to perform the method in the foregoing aspects.
In the technical solutions provided in the embodiments of this application, after the first operation and the second operation, the terminal or the apparatus may not display a displayed unimportant unread message on the second user interface. Therefore, even if when there are a large quantity of unread messages, in order neither to miss non-unimportant unread messages nor to be interfered by unimportant unread messages, the terminal or the apparatus can automatically identify unimportant unread messages, and the user does not need to identify or delete the unimportant unread messages one by one. This saves time and energy, and ensures great convenience and good user experience.
FIG. 1-1
is a schematic diagram of a drop-down message notification bar of an intelligent terminal;
FIG. 1-2
is a schematic diagram of a terminal according to this application;
FIG. 1-3
is a schematic diagram of a drop-down message notification bar with only an important message retained;
FIG. 1-4
is a schematic diagram of tapping a power button by a user to enter a drop-down message notification bar;
FIG. 1-5
is a schematic diagram of tapping a power button by a user to enter a drop-down message notification bar again;
FIG. 1-6
is a schematic diagram of tapping a dialog box "Unimportant unread message" by a user to display an unimportant message;
FIG. 1-7
is a schematic diagram showing that a mobile phone is in a screen-on state;
FIG. 1-8
is a schematic diagram of performing downward pulling by a user from a top of a screen to obtain a drop-down message notification bar;
FIG. 1-9
is a schematic diagram of closing and opening a drop-down message notification bar by a user;
FIG. 1-10
is a schematic diagram of tapping a dialog box to remove an unimportant message;
FIG. 1-11
is a schematic diagram of shaking a mobile phone to remove an unimportant message;
FIG. 1-12
is a schematic diagram of tapping a fingerprint button to remove an unimportant message;
FIG. 1-13
is a schematic diagram of displaying a drop-down message notification bar on a tablet computer;
FIG. 2-1
is a schematic diagram of a message processing method;
FIG. 2-2
is another schematic diagram of a message processing method;
FIG. 2-3
is another schematic diagram of a message processing method;
FIG. 2-4
is a schematic diagram of an apparatus;
FIG. 2-5
is another schematic diagram of an apparatus;
FIG. 3-1
is a schematic diagram showing messages at three levels in a drop-down message notification bar;
FIG. 3-2
is a schematic diagram of tapping a dialog box to display a message at level 2;
FIG. 3-3
is a schematic diagram of tapping a dialog box to display a message at a corresponding level;
FIG. 3-4A
FIG. 3-4B
and are a schematic diagram of shaking a mobile phone to hide a message at level 2 or 3;
FIG. 3-5
is a schematic diagram of tapping a fingerprint button to hide a message at level 2 or 3;
FIG. 3-6
is a schematic diagram showing that messages from different friends in WeChat are at different levels;
FIG. 3-7
is a schematic diagram of hiding a message at level 2 and/or 3;
FIG. 3-8
is a schematic diagram of grouping messages from different types of applications and functions;
FIG. 3-9
is a schematic diagram of an ongoing notification;
FIG. 4-1
Settings
is a schematic diagram of entering by a user to modify a level setting;
FIG. 4-2
is a schematic diagram of setting levels of messages from different applications by a user;
FIG. 4-3
is a schematic diagram of setting, by a user, whether messages at different levels are displayed;
FIG. 4-4
is a schematic diagram showing whether messages at different levels are displayed before and after being processed;
FIG. 4-5
is a schematic diagram of setting a field corresponding to level 3;
FIG. 4-6
is a schematic diagram of creating a new level;
FIG. 4-7
is a schematic diagram of entering information about level 4;
FIG. 5-1
is a schematic diagram showing that a latest message is received.
FIG. 5-2
is a schematic diagram of displaying quantities of messages at different levels;
FIG. 5-3
is a schematic diagram of not displaying a latest message.
The following clearly and completely describes technical solutions in the embodiments of this application with reference to the accompanying drawings in the embodiments of this application. Apparently, the described embodiments are merely some but not all of the embodiments of this application.
In the specification, claims, and accompanying drawings of this application, terms "first", "second", "third", "fourth", and the like (if any) are intended to distinguish between similar objects, but do not necessarily indicate a particular order or sequence. It should be understood that data termed in such a way are interchangeable in proper circumstances so that the embodiments described herein can be implemented in an order other than the order illustrated or described herein. In addition, terms "include", "have" and any variants of the terms are intended to cover non-exclusive inclusions. For example, processes, methods, systems, products, or devices that include a series of steps or units are not necessarily limited to those clearly listed steps or units, but may include other steps or units that are not clearly listed or that are inherent to these processes, methods, systems, products or devices.
FIG. 1-1
With the development of mobile terminals, more applications may be downloaded and installed. Many applications send notification messages to a mobile terminal. A smartphone is used as an example. There may be a communications application, a shopping application, a social application, and the like on a smartphone. Many applications usually push messages every day or regularly, for example, a discount promotion message pushed by the shopping application, hot news pushed by the social application, and a friend message from the communications application. Among a large number of messages ( is a schematic diagram of a drop-down message notification bar of an intelligent terminal), some messages are important, for example, a message from a relative or a colleague in a communication application; and some messages are unimportant, for example, a discount promotion message pushed by a shopping application. Even if messages are from a same application, the messages also have different importance. For example, a logistics message and a latest commodity message that are from a shopping application are important. If performing determining by browsing messages one by one, a user may consume time and energy. In the embodiments of this application, levels of different messages are classified, so that only unimportant content can be hidden when messages are browsed, with no need to waste time and energy in determining whether the messages are important, ensuring great convenience and good user experience.
FIG. 1-2
Specifically, is a schematic diagram of a terminal according to this application. The terminal may be any terminal device such as a mobile phone, a tablet computer, a personal digital assistant (Personal Digital Assistant, PDA), a point of sales (Point of Sales, POS) terminal, or a vehicle-mounted computer. That the terminal is a mobile phone is used as an example.
FIG. 1-2
is a block diagram of a partial structure of a mobile phone related to a terminal A according to an embodiment of this application. The mobile phone includes components such as a radio frequency (Radio Frequency, RF) circuit A-10, a memory A-20, an input unit A-30, a display unit A-40, a sensor A-50, an audio circuit A-60, a wireless fidelity (wireless fidelity, Wi-Fi) module A-70, a processor A-80, and a power supply A-90. A person skilled in the art may understand that the structure of the mobile phone shown in the figure does not constitute a limitation on the mobile phone, and the mobile phone may include more or fewer components than those shown in the figure, or a combination of some components, or components arranged differently.
The RF circuit A-10 may be configured to: send and receive a signal in an information sending and receiving process or in a call process, and particularly, after receiving downlink information of a base station, send the downlink information to the processor A-80 for processing; and in addition, send uplink data to the base station. Generally, the RF circuit A-10 includes but is not limited to an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), or a duplexer. In addition, the RF circuit A-10 may further communicate with another device by using a wireless communications network. Any communications standard or protocol may be used for the foregoing wireless communication, and includes but is not limited to a global system for mobile communications (Global System for Mobile communication, GSM), a general packet radio service (General Packet Radio Service, GPRS), code division multiple access (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), an email, or a short messaging service (Short Messaging Service, SMS).
The memory A-20 may be configured to store a software program and/or a module. The processor A-80 runs the software program and/or the module stored in the memory A-20, to execute various function applications of the mobile phone and process data. The memory A-20 may mainly include a program storage area and a data storage area. The program storage area may store an operating system, an application program required by at least one function (such as a sound or an image playing function), and the like. The data storage area may store data (such as audio data and a phonebook) created according to use of the mobile phone, and the like. In addition, the memory A-20 may include a high-speed random access memory, and may further include a non-volatile memory, for example, at least one magnetic disk storage device, a flash memory device.
The input unit A-30 may be configured to: receive entered digit or character information, and generate key signal input related to user settings and function control of the mobile phone. Specifically, the input unit A-30 may include a touch panel A-31 and another inputdevice A-32. The touch panel A-31, also referred to as a touchscreen, may collect a touch operation performed by a user on or near the touch panel A-31 (for example, an operation performed by the user on or near the touch panel A-31 by using any suitable object or accessory such as a finger or a stylus), and drive a corresponding connection apparatus according to a preset program. Optionally, the touch panel A-31 may include two components: a touch detection apparatus and a touch controller. The touch detection apparatus detects a touch orientation of the user, detects a signal brought by the touch operation, and transfers the signal to the touch controller. The touch controller receives touch information from the touch detection apparatus, converts the touch information into contact coordinates, and sends the contact coordinates to the processor A-80; and can receive and execute a command sent by the processor A-80. In addition, the touch panel A-31 may be implemented by using a plurality of types such as a resistive type, a capacitive type, an infrared type, and a surface acoustic wave type. In addition to the touch panel A-31, the input unit A-30 may further include the another VR device A-32. Specifically, the another VR device A-32 may include but is not limited to one or more of a physical keyboard, a function button (such as a volume control button or a power button), a track ball, a mouse, or a joystick.
FIG. 4-3
The display unit A-40 may be configured to display information entered by the user or information provided for the user, and various menus of the mobile phone. The display unit A-40 may include a display panel A-41. Optionally, the display panel A-41 may be configured in a form of a liquid crystal display (Liquid Crystal Display, LCD), an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or the like. Further, the touch panel A-31 may cover the display panel A-41. After detecting a touch operation on or near the touch panel A-31, the touch panel A-31 transfers the touch operation to the processor A-80 to determine a type of the touch event, and then the processor A-80 provides corresponding visual output on the display panel A-41 based on the type of the touch event. In , the touch panel A-31 and the display panel A-41 are used as two independent components to implement input and output functions of the mobile phone. However, in some embodiments, the touch panel A-31 and the display panel A-41 may be integrated to implement the input and output functions of the mobile phone.
The mobile phone may further include at least one sensor A-50 such as a light sensor, a motion sensor, or another sensor. Specifically, the light sensor may include an ambient light sensor and a proximity sensor. The ambient light sensor may adjust luminance of the display panel A-41 based on brightness of ambient light. The proximity sensor may turn off the display panel A-41 and/or backlight when the mobile phone is moved to an ear. As one type of the motion sensor, an accelerator sensor may detect magnitude of accelerations in all directions (which are generally three axes), may detect magnitude and a direction of gravity when being stationary, and may be configured to identify an application of a mobile phone posture (for example, switch between a landscape mode and a portrait mode, a related game, and magnetic force posture calibration), vibration identification related functions (such as step counter and knock), and the like. For other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor that may be further disposed on the mobile phone, details are not described herein.
The audio circuit A-60, a speaker A-61, and a microphone A-62 may provide an audio interface between the user and the mobile phone. The audio circuit A-60 may transmit, to the speaker A-61, an electrical signal converted from received audio data, and the speaker A-61 converts the electrical signal into a sound signal for outputting. In addition, the microphone A-62 converts a collected sound signal into an electrical signal. The audio circuit A-60 receives the electrical signal, converts the electrical signal into audio data, and outputs the audio data to the processor A-80 for processing; and then processed audio data is sent to, for example, another mobile phone, by using the RF circuit A-10, or the audio data is sent to the memory A-20 for further processing.
FIG. 1-2
Wi-Fi is a short-distance wireless transmission technology. The mobile phone may help, by using the Wi-Fi module A-70, the user send and receive an email, browse a web page, access streaming media, and the like. The Wi-Fi module A-70 provides wireless broadband internet access for the user. Although shows the Wi-Fi module A-70, it may be understood that the Wi-Fi module A-70 is not a necessary component of the mobile phone, and the Wi-Fi module A-70 may be omitted as required without changing the scope of the essence of the present invention.
The processor A-80 is a control center of the mobile phone, and is connected to various components of the entire mobile phone by using various ports and lines. By running or executing the software program and/or the module stored in the memory A-20, and invoking data stored in the memory A-20, the processor A-80 performs various functions of the mobile phone and processes data, to perform overall monitoring on the mobile phone. Optionally, the processor A-80 may include one or more processing units. Preferably, an application processor and a modem processor may be integrated into the processor A-80. The application processor mainly processes an operating system, a user interface, an application program, and the like. The modem processor mainly processes wireless communication. It may be understood that the modem processor may alternatively not be integrated into the processor A-80.
The mobile phone further includes the power supply A-90 (such as a battery) that supplies power to the components. Preferably, the power supply A-90 may be logically connected to the processor A-80 by using a power supply management system, to implement functions such as charging and discharging management and power consumption management by using the power supply management system. The mobile phone may further include a camera, a Bluetooth module, and the like, which are not shown though, and details are not described herein.
FIG. 1-3 (FIG. 1-3
In this application, classification for an important message and an unimportant message is performed in advance. In this case, when new messages are seen in a drop-down message notification bar, the smartphone can automatically filter out unimportant messages simply by performing some operations, and retain important messages, to achieve an effect shown in is a schematic diagram of a drop-down message notification bar with only an important message retained) and save user's time and energy. It should be noted that, after being filtered out, the unimportant message is not displayed in the drop-down message notification bar, which is referred to as removing the unimportant message out of the drop-down message notification bar herein. After the unimportant message is removed, a dialog box "Unimportant unread message" may be displayed, or a dialog box "Unimportant unread message" may not be displayed. This is not limited herein. The dialog box "Unimportant unread message" may be clicked by the user, and the unimportant message that has been removed is displayed again, or nothing may be displayed. This is not limited herein. In some feasible embodiments, in addition to "Unimportant unread message", "Hide messages", a prompt icon, or the like may further be displayed. This is not limited herein. In the embodiments of this application, displaying "Unimportant unread message" is used as an example for description.
FIG. 1-4 (FIG. 1-4
FIG. 1-5 (FIG. 1-5
FIG. 1-6 (FIG. 1-6
In some feasible embodiments, a specific operation of removing the unimportant unread message may be discussed in terms of two states: a screen-on state and a screen-off state. As shown in is a schematic diagram of tapping a power button by a user to enter a drop-down message notification bar), in the screen-off state, the user may tap the power button to enter the drop-down message notification bar, and various currently received messages are displayed in the notification bar, including a message from a communications application, a message from a shopping application, a message from a social application, and the like. In this case, when the user may turn off a screen, and then turn on the screen again as shown in is a schematic diagram of tapping the power button by the user to enter the drop-down message notification bar again), an unimportant message can be removed, and an important message and a dialog box "Unimportant unread message" can be retained. In some feasible embodiments, as shown in is a schematic diagram of tapping the dialog box "Unimportant unread message" by the user to display the unimportant message), the user may tap the dialog box "Unimportant unread message" to display the removed unimportant message. In some feasible embodiments, the unimportant message may also be removed only when the screen is turned on again after several seconds that elapses after the screen is turned off, for example, 10 seconds. If the screen is turned on within 10 seconds, the unimportant unread message may further be displayed and seen.
FIG. 1-7 (FIG. 1-7
FIG. 1-8 (FIG. 1-8
FIG. 1-9 (FIG. 1-9
In the embodiments of this application, when the mobile phone is in a screen-on and unlocked state, as shown in is a schematic diagram showing that the mobile phone in a screen-on state), the user may perform downward pulling from a top of the screen to display the drop-down message notification bar, as shown in is a schematic diagram of performing downward pulling by the user from the top of the screen to obtain the drop-down message notification bar). In this case, the drop-down message notification bar displays received messages including an important message and an unimportant message. Next, the user may pull the drop-down message notification bar upward to display a home screen, and then pull the drop-down message notification bar downward, as shown in is a schematic diagram of closing and opening the drop-down message notification bar by the user, and the user may also remove the unimportant message by performing another operation, such as tapping a home button, directly turning off the screen, or switching to another application by using a multitask function). In this case, the drop-down message notification bar may display only the important message, remove the unimportant message, and may further retain the dialog box "Unimportant unread message".
FIG. 1-10 (FIG. 1-10
In some feasible embodiments, the drop-down message notification bar may display a dialog box "Hide unimportant unread message", "Remove unimportant unread message", or "One tap to remove unimportant unread message", as shown in is a schematic diagram of tapping the dialog box to remove an unimportant message), so that when all messages are displayed in the drop-down message notification bar of the terminal, an unimportant message can be removed after the dialog box tapped. In some feasible embodiments, the unimportant message may also be removed only by pulling the notification bar downward after a preset period of time that elapses after the drop-down message notification bar is pulled upward, for example, 10 seconds. If the screen is turned on within 10 seconds, the unimportant unread message may further be displayed and seen.
FIG. 1-11 (FIG. 1-11
FIG. 1-12 (FIG. 1-12
In some feasible embodiments, the mobile phone may further be shaken according to a specific rule, so that a gravity and acceleration sensor of the mobile phone senses the shake, and a step of removing an unimportant message is performed, as shown in is a schematic diagram of removing the unimportant message by shaking the mobile phone). In this case, only an important message instead of the unimportant message is displayed in the drop-down message notification bar. In some feasible embodiments, as shown in is a schematic diagram of tapping a fingerprint button to remove an unimportant message), the fingerprint button may also be tapped to remove the unimportant message. The tap is a single-tap operation, a double-tap operation, or a multi-tap operation that is performed according to a specific rhythm, and this is not limited herein.
It should be noted that, in the drop-down message notification bar, if seeing an important message, the user may perform tap to read the message, or may tap a clear button to clear the message, or may not perform any processing. It should be noted that, when messages that are tapped and read or cleared include an important message and an unimportant message, the messages are no longer displayed in the drop-down message notification bar; and among other messages on which no processing is performed, an important message may continue to be retained in the drop-down message notification bar. That is, after the user performs an operation of removing the unimportant message, the important message may still be retained in the drop-down message notification bar, but the unimportant message may be cleared, or may be displayed again when "Unimportant unread message" is tapped. This is not limited herein.
FIG. 1-13 (FIG. 1-13
It should be noted that, in this application, the function of removing an unimportant message on a smartphone may also be applied to another intelligent terminal, for example, a tablet computer shown in is a schematic diagram of displaying a drop-down message notification bar on the tablet computer). Because an operation of the tablet computer is similar to that of the smartphone, details are not described again.
FIG. 2-1
101: A user performs a first operation on a terminal, and in response to the first operation, displays a first unread message and a second unread message on a first user interface of the terminal.
102: After the first user interface is exited, the user performs a second operation on the terminal; and in response to the second operation, if the first unread message and the second unread message are still unread messages, the first unread message instead of the second unread message is displayed on a second user interface of the terminal, where the first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
In view of this, an embodiment of this application provides a message processing method. shows a message processing method. The method includes the following steps:
FIG. 2-2
201: A user performs a first operation on a terminal; and in response to the first operation, and a first unread message and a second unread message are displayed on a first user interface of the terminal.
202: If the first user interface is not exited, the user performs a second operation on the terminal; and in response to the second operation, if the first unread message and the second unread message are still unread messages, the terminal stops displaying the second unread message and maintains displaying of the first unread message on the first user interface, where the first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
An embodiment of this application further provides a message processing method. shows a message processing method. The method includes the following steps:
The first operation performed by the user on the terminal may be turning on a screen, performing tap to open the first user interface, or performing another operation so that the terminal displays the first user interface, and this is not limited herein. The first user interface is a drop-down message notification bar or a HiBoard. It should be noted that, both the second user interface and the first user interface may be drop-down message notification bars; or both are HiBoards; or one is a drop-down message notification bar, and the other is a HiBoard. This is not limited herein. Specifically, the second operation may be at least one of: shaking the terminal by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the terminal; or sending preset audio information to the terminal.
FIG. 2-3
301: A user performs a first operation on a terminal, and in response to the first operation, the terminal displays a first unread message and a second unread message on a first user interface, where the first user interface is a drop-down message notification bar or a HiBoard.
302: Determine, based on at least one of: a source function of the first unread message, a source application of the first unread message, or whether the first unread message includes a preset field, that the first unread message is a non-unimportant unread message; and determine, based on at least one of: a source function of the second unread message, a source application of the second unread message, or whether the second unread message includes a preset field, that the second unread message is an unimportant unread message.
An embodiment of this application further provides a message processing method. shows a message processing method. The method includes the following steps.
In some feasible embodiments, messages pushed by some applications or functions are unimportant. Therefore, when messages from the applications or functions are received, it is determined that the messages are unimportant unread messages. In some feasible embodiments, a field such as "on sale" may also be set. When the field is obtained, it is determined that the messages are unimportant; in this case, the messages are determined as unimportant unread messages.
303: After preset duration that elapses after the first user interface is exited, in response to a second operation performed by the user on the terminal, if the first unread message and the second unread message are still unread messages, display the first unread message instead of the second unread message on a second user interface of the terminal, where the first unread message is a non-unimportant unread message, the second unread message is an unimportant unread message, and the second user interface is a drop-down message notification bar or a HiBoard.
In some feasible embodiments, the preset duration may be 10 seconds or one minute. This is not limited herein. The second operation is at least one of: shaking the terminal by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the terminal; or sending preset audio information to the terminal.
304: If the first user interface is not exited, in response to a second operation performed by the user on the terminal, if the first unread message and the second unread message are still unread messages, display the first unread message instead of the second unread message on the first user interface of the terminal, where the first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
In some feasible embodiments, both the first user interface and the second user interface may be drop-down message notification bars; or both are HiBoards; or one is a drop-down message notification bar, and the other is a HiBoard. This is not limited herein. In some feasible embodiments, when the first user interface is displayed, the second operation may be performed regardless of whether the first user interface is not exited. If the first user interface has exited, a corresponding message may be displayed in the second user interface. The second user interface may be the same as or different from the first user interface. This is not limited herein. If the first user interface is not exited, after a response to the second operation, a corresponding message may continue to be displayed on the first user interface.
FIG. 3-1 (FIG. 3-1
In some feasible embodiments, drop-down messages may not only be classified into important and unimportant messages, but also may be classified into a plurality of levels according to importance. Using three levels as an example, there may be level 1, level 2, and level 3. Level 1 is a highest importance level, level 2 is a second-highest importance level, and level 3 is a lowest important level. As shown in is a schematic diagram showing messages at three levels in a drop-down message notification bar), there are a message at level 1, a message at level 2, and a message at level 3; in this case, the drop-down message notification bar may display a message at level 1, messages at levels 1 and 2; or messages at levels 1, 2, 3. This is not limited herein.
FIG. 3-2 (FIG. 3-2
FIG. 3-3 (FIG. 3-3
An indication dialog box about a level may be set on an upper left corner of a message. As shown in is a schematic diagram of tapping a dialog box to display a message at level 2), the dialog box may be tapped to display or hide the message at the level. For example, when a dialog box "Level-2 message" is tapped, the message at level 2 is displayed. In some feasible embodiments, as shown in is a schematic diagram of tapping a dialog box to display a message at a corresponding level), if a dialog box "Level-3 message" is tapped, a message at level 3 may be displayed; or if dialog boxes "Level-2 message" and "Level-3 message" are tapped, a message at level 2 and a message at level 3 are displayed simultaneously. It should be noted that, when a message at a level is displayed, the message at the level is hidden after the dialog box is tapped. For example, when the message at level 2 is not displayed, the message at level 2 may be displayed by tapping the dialog box "Level-2 message". In some feasible embodiments, when "Level-3 message" is tapped, if the message at level 2 is hidden, the message at level 2 and the message at level 3 may be displayed simultaneously; or when the message level 2 is hidden through tapping, the message at level 2 and the message at level 3 may be hidden simultaneously. This is not limited herein. In some feasible embodiments, all messages at a level may be cleared simultaneously. For example, when the dialog box "Level-3 message" is dragged to flick rightward, all messages at level 3 are cleared. In some feasible embodiments, the messages at level 3 may also be cleared by pressing and holding the dialog box "Level-3 message", or pressing, holding, and sliding the dialog box "Level-3 message" back and forth, or tapping a clear button. This is not limited herein. In this case, no current messages at level 3 are displayed in the drop-down message notification bar. Certainly, after clearing, a newly received message at level 3 can further be displayed in the drop-down message notification bar. It should be noted that the "clear" herein is different from the foregoing "remove". The "clear" is deleting the message from the drop-down message notification bar, so that the message is no longer displayed in the drop-down notification bar. The "remove" may be expressed as hiding the message in the drop-down message notification bar, where when a related instruction is received (for example, a dialog box at this level is tapped), the message can further be displayed.
FIG. 3-4 A
FIG. 3-4B
FIG. 3-4 A
FIG. 3-4B
FIG. 3-5 (FIG. 3-5
In some feasible embodiments, as shown in and ( and are a schematic diagram of shaking a mobile phone to hide a message at level 2 or 3), the mobile phone may be shaken to hide an unimportant message. For example, the mobile phone is shaken once to hide a message at level 3, and is shaken once again to hide a message at level 2. In some feasible embodiments, if the mobile phone is shaken once again, the message at level 2 and/or the message at level 3 may be displayed. This is not limited herein. In some feasible embodiments, as shown in is a schematic diagram of tapping a fingerprint button to hide the message at level 2 or the message at level 3), messages at different levels may be hidden by tapping the fingerprint button. For example, a single-tap operation is performed on the fingerprint button to hide the message at level 3, and a double-tap operation is performed to hide the message at level 3 and the message at level 2. This is not limited herein.
FIG. 3-6 (FIG. 3-6
FIG. 3-7 (FIG. 3-7
In some feasible embodiments, in addition to setting all messages from an application to be at a same level, different priorities may further be set for different messages from a same application. For example, among messages from Taobao, an advertisement message is a message at level 3, a logistics message is a message at level 2, and a message from a friend is a message at level 1. This is not limited herein. As shown in is a schematic diagram showing that messages from different friends in WeChat are at different levels), in the WeChat application, different levels are determined through grouping. For example, messages from a colleague and a relative are messages at level 1, messages about a hobby, for example, a message from a bicycle friend, are messages at level 2, and some messages that cannot be grouped and that are less important are messages at level 3. As shown in is a schematic diagram of hiding a message at level 2 and/or 3), the message at level 2 and/or the message at level 3 may be hidden. The operation is similar to the foregoing operation, and details are not described again.
In this embodiment of this application, messages from different applications may be graded based on the different applications, grading may be performed based on different types of messages in an application, grading may be performed by using a visible field in a message , or grading may be performed by using an invisible field in a message. This is not limited herein.
FIG. 3-8 (FIG. 3-8
That messages from different types of applications and functions are graded based on the different types of applications and functions is used as an example, as shown in is a schematic diagram of grouping messages from different types of applications and messages from functions). All messages corresponding to "P2P" in a notification bar category may be set as messages at level 1 (or may be set as messages at another level, which is not limited herein), that is, at a highest importance level, and the messages are always retained in the drop-down message notification bar as long as the messages are not deleted; "regular" is at a general importance level, and a message corresponding to "regular" is set as a message at level 2; and "BTW" is "by the way", that is, a lowest importance level, and a message corresponding to "BTW" is set as a message at level 3. After being removed, the message at level 2 and the message at level 3 are hidden and not displayed. It should be noted that different types of messages may not only include messages from applications, but also may include messages from an intelligent terminal itself, for example, a battery level notification message and a message about insufficient storage space. This is not limited herein.
FIG. 3-9 (FIG. 3-9
In some feasible embodiments, some messages are messages from ongoing (ongoing) notifications , that is, messages from an application or a function that is executing a task, for example, a music player, uploading, or downloading. As shown in is a schematic diagram showing an ongoing notification), in some feasible embodiments, messages from ongoing notifications may be grouped into permanently resident notification messages and start-to-reside notification messages. The permanently resident notification messages are message that are always retained in the drop-down message notification bar regardless of whether the messages are used or not, for example, a real-time weather app message or a search function message. However, the start-to-reside notification message is a message that is retained in the drop-down message notification bar only after proactive startup by a user, for example, a call message, a downloading message, or a navigation message. In some feasible embodiments, setting and classification for the permanently resident notification message and the start-to-reside notification message may be performed as required. For example, a real-time weather message may be set as a start-to-reside notification message or a permanently resident notification message. This is not limited herein. In this embodiment of this application, a message whose notification type is "important" is a message at a highest importance level, that is, a message at level 1, and a message corresponding to "BTW" is a message at level 3, that is, an unimportant unread message. Even if the message corresponding to "BTW" is a permanently resident notification message, the message may be hidden after being processed.
FIG. 4-1 (FIG. 4-1
FIG. 4-2 (FIG. 4-2
Settings
Application Management
Settings
Application Management,
In this embodiment of this application, levels of different types of messages may be preset before delivery without accepting modification by a user, or may be modified by a user. The following provides descriptions by using an example in which modification by a user may be accepted. As shown in is a schematic diagram of entering by a user to modify a level setting), the user may enter by entering . Various applications may be seen in that is, one of the applications may be tapped. An email application is used as an example, as shown in is a schematic diagram of setting levels of messages from different applications by a user). After tapping the email application, the user may perform some settings for the email application, for example, for setting levels, that is, levels of messages from the email application. After "Set level(s)" is tapped, a drop-down bar may be displayed, a current level (level 1) is displayed, and optional levels (level 1, level 2, and level 3) are also displayed. The user may still select level 1, or may select level 2 or level 3; and if level 2 is selected, displaying or hiding is performed below the level-2 message in the drop-down message notification bar.
FIG. 4-3 (FIG. 4-3
FIG. 4-4 (FIG. 4-4
In some feasible embodiments, whether messages at different levels are displayed may further be set in the settings item, as shown in is a schematic diagram of setting, by a user, whether the messages at the different levels are displayed. The user taps a check option behind level 2, the first check option from the left may be a check option indicating whether a message at level 2 is displayed before the drop-down message notification bar is processed. If the check option is ticked, before being processed, the message at level 2 may be seen by using the drop-down message notification bar. However, if a check option behind level 3 is ticked, a message at level 3 is also hidden before being processed. The processed herein is the foregoing processing such as withdrawing the drop-down message notification bar and pulling the notification bar downward again, tapping the fingerprint button, or tapping "One tap to remove an unimportant unread message". The first check option from the right may be a check option indicating whether a message at this level is displayed after being processed. For example, among check options, a check option only behind level 1 is ticked, and none of check options behind level 2 and level 3 is ticked. In this case, after being processed, a message only at level 1 is displayed, a message at level 2 and a message at level 3 are not displayed, but are hidden or cleared, as shown in is a schematic diagram of whether messages at different levels are displayed before and after being processed).
FIG. 4-5 (FIG. 4-5
In some feasible embodiments, a method for determining levels of different messages is performed based on an application or a function. However, there may also be different types of messages in some applications or functions; in this case, levels of the messages may also be different, and field-related settings may be performed for different levels, that is, a message can be considered as a message at a level provided that the message meets some particular fields. As shown in is a schematic diagram of setting a field specific for a level-3), a field corresponding to level 3 is tapped to enter a "Level-3 field"; in this case, different fields may be entered, for example, "Best-selling items", "Entertainment news", and "Meitu Xiuxiu". When a received message includes one or more of these fields, it may be considered that the message is a message at level 3, and whether the message is displayed may be determined based on a processing manner of the message at level 3.
In some feasible embodiments, different levels of messages may be determined based on both an application and a field. For example, if a message A is from an application A, and the message A includes a field "BAC", it may be considered that the message A is a message at level 3. Specifically, fields corresponding to different levels may be set in a settings item of an application. Details are not described again.
FIG. 4-6 (FIG. 4-6
FIG. 4-7 (FIG. 4-7
In some feasible embodiments, a new level may further be created. As shown in is a schematic diagram of creating a new level), "Create a new level" is tapped to create a new level, for example, level 4; in this case, as shown in is a schematic diagram of entering information about level 4), a name of level 4 may be entered, or a field corresponding to level 4 may be set, or whether a message at level 4 is displayed separately before and after processing may be set. This is not limited herein.
FIG. 5-1 (FIG. 5-1
FIG. 5-2 (FIG. 5-2
FIG. 5-1
FIG. 5-2
FIG. 5-1
FIG. 5-2
In some feasible embodiments, as shown in is a schematic diagram of receiving a latest message), when the latest message is received, the latest message may be displayed at level 1, and a level of the latest message is displayed, for example, level 2. In some feasible embodiments, quantities of messages at different levels may be displayed in dialog boxes of the messages at the levels. As shown in is a schematic diagram showing quantities of messages at different levels), there are one message at level 1, four messages at level 2, and eight messages at level 3. It should be noted that, after being processed, a latest message in may be hidden in the Level-2 message in . Therefore, there are three messages at level 2 in , but there are four messages at level 2 in .
FIG. 5-3 (FIG. 5-3
In some feasible embodiments, even if a latest message is received, the latest message may not be displayed as long as the latest message is not a message at a level that needs to be displayed before being processed. As shown in is a schematic diagram showing that a latest message is not displayed), when a latest message is received, if the latest message is a message at level 2, a quantity of latest messages may be displayed on the left of a dialog box "Level-2 message", for example, "+2", that is, there are two latest messages, but the latest messages are not displayed; and if the latest message is a message at level 3, a quantity of latest messages, for example, "+1" is displayed on the left of "Level-3 message", that is, there is one latest message at level 3, but the latest messages are not displayed.
In some feasible embodiments, descriptions may be provided by using a user Mr./Ms. Liu as an example.
Mr./Ms. Liu, a salesman for intellectual property rights, has numerous customers thanks to a relatively good service capability. To keep frequent contact, Mr./Ms. Liu has to make a reply as soon as his mobile phone receives a message sent by a customer. However, there are always numerous messages or notifications sent by various different types of applications or functions on the mobile phone. Consequently, when a plurality of different types of messages are sent, whether the messages are important further needs to be determined one by one, which is quite time-consuming. Even because there are too many messages, a message from an important customer may be buried the large quantity of messages, and consequently a reply cannot be made immediately. This harms a relationship with the customer, affecting performance.
One day, Xiao Liu is taking a break in a coffee shop after an appointment with the customer. Many messages or notifications are still received this day, including a message about "Taobao sales", a credit card bill notification message, a message about weather forecast, a message about horoscopes, an email reminding message, a message about consumption information, a customer's message, and even a power notification message and a system update notification message. Among these messages, some are from customers, some are from family members, some may be from APPs for a stock market or the like followed by Mr./Ms. Liu, and some may be related to his own benefits; however, a lot of the messages are unimportant. Consequently, important messages and unimportant unread messages intermingle with each other, and need to be distinguished one by one, wasting time and energy. In addition, with any carelessness, Mr./Ms. Liu may miss some important messages, causing a large or small loss. After Mr./Ms. Liu uses a mobile phone with the function of this application, this problem is mitigated and even resolved. For details, refer to step S1 to step S8.
S1: Receive a new message A.
The following uses a mobile phone as an example. A processing process of another terminal is similar to that of the mobile phone, and details are not described herein. The mobile phone receives a new message, for example, the message A. The new message herein is a new message received by the terminal from an external device, and is unrelated to message content or a message source. When receiving the new message, the mobile phone may mark the new message as an unread message. When receiving the message A, the mobile phone may enter a screen-on state; or may enter a state in which a partial screen is in a screen-on state, to display only the message A; or may be in a screen-off state in which only a sound or vibration prompt is used. This is not limited herein.
S2: In response to a first operation of a user, determine one or more unread messages that need to be displayed; and display the determined one or more unread messages in a drop-down message notification bar or on a HiBoard.
The user may operate the mobile phone to browse the unread messages, for example, opening the drop-down message notification bar, or opening the HiBoard. Generally, unread messages displayed and browsed by the user are all current unread messages. However, some terminals may display only a subset of all the current unread messages because of user's settings, as required by a special application, or in a special scenario. This is not limited in this application. Specifically, on a home screen (Home Screen), the drop-down message notification bar may be pulled from top to bottom, or some virtual buttons may be tapped to enter the drop-down message notification bar, or sound control may be performed to enter the drop-down message notification bar. This is not limited herein. In addition, the HiBoard may be opened by performing sliding or another preset operation on the home screen, to view a new-message list.
The drop-down message notification bar is used as an example. Content displayed on the HiBoard is similar to that in the drop-down message notification bar, and details are not described again. An unread message, that is, information that is not processed by the user, is displayed in the drop-down message notification bar (all of a message that the user performs tapping to view, reply, or delete in an unread message list in the drop-down message notification bar or on the HiBoard, a message that is opened by an APP corresponding to the message, and a message that the user performs an operation to mark as a read message, are considered as having been processed by the user, and belong to read information). The displayed unread message includes the message A. It should be noted that, in some feasible embodiments, content of the message A may be directly displayed in a message list in the drop-down message notification bar. In some other scenarios, for example, because too many unread messages need to be displayed, and the message A is arranged at the back, with limitation by a size of a terminal screen, the message A cannot be displayed on the current user interface, but is hidden; in this case, the message A can be displayed only after the user performs a further operation. For example, a (virtual or physical) button on the screen, such as more, pull-down, or fold, is operated or a preset gesture is executed, to display the unread message A on the screen. If the message A is included in the more unread messages and can be displayed only by tapping the virtual button, it is considered that the message A is displayed only when content of the message A is displayed on the screen, that is, when the user can learn related information of the message A (for example, a sender, time, and all or some of the content) based on screen displaying. A case in which the message A is not displayed on the current screen because the message A is hidden or folded, and the user does not perform an operation on the message A to display the message A, is not considered as displayed.
S3. Mark the message A as displayed.
In this embodiment of this application, if the message A is displayed, the message A may be marked as displayed, to indicate that the message A has been displayed. Any message that is not displayed or that has not been displayed because of a display area size or a display policy of hiding, for example, a message for which only a quantity of unread messages displayed but no specific message sources (or senders/numbers), no time for sending/receiving messages, or no message content is specifically displayed, may be considered as an undisplayed message, and is not marked as displayed. Certainly, a terminal vendor or a user may define or modify a condition for "displayed". For example, a case in which some or all content is not displayed is considered as undisplayed; or a case in which a sender or time for receiving/sending a message is not displayed is considered as undisplayed; or another condition or a combination of conditions is used. This is not limited in this application.
S4: Exit the current drop-down message notification bar or the HiBoard .
After browsing the displayed unread message, the user may exit a current unread message browsing screen, for example, closing the drop-down message notification bar or exiting the HiBoard. A specific manner may be that a finger pulls the drop-down message notification bar upward, to close the drop-down message notification bar; or a home button is operated to return to a home screen, or the screen is directly turned off to close the drop-down message notification bar. This is not limited herein. The terminal may also automatically exit the current drop-down message notification bar or the HiBoard. For example, if receiving no operations within a preset time, the mobile phone may also automatically close the drop-down message notification bar, or automatically enter a screen-off state to close the drop-down message notification bar. This is not limited herein.
S5. Receive a message B.
In some feasible embodiments, a new message, for example, the message B, may be received when the drop-down message notification bar is in a closed state, for example, a screen-off state, or screen-on state but not on a screen showing the drop-down message notification bar. This step is optional, and may or may not be performed based on an actual situation.
S6: In response to a second operation of the user, determine one or more unread messages that need to be displayed, and display the determined one or more unread messages in the drop-down message notification bar or on the HiBoard.
Same as the first operation, the second operation may be tapping a main control button or a power button to turn on the screen, and then pulling the drop-down message notification bar downward from top to bottom on the screen, or tapping some virtual buttons to enter the drop-down message notification bar, or performing sound control to enter the drop-down message notification bar. This is not limited herein.
Like the first operation, the second operation may also perform sliding or another preset operation on the home screen to start the HiBoard. The second operation may be any operation that can be performed to display a list of unread messages. Specifically, the second operation may be the same as or different from the first operation.
The unread messages that need to be displayed are an unread message that has never been displayed and an unread message that has been displayed and that is not unimportant. In other words, the unread messages that need to be displayed do not include an unread message in unread messages that has been displayed and that is unimportant. Therefore, it needs to be determined whether condition 1 is met: unread and undisplayed, or whether all of unread, displayed, and not unimportant are met simultaneously. A message that meets condition 1 is displayed. Alternatively, it needs to be determined whether condition 2 is met: unread, and that unimportant and displayed are not met. A message in the unread messages that does not meet condition 2 is displayed.
Only some of the messages may be displayed, but other messages are not displayed, to reduce a quantity of messages displayed in the drop-down message notification bar. Specifically, a message that is not displayed herein shall meet all of the following conditions: condition 1: an unimportant unread message; condition 2: an unread message; and condition 3: displayed. Whether a message has been displayed may be determined according to whether the message has a mark indicating that displaying has been performed, to be specific, the mark indicating that displaying has been performed in step S3. Determining whether a message is unread is also mentioned in step S2. Whether a message is unimportant may be determined by using a source application or a source function of the message, or may be determined by using a field (for example, a priority field or an ongoing field) in the message. The source application or the source function of the message and the field in the message may be identified by reading internal code. The following code is used as an example for description.
The foregoing code is compiled by using Java language, and "com.taobao" may be obtained from the code. In this case, it is determined that if the message is tapped, a Taobao application is started; then whether a message from the application is an unimportant unread message from a source application when Taobao is used as a source application may be determined based on a preset importance level. If the message from the application is an unimportant unread message from a source application, it is determined that the message is an unimportant unread message. In addition, "50% off" in the code may be obtained, and if the field is a preset field in an unimportant unread message, the message may be determined as an unimportant unread message by obtaining the field.
A terminal vendor or a user may set and edit a source application or a source function of a message and a correspondence between a field in the message and an importance level, and may even set different correspondences in different application scenarios or in different time periods. The correspondence may be a one-to-one correspondence, a more-to-one correspondence, or a one-to-more correspondence. This is not limited herein. If the message A is determined as an unimportant unread message, because the message A carries a mark indicating that displaying has been performed, the message A is not displayed. If the message A is determined as an unread message that is important, normal, or at another non-unimportant level, although the message A carries a mark indicating that displaying has been performed, the message A is also displayed.
For example, if the message A is a message pushed by a shopping application Amazon (Amazon), and the shopping application has been set on the mobile phone as a source application of an unimportant unread message, any message sent by the application is considered to be unimportant. Therefore, the message A is considered as an unimportant unread message. For another example, determining may be performed based on a field in a message. For example, any message including "on sale (On sale)" or "promotion" is identified as an unimportant unread message. If the message A is a message sent by an instant messaging application, and the instant messaging application is preset as a source application of a non-unimportant unread message, any message from the instant messaging application is considered as a non-unimportant unread message. In this case, when the message A does not meet condition 1, but meets condition 2, the message A is displayed. In addition, the source function is a battery level notification, system update, Wi-Fi connection success, or the like. A processing process of the source function is similar to that of the foregoing source application, and details are not described again.
In some feasible embodiments, the terminal may determine, based on a correspondence shown in Table 1, whether the message is unimportant, that is, determining an importance level of the message based only on a correspondence between a source application or function and an importance level. The source application is, for example, Amazon, Taobao, or Facebook. If determining is performed based on only a message source, the following may be determined based on the following table: If a received message is from Amazon, the message is determined as an unimportant unread message; and if the received message is from WeChat, the message is determined as a non-unimportant unread message. A source function is, for example, a low battery level notification or system update. If a received message is from the low battery level notification, the message is a non-unimportant unread message; and if the message is from the system update, the message is an unimportant unread message. As shown in Table 4, if it is found that a title of the message includes the following fields, it may be determined that the message is an unimportant unread message such as on sale, cheap, or 50% off. This is not limited herein.
In some feasible embodiments, the terminal may determine, based on a correspondence shown in Table 2, whether the message is unimportant, that is, determining an importance level of the message based on a correspondence among a source application, a message type, and an importance level. For messages that are from a same application, for example, Taobao, but have different message types, different importance levels may also be distinguished. For example, for an advertisement message, a logistics message, and a payment message that are from Taobao, the following may be determined based on Table 2: If the message is an advertisement message, the message may be determined as an unimportant unread message; and if the message is a logistics message or a payment message, the message may be determined as a non-unimportant unread message. For some applications, for example, an application of a product of a brand liked by a user, for example, a Nike application, an advertisement from Nike may also be a non-unimportant unread message. For example, as shown in Table 2, all of an advertisement message, a logistics message, and a payment message that are sent by Nike are non-unimportant unread messages. In some feasible embodiments, whether a message corresponding to a message type is important may also be determined by using only the message type. As shown in Table 3, regardless of a source application or a source function of a message, determining can be performed based on a message type of the message. For example, advertisement messages are unimportant unread messages; all of the advertisement messages are unimportant unread messages regardless of whether the advertisement messages are from Taobao or Nike. For example, a logistics message and a payment message are non-unimportant unread messages; the logistics message and the payment message are non-unimportant unread messages regardless of whether the logistics message and the payment message are from Taobao or Nike.
In some feasible embodiments, the terminal may determine, based on a correspondence shown in Table 4, whether a message is unimportant, that is, determining an importance level of the message based on whether the message includes a preset field or whether a particular field in the message includes particular content. If it is found that a title of the message includes the following fields, it may be determined that the message is an unimportant unread message, for example, on sale, cheap, or 50% off. This is not limited herein.
Table 1
Source application or source function
Importance level
Amazon
Unimportant
Taobao
Unimportant
Facebook
Unimportant
Twitter
Unimportant
WeChat
Non-unimportant
Google
Unimportant
Sina
Unimportant
Low battery level notification
Non-unimportant
System update
Unimportant
Table 2
Message source
Message type
Importance level
Taobao
Shopping advertising
Unimportant
Taobao
Shopping logistics
Non-unimportant
Taobao
Payment info
Non-unimportant
Nike
Shopping advertising
Non-unimportant
Nike
Shopping logistics
Non-unimportant
Nike
Payment info
Non-unimportant
Table 3
Message type
Importance level
Shopping advertising
Unimportant
Shopping logistics
Non-unimportant
Payment info
Non-unimportant
Table 4
Field in a message
Importance level
On sale
Unimportant
Cheap
Unimportant
50% off
Unimportant
The foregoing methods for determining whether a message is unimportant may also be combined for use. For example, if a source application, a source function, and a specific field that are for a message have corresponding importance levels, the sum of importance level determining results is selected. That is, if one of the results is non-unimportant, final result is non-unimportant. For example, a message is unimportant based on a source application of the message, and is unimportant based on a source function of the message, but the message is determined as non-unimportant based on a field ongoing included in the message.
A criteria for determining the message B is the same as that for the message A. For a condition for not displaying, regardless of whether the message B meets condition 1, the message B meets condition 2 and does not meet condition 3, and therefore the message B needs to be displayed.
S7. Display the message A and the message B.
Based on the foregoing determining, if it is determined that the message A is a non-unimportant unread message, the message A and the message B are displayed.
S8. Display the message B instead of the message A.
Based on the foregoing determining, if it is determined that the message A is an unimportant unread message, the message A is not displayed, and only the message B is displayed.
By performing step S1 to step S8, if a mobile phone of Mr./Ms. Liu receives a large number of unimportant unread messages, Mr./Ms. Liu can perform a very simple operation step, to be specific, closing and re-opening the drop-down message notification bar, to avoid displaying of a large number of unimportant unread messages with no need to perform distinguishment one by one. This saves time and energy, and also avoids missing of some important messages, thereby avoiding large or small losses as many as possible.
FIG. 2-4
An embodiment of this application further provides a message processing apparatus 400. shows a message processing apparatus 400. The message processing apparatus 400 includes a receiving module 401 and a display module 402.
The receiving module 401 is configured to receive a first operation performed by a user on the apparatus; and the display module 402 may display a first unread message and a second unread message on a first user interface of the apparatus based on the first operation. The first user interface is a drop-down message notification bar or a HiBoard. The receiving module 401 is further configured to receive a second operation performed by the user on the apparatus; and after the first user interface is exited, if the first unread message and the second unread message are still unread messages, the display module 402 may further stop displaying the second unread message and maintain displaying of the first unread message on a second user interface. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message. If the first user interface is not exited, when the first unread message and the second unread message are still unread messages, the display module 402 further stops displaying the second unread message, and maintains displaying of the first unread message, on the first user interface. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
The second operation may be shaking the apparatus by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the apparatus; or sending preset audio information to the apparatus.
FIG. 2-5
In this embodiment of this application, shows an apparatus. The apparatus 400 further includes a determining module 403, configured to: determine that the first unread message is the unimportant unread message, and determine that the second unread message is the unimportant unread message. Specifically, that the first unread message is the non-unimportant unread message may be determined based on at least one of: a source function of the first unread message, a source application of the first unread message, or whether the first unread message includes a preset field.
In some feasible embodiments, the determining module 403 may further determine, based on at least one of: a source function of the second unread message, a source application of second unread message, or whether the second unread message includes a preset field, that the second unread message is the unimportant unread message.
In some feasible embodiments, the determining module 403 may further determine that the second operation occurs after preset duration that elapses after the first user interface is exited.
In some feasible embodiments, the apparatus 400 may be a terminal, or may be a chip. This is not limited herein.
An embodiment of this application further provides an apparatus. The apparatus includes a touchscreen, a memory, one or more processors, a plurality of application programs, and one or more programs. The one or more programs are stored in the memory. The apparatus is configured to perform the following steps:
including a first operation performed by a user on the apparatus, where the first operation performed by the user on the apparatus may be turning on a screen, performing tap to open a first user interface, or performing another operation so that the apparatus displays a first user interface, and this is not limited herein; and the first user interface is a drop-down message notification bar or a HiBoard; and in response to the first operation, displaying, by the apparatus, a first unread message and a second unread message on the first user interface, where the apparatus may receive a plurality of messages, and the first unread message and the second unread message are used as an example for description.
In some feasible embodiments, the apparatus 400 may be a terminal, or may be a chip. This is not limited herein.
After the first user interface is exited, the user performs a second operation on the apparatus. Similarly, the second operation may also be turning on the screen, performing tap to open a second user interface, or performing another operation so that the apparatus displays a second user interface, and this is not limited herein. The second user interface is a drop-down message notification bar or a HiBoard. If the first unread message and the second unread message are not read or deleted by the user through tapping and are still unread messages, the first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message, the apparatus displays the first unread message instead of the second unread message on the second user interface.
Alternatively, when the first user interface is exited, in response to a second operation performed by the user on the apparatus, if the first unread message and the second unread message are still unread messages, displaying the second unread message is stopped, and displaying of the first unread message is maintained, on the first user interface of the apparatus. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
Specifically, the second operation is at least one of: shaking the apparatus by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the apparatus; or sending preset audio information to the apparatus.
In the technical solution provided in this embodiment of this application, after the first operation and the second operation, the apparatus may not display a displayed unimportant unread message on the second user interface. Therefore, even if when there are a large quantity of unread messages, in order neither to miss non-unimportant unread messages nor to be interfered by unimportant unread messages, the user does not need to identify or delete the unimportant unread messages one by one. This saves time and energy, and ensures great convenience and good user experience.
including a first operation performed by a user on the apparatus, where the first operation performed by the user on the apparatus may be turning on a screen, performing tap to open a first user interface, or performing another operation so that the apparatus displays a first user interface, and this is not limited herein; and the first user interface is a drop-down message notification bar or a HiBoard; and in response to the first operation, displaying, by the apparatus, a first unread message and a second unread message on the first user interface, where the apparatus may receive a plurality of messages, and the first unread message and the second unread message are used as an example for description; and
after the first user interface is exited, performing, by the user, a second operation on the apparatus, where similarly, the second operation may also be turning on the screen, performing tap to open a second user interface, or performing another operation so that the apparatus displays a second user interface, and this is not limited herein; and the second user interface is a drop-down message notification bar or a HiBoard; and if the first unread message and the second unread message are not read or deleted by the user through tapping and are still unread messages, the first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message, displaying, by the apparatus, the first unread message instead of the second unread message on the second user interface.
An embodiment of this application further provides an apparatus. The apparatus includes a touchscreen, a memory, one or more processors, a plurality of application programs, and one or more programs. The one or more programs are stored in the memory. The apparatus is configured to perform the following steps:
Alternatively, when the first user interface is not exited, in response to a second operation performed by the user on the apparatus, if the first unread message and the second unread message are still unread messages, displaying of the second unread message is stopped, and displaying of the first unread message is maintained, on the first user interface of the apparatus. The first unread message is a non-unimportant unread message, and the second unread message is an unimportant unread message.
Specifically, the second operation is at least one of: shaking the apparatus by a preset amplitude, for a preset quantity of times, or for preset duration; tapping a preset virtual button on the apparatus; or sending preset audio information to the apparatus.
In the technical solution provided in this embodiment of this application, after the first operation and the second operation, the apparatus may not display a displayed unimportant unread message on the second user interface. Therefore, even if when there are a large quantity of unread messages, in order neither to miss non-unimportant unread messages nor to be interfered by unimportant unread messages, the user does not need to identify or delete the unimportant unread messages one by one. This saves time and energy, and ensures great convenience and good user experience.
The at least one processor executes the several instructions to enable the apparatus to further perform the following step:
determining, based on at least one of: a source function of the first unread message, a source application of the first unread message, or whether the first unread message includes a preset field, that the first unread message is the non-unimportant unread message; and determining, based on at least one of: a source function of the second unread message, a source application of the second unread message, or whether the second unread message includes a preset field, that the second unread message is the unimportant unread message. In this case, when there are a large quantity of unread messages, the apparatus can automatically identify unimportant unread messages, and the user does not need to determine the messages one by one. This saves time and energy, and ensures great convenience and good user experience.
The at least one processor executes the several instructions to enable the apparatus to further perform the following step:
Before the response to, after the first user interface is exited, a second operation performed by the user on the apparatus, it may be further determined that the second operation occurs after preset duration that elapses after the first user interface is exited. In this case, the user can consider and determine, within the preset duration, whether an unimportant unread message needs to be read.
All or some of the foregoing embodiments may be implemented by using software, hardware, firmware, or any combination thereof. When implemented by using software, all or some of the foregoing embodiments may be implemented in a form of a computer program product.
The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or some of the procedures or functions described in the embodiments of this application are generated. The computer may be a general-purpose computer, a special-purpose computer, a computer network, or another programmable apparatus. The computer instructions may be stored in a computer readable storage medium, or may be transmitted from one computer readable storage medium to another computer readable storage medium. For example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center in a wired (for example, a coaxial cable, an optical fiber, or a digital subscriber line (DSL)) or wireless (for example, infrared, radio, or microwave) manner. The computer readable storage medium may be any usable medium that can be stored by the computer, or a data storage device, such as a server or a data center, integrating one or more usable media. The usable medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, a DVD), a semi-conductor medium (for example, a solid-state drive (Solid State Disk, SSD)), or the like. | |
What is WBS in Project Management and Planning?
Updated: Aug 18, 2020
Work Breakdown Structure (WBS) is a key project deliverable that organizes a team's work into manageable sections.
The Project Management Body of Knowledge (PMBOK) defines the work breakdown structure as a "deliverable oriented hierarchical decomposition of the work to be executed by the project team."
The work breakdown structure visually defines the scope into manageable chunks that a project team can understand, as each level of the work breakdown structure provides further definition and detail.
An easy way to think about a work breakdown structure is as an outline or map of the specific project. A work breakdown structure starts with the project as the top-level deliverable and is further decomposed into sub-deliverables.
The project team creates the project work breakdown structure by identifying the major deliverables and subdividing those deliverables into smaller systems and sub-deliverables.
These sub-deliverables are further broken down until a single person may be assigned.
At this level, specific work packages required to produce the sub-deliverable are identified and grouped together.
The work package represents the list of tasks or "to-dos" to produce a specific unit of work.
If you've ever seen detailed project schedules, then you'll recognize the tasks under the work package as the things people need to complete by a specific time and within a specific level of effort.
From a cost point of view, these work packages are normally grouped and assigned to a specific department to produce the work.
These departments, or cost accounts, are defined in an organizational breakdown structure and are allocated a budget to produce the specific deliverables.
By integrating the cost accounts from the organizational breakdown structure and the project's work breakdown structure, the entire organization may track financial progress in addition to project performance.
Why Should We Use a Work Breakdown Structure?
The work breakdown structure has a number of benefits in addition to defining and organizing the project work. A project budget may be allocated to the top levels of the work breakdown structure, and department budgets then are quickly calculated based on each project's work breakdown structure.
By allocating time and cost estimates to specific sections of the work breakdown structure, a project schedule and budget may be quickly developed.
As the project unfolds, specific sections of the work breakdown structure may then be tracked to identify project cost performance and identify issues and problem areas in the project organization.
Project work breakdown structures can also be used to identify potential risks in a given project. If a work breakdown structure has a branch that is not very well defined then it represents a scope definition risk.
These risks should be tracked in a project log and reviewed as the project executes. By integrating the work breakdown structure with an organizational breakdown structure, the project manager may also identify communication points and formulate a communication plan across the project organization.
When a project is falling behind, referring to the work breakdown structure may quickly identify the major deliverables impacted by a failing work package or late sub- deliverable.
The work breakdown structure might also be color-coded to represent a sub-deliverable's status.
Assigning colors of red for late, yellow for at-risk, green for on-target, and blue for completed deliverables is an effective way to produce a heat-map of project progress and draw management's attention to key areas of the work breakdown structure.
Work Breakdown Structure (WBS) Guidelines
The following guidelines should be considered when creating a work breakdown structure:
The top-level represents the final deliverable or project
Sub-deliverables contain work packages that are assigned to an organization’s department or unit
All elements of the work breakdown structure don’t need to be defined to the same level
The work package defines the work, duration, and costs for the tasks required to produce the sub-deliverable
Work packages should not exceed 10 days of duration
Work packages should be independent of other work packages in the work breakdown structure
Work packages are unique and should not be duplicated across the work breakdown structure
Tools to Create a Work Breakdown Structure
Creating a Work Breakdown Structure is a team effort and is the culmination of multiple inputs and perspectives for the given project. One effective technique is to organize a brainstorming session with the various departments planned to be involved with the project.
Project teams can use low-technology tools like whiteboard, note cards, or sticky note pads to identify major deliverables, sub-deliverables, and specific work packages. These cards can be taped to a wall and reorganized as the team discusses the major deliverables and work packages involved in the project.
This low-technology approach is easy to do; however, it does not work well with distributed teams or translate easily into an electronic format.
There are several tools available that support mind mapping, brainstorming, and work breakdown structures.
For maximum benefit, a team should look to utilize a software that is made to easily export to a project management software that detail may be added later!
The usual players here are Primavera P6 and Microsoft Project.
What is WBS in Project Management and Planning?
We hope you now have an understanding of WBS and why it matters in project planning and management.
Set your projects out on the right foot, break things down into manageable chunks that you might have things done on time and within budget!
Make sure to check out the related articles below to learn more about project planning and management as the project unfolds!
Thanks a lot and take care, | https://www.projectcracker.ai/post/what-is-wbs-in-project-management-and-planning |
Peas originate from the Mediterranean basin and the Middle East, where they can still be found growing wild today. Some of the oldest dated peas have been discovered in the Nile delta region of Egypt.
The pea is most commonly the small spherical seed or the seed-pod of the pod fruit Pisum sativum. Each pod contains several peas, which can be green or yellow. Botanically, pea pods are fruit, since they contain seeds and develop from the ovary of a (pea) flower.
Subsequently, question is, what are peas classified as? Therefore, they are considered part of the Protein Foods Group. Many people consider beans and peas as vegetarian alternatives for meat. However, they are also considered part of the Vegetable Group because they are excellent sources of dietary fiber and nutrients such as folate and potassium.
Also asked, when did people start eating peas?
about 11,000 years ago
Who invented peas?
Gregor Johann Mendel
Is Pea a fruit or vegetable?
They are fleshy and don’t look like stems or leaves, but they are not fruit. The pea (or bean) is the seed. They all grow in the same kind of pod that is the fruit, and are very high in protein. The plant, the pod and the vegetable are all called legumes, Litt said.
How many peas does a pea plant produce?
In the past I get about 3 peas per pod and about 5 pods per plant that = about 15 peas per plant.
Can you eat peas raw?
The peas are sweet and may be eaten raw or cooked; these are the common peas that are sold shelled and frozen. Peas get starchy and mealy as they get larger or if they are not cooked quickly after they are picked.
What is a pea in English?
PEA stands for Point, Evidence and Analysis. This is a particularly good method to employ when writing your essays. First of all, state the point that you are going to make in your analysis. Next, you need to provide some evidence for your point. Take a quote from the text/extract which relates to this idea.
How tall do peas grow?
3 feet
Where do peas grow best?
In between pea plantings, plant other vegetables to take advantage of the nitrogen-rich soil that peas leave behind (they are a nitrogen-fixing legume). Peas are best grown in temperatures below 70°F (21°C). Once temperatures get above 80°F (27°C), peas tend to stop producing pods or the pods become tough.
Are peas good for you?
They have many essential vitamins and minerals that the body requires. Green peas are not high in calories, but they have protein. In addition, peas are a good source of dietary fiber, Vitamin A, iron, folate, thiamin, Vitamin C and manganese.
Are Frozen peas raw?
Frozen vegetables are not considered raw foods suitable for a 100 percent raw diet because they undergo a process called blanching before they’re frozen. Blanching involves heat-treating the vegetables with boiling water or steam for a short time and then rapidly cooling them with ice water.
How long do pea plants produce?
Main season peas usually take between 60 and 70 days from planting to eating. Good peas for later in the season are peas that can take some high temperatures and keep performing. These are the best varieties for planting in late spring. They typically take between 70 and 80 days to mature.
Why are peas Green?
It is rare for seeds to be green inside. This is because light is usually necessary for part of the synthesis of chlorophyll, which is what gives peas their green colour. Not all peas are green. The fact that they ARE green suggests to me that sufficient light DOES get through.
What is the difference between peas and beans?
Beans can refer generally to the seeds of plants in the family Fabaceae, the legumes, or to more specific varieties. Peas usually refer to the seeds from a the particular species Pisum sativum. If you’re using the term ‘bean’ broadly, you can call peas a type of bean.
Is Pea a grain?
The grains that we eat are the seeds of the Poaceae family of grasses, commonly called cereal grains or cereal grasses. The part that we eat is the bean or pea (the seed) and sometimes the pod as well. This family includes beans, clover, alfalfa, lentils, peanuts, chickpeas, lima beans, soybeans, and others.
Do peas come from green beans?
They are distinguished from the many other varieties of beans in that green beans are harvested and consumed with their enclosing pods, before the bean seeds inside have fully matured. An analogous practice is the harvest and consumption of unripened pea pods, as is done with snow peas or sugar snap peas.
Where are peas grown in the US?
The major field pea-producing areas include Canada, Europe, Australia and the U.S. Historically, field pea primarily was grown in the Palouse region of Washington and Idaho. In the 1990s, North Dakota, South Dakota and Montana began producing dry pea. | https://jasminecrowemusic.com/where-do-peas-originate-from/ |
Plastic Pollution and Penguins?
Citation: Cunningham, E. M., Ehlers, S. M., Dick, J. T., Sigwart, J. D., Linse, K., Dick, J. J., & Kiriakoulakis, K. (2020). High abundances of microplastic pollution in deep-sea sediments: evidence from Antarctica and the Southern Ocean. Environmental Science & Technology.
Antarctica is known to be one of the most remote places on the planet. Despite its remoteness though, people around the world impact it on a daily basis. One of these impacts is in the form of pollution. Since the 1980’s plastic pollution has been documented in Antarctica and has only increased over more recent years. For example, between 2000 and 2001 over 6000 pieces of plastic washed ashore on the sub-Antarctic islands. In one region of the Southern Ocean, over 350 kg of plastic debris was recorded from 1989 to 2019. So why does it matter that plastic makes its way to Antarctica? While remote to people, Antarctica is home to a lot of wildlife which can be harmed by plastic pollution. For example, Antarctic fur seals have been found entangled in plastic debris and plastic has been found in the stomachs of breeding petrels, which are a species of sea bird.
In addition to these dangers, plastic debris breaks down over time into microplastics, which is a threat to many marine species.. In fact, microplastics have been ingested by species ranging from invertebrates to penguins. In addition to the dangers associated with being ingested, microplastics are also known for containing persistent organic pollutants, which are toxic chemicals. Given the dangers of microplastics to marine life, a lot of research has been done to understand where they come from and their impacts. However, only a very small amount of this research has focused on Antarctica, so our knowledge of the extent of the problem there is lacking. Because of this and the fact that the Arctic, which is a similar remote environment, is known to have a lot of microplastic pollution, a team of researchers from northern Ireland wanted to conduct a study to determine the abundance of microplastics in the deep sea in Antarctica.
Microplastics, many of them denser than water, sink and settle in the sediment at the bottom of the ocean. To find out how much microplastic is present in Antarctica, the researchers took samples of the sediment from 30 sites within three different regions of the Southern Ocean: the Antarctica Peninsula, South Georgia, and the South Sandwich Islands. The purpose of collecting from individual sites from different regions was to see if the abundance of microplastic varied not only from site to site, but also between regions. They also collected samples from different depths and examined the sediments’ overall composition to learn more about the processes that lead to sediment and microplastic deposition. Through chemical analysis and visual examination, the researchers were able to determine the concentration and composition of microplastics in each sample.
Overall, the researchers found that microplastics were present in 93% of their samples, or 28 of the 30. They also identified a total of 147 microplastic particles. Most of the plastics were fragments that had broken off of larger pieces of plastic, but some were also from fibers and films. The high levels of microplastics that the researchers found in Antarctica resembles the results from research that has been conducted in the Arctic, as well as in Canada and other locations globally. Given larger human populations elsewhere, it would be expected that sediment in Antarctica would have fewer microplastics, which was not the case. In sum, these results indicate that high levels of microplastic can accumulate in Antarctic sediment despite its remoteness.
So now that we know there are high levels of microplastics in Antarctica and that they are dangerous to the species that inadvertently ingest them, the next question to investigate is where are these plastics coming from? This will help use reduce plastic pollution. All three regions that were sampled had very similar levels of microplastics, which was unexpected since the Antarctic Peninsula has more human presence than the other regions studied. Microplastics can be transported to other regions biologically when they are consumed by an animal, but that would not explain the high levels seen in Antarctica. Given this, the researchers hypothesized that the plastics are from a combination of visiting ships and people, as well as long range transport from other parts of the world. This means that plastic pollution from thousands of miles away can ultimately end up in Antarctica because ocean and atmospheric currents carry them there. This shows that we can all play a role in reducing plastic pollution in remote areas. By reducing the amount of plastic we allow to enter the environment, we can reduce the amount that is transported around the globe and therefore reduce the impacts on wildlife. | https://envirobites.org/2020/11/10/plastic-pollution-and-penguins/ |
TECHNICAL FIELD
BACKGROUND ART
Related Art Documents
Patent Documents
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
MODES FOR CARRYING OUT THE INVENTION
[Other Embodiments]
[Summary of Embodiment]
INDUSTRIAL APPLICABILITY
[Description of the Reference Numerals]
The present invention relates to stator manufacturing methods in which a coil is fitted in a cylindrical core, and coils that can be used in such stator manufacturing methods.
Japanese Patent Application Publication No. 2012-125043
JP 2012-125043 A
As described in, e.g., (), a stator is known in which two coil units whose coil side portions are accommodated in the same slot are placed so that their coil side portions are alternately arranged in the radial direction in this slot. When a coil having such a structure is inserted into slots from the inside in the radial direction, the two coil units need to be moved relatively to each other in the axial direction or the circumferential direction. However, when the coil is placed radially inside the core, the coil units may interfere with each other and the coil may not be able to be placed radially inside the core.
Japanese Patent Application Publication No. 2012-125043
JP 2012-125043 A
Patent Document 1: ()
A stator manufacturing method is desired in which a unit assembly in which coil side portions of two coil units are alternately arranged in the radial direction at the same circumferential position can be placed radially inside a cylindrical core and attached to the cylindrical core. A coil suitable for such a manufacturing method is also desired.
<mrow><mn mathvariant="normal">2</mn><mi mathvariant="normal">π</mi><mo>⋅</mo><mfenced separators=""><mi mathvariant="normal">Ri</mi><mo>−</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi></mfenced><mo>></mo><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mrow>
A stator manufacturing method according to the present disclosure is a stator manufacturing method in which a coil including a plurality of coil units formed by winding a rectangular wire is fitted in a cylindrical core having a plurality of slots extending in a radial direction and opening in a core inner peripheral surface so that the slots are distributed in a circumferential direction, the rectangular wire being a linear conductor having a rectangular section, wherein each of the coil units includes, as coil side portions that are placed in the slots, first coil side portions that are placed in one of a pair of the slots, and second coil side portions that are placed in the other of the pair of the slots, the stator manufacturing method including: a unit assembly formation step of forming a unit assembly in which the plurality of coil units are arranged in an annular shape by fitting the plurality of coil units together so that the first coil side portions of a first one of the coil units and the second coil side portions of a second one of the coil units are placed in line in the radial direction and arranged alternately; and an insertion step of, with the unit assembly being located radially inside the core, inserting each of the coil side portions of the plurality of coil units forming the unit assembly into an associated one of the slots, wherein a combination of a core and a coil which satisfies the following relational expression (1) is used as the core and the coil [in the relational expression (1), A represents a circumferential width of the rectangular wire, B represents a radial width of the rectangular wire, L represents the number of coil side portions that are placed next to each other in the radial direction in each of the slots, N represents the number of slots, and Ri represents a radius of the core inner peripheral surface].
According to this configuration, a unit assembly in which the first coil side portions of the first coil unit and the second coil side portions of the second coil unit are arranged alternately and in line is formed by the unit assembly formation step. At this time, the use of the combination of the core and the coil which satisfies the relational expression (1) ensures that the unit assembly formed by the unit assembly formation step is reliably placed radially inside the core with at least each coil unit being located on the inner side in the radial direction. The subsequent insertion step can thus be performed appropriately. That is, a stator manufacturing method can be implemented in which the unit assembly having the coil side portions of two coil units being arranged alternately in the radial direction at the same circumferential direction can be placed radially inside the cylindrical core and fitted therein.
<mrow><mn mathvariant="normal">2</mn><mi mathvariant="normal">π</mi><mo>⋅</mo><mfenced separators=""><mi mathvariant="normal">Ri</mi><mo>−</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi></mfenced><mo>></mo><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mrow>
A coil according to the present disclosure is a coil that is fitted in a cylindrical core having a plurality of slots extending in a radial direction and opening in a core inner peripheral surface so that the slots are distributed in a circumferential direction, including: a plurality of coil units each formed by a rectangular wire and each wound between a pair of the slots, the rectangular wire being a linear conductor having a rectangular section, wherein each of the coil units includes, as coil side portions that are placed in the slots, first coil side portions that are placed in one of a pair of the slots, and second coil side portions that are placed in the other of the pair of the slots, a plurality of the coil side portions are placed in line in the radial direction in each of the slots, and the first coil side portions of a first one of the coil units and the second coil side portions of a second one of the coil units are alternately arranged, and the coil satisfies the following relational expression (1) [in the relational expression (1), A represents a circumferential width of the rectangular wire, B represents a radial width of the rectangular wire, L represents the number of coil side portions that are placed next to each other in the radial direction in each of the slots, N represents the number of slots, and Ri represents a radius of the core inner peripheral surface].
According to this configuration, for example, when a unit assembly is formed by fitting the coil units together with the first coil side portions of the first coil unit and the second coil side portions of the second coil unit being arranged alternately and in line, this unit assembly has such a size that it can be placed radially inside the core with at least each coil unit being located on the inner side in the radial direction. Accordingly, the unit assembly is subsequently placed radially inside the core, and in this state, each coil unit is moved radially outward so that the coil side portions of each coil unit can be inserted into associated slots. That is, a coil can be implemented which is an assembly in which coil side portions of two coil units are arranged alternately in the radial direction at the same circumferential position, and which can be fitted into a cylindrical core from the inside in the radial direction.
Further features and advantages of the technique according to the present disclosure will become apparent from the following description.
FIG. 1] FIG. 1
[ is a perspective view of a stator according to an embodiment.
FIG. 2] FIG. 2
[ is a front view of a coil unit.
FIG. 3] FIG. 3
[ is a front view showing the positional relationship between adjoining two coil units.
FIG. 4] FIG. 4
[ is a plan view showing the positional relationship between adjoining two coil units.
FIG. 5] FIG. 5
[ is a partial sectional view of the stator.
FIG. 6] FIG. 6
[ is a diagram illustrating procedures of a unit assembly formation step.
FIG. 7] FIG. 7
[ is an imaginary view illustrating the relationship in size between a unit assembly and a core.
FIG. 8] FIG. 8
[ is a perspective view of a guide jig.
FIG. 9] FIG. 9
[ is a diagram illustrating procedures for attaching guide jigs to the unit assembly.
FIG. 10] FIG. 10
[ is a perspective view showing the positional relationship between a coil unit and a guide jig before insertion.
FIG. 11] FIG. 11
[ is a perspective view of a stator manufacturing device.
FIG. 12] FIG. 12
[ is a front view of the stator manufacturing device.
FIG. 13] FIG. 13
FIG. 12
[ is a sectional view taken along line XIII-XIII in .
FIG. 14] FIG. 14
FIG. 13
[ is a diagram corresponding to , showing the state during insertion of coil units.
FIG. 15] FIG. 15
FIG. 14
[ is a sectional view taken along line XV-XV in .
FIG. 16] FIG. 16
[ is a perspective view showing the positional relationship between a coil unit and a guide jig after insertion.
FIG. 17] FIG. 17
[ is a diagram showing how a coil unit is deformed during insertion.
FIG. 18] FIG. 18
[ is a partial sectional view of the stator.
An embodiment of the present invention will be described below. The embodiment described below is not intended to limit the scope of the present invention.
FIG. 1
An embodiment of a stator manufacturing method and a coil will be described with reference to the drawings. In the present embodiment, a stator 1 of a rotating electrical machine shown in will be described as an example. The present embodiment will be described with respect to a method for manufacturing the stator 1 and a coil 3 suitable for this manufacturing method. In the present embodiment, a core 2 in which the coil 3 is fitted is a core of the stator 1 (stator core). The term "rotating electrical machine" is a concept including all of a motor (electric motor), a generator (electric generator), and a motor-generator that functions as both a motor and a generator as necessary.
FIG. 1
As used herein, the "axial direction L," the "circumferential direction C," and the "radial direction R" are defined based on the axis of the cylindrical core 2 (unless otherwise specified). The axis of the core 2 is the axis of the inner peripheral surface of the core 2 (core inner peripheral surface 25). The positions, directions, etc. in the following description of each part of the coil 3 etc. refer to the positions, directions, etc. in the state where the coil 3 is fitted in the core 2 (see ) unless otherwise specified.
In the following description, the terms regarding the dimensions, the direction in which an element is placed, the position where an element is placed, etc. (e.g., parallel etc.) are concepts including variations due to tolerance (acceptable range of manufacturing variation).
In the figures that are referred to in the following description, the scales, the proportions of the dimensions in the lateral and vertical directions, etc. are sometimes different from those of actual products in order to simplify the figures, facilitate understanding, etc.
FIG. 1
As shown in , the stator 1 includes the core 2 and the coil 3 that is fitted in the core 2. For example, the stator 1 is a stator that is used in a revolving-field rotating electrical machine, and functions as an armature. A rotor (not shown) serving as a field including permanent magnets, electromagnets, etc. is placed in the space radially inside the core 2 with an air gap therebetween. The rotor is rotated by a rotating magnetic field that is generated by the stator 1. In the present embodiment, the stator 1 is a stator of a rotating electrical machine that is driven by a three-phase alternating current (an example of a multi-phase alternating current). The coil 3 including three-phase coils, namely a U-phase coil, a V-phase coil, and a W-phase coil, is fitted in the core 2. The core 2 is made of a magnetic material, and for example, is formed by stacking a plurality of magnetic material sheets (e.g., magnetic steel sheets such as silicon steel sheets) in the axial direction L. The core 2 may be mainly made of a green compact produced by pressing powder of a magnetic material.
FIG. 5
The core 2 has a hollow cylindrical shape. The core 2 has an annular yoke portion 21 and a plurality of teeth 22 extending radially inward from the yoke portion 21. The plurality of teeth 22 are located at regular intervals in the circumferential direction C. A slot 23 that opens radially inward is formed between two teeth 22 which adjoin each other in the circumferential direction C. That is, the cylindrical core 2 has a plurality of slots 23 extending in the radial direction R and opening in the core inner peripheral surface 25 such that the slots 23 are distributed in the circumferential direction C. The core inner peripheral surface 25 is a cylindrical surface including the radially inner end faces of the plurality of teeth 22. The plurality of slots 23 are located at regular intervals in the circumferential direction C. Each slot 23 of the present embodiment is a parallel slot. Namely, of inner walls (wall portions facing the space inside the slot) 23a of each slot 23, a pair of sidewalls 23b facing each other in the circumferential direction C are parallel to each other (see ).
FIG. 5
In the present embodiment, the slots 23 for U-phase, the slots 23 for V-phase, and the slots 23 for W-phase are formed in a repeated pattern of U-phase, V-phase, and W-phase in the circumferential direction C. In the present embodiment, the number of slots per pole per phase is "2," and the slots 23 for each phase are formed in the core 2 in a repeated pattern of two slots for U-phase, two slots for V-phase, and two slots for W-phase in the circumferential direction C. In the present embodiment, the number of magnetic poles per phase is "8" (the number of magnetic pole pairs is "4"), and a total of 48 (= 2 × 8 × 3) slots 23 are formed in the core 2. As shown in , an insulating sheet 28 is placed along the inner walls 23a of each slot 23. The insulating sheet 28 has an elongated, angular U-shape in section so as to extend along the pair of sidewalls 23b and a bottom wall 23c which form the inner walls 23a of the slot 23. The insulating sheet 28 is provided in order to ensure electrical insulation between the core 2 and the coil 3. The insulating sheet 28 is a sheet material made of a highly insulating, highly heat resistant material. For example, the insulating sheet 28 may be a resin sheet, a paper sheet, etc. Coil side portions 42 of coil units 4 forming the coil 3 are placed in each slot 23.
The coil 3 is formed by linear conductors, namely conductors having a linear shape. In the present embodiment, the coil 3 is formed by rectangular wires 32 that are linear conductors having a rectangular section. The term "rectangular" is a concept including a substantially rectangular shape in addition to a rectangular shape, and for example, including a rectangular shape with arc-shaped rounded corners, a rectangular shape with chamfered corners, etc. The expression "having a rectangular section" means that the sectional shape perpendicular to the direction in which the linear conductor extends is a rectangle. In the present embodiment, the rectangular wire 32 has a rectangular section including a pair of opposing long sides and a pair of opposing short sides.
The rectangular wire 32 has a flat (in this example, with an aspect ratio of 2: 1) rectangular section. The rectangular wire 32 is made of a conductive material such as a metal material (e.g., copper, aluminum, etc.), and has on its surface an insulating coating that is made of an insulating material such as resin, an oxide coating, etc.
FIG. 2
The coil 3 includes a plurality of coil units 4 (see ) that are each wound between a pair of slots 23. The coil 3 includes the same number of (in this example, 48) coil units 4 as the teeth 22 and the slots 23. The coil unit 4 is a cassette coil that is formed by bending before being fitted in the core 2. For example, a single coil unit 4 can be formed by winding a single rectangular wire 32 while forming the rectangular wire 32 into a circular or elliptical shape, and then bending the resultant rectangular wire 32 into a polygonal shape (e.g., a hexagonal shape, an octagonal shape, etc.)
FIG. 2
FIG. 5
As shown in , the coil unit 4 includes a pair of coil side portions 42 extending in the axial direction L, and a pair of bridging portions 44 extending in the circumferential direction C. The coil side portions 42 are portions that are placed in the slots 23. The coil side portions 42 extend straight so as to extend through the slots 23 in the axial direction L. The coil unit 4 includes, as the coil side portions 42, first coil side portions 42A that are placed in one of paired slots 23, and second coil side portions 42B that are placed in the other of the paired slots 23. The first coil side portions 42A and the second coil side portions 42B are placed in a pair of slots 23 that are separated from each other by a magnetic pole pitch (in this example, six times the pitch of the slots 23). Each coil side portion 42 is placed in the slot 23 with the insulating sheet 28 interposed between the coil side portion 42 and the inner walls 23a of the slot 23 (see ).
FIGS. 3 and 4
The bridging portions 44 are portions that are formed at positions outside (outside in the axial direction L) the core 2 to connect the pair of coil side portions 42, placed in different slots 23, in the circumferential direction C. The bridging portions 44 are formed at such positions that the bridging portions 44 project outward in the axial direction L from the axial end faces of the core 2, and are formed in an arc shape so as to extend substantially in the circumferential direction C. The coil unit 4 includes, as the bridging portions 44, first bridging portions 44A located on one side of the core 2 in the axial direction L and second bridging portions 44B located on the other side. The bridging portions 44 each have an offset portion 45 in its intermediate part in the circumferential direction C, which is formed by offsetting the rectangular wire 32 in the radial direction R. As shown in , the offset portion 45 is a bent portion that is provided to make a lane change while avoiding interference between the bridging portions 44 in two coil units 4 adjoining each other in the circumferential direction C.
The coil unit 4 is formed by winding the rectangular wire 32 a plurality of times. The coil unit 4 is thus a continuous coil that is formed by winding a single rectangular wire 32 a plurality of times. The continuous coil is a coil having a first slot accommodated portion (e.g., the first coil side portions 42A described above) that is accommodated in a predetermined slot 23, a second slot accommodated portion (e.g., the second coil side portions 42B described above) that is accommodated in a different slot 23 from the first slot accommodated portion, a first coil end portion (e.g., the first bridging portions 44A described above) that connects the two slot accommodated portions on one side in the axial direction L, and a second coil end portion (e.g., the second bridging portions 44B described above) that connects the two slot accommodated portions on the other side in the axial direction L. The coil unit 4 may be a concentric winding unit serving as a component of a concentric winding coil, or may be a wave winding unit serving as a component of a wave winding coil.
FIGS. 2 to 4
FIG. 6
FIGS. 2
3
FIG. 6
show an example in which the rectangular wire 32 is wound five times to form the coil unit 4. However, the number of turns may be determined as appropriate according to performance etc. required for rotating electrical machines (as an example, see etc. showing the case where the number of turns is 4). In and , a lead portion 47 that connects to a power line, and a connection portion 48 that connects to other coil unit 4 or a neutral point are shown extending straight. However, the lead portion 47 and the connection portion 48 may have any specific shape or may have any other shape according to the purpose (see etc.).
FIG. 3
As shown in , an inter-side clearance 58 extending in the axial direction L and the radial direction R is provided between the first coil side portions 42A of two coil units 4 adjoining each other in the circumferential direction C. Similarly, an inter-side clearance 58 extending in the axial direction L and the radial direction R is provided between the second coil side portions 42B thereof. These inter-side clearances 58 serve as tooth placement spaces (tooth holes) in which the teeth 22 are placed when the coil 3 (coil units 4) is finally fitted in the core 2.
FIGS. 4
5
As shown in and , a plurality of first coil side portions 42A of a single coil unit 4 are placed in line at intervals in the radial direction R so that a space having a size corresponding to the rectangular wire 32 is provided between two first coil side portions 42A which adjoin each other in the radial direction R.
The plurality of first coil side portions 42A are placed in line at intervals in the radial direction R so that the short side of the rectangular wire 32 having a rectangular section extends in the radial direction R. Similarly, a plurality of second coil side portions 42B of a single coil unit 4 are placed in line at intervals in the radial direction R so that a space having a size corresponding to the rectangular wire 32 is provided between two second coil side portions 42B which adjoin each other in the radial direction R. The plurality of second coil side portions 42B are placed in line at intervals in the radial direction R so that the short side of the rectangular wire 32 having a rectangular section extends in the radial direction R.
In each space provided between two first coil side portions 42A which adjoin each other in the radial direction R, the second coil side portion 42B of another coil unit 4 of the same phase is placed.. Each of the second coil side portions 42B of a single coil unit 4 is placed so as to be sandwiched between the first coil side portions 42A of another coil unit 4 from both sides in the radial direction R. Similarly, the first coil side portions 42A of other coil unit 4 of the same phase are each placed in a space provided between two second coil side portions 42B which adjoin each other in the radial direction R. Each of the first coil side portions 42A of a single coil unit 4 is placed so as to be sandwiched between the second coil side portions 42B of another coil unit 4 from both sides in the radial direction R. A plurality of coil side portions 42 are thus placed in line in the radial direction R in each slot 23, and first coil side portions 42A of a first coil unit 4 and second coil side portions 42B of a second coil unit 4 are arranged alternately in the radial direction R. All of the first coil side portions 42A of the first coil unit 4 and all of the second coil side portions 42B of the second coil unit 4 different from the first coil unit 4 are arranged in each slot 23.
In a single coil unit 4, the interval (circumferential interval) between the first coil side portion 42A and the second coil side portion 42B which adjoin each other in the direction in which the rectangular wire 32 extends varies depending on the radial position. The coil unit 4 is formed so that the interval between the first coil side portion 42A and the second coil side portion 42B increases from the inside in the radial direction toward to the outside in the radial direction. The coil unit 4 is thus curved so that it generally has the shape of an arc band as viewed in the axial direction L.
Procedures for manufacturing the stator 1 which are carried out by using the coil units 4 described above will be sequentially described below. The stator manufacturing method of the present embodiment includes a unit assembly formation step, a guide jig attachment step, and an insertion step. The unit assembly formation step, the guide jig attachment step, and the insertion step are performed in this order.
FIG. 6
(A) The plurality of coil units 4 are sequentially arranged with a pair of slots 23 in which a pair of coil side portions 42 are placed being shifted one by one in the circumferential direction C.
FIG. 4
(B) Two coil units 4 which adjoin each other in the circumferential direction C are fitted together so that the rectangular wires 32 in each layer are located at the same radial position and overlap each other as viewed in the axial direction L except for the offset portions 45 and the coil side portions 42 located at both ends (see ).
(C) Two coil units 4 of the same phase which are separated from each other by a magnetic pole pitch (in this example, six times the pitch of the slots 23) in the circumferential direction C are fitted together so that the first coil side portions 42A of the first coil unit 4 and the second coil side portions 42B of the second coil unit 4 are arranged alternately and in line.
The unit assembly formation step is a step of forming a unit assembly 5 comprised of a plurality of coil units 4 arranged in an annular shape. As shown in , in the unit assembly formation step, a plurality of (in this example, 48, which is the same number as the teeth 22 and the slots 23) coil units 4 are arranged in the circumferential direction C to form a cylindrical basket-shaped unit assembly 5. The unit assembly 5 is formed so as to implement the following structures (A) to (C).
For example, in the case where the stator 1 is applied to a rotating electrical machine that is driven by a three-phase alternating current as in the present embodiment, each coil unit 4 finally forms one of a U-phase coil, a V-phase coil, and a W-phase coil. For example, six coil units 4 arranged next to each other in the circumferential direction C, namely two coil units 4 for U-phase, two coil units 4 for V-phase, and two coil units 4 for W-phase which are arranged next to each other in the circumferential direction C, form a single magnetic pole. The coil 3 including the U-phase coil, the V-phase coil, and the W-phase coil is formed by arranging a total of eight sets of such six coil units 4 next to each other in the circumferential direction C.
After the unit assembly 5 is formed by fitting the plurality of coil units 4 together, the insulating sheet 28 is attached to the coil side portions 42 of each coil unit 4. The insulating sheet 28 is inserted and attached radially inward from the outside in the radial direction onto the coil side portions 42 placed in line in the radial direction R at the same circumferential direction.
<mrow><mn mathvariant="normal">2</mn><mi mathvariant="normal">π</mi><mo>⋅</mo><mfenced separators=""><mi mathvariant="normal">Ri</mi><mo>−</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi></mfenced><mo>></mo><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mrow>
In this unit assembly formation step, in the present embodiment, a combination of a core and a coil (coil units) which satisfy a predetermined relational expression is used as the core 2 and the coil 3 (coil units 4). For example, in the case where the specification of the core 2 has been defined according to the performance etc. required for rotating electrical machines and cannot be changed, the coil 3 (coil units 4) that satisfies a predetermined relational expression in relation to the specification of the core 2 is used. The coil 3 (coil units 4) that satisfies the following relational expression (1) is used in the present embodiment.
FIG. 7
In the relational expression (1), an algebra "A" represents the circumferential width (in this example, the length of the long side; see ) of the rectangular wire 32 having a rectangular section. An algebra "B" represents the radial width (in this example, the length of the short side) of the rectangular wire 32 having a rectangular section. An algebra "L" represents the number of coil side portions 42 (the total number of layers) that are placed next to each other in the radial direction R in each slot 23. An algebra "N" represents the number of slots 23. An algebra "Ri" represents the radius of the core inner peripheral surface 25 (the length of separation between the axis X of the core 2 and the radially inner end faces of the teeth 22).
<mrow><mfenced separators=""><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mfenced><mo>/</mo><mn mathvariant="normal">2</mn><mi mathvariant="normal">π</mi><mo>+</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi><mo><</mo><mi mathvariant="normal">Ri</mi></mrow>
The above relational expression (1) can be rewritten as the following relational expression (1').
FIG. 7
In the relational expression (1'), "A·N" in the first term of the left side can be regarded as the circumference of the inner peripheral surface of the unit assembly 5 in the state where the coil units 4 forming the unit assembly 5 are closely located on the inner side in the radial direction (on the axis X side) and the coil side portions 42 contact each other in the circumferential direction C and thus the diameter of the unit assembly 5 cannot be reduced any more (the state shown by imaginary lines in ; hereinafter referred to as the "minimum diameter state"). "(A·N)/2π," which is "A·N" divided by twice the ratio of the circumference of a circle to its diameter "π," can be regarded as the radius of the inner peripheral surface of the unit assembly 5 in such a state (the minimum radius of the inner periphery of the unit assembly 5). "B·L" in the second term of the left side can be regarded as the thickness in the radial direction R of the unit assembly 5 formed by fitting the plurality of coil units 4 together. The entire left side of the relational expression (1') can therefore be regarded as the radius of the outer peripheral surface of the unit assembly 5 in the minimum diameter state where the coil units 4 are closely located on the inner side in the radial direction. As can be seen from the relational expression (1'), the use of the coil 3 (coil units 4) that satisfies the relational expression (1) in relation to the specification of the core 2 ensures that the unit assembly 5 is reliably placed radially inside the core 2.
In the unit assembly 5 in the minimum diameter state described above, the coil units 4 do not obliquely contact each other. This can effectively restrain damage to the rectangular wire 32.
<mrow><mn mathvariant="normal">4</mn><mi mathvariant="normal">π</mi><mo>⋅</mo><mfenced separators=""><mi mathvariant="normal">R</mi><mn mathvariant="normal">1</mn><mo>−</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi></mfenced><mo>></mo><mn mathvariant="normal">3</mn><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mrow>
<mrow><mi mathvariant="normal">π</mi><mo>⋅</mo><mfenced separators=""><mi mathvariant="normal">Ri</mi><mo>−</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi></mfenced><mo>></mo><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mrow>
In view of reliability, ease of operation, etc. at the time of placing the unit assembly 5 radially inside the core 2, it is preferable to use the coil 3 (coil units 4) that satisfies the following relational expression (1B) (and the relational expression (1C)).
<mrow><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi><mo><</mo><mi mathvariant="normal">D</mi></mrow>
The coil 3 (coil units 4) which satisfies the following relational expression (2) in relation to the specification of the core 2 is used in the present embodiment. In the relational expression (2), an algebra "D" represents the depth of the slot 23 (the length in the radial direction R from the opening on the inner side in the radial direction to the bottom wall 23c). Algebras "B," "L" are the same as those in the above relational expression (1).
In the relational expression (2), "B·L" of the left side can be regarded as the total length of a plurality of coil side portions 42 in the radial direction R that are finally placed in line in each slot 23. Accordingly, the use of the coil 3 (coil units 4) that satisfies the relational expression (2) in relation to the specification of the core 2 ensures that all of the coil side portions 42 are placed appropriately in each slot 23 of the final stator 1 without protruding radially inward from the slots 23.
FIG. 8
The guide jig attachment step is a step of attaching guide jigs 7 of a stator manufacturing device 6 to the unit assembly 5 formed in the unit assembly formation step. The guide jigs 7 are insertion assisting members that allow each coil unit 4 to be smoothly inserted into associated slots 23. The guide jigs 7 and a pressing device 8 are included in the stator manufacturing device 6. As shown in , each guide jig 7 is formed by three members, namely a first guide member 71, a second guide member 72, and a third guide member 73. The second guide member 72 and the third guide member 73 have corresponding shapes, and are placed on both sides of the first guide member 71 in the axial direction L so as to sandwich the first guide member 71 therebetween in the axial direction L.
FIGS. 9
10
The first guide member 71 is formed in the shape of a plate extending in the axial direction L and the radial direction R. The first guide member 71 has a tapered shape so that its circumferential width gradually decreases from the outside in the radial direction toward the inside in the radial direction. The first guide member 71 is inserted so that the entire first guide member 71 is fitted in the inter-side clearance 58 of the unit assembly 5 (see and ). The first guide member 71 is formed so that the circumferential width (thickness in the circumferential direction C) at its radially outer end is equal to or greater than the circumferential width at the radially inner end of the tooth 22 of the core 2. In the insertion step that is performed later, each of the first guide members 71 is placed radially inside a corresponding one of the teeth 22 so as to face the corresponding tooth 22. The first guide members 71 serve to guide the coil side portions 42 of the coil units 4 to be inserted into the slots 23 so that the coil side portions 42 smoothly move in the radial direction R, while supporting the coil side portions 42 in the circumferential direction C.
FIGS. 9
10
Each of the second guide member 72 and the third guide member 73 is formed in the shape of a plate extending in the radial direction R and the circumferential direction C. Each of the second guide member 72 and the third guide member 73 has a tapered shape so that its circumferential width gradually decreases from the outside in the radial direction toward the inside in the radial direction. Each of the second guide member 72 and the third guide member 73 has a pair of cutouts 75 formed on both sides in the circumferential direction C of its middle part in the radial direction R. Each of the second guide member 72 and the third guide member 73 is formed in the shape of a wedge so that its tip end portion located radially inside the cutouts 75 is pointed. The second guide member 72 is placed so that its pointed part on the tip end side is located on one side of the first guide member 71 in the axial direction L and faces an axial end face of the first guide member 71. The third guide member 73 is placed so that its pointed part on the tip end side is located on the other side of the first guide member 71 in the axial direction L (on the opposite side from the second guide member 72) and faces an axial end face of the first guide member 71. The pointed parts of the second guide member 72 and the third guide member 73 together with the first guide member 71 are inserted into the inter-side clearance 58 of the unit assembly 5 (see and ).
Each of the second guide member 72 and the third guide member 73 is formed so that the circumferential width (thickness in the circumferential direction C) of its pointed part is substantially equal to the circumferential width of the first guide member 71 at the same radial position. Each of the second guide member 72 and the third guide member 73 is formed so that its circumferential width is larger than the circumferential width of the tooth 22 at every position in the radial direction R. In the insertion step that is performed later, the second guide member 72 is placed so as to face the end face on one side of the tooth 22 in the axial direction L, and the third guide member 73 is placed so as to face the end face on the other side of the tooth 22 in the axial direction L (on the opposite side from the second guide member 72). The second guide members 72 and the third guide members 73 serve to guide the boundary portions (bent portions) between the coil side portions 42 and the bridging portions 44 of the coil units 4 to be inserted into the slots 23 so that the boundary portions smoothly move in the radial direction R, while supporting the boundary portions in the circumferential direction C and the axial direction L. At the same time, the second guide members 72 and the third guide members 73 serve to prevent the insulating sheets 28 from coming off from the slots 23 in the axial direction L.
FIG. 9
In order to attach such guide jigs 7 to the unit assembly 5, as shown in , the first guide members 71 and the second guide members 72 are first inserted into the inter-side clearances 58 of the unit assembly 5 radially inward from the outside in the radial direction and attached thereto. Next, the core 2 having a hollow cylindrical shape is inserted in the axial direction L onto the unit assembly 5 having only the first guide members 71 and the second guide members 72 attached thereto (the third guide members 73 have not been attached to the unit assembly 5) from the opposite side in the axial direction L from the second guide members 72. As described above, since the core 2 and the coil 3 (coil units 4) are a combination that satisfies the relational expression (2), the core 2 is appropriately and reliably inserted onto the unit assembly 5 without interference between the unit assembly 5 and the core 2. Finally, the third guide members 73 are inserted into the inter-side clearances 58 of the unit assembly 5 radially inward from the outside in the radial direction and attached thereto.
Subsequently, the phases of the core 2 and the unit assembly 5 are adjusted to position the core 2 and the unit assembly 5 in the circumferential direction C. By this phase adjustment and positioning, the first guide members 71 are placed radially inside the teeth 22 so as to adjoin and face the teeth 22, and the coil side portions 42 of the coil units 4 are placed radially inside the slots 23 so as to adjoin and face the slots 23. An assembly 52 of the unit assembly 5 having the guide jigs 7 attached thereto and the core 2 is thus produced by the guide jig attachment step.
The insertion step is a step of inserting the coil side portions 42 of the plurality of coil units 4 of the unit assembly 5 into the slots 23. In the insertion step, with the unit assembly 5 with the guide jigs 7 attached thereto being placed radially inside the core 2, the plurality of coil units 4 are pressed radially outward in a radial fashion to insert the coil side portions 42 of each coil unit 4 into associated slots 23. In the present embodiment, such an insertion step is performed by using the pressing device 8 included in the stator manufacturing device 6.
FIGS. 11 to 13
The pressing device 8 is a device that generates a pressing force required to fit the coil units 4 in the core 2 (specifically, to insert the coil side portions 42 into the slots 23) when manufacturing the stator 1. show an example of such a pressing device 8. In this example, the pressing device 8 mainly includes a support base 81 and a pressing roller 84. The support base 81 is a base that holds the assembly 52 of the unit assembly 5 having the guide jigs 7 attached thereto and the core 2. The support base 81 has a pair of support rollers 82 that contact the outer peripheral surface of the assembly 52. The support base 81 rotatably supports the assembly 52 with the pair of support rollers 82.
The pressing roller 84 presses the coil units 4 (specifically, the bridging portions 44) included in the unit assembly 5 of the assembly 52 supported by the support base 81 radially outward in a radial fashion from the inside in the radial direction. The pressing roller 84 is placed in a space located radially inside the unit assembly 5 and located outside the core 2 in the axial direction L. The pressing roller 84 is a member having a columnar shape and is placed so that its axis extends parallel to the axis X of the core 2. The pressing roller 84 includes a pair of a first roller 84A and a second roller 84B. The first roller 84A is placed on one side in the axial direction L of the core 2 so that the first roller 84A can contact the first bridging portions 44A of the coil units 4. The second roller 84B is placed on the other side in the axial direction L of the core 2 so that the second roller 84B can contact the second bridging portions 44B of the coil units 4. The first roller 84A and the second roller 84B are coupled together by a coupling shaft 86 extending through the space radially inside the unit assembly 5 in the axial direction L.
The support base 81 and the pressing roller 84 can move relative to each other in the radial direction R.
For example, the pressing roller 84 can move relative to the support base 81 in the radial direction R (as an example, in the vertical direction in the case where the assembly 52 is supported so that its axis extends in the horizontal direction).
The present disclosure is not limited to this configuration, and the support base 81 may be able to move toward the pressing roller 84. The relative movement between the support base 81 and the pressing roller 84 is made in such a range that the coil side portions 42 of the coil units 4 are appropriately accommodated in the slots 23 and that the coupling shaft 86 does not contact the radially inner end faces of the teeth 22.
FIGS. 11 to 13
FIGS. 14 and 15
In the insertion step, the coil side portions 42 of the plurality of coil units 4 forming the unit assembly 5 are inserted into the slots 23 by using such a pressing device 8. First, as shown in , the assembly 52 of the unit assembly 5 having the guide jigs 7 attached thereto and the core 2 is placed on the support base 81. Next, as shown in , the pressing roller 84 is gradually moved toward the support base 81 while rotating the assembly 52 supported by the support rollers 82 of the support base 81. The pressing roller 84 thus presses parts of the bridging portions 44 in the circumferential direction C radially outward and gradually moves the pressing position in the circumferential direction C. More specifically, the first roller 84A sequentially contacts the first bridging portions 44A of the coil units 4 included in the assembly 52 and moves relatively in the circumferential direction C to sequentially press the first bridging portions 44A radially outward. At the same time, the second roller 84B sequentially contacts the second bridging portions 44B of the coil units 4 included in the assembly 52 and moves relatively in the circumferential direction C to sequentially press the second bridging portions 44B radially outward along the circumferential direction C.
FIG. 16
FIGS. 10
16
When the bridging portions 44 of the coil units 4 are pressed radially outward, the coil side portions 42 leading to the bridging portions 44 are pulled radially outward accordingly. At this time, as shown in , each coil side portion 42 is guided by the first guide member 71, the second guide member 72, and the third guide member 73 and smoothly inserted into the slot 23. During this insertion, each coil unit 4 is deformed so that the circumferential interval between the first coil side portion 42A and the second coil side portion 42B increases (see and ). At the same time, each coil unit 4 is deformed so that the axial interval between the axial tip ends (in this example, the offset portions 45) of the bridging portions 44 located on both sides in the axial direction L decreases. The unit assembly 5 is therefore increased in diameter and reduced in axial length (length of separation between the axial tip ends of the bridging portions 44 located on both sides) as compared to before insertion into the slots 23.
When the bridging portions 44 of all the coil units 4 of the unit assembly 5 are pressed radially outward, the coil side portions 42 of all the coil units 4 are inserted into the slots 23 accordingly. The coil side portions 42 are thus inserted into the slots 23 by the pressing device 8 that sequentially presses the bridging portions 44 radially outward along the bridging portions 44 extending in the circumferential direction C, so that each coil unit 4 is wound between a pair of slots 23. As described above, according to the stator manufacturing method of the present embodiment, the unit assembly 5 that is placed so that the coil side portions 42 of two coil units 4 are placed alternately in the radial direction R at the same circumferential position is attached to the cylindrical core 2, whereby the stator 1 can be produced.
Japanese Patent Application Publication No. 2011-193597
JP 2011-193597 A
() discloses an example of a stator manufacturing method using a cylindrical core and coil units forming a coil, in which a stator is manufactured by fitting the coil units in the core. In this manufacturing method, a jig having a plurality of holding grooves formed in the outer peripheral surface of its columnar body is used to fit the coil (the plurality of coil units) in the core. More specifically, the coil is fitted by the step of placing the coil units one by one in each holding groove of the jig and the step of placing the coil units held by the jig radially inside the core and pressing the coil units radially outward in a radial fashion to insert coil side portions of the coil units into slots of the core. In this method, regarding two coil units whose coil side portions are accommodated in the same slot, the coil side portions of one of the coil units are located in the outer side in the radial direction of the slot and the coil side portions of the other coil unit are located in the inner side in the radial direction of the slot. Since these coil side portions are thus located in the outer and inner sides in the radial direction of the slot, these coil side portions can also be inserted one by one, and the coil units do not interfere with each other when the coil is placed radially inside the core.
FIG. 17
As shown in , in the insertion step, each coil side portion 42 of each coil unit 4 is sandwiched between two first guide members 71 located on both sides of the coil side portion 42 and adjoining each other in the circumferential direction C, and is guided by the two first guide members 71. Accordingly, when the coil unit 4 is deformed during insertion, each coil side portion 42 can be contacted and supported by the two first guide members 71 located on both sides thereof. This can restrain the coil side portions 42 from being deformed outward in the circumferential direction C.
FIG. 18
As described above, in the insertion step of the present embodiment, the coil side portions 42 are inserted into the slots 23 by the pressing device 8 that sequentially presses the bridging portions 44 radially outward along the bridging portions 44 extending in the circumferential direction C. In this insertion operation, each coil unit 4 is inserted into the slot 23 after one of the pair of coil side portions 42 is located radially outside the other. For example, in , when a radially outward pressing force is applied from the pressing roller 84 to the unit assembly 5 while the assembly 52 (core 2) is rotating during insertion, each coil unit 4 is tilted with respect to the circumferential direction C so that the pressed first coil side portions 42A are located radially outside the second coil side portions 42B, namely the other coil side portions of the same coil unit 4. At this time, a load is unevenly applied to the pair of coil side portions 42 of each coil unit 4. An asymmetrical load that causes a twist in the slot 23 is applied to each coil side portion 42. If such a load is applied, the rectangular wire 32 and the insulating sheet 28 may be damaged depending on the circumstances.
As a solution to this problem, in the present embodiment, the rectangular wire 32 in the pair of coil side portions 42 of each coil unit 4 is formed to have an asymmetrical shape rather than a typical symmetrical shape regarding its four corners. That is, the rectangular wire 32 in each coil side portion 42 has an asymmetrical shape with a pair of inner peripheral corners 34 having a different radius of curvature from a pair of outer peripheral corners 36. Specifically, the pair of inner peripheral corners 34 of the rectangular wire 32 have a larger radius of curvature than the pair of outer peripheral corners 36 thereof. The inner peripheral corners 34 are a pair of corners located closer to the inner periphery (the center of turn) when the coil unit 4 is wound between the pair of slots 23, out of the four corners of the rectangular wire 32. The outer peripheral corners 36 are the remaining ones of the four corners of the rectangular wire 32, namely a pair of corners located closer to the outer periphery when the coil unit 4 is wound between the pair of slots 23. In the case where any corner of the rectangular wire 32 has a right-angled edge, the radius of curvature of this corner is regarded as "0 (zero)."
For example, it is preferable that the radius of curvature of the inner peripheral corners 34 be equal or larger than twice (preferably equal to or larger than three times) the radius of curvature of the outer peripheral corners 36. Such relatively greatly rounded inner peripheral corners 34 can restrain the twisting load that is applied to each coil side portion 42 in the insertion step. Specifically, if the coil side portions 42 are twisted in the slot 23, the coil side portions 42 are tilted with respect to the sidewalls 23b of the slot 23. However, since the inner peripheral corners 34 are greatly rounded, the corners of the coil side portions 42 are restrained from hitting the sidewall 23b hard. The inner peripheral corners 34 have a larger radius of curvature because the surface of the coil side portion 42 which is located closer to the inner periphery (the center of turn) hits the sidewall 23b of the slot 23 hard when the coil unit 4 is inserted while increasing the circumferential interval between the pair of coil side portions 42.
Since the inner peripheral corners 34, namely the corners that hit the sidewall 23b hard, have a larger radius of curvature, stress that is applied when the coil side portion 42 hits the sidewall 23b can be reduced. This can effectively restrain damage to the rectangular wire 32 and the insulating sheet 28, whereby electrical insulation between the core 2 and the coil 3 can be satisfactorily ensured.
FIG. 18
In such a configuration, as shown in , the plurality of coil side portions 42 that are placed in the same slot 23 are arranged so that their relatively greatly rounded corners having a larger radius of curvature alternately face toward one side and the other side in the circumferential direction C along the radial direction R. The plurality of coil side portions 42 that are placed in the same slot 23 are also arranged in a zig-zag pattern along the radial direction R so that the coil side portions 42 are alternately tilted in the opposite directions with respect to the radial direction R.
<mrow><mi mathvariant="normal">Z</mi><mo>≤</mo><mi mathvariant="normal">W</mi><mo>−</mo><mn mathvariant="normal">2</mn><mo>⋅</mo><mi mathvariant="normal">T</mi></mrow>
The coil 3 (coil units 4) that satisfies the following relational expression (3) in relation to the specification of the core 2 is used in the present embodiment.
In the relational expression (3), an algebra "Z" represents the diagonal width between the inner peripheral corner 34 and the outer peripheral corner 36 which are diagonally located in the rectangular wire 32 having a rectangular section. An algebra "W" represents the circumferential width of the slot 23 (the circumferential width between the pair of sidewalls 23b forming a parallel slot). An algebra "T" represents the thickness of the insulating sheet 28.
In the case of using the coil 3 (coil units 4) that satisfies the relational expression (3) in relation to the specification of the core 2, both of the pair of diagonal corners of the rectangular wire 32 of the coil side portion 42 are not pressed against the sidewalls 23b on both sides of the slot 23 with the insulating sheet 28 interposed therebetween, even if each coil side portion 42 is actually twisted in the insertion step and the coil side portion 42 is tilted. Accordingly, the twisting load that is applied to each coil side portion 42 in the insertion step can be effectively restrained, and electrical insulation between the core 2 and the coil 3 can be satisfactorily ensured.
(1) The above embodiment is described with respect to an example in which the stator 1 is manufactured by using the core 2 having 48 slots 23. However, the present disclosure is not limited to such a configuration. For example, the number of slots "N" of the core 2 may be 24, 36, 60, ..., etc. In this case, other specifications of the core 2 and the coil 3 (coil units 4) are determined according to the number of slots of the core 2 as well so as to satisfy the relational expression (1).
(2) The size of the core 2 shown in the figures of the above embodiment is by way of example only. The present disclosure is not limited to such a configuration, and the size (including the core inside diameter "Ri") of the core 2 may be determined as appropriate according to the performance etc. required for rotating electrical machines. In this case, other specifications of the core 2 and the coil 3 (coil units 4) are determined according to the size of the core 2 as well so as to satisfy the relational expression (1).
(3) The size of the slots 23 shown in the figures of the above embodiment is by way of example only. The present disclosure is not limited to such a configuration, and the circumferential width "W" and the depth "D" of the slots 23 may be determined as appropriate according to the performance etc. required for rotating electrical machines. In this case, other specifications of the core 2 and the coil 3 (coil units 4) are determined according to the size of the slots 23 as well so as to satisfy at least one of the relational expressions (2) and (3).
(4) The above embodiment is described with respect to an example in which the stator 1 is manufactured by using the coil 3 that is formed by the rectangular wire 32 having a flat rectangular section with an aspect ratio of about 2 : 1. However, the present disclosure is not limited to such a configuration. The circumferential width "A" and the radial width "B" of the rectangular wire 32 may be determined as appropriate and the ratio therebetween may be determined as appropriate. In this case, other specifications of the core 2 and the coil 3 (coil units 4) are determined according to the size of the rectangular wire 32 as well so as to satisfy the relational expression (1).
(5) The above embodiment is described mainly with respect to the configuration in which a total of eight coil side portions 42 are placed in line in a single slot 23. However, the present disclosure is not limited to such a configuration. For example, the number of coil side portions 42 (the number of layers) that are placed in a single slot 23 may be 3, 4, 5, 6, 7, ..., etc. The three or more coil side portions 42 are placed so that the first coil side portions 42A of the first coil unit 4 and the second coil side portions 42B of the second coil unit 4 are arranged alternately and in line. In this case, other specifications of the core 2 and the coil 3 (coil units 4) are determined according to the number of layers as well so as to satisfy the relational expression (1).
(6) The above embodiment is described with respect to an example in which the pair of inner peripheral corners 34 of the rectangular wire 32 have a larger radius of curvature than the pair of outer peripheral corners 36 thereof. However, the present disclosure is not limited to such a configuration. The inner peripheral corners 34 and the outer peripheral corners 36 may have the same radius of curvature, or the inner peripheral corners 34 may have a smaller radius of curvature than the outer peripheral corners 36.
(7) The above embodiment is described with respect to an example in which the number of slots per pole per phase is "2." However, the present disclosure is not limited to such a configuration. For example, the number of slots per pole per phase may be "1," "3," etc.
(8) The above embodiment is described with respect to an example in which the coil side portions 42 of the coil units 4 are sequentially inserted into the slots 23 by using the pressing device 8 having the pressing roller 84. However, the present disclosure is not limited to such a configuration. All the coil side portions 42 may be inserted into the slots 23 at a time. The coil side portions 42 may be inserted into the slots 23 by pulling the bridging portions 44 radially outward. Alternatively, the coil side portions 42 may be inserted into the slots 23 by pressing the bridging portions 44 in the axial direction L and thus deforming the coil units 4 so as to increase the interval between adjoining ones of the coil side portions 42.
(9) It should be understood that, regarding other configurations as well, the embodiment disclosed in the specification is by way of example only in all respects. Accordingly, those skilled in the art may make various modifications as appropriate without departing from the spirit and scope of the present disclosure.
Other embodiments of the stator manufacturing method and the coil will be described. Configurations disclosed in each of the following embodiments can be combined with those disclosed in other embodiments as appropriate unless inconsistency arises.
Based on the above description, a stator manufacturing method according to the present disclosure preferably includes the following configurations.
<mrow><mn mathvariant="normal">2</mn><mi mathvariant="normal">π</mi><mo>⋅</mo><mfenced separators=""><mi mathvariant="normal">Ri</mi><mo>−</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi></mfenced><mo>></mo><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mrow>
A stator manufacturing method in which a coil (3) including a plurality of coil units (4) formed by winding a rectangular wire (32) is fitted in a cylindrical core (2) having a plurality of slots (23) extending in a radial direction (R) and opening in a core inner peripheral surface (25) so that the slots (23) are distributed in a circumferential direction (C), the rectangular wire (32) being a linear conductor having a rectangular section, wherein each of the coil units (4) includes, as coil side portions (42) that are placed in the slots (23), first coil side portions (42A) that are placed in one of a pair of the slots (23), and second coil side portions (42B) that are placed in the other of the pair of the slots (23), the stator manufacturing method including: a unit assembly formation step of forming a unit assembly (5) in which the plurality of coil units (4) are arranged in an annular shape by fitting the plurality of coil units (4) together; and an insertion step of, with the unit assembly (5) being located radially inside the core (2), inserting each of the coil side portions (42) of the plurality of coil units (4) forming the unit assembly (5) into an associated one of the slots (23), wherein a combination of a core (2) and a coil (3) which satisfies the following relational expression (1) is used as the core (2) and the coil (3) [in the relational expression (1), A represents a circumferential width of the rectangular wire (32), B represents a radial width of the rectangular wire (32), L represents the number of coil side portions (42) that are placed next to each other in the radial direction (R) in each of the slots (23), N represents the number of slots (23), and Ri represents a radius of the core inner peripheral surface (25)].
According to this configuration, a unit assembly in which the first coil side portions of the first coil unit and the second coil side portions of the second coil unit are arranged alternately and in line is formed by the unit assembly formation step. At this time, the use of the combination of the core and the coil which satisfies the relational expression (1) ensures that the unit assembly formed by the unit assembly formation step is reliably placed radially inside the core with at least each coil unit being located on the inner side in the radial direction. The subsequent insertion step can thus be performed appropriately. That is, a stator manufacturing method can be implemented in which the unit assembly having the coil side portions of two coil units being arranged alternately in the radial direction at the same circumferential direction can be placed radially inside the cylindrical core and fitted therein.
A coil according to the present disclosure preferably includes the following configurations.
<mrow><mn mathvariant="normal">2</mn><mi mathvariant="normal">π</mi><mo>⋅</mo><mfenced separators=""><mi mathvariant="normal">Ri</mi><mo>−</mo><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi></mfenced><mo>></mo><mi mathvariant="normal">A</mi><mo>⋅</mo><mi mathvariant="normal">N</mi></mrow>
A coil (3) that is fitted in a cylindrical core (2) having a plurality of slots (23) extending in a radial direction (R) and opening in a core inner peripheral surface (25) so that the slots (23) are distributed in a circumferential direction (C) including: a plurality of coil units (4) each formed by a rectangular wire (32) and each wound between a pair of the slots (23), the rectangular wire (32) being a linear conductor having a rectangular section, wherein each of the coil units (4) includes, as coil side portions (42) that are placed in the slots (23), first coil side portions (42A) that are placed in one of a pair of the slots (23), and second coil side portions (42B) that are placed in the other of the pair of the slots (23), a plurality of the coil side portions (42) are placed in line in the radial direction (R) in each of the slots (23), and the first coil side portions (42A) of a first one of the coil units (4) and the second coil side portions (42B) of a second one of the coil units (4) are alternately arranged, and the coil (3) satisfies the following relational expression (1) [in the relational expression (1), A represents a circumferential width of the rectangular wire (32), B represents a radial width of the rectangular wire (32), L represents the number of coil side portions (42) that are placed next to each other in the radial direction (R) in each of the slots (23), N represents the number of slots (23), and Ri represents a radius of the core inner peripheral surface (25)].
According to this configuration, for example, when a unit assembly is formed by fitting the coil units together with the first coil side portions of the first coil unit and the second coil side portions of the second coil unit being arranged alternately and in line, this unit assembly has such a size that it can be placed radially inside the core with at least each coil unit being located on the inner side in the radial direction. Accordingly, the unit assembly is subsequently placed radially inside the core 2, and in this state, each coil unit is moved radially outward so that the coil side portions of each coil unit can be inserted into associated slots. That is, a coil can be implemented which is an assembly in which coil side portions of two coil units are arranged alternately in the radial direction at the same circumferential position, and which can be fitted into a cylindrical core from the inside in the radial direction.
<mrow><mi mathvariant="normal">B</mi><mo>⋅</mo><mi mathvariant="normal">L</mi><mo><</mo><mi mathvariant="normal">D</mi></mrow>
The coil (3) satisfies the following relational expression (2) [In the relational expression (2), D represents a depth of the slots (23)].
According to this configuration, all of the coil side portions are placed appropriately in each slot of the final stator without protruding radially inward from the slots. The stator that is produced by using such a coil can be reliably formed in an appropriate shape.
The stator manufacturing method and the coil according to the present disclosure need only to have at least one of the effects described above.
For example, the technique according to the present disclosure is applicable to stator manufacturing methods in which a coil is fitted in a cylindrical core.
1
2
3
4
5
6
23
25
26
32
34
36
42
42A
42B
44
R
C
Ri
N
W
D
L
A
B
Z
T
Stator
Core
Coil
Coil Unit
Unit Assembly
Pressing Device
Slot
Core Inner Peripheral Surface
Insulating Sheet
Rectangular Wire
Inner Peripheral Corner
Outer Peripheral Corner
Coil Side Portion
First Coil Side Portion
Second Coil Side Portion
Bridging Portion
Radial Direction
Circumferential Direction
Radius of Core Inner Peripheral Surface
Number of Slots
Circumferential Width of Slot
Depth of Slot
Number of Coil Side Portions in Slot
Circumferential Width of Rectangular Wire
Radial Width of Rectangular Wire
Diagonal Width of Rectangular Wire
Thickness of Insulating Sheet | |
BACKGROUND OF THE INVENTION
Coping saws are widely employed for various applications and generally comprise a U-shaped metal frame supporting anchor bolts in which are mounted the ends of the coping saw blade. In accordance with conventional practice, the saw blade has transversely extending pins adjacent the ends thereof, and these pins seat in notches in the anchor bolts which intersect axial slots receiving the end portions of the blade. Indicative of the types of anchor bolt structures which have been employed is that illustration in Roy U.S. Pat. No. 2,514,609.
Since the coping saws generally employ a U-shaped frame which is bent from metal bar stock or tubing and since the free ends of the frame are under considerable tension when the blade is tightly secured in position, impacts upon the frame which may inadvertently occur during usage frequently cause the free ends to deflect towards each other and spring the saw blade outwardly therefrom. The sloping notches of the type illustrated in the above mentioned Roy patent tend to facilitate camming of the blade pins outwardly therefrom.
It is an object of the present invention to provide a saw with an improved saw blade holder which will tend to retain the mounting pins of the saw blade within the mounting bolts when frame deflecting forces occur.
It is also an object to provide such a saw wherein the anchor bolts may be readily fabricated with slots and notches cooperating to secure firmly the ends of the saw blade within the frame and to resist forces tending to effect disengagement of the saw blade therefrom.
Another object is to provide such a saw which may be simply and readily fabricated and which is rugged in construction for long lived operation.
SUMMARY OF THE INVENTION
It has now been found that the foregoing and related objects are readily attained in a saw which comprises a holder including a generally U-shaped frame having a pair of spaced legs, a handle secured adjacent the free end of one leg of the frame, and a pair of elongated anchor bolts supported adjacent the free ends of the frame and having blade mounting portions extending inwardly of the legs and towards each other. Each of the blade mounting portions has a slot extending axially from the inner end thereof and a generally L-shaped notch intersecting the axial slot with a sloping leg portion sloping from the periphery thereof towards the opposite leg of the frame and an axial leg portion extending from the inner end of the sloping leg portion towards the adjacent leg. A saw blade has its end portions disposed within the axial slots of the anchor bolts and has transversely extending pins on its end portions seated within the notches. Deflection of the legs of the frame results in camming of the pins into the axial leg portions of the notches.
In the preferred embodiment, the legs of the frame have generally circular apertures adjacent the free ends threof, and the anchor bolts are of generally circular cross section and rotatably seated in the circular apertures of the frame. The L-shaped notch is configured to provide a shoulder at the intersection between the sloping leg and axial leg portions, and this shoulder is oppositely angularly disposed relative to the angle of said sloping leg portion to facilitate camming of the transversely extending pins of the saw blade into the axial leg portions of the notches.
Desirably, the slot is of a depth equal to about 1/3-2/3 the width or diameter of the anchor bolts, and the notches are of a depth equal to about 1/3-3/4 the depth of the axial slots. The included angle between the sloping leg and axial leg portions of the notches is about 55°- 80°.
BRIEF DESCRIPTION OF THE ILLUSTRATED EMBODIMENT
FIG. 1 is a side elevational view of a coping saw embodying the present invention;
FIG. 2 is a fragmentary side elevational view to a greatly enlarged scale of the end portion of the saw remote from the handle with the frame in section and with various structural portions shown in dotted line;
FIG. 3 is a view similar to FIG. 2 showing the mounting pins on the saw blade disposed within the axial portion of the notch following deflection of the frame;
FIG. 4 is a fragmentary exploded perspective view of the anchor bolt and saw blade; and
FIG. 5 is a sectional view of the anchor bolt of FIGS. 2-4.
DETAILED DESCRIPTION OF THE ILLUSTRATED EMBODIMENT
Turning now in detail to FIG. 1 of the attached drawings, a coping saw embodying the present invention comprises a blade holder generally designated by the numeral 10 and a blade generally designated by the numeral 12 and having teeth 14 along one edge thereof and transversely extending mounting pins 16 at the end portions thereof.
The holder 10 has a generally U-shaped metal frame 18 with flattened free end portions 20, 21 having apertures 22 (seen in FIG. 2) and an elongated handle 24 extending outwardly from one end portion 21 with a ferrule 26 at the inner end thereof.
As seen in FIGS. 2-5, there is seated in the aperture 22 of the end portion 20 the anchor bolt generally designated by the numeral 28 having a generally hemispherical head 30 and an elongated shank 32 of circular cross section. Extending axially in the shank 32 from its inner end is a slot 33 which is intersected by a generally L-shaped notch having a sloping portion 34 which slopes towards the inner end of the bolt 28 and an axially extending portion 36. A shoulder 38 slopes from the sloping slot portion 34 to the axial portion 36 in the direction opposite to that of the principal direction of the sloping slot portion 34.
Seated in the radial aperture 41 in the shank 32 is a pin 40 for rotating the anchor bolt 28 in the aperture 22. The underside of the head 30 is provided with a multiplicity of radially extending ribs 42 which seat in complementary recesses 44 in the outer surface of the outer end portion 20 to lock the anchor bolt 28 in a rotated position.
The other anchor bolt is generally designated by the numeral 45 and has a head 46 of generally circular cross section and a threaded shank (not shown) which extends through the aperture 22 (not shown) in the end portion 21 and ferrule 26 and threadably engages in the handle 24. A pin 50 extends radially outwardly therefrom for effecting rotation and a slot (not shown) and generally L-shaped notch 52 are provided in the same configuration and relationship as those in the bolt 28.
As can be seen in FIG. 2, the end portions of the saw blade 12 seat in the axial slots 33 of the anchor bolts 28, 45 and the pins 16 thereof are disposed in the sloping portions 34 of the notches in the anchor bolts 28, 45. The anchor bolt 45 is drawn tightly into the handle 24 by rotation of the handle 24 until the saw blade 12 is tensioned between the anchor bolts 28, 45. As can be seen, the axially extending portion 36 is of greater width and length than the diameter of the pin 16.
In the course of utilization of the coping saw, it may be inadvertently dropped and the impact on the frame 18 may tend to spring the end portions 20, 21 towards each other. The stiffness of the saw blade 12 will produce a camming action of the pins 16 into the axial portions of the L-shaped notches 52 to maintain the blade 12 therewithin as seen in FIG. 3, rather than springing outwardly therefrom. Moreover, the same action takes place when the blade 12 jams and the saw is pushed to free it with attendant springing of the frame. As will be appreciated, the oppositely sloping shoulders 38 in the notches 52 facilitate this camming action.
Although the frame has been illustrated as fabricated of metal bar stock of generally cylindrical cross section with flattened end portions, it will be appreciated that other materials and configurations may be employed. For example, tubular stock may be provided with flattened end portions or stock of generally circular cross section may be welded or otherwise affixed thereto end portions providing suitable means for retaining the anchor bolts thereon. In addition to metal stock, reinforced plastics may conveniently be employed as the frame material.
In the illustrated embodiment, the handle and one anchor bolt cooperate to effect mounting thereof upon the adjacent leg of the frame. However, other arrangements may be employed for mounting both the anchor bolt and the handle upon the frame as is well known in the art. The illustrated embodiment offers the advantage of providing a convenient means for rapidly tensioning the saw blade between the anchor bolts.
The axial slots in the anchor bolts should extend to a depth between 1/3 and 2/3 of the total thickness of the anchor bolts; preferably, the depth is approximately 1/2 the thickness or diameter. The L-shaped notches must, of course, intersect the axial slots and should extend to a depth equal to about 1/2 to 3/4 of the depth of the axial slots. The included angle between the sloping and axial leg portions of the notches should be within the range of 55° to 80. degree..
From the foregoing detailed specification and drawings, it will be readily appreciated that the saw of the present invention affords significant advantages in ensuring retention of the saw blade within the anchor bolts during the minor impacts to which the frame will be exposed during usage. The components of the saw may be readily and economically fabricated from materials which will provide a rugged and long lasting structure. | |
Eric Anderson, the chef of Ballard restaurant Samara, will serve a tasting menu featuring local, seasonal, ingredients every Thursday starting March 17.
The 11 to 15 dishes in the $150 tasting menu, which will rotate regularly based on what’s seasonally available, will include dishes like nettle-wrapped halibut, applewood-grilled squab with parsnips, and a season vegetable course with charred beets, pickled carrot, grilled fern, and roasted sunchoke. The two seatings, at 5:15 p.m. and 7:30 p.m. will serve a total of eight customers per night. | https://bellevuechronicle.com/chef-eric-anderson-is-now-serving-exclusive-tasting-menus-at-ballard-restaurant-samara/ |
Church bells will be the back-up warning for flooding in Starcross.
The Environment Agency has worked with Starcross Flood Group, St Paul’s Church and flood wardens to create a contingency plan unique to the village if all usual forms of communication fail.
The chances of residents not getting warned by traditional electronic methods via the flood warning service are remote. But every flood plan has a contingency and Megan Debenham, the Flood Group Co-ordinator for Starcross, suggested using the 18th and 19th-century bells in St Paul’s Church.
Community fundraisers and funding from the Environment Agency has restored the bells and surrounding masonry to their former glory and the bells returned to their tower on Tuesday 19 February 2019 after an absence of 4 months.
Jane Fletcher-Peters of the Environment Agency said:
As well as building flood defences, we also work with communities to create a flood plans – a set of actions of what to do in the event of flooding.
These plans always have a contingency for warning residents. While flood wardens knocking on doors is the most obvious solution, if flooding is at night, then residents could be asleep or wary of answering the door.
So we work together to find practical solutions like shining car headlights into houses and making people aware if that is accompanied by knocking, it could be a flood warden at the door.
Starcross is very much a boating community so it made sense that if the church bells were sounded to warn of flood, ringers would adopt an SOS peal familiar to residents.
Tim Miles, churchwarden of St Paul’s Church, said:
We are very excited to welcome the bells back to the church and will sleep soundly knowing they are ready if needed to warn villagers of flooding.
Starcross’ use of the church bells comes 13 months after the Environment Agency began £4million of work to better protect more than 600 properties from coastal flooding in the area. The Environment Agency installed 2 new floodgates at Church Road and Generals Lane slipway and raised the car park levels and extended the slipway at the Fishing and Cruising Club.
In Cockwood the harbour wall was raised along Dawlish Road in line with predicted sea level rises. There are also 2 tidal gates as part of the scheme that the community will operate on the Environment Agency’s behalf.
There are 5.2 million homes and businesses in England at risk of flooding. The Environment Agency monitors flood risk and issues alerts and warnings accordingly:
- Flood Alert – Prepare. Flooding is possible
- Flood Warning – Act. Flooding is expected. Immediate action required
- Severe Flood Warning – Survive. Severe flooding. Danger to life
Check your flood risk, know what to do if flooding was expected, and be ready to respond. Check your flood risk and keep up to date with the latest situation at www.gov.uk/check-if-youre-at-risk-of-flooding, call Floodline on 0345 988 1188 or follow @EnvAgencySW on Twitter for the latest flood updates in Devon and Cornwall.
Revision History: | http://thepublicinterest.info/press-release-church-bells-to-be-back-up-warning-for-flooding-in-starcross |
Michelle will divide 36 herbal tea bags and 48 mint tea bags among gift boxes. Each gift box will have the same number of herbal tea bags and the same number of mint tea bags. What is the greatest number of gift boxes Michelle can make?
| |
Reading, Pa., October 25, 2017 – The 9th Annual People First Event is scheduled for Tuesday, November 14 at Queen City Family Restaurant, Reading, Pa., which will be closed for the day to the general public and will be festively filled with over 1,000 invited guests who are homeless or less fortunate to a festive meal during the season of Thanksgiving.
“Putting ‘People First’ is our annual tradition of celebrating the true meaning of community and paying it forward. With hot comforting meals served by caring volunteers with warm smiles, we wish to help nourish the mind and bodies of people who could use some encouragement,” said Elsayed Elmarzouky, founder of People First and owner of Queen City Family Restaurant, Reading, Pa.
Each year, more than 100 volunteers assist with cooking meals, serving food, and handing out gift bags for men, women and children.
Community non-profit organizations helped identify and invite individuals and families who are homeless or at-risk. More than 1,000 invitations were personally distributed through Berks Coalition to End Homelessness, Opportunity House and Berks County Veterans Assistance Office.
Food donors include Berks Packing, Feeser, Sysco and US Foods. Collectively, they donate the items needed to make a festive holiday dinner including turkey, side dishes and desserts. The meals are prepared and served by staff and volunteers at Queen City Family Restaurant.
To accommodate the large number of people, Customer’s Bank is sponsoring a heated tent from Knight’s Rental which serves as an extension of the restaurant to house more guests as well as the hub for holiday gifts.
Berks Conference of Churches and Immanuel United Church of Christ, Shillington, worked intently to collect donations of hats, scarves and gloves that are wrapped in gift bags. Also, blankets are supplied by Blankets of Hope – Berks.
Gift bags were made possible by Holleran Center for Community & Global Engagement at Alvernia, which also orchestrates the volunteer manpower. There are teams comprised of volunteers throughout the community who handle fulfillment and packaging of all gift bags, set up and tear down for the event, transportation and traffic control, greeters, servers and more.
Berks County Intermediate Unit (BCIU) provides transportation and the Reading Police Department keeps traffic flowing safely in the vicinity. The Anderson Group provides marketing and planning support.
The People First committee works hard to make the event reflect its true meaning of welcoming people in the community who ordinarily do not feel welcome. This event goes far beyond the meal. It is about giving back. People First supporters encourage other businesses to join them in their efforts and find a unique way to give back to their community.
• 10,000+ individuals have been personally invited for a free meal and camaraderie.
• 600+ volunteers to serve meals, transport guests, provide festive atmosphere.
• 10+ businesses, vendors, non-profits and agencies to provide food, gifts and community compassion.
• Endless smiles, tears of joy, and the genuine gift of giving to those in need to remind each guest that there is hope and they deserve respect. | https://www.bctv.org/2017/10/27/people-first-to-hold-9th-annual-event-at-queen-city-family-restaurant-giving-thanks-with-homeless-at-risk-guests/ |
What are the aims of this research?
Previous research has been successful in identifying genetic changes that increase an individual's chance of developing rheumatoid arthritis. However, it is currently unclear how exactly these changes lead to disease. Therefore, the researchers are aiming to identify how these genetic changes might increase the risk of developing rheumatoid arthritis.
Why is this research important?
By improving understanding of the disease process, it will allow the development of more effective treatments and better targeting of existing treatments. This research will identify the specific genes which are altered by these genetic changes, and therefore are involved in the development and maintenance of rheumatoid arthritis.
The researchers will combine existing knowledge of these genetic changes, with information about how genes are controlled, which is specific to individual cells. This will allow identification of cell processes that are important in rheumatoid arthritis, and help build a complete picture of the disease process. This could allow us to identify subgroups of patients with a greater risk of severe disease or those more likely to respond to certain treatments.
How will the findings benefit patients?
This research has the potential to increase knowledge of why and how some individuals develop rheumatoid arthritis and why it is more severe in some cases. Secondly, it could provide targets for new treatments, or improve the use of existing treatments by allowing doctors to select treatments based on an individual's risk. | https://www.versusarthritis.org/research/our-current-research/our-current-research-projects/rheumatoid-arthritis-investigating-dna-changes/ |
The total market size of has reached $33.3 trillion in 2018, an increase of $10.9 trillion from the housing market crash in 2012. Even though the economic performance plays important roles in influencing the housing market, the house price is also determined by the characteristics of the house itself. In this blog post, I used different machine learning algorithms to predict house price based on features that describe the details of the house, including but not limited to number of rooms, lot size, year built et al.
Exploratory Data Analysis
The Iowa House Price data from Kaggle is used in this analysis. In order to understand the features that are correlated to the sale price, a heatmap of correlation was generated.
There were many features that are strongly correlated with the sale price. The top 12 features were: OverallQual, GrLivArea, GarageCars, GarageArea, TotalBsmtSF, 1stFlrSF, FullBath, TotRmAbvGrd, YearBuilt, YearRemodAdd, GarageYrBlt, and MasVnrArea. The correlation is clearer when it is presented in scatter plot.
The scatter plot showed that there are some outliers in the dataset (circled out in red). These outliers need to be removed to avoid skewing the prediction results.
Target Variable Data Transformations
SalePrice is the target variable that we need to predict. Its distribution also impacts the performance of the machine learning algorithms.
The raw data of SalePrice was right skewed. Since many machine learning models, especially the linear regression, favor normally distributed data, data transformation is required to make the data normal. After log transformation, SalePrice is closer to normal distribution.
Impute missing values
Missing and null values must be handled before training the machine learning model. Visualization of the missing values showed that different variables had different percentage of missing values.
Different strategies were implemented to impute missing values in categorical and numerical features. For categorical features like 'PoolQC', 'MiscFeature', 'Alley', 'Fence' and 'FireplaceQu', the null values mean no feature, and therefore null values were filled with 'None'. For numerical features, like 'LotFrontage', the null values are filled with the median of the neighborhood. Some features, like 'SaleType', had only a few missing values, so using the most frequent values to fill them is feasible.
Feature scaling and categorical feature encoding
Numerical features were standardized using Scikit-learn package StandardScaler. It subtracts the mean and divides by the standard deviation. Therefore, the transformed data will have mean of 0 and standard deviation of 1. The categorical features were transformed using Pandas get_dummies method to generate dummy variables for each categorical features.
Model selection and hyper-parameter tuning
I used cross-validation to assess the performance of the Lasso Regression, Ridge Regression, and RandomForestRegressor in predicting the house price. Lasso (alpha=0.0005) had root mean squared error (RMSE) of 0.1118, Ridge (alpha=1.0) had RMSE of 0.1201, and RandomForestRegressor (default setting) had RMSE of 0.1465. GridSearch was used to search for the best hyper-parameters for each model. Lasso Regression worked best with alpha=0.0005, and Ridge Regression worked best with alpha=18. Within the range of parameter setting, RandomForestRegressor worked best with max_depth=80, max_features=4, n_estimators=200.
Test Results
The test score for RandomForestRegressor is 0.17133, Ridge Regression is 0.11999, and Lasso Regression is 0.12097. Therefore, Ridge Regression performed best among the three algorithms tested. The top 10 absolute value of coefficients for Ridge Regression are listed below:
About Author
Leave a Comment
You must be logged in to post a comment. | https://nycdatascience.com/blog/student-works/iowa-house-price-prediction-using-machine-learning/ |
Join us from November 14-21, 2022 when Kim Evelyn will share reflections on teaching Caribbean Literature at @jwilonline. In an increasingly distracting world pulling our students’ attention in different directions, it can feel like a struggle to keep students engaged in the close reading work of literary studies and foster their appreciation for literary texts. Fortunately, the world of Caribbean literature and cultural studies is rich with compelling texts, controversial ideas, radical figures, and fascinating stories. Educators can tap into this wealth of resources with engaging pedagogical strategies that work in both general literature courses and Caribbean literature courses. Providing recordings of poetry readings/performance poems, documentaries, lectures, and interviews allow students to hear and see writers or other important figures off the page. Assignments such as creating playlists, conducting interviews, writing articles or non-fiction/personal essays, and researching archived works draw students into the joys of close reading and help them see the relevance of literary texts and other cultural products to their own lives and cultures. As a bonus, online tools offer students opportunities to develop career-relevant audience awareness and tech savviness as they collaborate on shared documents, dig into digital archives, or create timelines and maps. In this series, we’ll explore opportunities for engagement in meaningful pedagogy in Caribbean literature and cultural studies. I hope you’ll share your best practices too.
Bio:
Dr. Kim Evelyn is an Assistant Professor of English at Bowie State University where she teaches Caribbean literature, cultural studies, postcolonial studies, and composition. At BSU, Dr. Evelyn has been recognized for her service to students and serves as a Fellow with the Center for Excellence in Teaching and Learning. Her work has appeared in the Journal of West Indian Literature, The Caribbean Writer, Postcolonial Text, Anthurium: A Caribbean Studies Journal, South Atlantic Review, and elsewhere, and is forthcoming in the edited collection, The Affects of Pedagogy in Literary Studies. In addition to Caribbean literature, her research interests include: diaspora, nation, and migration; dub poetry; Creole/Patwah languages in literature; media, propaganda, and advertising; and collaborative, engaged pedagogy. Dr. Evelyn earned her PhD in English at the University of Rhode Island where she taught writing and literature courses and served as Project Manager for the university’s National Endowment for the Humanities NextGen PhD grant. She tweets at @KimCEvelyn
You can read Kim Evelyn’s essay “Using Digital Tools and Collaborative Writing to Engage Students with Kamau Brathwaite’s Poetry” in the April 2022 issue of JWIL. | https://www.jwilonline.org/category/news/ |
Magical non woven is made by PP(Polypropylene), has good water-absorbency. As the inner layer of mask, Magical Hydrophilic Nonwoven can absorb droplet and steam very well.
DETAIL
The HEPA water electret melt-blown nonwoven fabric can prevent and remove the spread of dust, pollen, PM 2.5, and particles that are more than or equal to 0.3 μm.
DETAIL
NEWS
MORE
2022.03.11
IDEA22 Conference & Expo
Read more
2022.03.01
Economy Daily News: Chairwoman Ausra partners with MAG to explore Lithuania business opportunities
Read more
PRODUCT KNOWLEDGE
MORE
2022.05.17
Do you wear masks properly? How to choose the right masks?
Read more
2022.05.04
What are the materials for face masks? | https://www.magicalfilm.com.tw/ |
Total traceability of the laboratory results and information.
To determine the opening and closing torque in bottles and agro-alimentary containers, cosmetics.
Equipment to measure the carbon dioxide content of the beverage inside the glass bottles, PET and cans.
Automatic equipment to determine the opening and closing pair in bottles and agri-food containers,...
Equipment to visually detect leaks.
To control the sealing and vacuum of containers, trays, blisters, cans, bottles, etc. Standard,...
Equipment to evaluate the bursting resistance in PET bottle filling conditions
Calibrated equipment to measure the content of carbon dioxide in beverages, packed in glass...
AMTG is a portable calibrator. Equipment for measuring the thickness of non-magnetic materials,... | https://www.idmtest.com/products/envases-y-botellas-2 |
The utility model discloses a crystal piece installation structure which comprises a lamp fixing top disc, a fixing rope is installed at the bottom of the lamp fixing top disc, two lamp circular rings are arranged at the end, away from the lamp fixing top disc, of the fixing rope, and the bottom end of the fixing rope is fixedly connected with the lamp circular ring above the fixing rope. A crystal piece is arranged between the two lamp circular rings and arranged on the surfaces of the lamp circular rings in a surrounding mode, and grooves are formed in the top and the bottom of the crystal piece. The lamp fixing top disc, the fixing rope, the lamp circular ring, the crystal piece and the grooves are matched with one another, the product is composed of the crystal piece and the hardware, the grooves are formed in the upper end and the lower end of the crystal piece, the hardware is embedded into the grooves of the crystal piece for fixing, time and labor are saved during installation of the crystal piece, the labor intensity of workers is reduced, and the production efficiency is improved. Therefore, the crystal is very convenient to install, the production efficiency of the lamp is improved, and great convenience is brought to a user. | |
is an unusual table object in which Humbert blurs the boundaries between art and design. The series developed for Atelier Haußmann is comprised of 31 unique objects each consisting of a remnant marble slab with a breakpoint, surrounded by a steel angle frame which has been individually composed to match the random shape of the slabs, yet remaining open at the breakpoint.
Each marble top of the tables is different in type of stone, shape and size.
The two Heights are 30 or 35 cm.
Each table is numbered. | https://atelierhaussmann.de/en/produkt/petite-table-dangle/ |
ISBN:
9781119320562
No. of Pages:
456
Publisher:
ASME Press
Publication date:
2017
eBook Chapter
7 Laminar Fluid Flow and Heat Transfer
By
Abram S. Dorfman
Page Count:
34
-
Published:2017
Citation
Dorfman, AS. "Laminar Fluid Flow and Heat Transfer." Applications of Mathematical Heat Transfer and Fluid Flow Models in Engineering and Medicine. Ed. Dorfman, AS. ASME Press, 2017.
Download citation file:
The mathematical models describing the transfer processes are based on the system of the Navier-Stokes equations for momentum transfer and similar equations for energy and mass transfer. These equations are conservation laws expressed in terms of the velocity components, temperature, and concentration. For incompressible fluid flows with constant properties, these expressions are given by equations 1.4–1.8 (without dissipation function S) from Chapter 1 supplemented by equation for mass transfer similar to energy equation, where C is dimension-less concentration and ρDm is the coefficient similar to μ.
This content is only available via PDF. | https://asmedigitalcollection.asme.org/ebooks/book/16/chapter-abstract/554/Laminar-Fluid-Flow-and-Heat-Transfer?redirectedFrom=fulltext |
Article adapted from Seraf: Portfolio Management for Early-Stage Investors
One of the best ways to facilitate the CEO’s future growth and success is by providing them with an annual review detailing how they are doing in the job. It is the responsibility of the board to conduct this review since the board is responsible for hiring and firing the CEO.
A well done review offers tremendous value to the CEO. It should highlight the CEO’s strengths and weaknesses as a leader and strategist. Ultimately, a successful CEO will embrace the feedback, both positive and negative, and apply what they learn to improve overall performance.
Download the Annual CEO Performance Review Form >>
What are the business reasons for an Annual CEO Performance Review?
All directors on a company board hold a fiduciary duty to the company. At the core of this duty is the requirement that a director must exercise good business judgment in the guidance of the business. A well thought-out performance review supports this duty in 3 very important ways:
- Build alignment between board members and the CEO: Determine whether the board and the CEO agree on the near and long term strategy for the business. Building a successful company is hard enough without having the CEO and her board pulling in opposite directions on fundamental topics!
- Improve Board/CEO communications: Help expose situations where directors are frustrated or concerned by the quality and frequency of communications between the CEO and the directors. Better communications will result in better outcomes.
- Develop the CEO: By outlining weaknesses in a CEO’s performance, the CEO can focus on areas to improve in the coming year.
What are some of the key aspects of the CEO Performance Review?
A CEO for an early stage company wears many hats. But, ultimately, there are three areas where she should spend most of her time. Those areas are: Strategy, Team and Finances. To establish an effective annual performance review, clear business objectives must be agreed upon in advance with the CEO. Once these objectives are set, the CEO’s goals for the upcoming year should be outlined, written down, and agreed to.
What should these goals look like? They should:
- Support the strategic objectives of the company
- Measure the CEO’s ability to build her team, establish strategy and lead the organization
- Be tied to the financial performance of the company
In addition to informing the CEO on her performance relative to the board’s expectations and goals, the performance review is an important vehicle for establishing how large (or small) her annual bonus will be. If you put in place well-defined, measurable goals, it’s much easier to agree on the appropriate level of compensation at year end.
What does a CEO Performance Review process look like?
Keeping things simple is one of the best ways to ensure that the job gets done in a timely fashion. There are a number of steps in a performance review, and it will take time. There are ways to make the process more efficient, but someone (usually the board chair or lead director) will have to stay on top of it.
We recommend doing a 360 degree review of the CEO. In a 360 degree review, you will speak to the entire board in addition to speaking with the CEO’s direct reports.
So, what are the steps? We suggest the following:
- At year end, the CEO writes up a self evaluation of goals for the past year.
- Ask all directors and direct reports to review the CEO’s self evaluation.
- Arrange for a 30 minute phone call with each director and direct report. Get their opinion on whether they agree, disagree or otherwise modify what the CEO wrote in her self evaluation. This phone call should be conducted by the board chair or lead director.
- Write up a report that summarizes the key elements discussed during the phone conversations. It can be helpful to include any paraphrased notes from the calls. This gives the CEO a chance to hear “directly” from her evaluators.
- Sit down with the CEO and share the results of the report. In some cases, it’s best to have this conversation one-on-one. In other situations, you might want to have two directors meet with the CEO.
- An optional final step is to present the results of the review at a full board meeting.
There are some important extenuating circumstances that might make this process a bit more challenging than outlined above. If there are some serious relationship issues between the CEO and the board or any direct reports, or if there are major deficiencies in the performance of the CEO, the final steps in the process may need modification. Remember, one of the main goals with a performance review is to improve overall performance in the future. Use your best judgment in how you deliver the results of the performance review to the CEO to achieve the best results.
What are some additional issues to keep in mind during a CEO Performance Review?
In our sample questionnaire there are lots of questions. You shouldn’t expect to ask all of them. Tailor your interviews to what’s important for your company. Make sure the questions you ask are focused on the three main responsibilities of the CEO: Strategy, Team and Finances.
It’s very important to hear directly from the source. That’s why you need to interview the full board, and if you choose to, the entire management team. Delivering the results of the review to the CEO in person is an important step in the process. It can be a challenging conversation. So remember, it’s okay to be critical, but it’s not okay to be adversarial. Don’t just provide performance feedback once a year. It’s helpful if the lead director/chair has an ongoing discussion with the CEO. And finally, good process will lead to improved outcomes and help further develop the CEO.
There’s one last question to ask when thinking about CEO Performance Reviews. Is a performance review appropriate with very early stage companies? We believe the answer is yes, because we think all CEOs can benefit from good, constructive feedback. You might want to scale back some of the formality in the process outlined above. Or, you might want to give more regular, informal reviews throughout the year. But, just because the company is still very young, don’t skip this valuable board responsibility. | https://suitescapital.com/conducting-a-ceo-performance-review/ |
This is addressed in #6357, which is also changing the code here. But the test here looks like something that should be included there.
For what it is worth, I wrote this patch and unit test because I was working on an alternate patch for #6357, and I thought it would be easier for everyone to evaluate my patch and to merge fixes if I broke off this patch and its test into a separate ticket. So I suggest that this unit test and patch should be applied to trunk and then any solution to #6357 should be built on top of this fix. That way trunk will already have this bugfix in it even before it gets a patch for the performance issue (#6357) in.
Again, my motivation here is that I was writing a patch for #6357, and it started to turn into a large patch, and become harder for me to keep in my head. Of course that will also mean it is hard for a reviewer to get into their head. Therefore, I broke off this piece of it, which a reviewer could relatively easily read. I think it would be a mistake to reject this patch on the basis that a larger patch that is (hopefully) coming soon would subsume it.
For what it is worth, my alternate patch for #6357 is complete, passes all current unit tests plus several more unit tests that I added, and has undergone extensive benchmarking, profiling, and optimization. So I would be keen to submit my alternate patch for #6357. The blocker for me is that I think it will be a big and complex process to review it if it comes with all these bugfixes in addition to its primary purpose of optimization.
Thanks for your work on this zooko. Sorry about the long turn-around. :(
There is some obvious intermediate debugging cruft left in this patch that no doubt needs to be cleaned up.
There seems to be a lot of implementation changes. Are these really all necessary to make the new test pass? The patch you supplied in the ticket summary makes me suspect it isn't.
The new stringchain dependency sadly requires some discussion. At a minimum, the license will need to be changed before Twisted may depend on it. Hopefully this can be deferred to a later ticket, since it seems stringchain isn't actually required to make this new test pass in a reasonable way.
There are some variables in the unit test that aren't named according to the naming convention. There are also some whitespace issues.
The attached patch doesn't cover as many edge cases as the patch in the ticket summary. Did you decide those cases aren't important?
Hm, I seem to have attached the wrong patch as attachment:linereceiver-remnant-fix.patch. That attachment looks different from the in-line patch that I pasted into the original comment, and the latter looks more correct, and the latter doesn't have the problems that exarkun objected to in comment:6. My apologies! I'll double-check and submit the correct patch.
Okay, here is the correct patch (which is indeed the one pasted into the original description). I followed https://twistedmatrix.com/trac/wiki/BasicGuideToContributingCode to produce this. I ran the unit tests with the part of the patch that adds a unit test but without the part of the patch that fixes the bug, confirmed that the test detects the bug, then applies the part of the patch that fixes the bug and re-ran the tests and confirmed that this made the test go from red to green.
| |
If you have been trading for a while, you may have noticed that when a specific currency pair rises, the other pair falls. For example, if EUR/USD is going up, USD/CHF is going down. Have you also noticed that when one currency pair is going up or down very fast, the other currency pair does the same thing but in the opposite direction?
This is called currency correlation, which refers to a statistical measure of how two currency pairs move in relation to each other. Whenever the currency pair value rises, a positive correlation is formed. On the other hand, a negative correlation is said to be present when one currency pair falls as the further increases.
As a trader, you need to understand and monitor currency correlation as it strongly affects trades and significant risk in your portfolio. For example, if you hold two pairs with a strong positive correlation and both start to move against you, your losses will be magnified.
We’ve got Ezekiel Chew, an experienced trader with over 20 years of experience and educator at Asia Forex Mentor, to share his take on Currency correlation and how traders should trade them. We will share his POV on calculating correlation, trading pairs, tools that can be used to track correlation, and more.
Table of Contents
- What is Currency Correlation?
- Correlation Coefficient Formula
- Forex Correlation Pairs
- Forex Correlation Table
- Currency Correlation Hedging Approach
- Commodity Forex Correlation
- Pairs Trading
- How To Trade Currency Correlation Pairs
- Best Forex Trading Course
- Best Forex Brokers
- Conclusion: Currency Correlation
- Currency Correlation FAQs
What is Currency Correlation?
In the trading world, correlation measures how two currency pairs move in relation to each other. Currency correlation is a measure of how closely two currency pairs move up or down at the same time. The aim is to establish whether two currency pairs move in the same direction (positive correlation), in opposite directions (negative correlation), or are random.
All the stock pairs that show the random movements without any unconnected relationship do not correlate. So, what does it depict? It means that the changes in one will not affect or influence the other. On the other hand, if two currency pairs have a perfect positive correlation, they will move in the same direction. Most traders may ignore the perfect positive correlation as it rarely exists; however, it can affect the trading results.
Mathematically, correlation is represented using a Correlation Coefficient formula that ranges from -1 to +1 or -100 to +100. A coefficient of +1 indicates perfect positive correlation, while a coefficient of -1 indicates perfect negative correlation.
When a stock pair’s value is in the positive range of 1000, the assets move in nearly the same direction. If it is above -100, forex pairs move in almost identical but opposite directions. However, a currency pair with a coefficient close to 0 generally means that the relationship between the two currency pairs is small and not worth worrying about.
Correlation Coefficient Formula
The correlation coefficient rate is generally calculated by using the below formula.
You may feel the correlation coefficient formula is complicated, but that’s not the case. The overall idea is that it compares data points representing two pairs (X & Y) to the average reading in each pair. As a result, the bottom equation component represents the standard deviation, while the top component represents covariance.
Forex Correlation Pairs
Currency correlation is not exclusive to just two currency pairs. However, it can be measured for a group of currency pairs, especially when you have multiple positions open simultaneously.
The table below compares the forex link between the world’s most widely traded currency pairs. It will be more helpful to compare the currencies on the x-axis to those on the y-axis to see how they are connected. For instance, the correlation between GBP|USD and EUR|USD is 77, which is pretty high.
Forex Correlation Table
Although the Forex correlation pairs may not move in the same direction, they move together. On the other hand, the EUR|GBP, and GBP|USD from a strong negative correlation is at -90.
According to the above statement, most move in opposing directions. Currency correlations must be monitored since even the tiniest currency pair table may contain several significant ties.
For example, if you are a trader, you can buy GBP|USD, vend the EUR|GBP, and expect to represent two different forex markets. Pairs, on the other hand, have a strong negative correlation, indicating that they move in opposing directions. As a result, the trader may lose or win money on them because the two teams and not fully independent currency trades are linked.
Currency Correlation Hedging Approach
A forex correlation strategy can be used to hedge risk. When you utilize a hedging strategy, you essentially take two different trades correlated to offset the risk in your portfolio. For example, forex traders can hedge stock market positions by taking trades in correlated pairs that move in the same direction.
As a trader, you can attain a currency hedge if you lose from one currency trade. So, it can be a result-driven strategy for a trader who does not want to exit a particular position but merely intends to minimize or offset their loss when the pair retreats.
Remember that hedging with correlated currency pairs is not always easy. The forex market moves quickly, and managing two trades in different directions can be very difficult.
Commodity Forex Correlation
Different commodities and raw materials feature correlation currencies. The table below compares the link between some of the world’s most widely traded commodity currency pairs.
The above table showcase that XAU|USD (gold) shows little correlation with other currency pairs. However, it is highly correlated with XAG|USD (silver), which is not surprising given that both precious metals tend to move together. The table also shows the strong positive currency correlation of gold which is 81 with XAG|USD (silver). If you are trading with gold or any other major currencies, you can use such analysis to take long- or short-term positions in various currencies.
Pairs Trading
Pairs trading is a strategy forex traders use to take advantage of the relationship between two currency pairs. Forex traders can sell the pairs that are moving up and buy the pairs that are moving down. In order to do this, the trader must have a strong understanding of forex correlation. The idea of pair trading allows the currency to move up as they share a high correlation history. Therefore, it can be the best possible approach for better conversions.
Despite that, it is possible that the pair may not go up again. This is because most forex trades set up a stop-loss order on the positions to eliminate risk to manage losses. Remember that a profit can be earned on one trade by offsetting a loss on another, even if the pairs return to their initial correlation. To put it another way, the sold position may fall while the purchased position rises when the pair’s mean-revert trend is resumed. This condition results in both sides making money.
You need to understand trading pairs better and invest in a position to manage risk using a currency correlation approach. Moreover, opt for the small percentage to trade based on where you want to place the stop loss. For example, if the stop loss is set at 30 pips within the EUR/USD exchange rates, it implies a risk of about $3. To match a 1% value in the account, the forex trader must have a minimum balance of at least $300. As a result, they can assist in limiting performance and trade risk
How To Trade Currency Correlation Pairs
Several approaches can be used to trade currency correlation pairs. It includes techniques like commodity correlation, hedging, and pair trading. The steps that are essential for trading and making profits has:
#1. Open A Live Account
When you are ready to start trading, the first step is to open a live account with a broker, or you can use virtual fund practices.
#2. Research Market
You should not step into the market without prior knowledge. So, always take your time to research the market and learn currency pairs like interest rates, inflation, and economic data.
#3. Choose a Currency correlation strategy
After doing your homework, the next step is to decide which currency correlation strategy you want to use.
#4. Risk Management
The most crucial thing in trading is risk management. You should always set stop-loss and take-profit orders to minimize your losses in volatile markets. However, remember that these tools don’t protect your investment slippage.
#5. Open a trade
When you have chosen your strategy and set your orders, it’s time to open a trade. Always monitor your positions and ensure that your stop-loss orders are in place. Moreover, determine the entry and exit points.
Best Forex Trading Course
The best Forex trading course is the One Core Program from Asia Forex Mentor by Ezekiel Chew. While trading skills are lucrative, it may take you so long to grasp what works and what doesn’t. It builds your skills from the viewpoint of a new trader with fear into an advanced trader working with strategies.
Your best option is a great course. Trainers and mentors are aware of what will help you conquer the markets. Fumbling alone can waste your chance at a lifetime career in trading. A course helps you fast-track on a tried and tested model.
Many traders make a final stop at the One Core Program. Which is among the top ten credible courses you can bank on? Traders go on to hit six-figure trades following a proven model. It’s a course that has helped retail and institutional traders transform their trading careers.
|RECOMMENDED TRADING COURSE|
REVIEW
VISIT
#1 Forex, Crypto and Stocks trading course. Ranked most comprehensive by Investopedia and Best by Benzinga. Free to Try!
Best Forex Brokers
|Broker||Best For||More Details|
| |
securely through Avatrade website
|Broker||Best For||More Details|
| |
securely through FXCC website
Conclusion: Currency Correlation
Currency correlation pairs are a great way to diversify your portfolio and limit risk. You can use hedging, pair trading, and commodity correlation strategies to trade these pairs. However, it’s important to understand how they work before you start trading for better risk management. Moreover, always research the market, set stop-loss orders, and use risk management strategies to protect your initial investment.
Currency Correlation FAQs
How do currency pairs affect each other?
Currency pairs affect each other because they are inversely correlated. Whenever the two different currency pairs increase in value, the positive correlation is said to be strengthened, and when they decrease in value, the negative correlation is said to be weakened.
How do you use currency correlation?
You can use currency correlation to trade multiple currency pairs at the same time. By looking at the correlation coefficients, you can see which pairs are moving in the same direction and which pairs are moving in opposite directions. Always learn before applying the currency correlation techniques such as economic data, interest rates, etc. When the reading is under -70 and greater than 70, the movements of the two pairs are mirrored each other. When readings are between -70 and 70, it indicates less correlation between the pairs. | https://www.dumblittleman.com/currency-correlation/ |
Novavax Inc. (NASDAQ: NVAX) is currently trading at around $12.18, a price level that means its value has jumped 244.09% higher than its 52-week low. In intraday trading, NVAX shares have hit a high of $12.35 and a low of $10.10. The last 52 weeks have seen the company’s shares touched a high of $17.71 and a low of $3.54, while recent trading session has witnessed an intraday change of just 7.60%. That was after the news story published on Mar-04-20 that was titled ‘5 Drug Makers to Gain From Coronavirus Outbreak’.
Comparatively, NVAX’s year to date performance is at 184.42%. The 7-day charts show that the stock’s price has jumped by 22.78% over the last week and 66.23% over the past month. The stock has an ATR of 1.66, while if we factor in its price changes, we note that the weekly volatility stands at 23.32% and 12.69% over 1 month.
Looking at the overall sentiment about this stock we find that the community has adopted a bearish outlook, a sentiment shared by analysts offering their price forecasts for the stock for the next 12 months. Analysts have given Novavax Inc. (NVAX) a consensus price target of 14.25, which is noticeably above its current trading value. The analysts estimate the stock will hit a 12-month high of $27.50, while a downturn for the stock is likely to see it drop to a low of $6.00. When we calculate the distance from the median price, we find that the stock will move 13.0% from its price at the previous close to touch the estimated average price. An upside towards the 12-month high will see the stock climb 55.71%, while a decline to the 12-month low will see the stock lose -103.0 of its current value.
With this outlook, analysts have a consensus recommendation rating of 2.30 for the stock, suggesting that investors Overweight the stock. B. Riley FBR issued a stock update for Novavax Inc. (NVAX) on November 27, 2019 in which the firm assigned “Buy” rating. H.C. Wainwright on August 14, 2019 rated the stock at Buy. Although bearish, it is notable that the stock is well above its 200-day simple moving average by 120.48%, while it is 78.90% above and 38.43% above its SMA50 and SMA20 respectively. The volume of shares traded in the last session stands at 2.54 million against a 3-month average of 6.10M.
Let us look at how the company has attracted institutions in recent months. Records show that institutional investors own 21.40% of the Novavax Inc. (NVAX) total float.
Meanwhile, InflaRx N.V. (NASDAQ:IFRX) has lost -88.89% over the course of a year, with the price now at $4.30. According to a GlobeNewswire story on Feb-26-20, ‘InflaRx Announces Positive Initial Data from Ongoing Phase IIa Open Label Study with IFX-1 in Patients Suffering from Pyoderma Gangraenosum’. The shares of the company were last trading at -4.87% lower, and went as high as $4.76 on the 04th of March. At the last trading session, the prices were ranging between $4.4501 and $4.76. The shares of the company are below the target price of $3.68 by 14.42%. The current market cap of the company is $125.70M. The latest development has seen the stock’s price achieve a 10.91% lead over SMA 50 and a reduction of -91.90% over its 52-week high. The stock also recorded a gain of 30.26% in the past one month, 26.97% gain in 3 months, and 60.28% gain in six months. Measuring its price variation, the volatility of IFRX during past week was calculated to be 19.58% while that of a month was 12.96%.
So what does the analyst community expect in terms of the company’s earnings for the quarter, year and beyond? Well, earnings per share. The company’s diluted trailing 12-month EPS is -$2.11 and -$2.38 for the next quarter but will shrink at -16.70% for the year. Earnings per share will decrease by -3.80% for the next fiscal year. 5 analysts project the company’s quarterly earnings year-over-year will decline -111.40%.
Taking a closer look at the price potential of the IFRX stock, the company needs to record a growth of 6.98% before it can be able to surge past its median price target of $4.00. To determine the directional movement of the stock, its 50-day moving average is $3.88 while its 200-day moving average is $4.86. With liquidity very critical in the stock market, IFRX has around 27.81M shares outstanding that normally trades 17.05M of its float. The price of IFRX recently witnessed a 5-day loss of -6.80% with 0.58 average true range (ATR). The stock now has its RSI stands at 51.53.
Analysts are estimating that the IFRX stock price might go up by 6.98%. This was concluded after the high price target price of $4.00 was set for the shares to achieve over the next 12 months. Analysts also expect that traders would keep the stock price minimum within the range of $3.00. If that happens, then the stock will gain by 30.23% from its current price. All in all, the price of IFRX has increased by 14.14% so far this year.
iCAD Inc. (NASDAQ: ICAD) is currently trading at around $15.03, a price level that means its value has jumped 271.11% higher than its 52-week...
ABOUT US
Our company helps in establishing and molding world-class journalists in our organization. We have earned several awards on the collective of authors and employees of our agency makes the greatest possible efforts in order to fulfill the formulated tasks as quickly and as qualitatively as possible | |
http://apnews.excite.com/article/200609 ... THJ80.html
WASHINGTON (AP) - It's more than idle doodling and the meaning is unclear. But there's one thing researchers are sure of: The insect, ear of corn, inverted fish and other symbols inscribed on an ancient stone slab is the earliest known writing in the Western Hemisphere.
The arrangement and pattern of the symbols suggest the ancient Olmec civilization was using written language roughly three centuries earlier than previously proposed.
"We are dealing with the first, clear evidence of writing in the New World," said Stephen Houston, a Brown University anthropologist. Houston and his U.S. and Mexican colleagues detail the tablet's discovery and analysis in a study appearing this week in the journal Science. | https://archaeologica.org/forum/viewtopic.php?f=4&t=848 |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.