content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
The accurate determination of dose when studying nanoparticle--cell interactions is essential for quantitative particle toxicology and pharmacology.^[@ref1],[@ref2]^ With nanoscale particulates, this is far from straightforward as the complex and varied mechanisms of interaction with cells mean that the exposure dose does not directly correlate to quantity of particles actually internalized.^[@ref3]^ A layer of complexity comes from the multivariate nature of these interactions, with nanoparticle diameter, morphology, surface area, surface charge, and surface chemistry/coating all influencing the dispersion of the nanoparticles and subsequent cellular uptake and response.^[@ref4]−[@ref6]^ The standard dose concentration formulation of weight per unit volume of cell delivery solution does not account for any of these parameters as it quantifies only the totality of material rather than the discrete structural units of which the dose is composed. The fundamental dose measure must therefore always be the particle number internalized per cell or even the number internalized to a specific organelle per cell. This raises serious challenges to metrology as nanoscale measurement is required, under experimental conditions, that is, of nanoparticle concentration and dispersion within cell culture medium for *in vitro* assays (exposure dose) and of nanoparticle concentration within cellular tissue (*i.e.*, dose delivered). The cellular internalization of nanoparticles has been extensively studied,^[@ref7]−[@ref12]^ but while quantification of total exposure dose is routinely reported, there are fewer studies on intracellular quantification and distribution at the single particle level. There are reports on cytoplasmic *versus* vesicle-bound particles,^[@ref13]^ plentiful instances of descriptive EM, and a few comprehensive, statistically robust studies of particle count.^[@ref14],[@ref15]^ Here, we demonstrate that calibration of cytometry techniques by electron microscopy-based nanoparticle (NP) counts in cell sections enables quantification of NPs internalized by endocytosis in tens of thousands of cells at a time. Progressing further, even when a reliable and accurate measure of nanoparticle dose has been established, the prediction of dose--response characteristics still requires knowledge of the biological processes which determine the pharmacokinetics of nanotoxins and nanopharmaceuticals. More specifically, when endocytosis and exocytosis control particle uptake and expulsion,^[@ref8],[@ref9],[@ref16],[@ref17]^ particles are commonly encapsulated within intracellular vesicles which can only be viewed as the effective unit of dose^[@ref18]^ if the vesicles are not expelled or fused over the time scale of the measurement^[@ref19]^ or that biological degradation within such vesicles has not had time to alter the physiochemical properties of the particles.^[@ref20]−[@ref22]^ Regardless of the temporal stability of vesicles, in proliferating cells, the dose will exhibit abrupt and significant dilution due to cell division.^[@ref23]^ It is this process of nanoparticle inheritance which we report on here. The evolution of particle dose across cell generations must be appreciated if accurate toxicological models are to be developed.^[@ref24]^ In nanomedicine, dose dilution upon mitosis is a crucial determinant of therapeutic efficacy, especially as much of the effort in this area is focused on cancer medicine where rapid cell proliferation is a hallmark of the disease.^[@ref25]^ Consideration of nanoparticle inheritance leads to an important question---what is the unit of inheritance? While it is particle dose that we wish to quantify, for endocytically active cells, it is actually NP-loaded vesicles that are directly inherited. These nanoparticles are secondary, indirectly passing to daughter cells as vesicular cargo. Our previous studies of nanoparticle inheritance, using fluorescent nanoparticles (quantum dots) to quantify dose, indicated a marked asymmetry in the partitioning of fluorescence between daughter cells.^[@ref26]^ This asymmetry has also been reported in other studies.^[@ref27]^ Our measurements of vesicle partitioning, however, present a more ambiguous picture in which the inherited vesicle asymmetry is not as marked.^[@ref18]^ In this paper, we show that this important discrepancy can be resolved by proper consideration of the appropriate metric for dose---the nanoparticle. That knowledge of particle number, plus the form of its vesicular packaging within the cell, is required for accurate prediction of dose kinetics. Arguably, the most ideal technique to address nanoparticle dose quantification, in terms of spatial resolution, is three-dimensional (3-D) imaging using electron microscopy (EM) to provide a direct measure of particle size, localization, and count throughout the volume of the cell. This is technically possible but is a highly specialist technique requiring extensive expertise and, even with careful sampling, is challenging and time-consuming to implement for mass cell analysis or under cell culture conditions.^[@ref14],[@ref15]^ The practical technology, commonly applied for nanoparticle dose assessment, is high-throughput optical cytometry (automated microscopy or flow cytometry). This is widely available and capable of rapid, mass measurement of cells^[@ref28]^ but cannot deliver individual nanoparticle counts owing to the diffraction-limited resolution of optical/UV imaging techniques. To bridge these approaches, there is a need for calibration studies linking low-throughput, high spatial resolution nanoscale measurements to surrogate quantifiers of dose that have lower spatial resolution but which are suitable for high-throughput measurement, such as particle fluorescence^[@ref29]^ or magnetic moment quantification.^[@ref30]^ In this paper, we present a series of such calibration measurements, relating full 3-D EM imaging of quantum dot nanocrystals within a U-2 OS, osteosarcoma cell line, to fluorescence-based dose quantification by flow cytometry. The approach is based on statistical sampling of low-throughput nanoscale EM measurement sets to construct probability distribution functions (PDFs) of quantum dot (QD) particle dose. These are then calibrated to optical measurement sets and used to generate much larger computational data sets from which simulated fluorescence distributions can be validated by comparison to experiment. Results {#sec2} ======= Intercellular Dose Variation {#sec2.1} ---------------------------- Robust measurement of nanoparticle dose within cells relies on large data sets to obtain statistical accuracy and requires data on \>10^3^ cells; for this, we use rapid-throughput flow cytometry. The starting point is measurement of particle dose per cell, identified by the integrated fluorescence from the quantum dots encapsulated within the cells, in this case by endocytosis. A typical fluorescence intensity histogram from 10 000 cells is shown in [Figure [1](#fig1){ref-type="fig"}A](#fig1){ref-type="fig"}. The cell culture had been exposed to a 10 nM concentration of quantum dots for 1 h, following which the excess nanoparticles were removed with a series of washes; after a further 24 h incubation period, cells were fixed and prepared for measurement (see [Methods](#sec4){ref-type="other"} section). In previous studies using this quantum dot system, the fluorescence intensity proved to be stable over 70 h following encapsulation within cells.^[@ref18]^ There is marked variation in the cellular fluorescence with the distribution showing a standard deviation of 0.68 relative to the mean. To understand this heterogeneity, we need to consider the distribution of QD particles taken up by cells, and as we have previously shown, uptake here is driven by endocytosis so the count metric is the number of nanoparticle-loaded vesicles per cell (the term "vesicle" is used here as a general term for a membrane-bound, intracellular organelle; that is, no distinction is made between early endosome, late endosome, or lysosome). To achieve this, we use imaging cytometry to provide spatial information on the localization of quantum dots within cell vesicles. A representative panel of cell images (31 from 5000) is shown in [Figure [1](#fig1){ref-type="fig"}B](#fig1){ref-type="fig"}. Automated image masking using the QD fluorescence signal and subsequent automated counting of mask spots provides a count of nanoparticle-loaded vesicles per cell image, the histogram of which is shown in [Figure [1](#fig1){ref-type="fig"}C](#fig1){ref-type="fig"} (red circles). The probability distribution function has an overdispersed form and is well-described by a Polya distribution function (solid line) with mean μ = 7 vesicles per cell and overdispersion factor *b* = 0.25 (see [Methods](#sec4){ref-type="other"} section for details on the mathematical form of this particular PDF function). It is clear that the dose heterogeneity seen at the whole cell level is in part due to a marked variation in the number of vesicles per cell which ranges from 0 to \>30. ![(A) Histogram of quantum dot fluorescence intensity per cell, 24 h after endocytic uptake of the dots (10 nM concentration, 1 h exposure), showing a marked variation in individual cellular dose. (B) Cell optical images (fluorescence overlay on bright-field images) confirming the variation in dose and indicating the spatial location of particle-loaded vesicles. (C) Measured probability distribution of vesicles per cell (red circles) can be fitted by an overdispersed Polya distribution function (black line).](nn-2013-019619_0001){#fig1} Intracellular Particle Dose and Packaging {#sec2.2} ----------------------------------------- To probe within the cellular vesicles requires sub-micrometer resolution imaging, and so for this we use electron microscopy. A set of transmission electron microscope (TEM) images of vesicles within a cell section, typically 100 nm thick, are shown in [Figure [2](#fig2){ref-type="fig"}A](#fig2){ref-type="fig"}. The high density inorganic quantum dots contain atomically heavy elements (Cd, Se, and Zn) and are crystalline, producing strong image contrast (both mass--thickness and diffraction) such that the particles are easily discriminated as dark ∼10--15 nm regions (black spots) in the bright-field TEM image. Counts of particle number per vesicle section for 391 vesicles taken from 102 cells are collated in the histogram in [Figure [2](#fig2){ref-type="fig"}B](#fig2){ref-type="fig"}. ![(A) TEM images from a single cell sections, 100 nm thick; top left image shows the complete cell section, while other images show a selection of vesicles within the cell with a large range of quantum dot loading (10 nM dose, 1 h exposure followed by 24 h incubation); the bottom right-hand section has been falsely colored to indicate the results of the QD counting algorithm; blue spots correspond to isolated QDs, red spots refer to QDs in contact with other nanoparticles. (B) Measured probability distribution of quantum dots per vesicle section (red circles; 102 cells and 391 vesicles) fitted with a biexponential function (black line).](nn-2013-019619_0002){#fig2} The most striking aspect of the images is the 3 decade range in the encapsulated number of particles per vesicle section; the frequency of which displays a biexponential distribution (fitting parameter values given in the [Methods](#sec4){ref-type="other"} section). Analyses of the causative processes which underlie this number distribution are beyond the scope of this paper; however, we note that TEM studies of the quantum dot dispersion in cell culture media indicate a similar form for the size distribution of particle agglomerates.^[@ref31]^ This suggests a direct transfer of agglomerates into the cells through an endocytic internalization processes that is independent of (agglomerate) size. The biexponential, probability distribution function in [Figure [2](#fig2){ref-type="fig"}B](#fig2){ref-type="fig"} (solid line) enables prediction of the particle dose across a set of vesicles. A typical *in vitro* cytometry assay involves measurement of 10 000 cells, each with many nanoparticle-loaded vesicles (typically 5--30 vesicles per cell), and so knowledge of the probability distribution function is essential for accurate prediction of dose. In addition to vesicle counts, the optical microscopy images provide a surrogate measure of particle number through the total fluorescence intensity per vesicle section. Thus a comparison of the electron and optical microscopy can be made using the QD particle number histogram shown in [Figure [2](#fig2){ref-type="fig"}B](#fig2){ref-type="fig"} and the distribution of fluorescence intensity per vesicle section. This is presented as a cumulative frequency distribution in [Figure [3](#fig3){ref-type="fig"}](#fig3){ref-type="fig"} for sample sets of 391 TEM images and 690 fluorescence images. The integrated fluorescence intensity is calculated from the image set shown in [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"} using the masked areas to identify individual nanoparticle-loaded vesicles. An absolute correlation of fluorescence intensity to QD particle number is not possible due to the different transverse sampling of the electron and optical microscopy; the microtome sections for TEM are ∼100 nm thick while the imaging cytometer has a depth of field of ∼1 μm (objective lens NA = 0.75, λ~QD~ = 705 nm). However, the form of the two data sets can be compared, and this shows a close correspondence, indicating that the distribution in fluorescence intensity per vesicle optical section does correlate to a variation in individual nanoparticle number per vesicle EM section. ![Cumulative frequency distribution of QD particles per vesicle measured by TEM (red stars and lower *x*-axis; taken from the data presented in [Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}) and QD fluorescence intensity per vesicle measured by flow cytometry (blue circles and top *x*-axis; taken from the data presented in [Figure [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"}).](nn-2013-019619_0003){#fig3} Calibration of Cellular Dose {#sec2.3} ---------------------------- The results presented in [Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"} detail the nanoparticle number per vesicle in ∼100 nm thick cell sections; therefore, to obtain the total particle dose per cell for a complete calibration of the quantum dot fluorescence, the TEM data from 2-D sections have to be related to the whole cell volume. To estimate the sampling fraction within the subvolume of a cell, we use serial block face backscattered electron imaging in a scanning electron microscope (SEM) containing an in-chamber microtome that slices a resin-mounted block of cells with accurate conformation of successive 2-D images of the exposed cell surfaces. This allows full 3-D image reconstructions from a group of cell sections.^[@ref32]^[Figure [4](#fig4){ref-type="fig"}A](#fig4){ref-type="fig"} shows a 2-D representation of such a 3-D reconstruction in which agglomerations of quantum dots can be seen, both on the outer cell membrane and internally within membrane-bound vesicles. The serial section thickness used to slice the cells by the SEM microtome is the same as for the TEM analysis (*ca.* 100 nm), and simulations of the electron penetration (Casino Flight simulator v2.42; further details in the [Supporting Information](#notes-1){ref-type="notes"}) predict an interaction volume of ∼170 nm and a maximum backscattered electron emission depth of ∼70 nm (*i.e.*, comparable to or less than the section thickness). Area analysis of the particle content in each of the 100--150 individual sections across whole cells and within the total cell volumes provides an estimate of the fraction of the total quantum dot content to be found within a typical 2-D section. The resolution of the backscattered electron imaging (the pixel size was limited to be 17 × 17 nm and the voxel size 17 × 17 × 100 nm) is not sufficient to resolve single QD particles within dense agglomerates, and so we use the total area of QD clusters as the metric for quantification. [Figure [4](#fig4){ref-type="fig"}B](#fig4){ref-type="fig"} shows a histogram of the percentage of QD area within a single section to that summed across all cell sections; the data are an amalgamation of 453 sections taken from three cells; the mean value is 0.67% of the total cell area exposed in a section, which implies a 2-D to 3-D multiplying factor of 150. As the TEM images of the QD particle-loaded vesicles are a randomly selected set, both in terms of the transverse position of the cell section and the cell identity, we can use this mean value multiplying factor to scale the QD particle count PDFs and make an approximate conversion of the section-based particle counts to a whole cell particle number. ![(A) Two-dimensional representation of a 3-D reconstruction of a series of serial block face SEM images of a QD-loaded cell; QDs on, and those encapsulated within, the cell can be identified and distinguished. (B) Frequency distribution of QD area fraction within a single 2-D image slice of a cell (the "loading" is expressed as a percentage of total cell area exposed in each respective slice). The mean area loading is 0.67%.](nn-2013-019619_0004){#fig4} Given the variability in both QD particles per vesicle section and vesicles per cell, it is essential that population-wide, statistical measures are used to quantify the dose, for probabilistic approaches are the only robust option when the individual quantities are subject to such large variation. We therefore use random sampling of the PDFs shown in [Figures [1](#fig1){ref-type="fig"}](#fig1){ref-type="fig"} and [2](#fig2){ref-type="fig"} and the 2-D to 3-D conversion factor above to obtain frequency distributions of vesicles per cell and of particles per vesicle and from these construct the predicted particle dose across a large population of cells. The predicted dose for a population of 10 000 cells, obtained from sampling of the PDFs, is shown in [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"} (solid black line). ![Predicted (black line) and measured (red line) frequency distributions of QD particles per cell (measured data are scaled by calibration factors obtained from the optical vesicle count and TEM-based particle count data).](nn-2013-019619_0005){#fig5} The cytometry data provide a measure of the "whole cell" fluorescence which is a good surrogate of total particle number for QDs with stable emission. A single scaling factor is introduced to transform the arbitrary measurement base of fluorescence unit to a count of particles per cell. The predicted dose distribution is in excellent agreement with the measured data (Pearson coefficient, *r* = 0.96), thus confirming the validity of the statistical sampling approach to correlate individual particle counts to whole cell fluorescence measurement. The calibrated distribution has a mean dose of ∼2.4 million QD particles per cell. Counts of nanoparticles (targeted for endocytic uptake) per cell have been reported for a range of cell types, using direct counting from EM images,^[@ref14],[@ref15]^ measurement of cell magnetization in the case of magnetic particles,^[@ref13],[@ref33],[@ref34]^ and by atomic spectroscopy;^[@ref35]^ values reported span the range of 10^3^--10^7^ per cell. Thus our results are within the bounds previously reported and provide further evidence that, on average, extremely high numbers of QD particles targeted for endocytic uptake are internalized per cell. Dose Inheritance {#sec2.4} ---------------- Having confirmed the validity and accuracy of dose prediction from knowledge of QD particles per vesicle and vesicles per cell, the evolution of this dose in a proliferating cell population can be analyzed. Specifically, we model the dilution and partitioning of particle dose into daughter cells that occurs within a further 24 h time period. This is compared to measured dose distributions obtained from flow cytometry measurements taken at 24 and 48 h after exposure and constructed from the fluorescence intensity histograms using the *x*-axis scaling factor already reported. The dose inheritance is modeled using a binomial partitioning probability to decide which daughter inherits each vesicle.^[@ref18],[@ref36]^ This is done for all vesicle-enclosed particle clusters used in the construction of the 24 h dose profile in [Figure [5](#fig5){ref-type="fig"}](#fig5){ref-type="fig"}; that is, random sampling of the predicted dose for a population of 10 000 cells using a binomial portioning probability distribution generates the number of parent vesicles to be inherited by each daughter:where *B* is the probability of daughter 1 inheriting *d* vesicles from a parent containing *n* vesicles when the mean inheritance probability is *p*; *d′* is the number of vesicles inherited by daughter 2. Previous work on this cell line indicates that the mean cell cycle time is 20.5 h,^[@ref23]^ and so there will be a small percentage of the population which progresses through two rounds of division within the 24 h time period (individual cells are assumed to be randomly distributed throughout the cell cycle at the 24 h time point). To account for this occurrence, a second round of binomial partitioning is imposed on 17% of the daughter cells. Predicted and measured distributions are shown in [Figure [6](#fig6){ref-type="fig"}A](#fig6){ref-type="fig"} for a *p* value of 0.55; that is, the best fit is obtained with only a slight asymmetry in the mean probability of vesicle inheritance; however, this results in a much wider dose distribution of QD particles per cell because of the large variation in QD loading per vesicle. The importance of random inheritance is shown by [Figure [6](#fig6){ref-type="fig"}B](#fig6){ref-type="fig"}, which depicts the expected dose in the case of strict 50:50 splitting of particle dose (*i.e.*, *p* = 0.50). Systematic, symmetric partitioning maintains the distribution shape and moves it to half of the parent dose, it is clear that this is not in agreement with the present experimental evidence. ![(A) Measured (colored lines) and predicted (*p* = 0.55) (black lines) frequency distributions of QD particle load per cell, 24 h (red experiment curve) and 48 h (green line) post-loading (10 nM concentration, 1 h exposure). Notably, in the predicted curve, the vesicles per cell were sampled with only a slight asymmetry of inheritance, but because of the large variation in QD loading per vesicle, this results in a much wider dose distribution of QD particles per cell. (B) Experimental data shown with predictions assuming strict 50:50 partitioning of particles between daughter cells. Clearly, this does not fit the experimental observations.](nn-2013-019619_0006){#fig6} The reduction in peak value and the increased width of the dose distribution at 48 h is due to dispersion (driven by unequal partitioning of nanoparticles between daughter cells), stemming from two sources: the randomness of vesicle inheritance (given by the binomial partitioning above) and the variability in particle load of each vesicle ([Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}). The inheritance variability is shown in [Figure [7](#fig7){ref-type="fig"}A](#fig7){ref-type="fig"}, which plots the distribution of the partitioning fractions used in modeling the vesicle inheritance. Binomial partitioning of low numbers of vesicles (typically \<30) leads to a wide range of inherited dose as the variance in binomial trials is proportional to √*n*. The particle-loaded vesicle inheritance variability is shown in [Figure [7](#fig7){ref-type="fig"}B](#fig7){ref-type="fig"}, which is a scatter plot of the particle inheritance as a function of nanoparticle-loaded vesicle inheritance; that is, uniform loading of the vesicles would give equal fractions and produce a straight line at 45° to the axes. The large heterogeneity in the numbers of particles loaded into each vesicle and the relatively low number of loaded vesicles per cell can lead to a marked difference in the fraction of QD-loaded vesicles and thus particles inherited. The Pearson correlation coefficient of the data sets is 0.71, indicating a positive but imprecise relation between the inheritance of particle-loaded vesicles and of total particle number. The variance of particle load per vesicle introduces an asymmetry as excessively high (or low) loaded vesicles skew the fraction of particles inherited, especially at low parent vesicle number where the influence of outliers becomes significant. ![Statistics of predicted particle inheritance. (A) Probability distribution of vesicle partitioning fraction inherited by daughter cells. There is only a slight asymmetry to this, suggesting that the vesicles are inherited in a near random manner (*i.e.*, a near 50:50 split on cell division). (B) Dot-plot of % of particles inherited *versus* % of nanoparticle-loaded vesicles inherited. There is a nonlinear relationship because of the variation in particle load within measured vesicles ([Figure [2](#fig2){ref-type="fig"}](#fig2){ref-type="fig"}). The solid black line highlights the condition of equality in fraction of vesicles and of particles inherited (uniform loading of vesicles).](nn-2013-019619_0007){#fig7} Conclusions {#sec3} =========== We have shown that through the use of limited cell sampling using high-resolution EM a calibration can be made, relating large population, cytometric measurements of fluorescence to exact quantum dot particle dose taken up by endocytosis. The statistical profile of particle dose is captured in probability distribution functions describing the variance of particle number within intracellular vesicles and of loaded vesicle number per cell. This probabilistic approach allows us to quantify at the fundamental level of *particles per cell* and maintain the capacity to analyze the 10^4^ cells or more required to fully account for the biological heterogeneity displayed within a cell colony. The calibration indicates that substantial numbers of nanoparticles per cell are internalized by endocytosis, and this has implications for the design of *in vitro* assays. Typical pharmacology assays contain milliliter volumes of particle dispersions, at nanomolar concentration and a total particle number of ∼10^12^; with mean particle loads of 10^6^ per cell in populations of ∼10^6^ cells, this implies severe depletion of the nanoparticle reservoir and a highly nonlinear supply dynamic. The results also highlight the large variability present in nanoparticle--cell interactions, leading to a wide range of particle number per vesicle and so per cell, and show that near random partitioning of vesicles into daughter cells following cell division dictates the dispersion of particle dose. In our experiments, the internalization of the nanoparticles occurs through endocytosis, as is the case for the majority of nanoparticle--cell studies. This loading process leads to particle encapsulation within organelles (endosomes) and the need to distinguish between the number of nanoparticles and the way in which they are packaged in the cell. While endosomes are dynamic organelles that can be exocytosed, fused, or matured into lysosomes, particle encapsulation is nonetheless particularly relevant when studying the impact of cell division upon dose; here the prediction of inherited dose must take into account the vesicles as well as the particles. Our analysis shows that a highly asymmetric inheritance of particle numbers by daughter cells can occur despite near symmetric partitioning of vesicles, and that this asymmetry is driven by the presence of extreme events in the loading process which lead to marked variation in the number of particles per vesicle. Regardless of the reason for the variation in vesicle packing, anomalous organelles then weigh the inherited particle fraction in daughter cells. Thus the process of dose dilution looks very different according to whether particle number or vesicle number is tracked through mitosis. These studies pave the way for predictive modeling of nanopharmacology. The approach outlined allows us to relate the absolute dose level of a nanotherapeutic (particle number) and its formulation (intracellular packaging) to biomarkers of cell status, measured on the standardized, high-throughput platform of flow cytometry. It can also take into account the influences of cell cycle and proliferation on nanotherapeutic pharmacokinetics and pharmacodynamics, which are important arbiters of therapeutic outcome in diseases such as cancer. For example, nanoparticulate drug formulations could be fluorescently labeled and this labeling then used in conjunction with flow cytometry to track the exact dose across a population of cells as they progress through the cell cycle and proliferate under the influence of the therapeutic agent. Methods {#sec4} ======= Cell Culture and QD Loading {#sec4.1} --------------------------- U-2 OS (ATCC HTB-96) cells were maintained in McCoy's 5a medium (Sigma M8403) supplemented with 10% fetal calf serum (FCS), 1 mM glutamine, and antibiotics and incubated at 37 °C in an atmosphere of 5% CO~2~ in air, in 25 cm^2^ cell culture flasks. Cells were loaded with commercially available targeted nanocrystals using the Qtracker 705 cell labeling kit (10 nM) (Invitrogen (Q25061MP)). Qtracker reagents A and B were premixed and then incubated for 5 min at room temperature. Fresh full growth medium (2 mL) was added to the tube and vortexed for 30 s. This labeling solution was then added to the cells and incubated for 1 h at 37 °C. After the 1 h period, the cells were washed twice with fresh media to remove any free quantum dots from the cell media and then reincubated at 37 °C in fresh media. To prepare for flow analysis, samples were incubated in FACS buffer (PBS/0.2% BSA/0.05% sodium azide) for 30 min before resuspension in 200 mL of PBS and storage in a refrigerator at 4 °C until later data acquisition on the flow cytometer. Electron Microscopy {#sec4.2} ------------------- The quantum dot exposed cells (exposed for 1 h and incubated for a further 24 h) were harvested and placed in fixative (2% glutaraldehyde and 2% formaldehyde in 100 mM PIPES buffer), washed in a buffer, then spun into pellets, and fixed in 2% osmium tetroxide. Following dehydration by a series of ascending strength alcohols and washing with dry acetone, the specimens were infiltrated with Spurr's resin which was polymerized at 60 °C for 24 h. Sections were cut from the polymerized block with a nominal thickness of 100 nm using an ultramicrotome (Leica Ultracut E) and placed on a copper grid (Agar Scientific). No conventional heavy metal stain (uranyl acetate or lead citrate) was used. Transmission electron microscopy (TEM) was then conducted on an FEI Tecnai F20 microscope operating at 200 kV and fitted with a Gatan Orius SC600A CCD camera. A total of 102 cells within one randomly selected thin section of the cell pellet was fully examined such that all membrane-bound quantum dots within each cell were identified and imaged. The images of the encapsulated quantum dots were processed to identify individual quantum dots using scripts in MATLAB, enabling quantification of numbers of quantum dots per vesicle. Section thickness was confirmed to be ∼100 nm using electron energy loss spectra recorded in a FEI CM200 FEG-TEM operating at 197 kV and fitted with a Gatan Imaging filter (GIF-200). Whole cell information was collected from a resin block containing cells exposed to QDs for 1 h and prepared as described above, using a Gatan 3-View system^[@ref32]^ installed on a FEI Quanta FEG250 ESEM operating at an accelerating voltage of 3.8 kV and with a water vapor pressure of 0.64 Torr (85 Pa). The ultramicrotome inside the SEM was used to cut sections from the polymerized block at nominal slice thickness of 100 nm, with serial backscattered imaging of the exposed block face recorded over an area of 69.014 μm × 69.014 μm with a pixel size of 17 × 17 nm, a 15 μs dwell time, a 30 μm objective aperture inserted, and at the manufacturer's spot size setting of 3.5. A through thickness stack of 320 images was recorded over ∼25 h. The image stack was compiled and analyzed using Fiji image analysis software^[@ref37]^ to select only image (sub)stacks of fully sectioned cells for 3-D reconstruction. Reconstructions were produced using the Imaris software with a voxel size of 17 nm × 17 nm × 100 nm. Flow Cytometry {#sec4.3} -------------- Cell images were acquired using an Imagestream100 cell analyzer (Amnis Corporation). A 488 nm wavelength laser was used to excite quantum dot fluorescence, which was collected with a 40×, 0.75 objective lens, using the 660--735 nm spectral detection channel. A subset of 1 × 10^4^ cells taken from the larger cultured cell population was imaged for each sample and analyzed using the manufacturer's software. Gating of the acquired data to ensure focused images of viable cells reduced the analyzed population to 5000 cells. Line-scan gradients were used to select cells within the focal plane, and gating on two-dimensional plots of cell area and aspect ratio were used to select viable cells. The system and peak image analysis algorithms were used to identify intensity clusters and calculate their number, assuming a discrimination level of intensity at twice the intensity of the background. Spot counting accuracy was confirmed by manual verification of confocal images. The sampling and gating procedures ensure that nanoparticle-loaded vesicles are only counted in healthy cells. Statistical Modeling {#sec4.4} -------------------- Measured distributions of nanoparticles per vesicle and of particle-loaded vesicles per cell were fitted with statistical distributions to obtain probability distribution functions. The probability, *P*~*n*~, of finding *n* particles in a cellular vesicle is described by a biexponential decay function of the formwith parameter values of, *a*~1~ = 0.103, *b*~1~ = 6 × 10^--3^, *a*~2~ = 0.017, *b*~2~ = 4 × 10^--4^. The probability, *P*~*v*~, of finding *v* loaded vesicles in a cell is described by a Polya distribution of the formwith μ = 7 and *b* = 0.25. This is an overdispersed form of a Poisson distribution with mean, μ; *b* is a dispersion factor which broadens the distribution (*b* = 0, corresponds to a Poisson curve). To simulate a flow cytometry intensity histogram, the vesicle count PDF is randomly sampled to produce vesicle numbers for a simulated population of 10 000 cells; the particle number PDF is then randomly sampled to provide the nanoparticle dose in each vesicle. Modeled electron penetration using CASINO V2.42 (see Drouin *et al.*, *Scanning* 2007, *29*, 92--101, for further detail); movies reconstructing 3-D cell profiles from EM cell section images; and magnified images of the TEM section of [Figure [2](#fig2){ref-type="fig"}A](#fig2){ref-type="fig"}. This material is available free of charge *via* the Internet at <http://pubs.acs.org>. Supplementary Material ====================== ###### nn4019619_si_001.avi ###### nn4019619_si_002.mpg ###### nn4019619_si_003.pdf ###### nn4019619_si_004.pdf This work was supported by the Engineering and Physical Sciences Research Council, U.K. under Grants EP/H008683/1 Swansea and EP/H008578/1 Leeds. The authors would like to thank the EPSRC for funding (EP/H008683/1 Swansea and EP/H008578/1 Leeds); A. Warley, K. Brady, and F. Winning (Centre for Ultrastructural Imaging, King's College, London, U.K.) for pelleting and sectioning the cells for TEM analysis; T. Starborg (Wellcome Centre for Cell Matrix Research, University of Manchester) for performing the serial block face sectioning and imaging using Gatan's 3-View package; A.G. Monteith and N. Wilkinson (Gatan U.K.) for facilitating access to the 3-View facility at Manchester and for help with the subsequent image processing. The authors declare no competing financial interest.
The Barren River District Health Department is investigating eight cases of COVID-19 in the Barren River District. Warren County has five cases; Simpson has two; Logan has one. The news of positive cases has understandably raised concern for many community members. We should all prepare for the number of positive cases to continue to increase in the coming days. It is normal for people to feel stress and anxiety in these types of situations. In order to help manage mental health, do the following: Stay informed with updates from reliable sources such as: - govstatus.egov.com/kycovid19 - www.cdc.gov - www.barrenriverhealth.org/covid-19-information - www.facebook.com/BarrenRiverDistrict - www.facebook.com/GovAndyBeshear - Maintain a healthy diet, engage in regular exercise, and get enough sleep - Preserve daily routines as much as possible - Take a break from social media and news and don’t overexpose yourself to too much information - Take advantage of outdoor activities while still maintaining social distancing - Social distancing does not mean social isolation, connect with friends and family through virtual opportunities such as texting, phone calls, and FaceTime To report a business or organization who is not taking social distancing measures or following executive orders from Governor Andy Beshear, call Kentucky’s COVID-19 Reporting Hotline at 1-833-597-2337. For questions about COVID-19, call the State hotline at (800) 722-5725 or visit www.barrenriverhealth.org/covid-19-information or https://govstatus.egov.com/kycovid19. Online Public Information File Viewers with disabilities can get assistance accessing this station's FCC Public Inspection File by contacting the station with the information listed below. Questions or concerns relating to the accessibility of the FCC's online public file system should be directed to the FCC at 888-225-5322, 888-835-5322 (TTY), or [email protected].
Hot on the heels of making my black linen pair of the fabulous Closet Case Patterns Pietra Pants, I knew I wanted a decidedly winter version to wear and took a look in my stash to find some very soft and warm grey wool flannel, which I think was gifted to me by “Neighbour Helen” years ago and which I used to sew up a different pair of trousers a few years ago, too (still worn!). Wool flannel Pietra trousers A linen tie-sleeve teeshirt Last year the June issue of Burda magazine contained a pattern for a simple teeshirt with sleeves that tied, and it’s not left my mental To Sew List over the intervening 6 months! A boxy Burda fleece When I was compiling my 2019 year in review post I was surprised and a bit saddened that I didn’t actually sew any Burda magazine patterns last year despite buying it every month and liking quite a few patterns in every issue. So I resolved to try and sew more from my magazines, and when January’s contained this wonderful, boxy sweatshirt I just knew I had to sew it up! A blue Tacara dress I definitely have A Type when it comes to dresses. In general, I like them close-fitting, or at the very least with a pencil skirt. I mean, there are exceptions – some dresses with a very different shape that I end up loving, but in general I stick to what I know I love to wear. I guess this is my way of saying that when I branch out from my comfort zone, I’m never immediately convinced whether I like it or not – it takes some wearings and time to try and figure it out. And I’m still on the fence with this one. I wasn’t convinced when Seamwork magazine (referrer link) released their Tacara dress pattern as it’s outside My Type. But I kept seeing it on more and more women and liking the way it looked, so I got it printed in A0 (those are some BIG pieces!) and I bought the required 2.2m of lightweight blue cotton spandex jersey from Ditto, when we were at their shop in Brighton over the holidays. Digital cityscape compression leggings The third pair of compression leggings I wanted to share with you were actually made before the other two pairs, when I was still tweaking the first but felt confident enough to cut into “good fabric” rather than the cheap stuff I keep around for sewing muslins. And what a fabric it is, too! Red Cold Gear compression leggings The second pair of compression leggings I made for myself using our new Compression Fitting Bottom Block pattern was one I decided to make after realising that I’m wearing a LOT of leggings made from winter technical fabrics for my daily cycle commutes. Even though my legs are moving and getting warm that way, I find that because I’m moving faster, the wind keeps my legs a lot cooler than when I’m running. And my few pairs of Cold Gear or thermo leggings have been in constant rotation for the past few months. So I finally cut into some fabric from my deep stash – genuine Under Armour Cold Gear fabric that Cidell gifted to me years ago after coming across a treasure trove of it in a Baltimore fabric shop. I made a baser layer top around the time I was developing the book (which I may have never blogged?), and a bunch of leggings out of the other colourways, but I knew I could always use another pair of warm leggings since the others are worn so much. Muted floral compression leggings Thank you all for the enthusiasm for our new (free!) Compression Fitting Bottom Block pattern! Even though these are the most basic leggings you can get, I really wanted to show off the pairs I made to test the pattern and this pair in particular got SO much love when I shared some in-progress shots on Instagram. Highly reflective Rouleur Leggings One of the things I love most about my Silhouette cutting machine is the ability to essentially cut any shape I like from reflective iron-on vinyl and make everything reflective. This is a seasonal pursuit, since realistically, I’m doing a lot more running and cycling after dark in the winter (with its 4pm sunsets) than I am in summer (with its 10pm sunsets). And since my Silhouette is boxed up awaiting workspace from our renovations, I had to go an fulfil my need for reflective goodies elsewhere, right?? Enter the new-to-me UK shop, Hello Reflectives. Yes, a shop that sells reflective fabrics and haberdashery. They’ve got all the fabrics to mimic those ££££ Nike vaporflash jackets from a few years ago (you have no idea what a status symbol those were before the cheap knockoffs arrived), slightly stretchy reflective pipings, vegan leather… but more importantly, a good collection of stretch fabrics with all-over reflective prints. An all-over reflective print? With STRETCH? Take my money!! Black linen Pietra trousers I bought the Closet Case Patterns Pietra Pants pattern when it came out last summer, and even had it printed up in A0 shortly after, but only just not got around to sewing it up for myself, and I have no idea how I managed without them this long! I decided to make them up in a black washed 100% linen from Textile Express (bought at the same time as the yellow ramie for my Cielo Top). My friend was like “linen trousers – in winter??” but this linen is a really nice, hefty weight that is perfectly warm enough for English winters. Absolutely not the thin drapey stuff you’d wear on a tropical holiday!! I’ve been trying to buy more sustainable and/or recycled fabrics and linen is one of the best sustainable fabrics out there. The downside, of course, is that linen = wrinkles! So please forgive that these are wrinkly in the photos purely because I’d been sat at my desk in the office for half a day before we took these! A digital floral sheath dress I’ve been trying to sew down my stash a lot this year – picking projects that use up fabric I’ve already got (and love!) rather than buying new and running out of space in the little wardrobe that holds my fabric stash. So just before Christmas I was finally starting to recover from the dreaded flu and thought my sewing mojo could really use a boost in the form of a Quick Knit, err, Dress! Usually I sew a Quick Knit Top to boost my mood but this time I fancied a dress instead, and I had just the fabric to use. I bought this particular fabric from the FabWorks stall at the Great British Sewing Bee Live show back in 2017 and I knew it’d make for a great and comfortable winter dress. I’m not often drawn to prints but I loved that this one was a floral with pixellation in places on a super stretchy but lightweight French terry, so it would be warm and very easy to wear through winter.
https://blog.fehrtrade.com/category/gallery/page/2/
Augmented Reality in The New York Times: the experience of editorial content according to Brazilian audiences This article analyzes and seeks to reflect on Brazilian users’ immersive experience with content available in virtual (VR) and augmented reality (AR), on the New York Times. The goal is to verify the perception of the immersive news stories made available by the newspaper in two articles that deal with fashion and behavior: “Augmented Reality: David Bowie in three dimensions”, published on March 20, 2018, which examines the costumes of the musician and composer based on the catalog of the exhibition “David Bowie Is” and “Ashley Graham: unfiltered”, published on September 5, 2018, which explores digital imaging resources to illustrate the model’s interview on the plus size fashion theme and acceptance of the body. The text begins with a literature review and research on the adoption of such technology by journalistic vehicles and proposes a study based on the investigation of the meaning/pertinence of the simulations for the interpretation of contexts and themes in journalistic matters. Additionally, the text questions how these technological resources affect the processes of communication and perception, through a research dynamic with a group of Brazilian volunteers, to verify how these new technological resources explore the degree of immersion and the strategies of these experiences, with the preliminary results described at the end. Referències Buitoni, D. (2011). Fotografia e jornalismo. A informação pela imagem. São Paulo: Saraiva. Buitoni, D. (2012). Imagens contemporâneas: complexidades e interfaces. Líbero, São Paulo, 15 (29). Retrieved from: http://seer.casperlibero.edu.br/index.php/libero/article/view/301 De La Peña, N. Weil, P., Llobera, J.; Giannopoulos, E., Pomés, A., Spanlang, B. Friedman, D., Sanches-Vives, M., & Slater, M. (2010). Immersive Journalism: Immersive Virtual Reality for the First-Person Experience of News. Presence, 19(4), 291-301. David Bowie Is. Retrieved from: https://davidbowieisreal.com Dominguéz, E. (2013). Periodismo inmersivo. Fundamentos para una forma periodística basada en la interfaz y en la acción. (Tese de Doutorado). Universitat Ramon Llull, Barcelona. Godart, F. (2010). Sociologia da Moda. São Paulo: Editora Senac. Pezzolo, D. B. (2009). Por dentro da moda: definições e experiências. São Paulo: Senac São Paulo. Rheingold, H. (1992). Virtual reality. Londres: Mandarin. Ryan, M.-L. (2001). Immersion and in literature and electronic media. Baltimore: Johns Hopkins. Fuchs, P. (2017). Virtual Reality Headsets: A theoretical and pragmatic approach. London: CRC Press. Nikas, J. (2018, September). Ashley Graham, Unfiltered. The New York Times. Retrieved from: https://nyti.ms/2CicD5Q?smid=nytcore-ios-share. Roberts. G. (2018, February). Realidade aumentada: Como vamos trazer como novidades para sua casa. The New York Times. Retrieved from: https://nyti.ms/2FEsGHV Ryzik, M. (2018, March). Augmented Reality: David Bowie in three dimensions. The New York Times. Retrieved from: https://nyti.ms/2u5Co5l?smid=nytcore-ios-share Silva, F. F. (2017). Realidade Virtual no Jornalismo: Tensionamento Conceitual e Curva de Oscilação. In Anais do 40º Congresso Brasileiro de Ciências da Comunicação (2017). Curitiba, PR: Intercom.
https://communicationpapers.revistes.udg.edu/communication-papers/article/view/22384/0
The COVID-19 pandemic had a lasting impact on how and where people work. With so many employees now familiar with remote work, many have decided they’d like to continue the arrangement long-term. That isn’t just a hunch: Lattice’s latest State of the Employee Experience Report found that 48% of employees would consider quitting because of an organization’s remote work policy. The number is even higher (59%) for Gen Z and Millennial employees. The report includes feedback from over 3,000 US and UK employees. Those weren’t the only surprises in this year’s survey, which focused primarily on hybrid and remote work. Here’s what else employees had to say. 1. Hybrid work is the new normal. “Hybrid” isn’t as novel a concept as it used to be. According to our latest research, distributed work is the new normal for many, with 57% of survey respondents working in either remote or hybrid environments. Among hybrid workers, the majority (64%) report to the office two to three times per week. Though popular on both sides of the Atlantic, hybrid work seemed especially common among UK workers. Over half of UK respondents (52%) work in a hybrid environment, compared to 34% in the US. Notably, UK workers also spend less time in the office than their US peers, with most coming in just two days or less. Still, normal as it may seem now, not everyone believes the arrangement is here to stay. While most employees (56%) feel their organizations’ remote work policy is settled for 2023, over a third expect changes in the next 12 months. Overall, 16% expect their company policy will become less flexible in the year ahead. 2. Most workers aren’t onsite by choice. Have more flexible work arrangements become more of the norm in recent years? Absolutely. But there are still plenty of organizations that require their employees to work in the office, either full or part-time. Of the employees surveyed working in an office full time, only 14% are there by choice. The remaining 83% are there because their employer made it mandatory. And even hybrid workplaces can be inflexible about in-office work. According to our survey, over 40% of hybrid companies dictate specific days of the week when employees need to come in. The remainder (57%) allow their employees to choose the days they want to work in the office. While they may not always be satisfied with their company’s policy, our research did show that most employees (83%) are willing to comply. Still, the remaining 17% reported that they don’t always comply with the specific days required to be in the office. And non-compliance is an even bigger issue in the UK, where 20% of employees say they sometimes skip their required in-office days, compared to just 13% of US employees. 3. Personal connection motivates some onsite workers. Mandates aren’t the only thing keeping offices afloat, however. So what drives someone to come into the office even if they don’t have to be there? Our survey found that employees who voluntarily go into the office are motivated by a preference for the office environment (82%) and personal connection (78%). In-office perks don’t have the same sway. Less than half of respondents consider in-office benefits, like catered lunches and in-office gyms, as a lead consideration for returning to the office. Companies seem to be getting the memo, as only 14% of employees report that their companies had added additional office perks over the past year. 4. Satisfaction and flexibility are linked. It’s clear that flexibility is one of the top priorities (if not the top priority) for many employees. Survey data backs that up: While the majority of employees (79%) report being satisfied with their level of flexibility, the number of satisfied employees is higher for remote (84%) and hybrid employees (85%) than in-office workers (69%). When looking at satisfaction and employee mental health, another clear trend emerges: Employees “strongly satisfied” with their level of flexibility are twice as likely to believe their work has a positive impact on mental health. Compared with their less-satisfied counterparts, employees who reported satisfaction with their level of flexibility were over twice as likely to say they were optimistic about future growth opportunities within their organization (61% compared to 29%). In addition, employees that are satisfied with their job and work arrangement are generally more engaged with their work and less likely to leave to look for a new opportunity — all of which can lead to increased productivity, better performance, higher employee engagement, and higher employee retention. — One thing is clear when you dig into the data: Employees overwhelmingly want more flexibility at work. And if organizations want to empower that talent to perform at their highest level, it’s essential to consider those needs. For a closer look into our survey findings, contact our team at [email protected]. You can also read Lattice’s 2023 State of People Strategy Report to learn what initiatives and programs HR teams plan to prioritize for the year ahead.
https://lattice.com/library/lattice-survey-heres-what-employees-are-really-saying-about-hybrid-work
- MINIMUM QUALIFICATIONS: - High School Diploma/GED and one year of experience working in social service/health care agency providing direct client related services to diverse populations (e.g., persons of color, MSM, substance users, mentally ill, etc.). - A valid NYS driver’s license and access to a reliable insured vehicle with the ability to travel required. - Computer skills and proficiency in Microsoft Office is a must; Electronic Health Records systems preferred. - Good communication, documentation and writing skills. - Effective communication and documentation skills. - Experience delivering stigma-free, non-judgmental and culturally-competent services. - Sensitivity to HIV/AIDS, chronic illness, LGTBQ+ issues and a strong commitment to the mission, vision, and values of ACR Health are essential. PRIMARY RESPONSIBILITIES: - Incorporate best practices regarding confidentiality into all job duties and communications in accordance with Article 27-F and HIPAA, ACR Health policies and procedures and other applicable regulations. Protect agency data in accordance with confidentiality procedures and protocols. Observe and abide by the HIV Confidentiality Law and HIPAA. - Provide HIV and sexually transmitted disease screening to locate previously undiagnosed HIV and STD positive individuals and link them to care. - Conduct strategic street outreach in communities targeting PWUD, BIPOC communities who experience barriers to accessing healthcare, and experience higher rates of preventable hospitalizations, and are at high risk of drug overdose. As well as high-risk sub-populations of individuals to promote and facilitate access to HIV counseling and testing services, risk reduction counseling, and other HIV prevention interventions and supportive services. - Facilitates access to PrEP. - Provides individuals with Protocol Based Counseling activities and one on one counseling, including: counseling, risk assessment and development of a corresponding risk reduction plan, testing for HIV/STD/HCV antibodies, and referrals for HIV/STD/HCV-related services; PrEP and Antiretroviral therapy adherence. - Maintain the recruitment, training, supervision and scheduling of Peer Educators. Keep the Peer Educator Training curriculum up to date. Conduct regular supervision with each individual Peer Educator, and regular group meetings with Peer Educators regionally. - Provide education on COVID and variants to all persons encounters; link persons to COVID testing & vaccination pods. - Provide direct referral for persons to healthcare, telemedicine, mental health, opioid use disorder systems, HIV/STD treatment, PrEP/PEP services. - Maintain accurate patient and service records in accordance with the NYSDOH-AI, ACR Health, and Harm Reduction department’s policies and procedures. - Complete accurate monthly, quarterly and/or annual report(s) within agency and departmental guidelines. - Identify and develop networking relationships with community based organizations within Onondaga County. - Assist with the general work of the Prevention department, including special projects and general agency programs/initiatives. - Participate in appropriate and applicable training/professional development opportunities for a minimum of 24 hours of curriculum-based training annually. - Participate as a culturally competent member of the Prevention Services department and agency, which includes having the capacity to function effectively as an individual within the context of cultural beliefs, behaviors, and needs presented by consumers and their communities. - Maintain confidentiality of all agency clients as well as other appropriate organizational components. - Maintain all agency and program property/equipment in good standards. Cooperate with the IT department for routine security maintenance of equipment(s). - Perform daily checks of agency vehicle ensuring its safety and sufficient fuel and maintain real time mileage logs for agency vehicles. - Work in a cooperative, collegial style with all other organizational personnel. Conduct oneself in a professional manner as an agency employee and representative. - Perform other duties as assigned by the Manager/Director of Harm Reduction Services Department, Chief Officers and/or Executive Director. ACR Health is an Equal Opportunity Employer. We value a diverse workforce and inclusive workplace. We consider all applicants without regard to race, color, religion, creed, gender, gender identity, gender expression, national origin, age, disability, socio-economic status, marital or veteran status, pregnancy status or sexual orientation or any other protected category.
https://www.acrhealth.org/careers/employment-opportunities/community-outreach-liaison/
This quantity within the Greenwood publications to the Universe sequence covers the internal planets—Mercury, Venus, Earth, and Mars. Thematic chapters talk about all the many parts of astronomical examine surrounding each one topic, supplying readers with the main up to date realizing of present wisdom and the ways that it's been received. Asymptotic methods for the Fokker-Planck equation and the exit problem in applications Half A: The Fokker-Planck Equation. half B: Asymptotic resolution of the go out challenge. half C: functions Handbook of Archaeoastronomy and Ethnoastronomy How human groups interpret what they understand within the sky is essential in enjoyable humankind’s most simple have to understand the universe it inhabits, either from a latest medical viewpoint and from numerous different cultural standpoints, extending correct again to early prehistory. Archaeoastronomy, that's all for cultural perceptions and understandings of astronomical phenomena, is a wealthy cross-disciplinary box. Higher Education in Asia/Pacific: Quality and the Public Good Enlargement and privatization have created new matters over the standard of schooling through the Asia/Pacific sector. This quantity offers a framework to check those demanding situations within the area and past. - Nanodust in the Solar System: Discoveries and Interpretations - Mathematical Astronomy Morsels - The Urban Astronomer's Guide: A Walking Tour of the Cosmos for City Sky Watchers (Patrick Moore's Practical Astronomy Series) - The Complete Guide to the Herschel Objects: Sir William Herschel's Star Clusters, Nebulae and Galaxies Extra info for Astronomy Today Chaisson McMillan, Prentice-Hall, Inc. Example text Explain what is meant by the term "blackbody radiation" and describe the basic properties of such radiation. Tell how we can determine the temperature of an object by observing the radiation that it emits. Show how the relative motion of a source of radiation and its observer can change the perceived wavelength of the radiation, and explain the importance of this phenomenon to astronomy. Astronomical objects are more than just things of beauty in the night sky. Planets, stars, and galaxies are of vital significance if we are to understand fully our place in the big picture—the "grand design" of the universe. In this chapter we begin our study of how astronomers extract information from the light emitted by astronomical objects. HTM (2 of 3) [14/12/2002 2:33:32] Astronomy Today concepts of radiation are central to modern astronomy. HTM (1 of 3) [14/12/2002 2:33:34] Astronomy Today (Background) When a prism is placed in the path of light captured by a telescope, the resulting photograph can look almost psychedelic. Each of the stars and other sources of radiation in the picture has had its light split into its component colors, from red to violet. However, in 13,000 years' time, Orion will be a summer constellation. HTM (8 of 8) [14/12/2002 2:33:37] Chapter 1, Section 4 The Moon is our nearest neighbor in space. Apart from the Sun, it is by far the brightest object in the sky. Like the Sun, the Moon appears to move relative to the background stars. Unlike the Sun, however, the Moon really does revolve around the Earth. It crosses the sky at a rate of about 12° per day, which means it moves an angular distance equal to its own diameter—30 arc minutes—in about an hour. - Le dzogchen, voie du bouddhisme tibétain by Julia Lawless, Judith Allan - Gateway to Inner Space: Sacred Plants, Mysticism and by Christian Ratsch (editor), Terence McKenna, Stanislav Grof,
http://miamibeachcondo.us/lib/astronomy-today-chaisson-mc-millan-prentice-hall-inc
LAFAYETTE, La. (KLFY)- Project Front Yard and the Environmental Quality Division of Lafayette Consolidated Government, in partnership with the Bayou Vermilion District, are asking citizens of all ages to participate in the 35th annual Trash Bash, April 6, 2019, from 8 a.m. to 12 p.m. All are invited to take part in beautifying Lafayette by cleaning its streets, parks and waterways. After a bit of work, it’s all play at the “bash” afterwards where participants can enjoy complimentary lunch, live music and prizes. Neighborhood groups, Scouts, nonprofits and businesses are asked to choose a site within Lafayette Parish where they will clean up litter. There is no cost to participate. Volunteers can register by phone (337) 291.5637 or email [email protected]. The first 100 registered volunteers will receive a free T-shirt. A limited number of canoes are available for reservation by those wanting to clean up on the Bayou Vermilion. Volunteers may also bring their own personal watercraft. This community cleanup effort is scheduled for Saturday, April 6, from 8 a.m. to 12 p.m. Volunteers meet up at the Bayou Vermilion District’s Begnaud House, across from the Beaver Park Pavilion, located at 500 Fisher Road to pick up supplies. Gloves, litter bags, litter grabbers and high-visibility vests will be provided. For those who reserve canoes, paddles and life vests will be provided along with transportation upstream. Volunteers should wear closed-toe shoes and sunscreen and bring a durable water bottle. Volunteers may arrange to pick up supplies prior to the event at the Recycling Office located at 400 Dugas Road, off North University Avenue in Lafayette. All volunteers are invited to return to the BVD’s Begnaud House by 11:30a.m. for the after clean up bash where prizes will be awarded for the most interesting piece of trash discovered and the most trash retrieved. For more information or cleanup site suggestions, please contact the Recycling Office at (337) 291-5637 or [email protected].
https://www.klfy.com/community/calling-all-volunteers-project-front-yard-needs-your-help-for-trash-bash-2019/
--- abstract: 'Harmonic functions of two variables are exactly those that admit a conjugate, namely a function whose gradient has the same length and is everywhere orthogonal to the gradient of the original function. We show that there are also partial differential equations controlling the functions of three variables that admit a conjugate.' address: - | -Laboratoire de Mathématiques de Bretagne Atlantique UMR 6205\ Université de Bretagne Occidentale, 29238 Brest Cedex 3\ France - | -Mathematical Sciences Institute\ Australian National University,ACT 0200, Australia author: - Paul Baird - Michael Eastwood title: On Functions with a Conjugate --- [^1] Introduction ============ A pair of smooth real-valued functions $f$ and $g$ on a Riemannian manifold $M$ are said to be conjugate if and only if $$\label{definition} \|\nabla f\|=\|\nabla g\|\quad\mbox{and}\quad \langle\nabla f,\nabla g\rangle=0.$$ In this article, we shall address the following question. When does a given smooth function $f:M\to{\mathbb{R}}$ admit a conjugate function? When $M$ is 2-dimensional the pair of functions $(f,g):M\to{\mathbb{R}}^2$ is mutually conjugate if and only if the mapping $(f,g)$ is conformal away from isolated points where its differential vanishes. It is well-known that, in this case, $f$ must be harmonic and, conversely, a harmonic function locally always admits a conjugate, unique up to an additive constant. When $M$ is of higher dimension, then the pair $(f,g):M\to{\mathbb{R}}^2$ is said to be semiconformal. As discussed in [@thebook], semiconformality is one of the two conditions that $(f,g)$ be a harmonic morphism. In fact, if $M={\mathbb{R}}^n$ and both $f$ and $g$ are polynomial, then it is the only condition [@abb]. In this article, we shall be concerned with $f$ defined on an open subset in ${\mathbb{R}}^3$. We extend our earlier work [@be] in which we derived some necessary conditions on $f$ in order that it admit a conjugate. Under some mild non-degeneracy assumptions, we now derive necessary and sufficient conditions. An example of a pair of conjugate functions in three variables is $$f=x_2\frac{x_1{}^2+x_2{}^2+x_3{}^2}{x_2{}^2+x_3{}^2}\qquad g=x_3\frac{x_1{}^2+x_2{}^2+x_3{}^2}{x_2{}^2+x_3{}^2}.$$ The Hopf mapping $S^3\to S^2$ viewed in stereographic coördinates $$f=\frac{(1-\|x\|^2)x_2+2x_1x_3}{x_2{}^2+x_3{}^2}\qquad g=\frac{(1-\|x\|^2)x_3-2x_1x_2}{x_2{}^2+x_3{}^2}$$ provides another good example. In these two cases, the pair $(f,g)$ enjoys an evident symmetry with respect to rotation about the . This is not usual, as is illustrated by the following example:– $$f=\log\sqrt{x_1{}^2+x_2{}^2+x_3{}^2}\qquad g=\arccos \frac{x_1}{\sqrt{x_1{}^2+x_2{}^2+x_3{}^3}}.$$ In all three examples, the pair $(f,g)$ is smooth away from the $x_1$-axis. We shall frequently need to manipulate tensors and for this purpose, we use Penrose’s abstract index notation [@OT]. We shall write $$f_i=\nabla_if\qquad f_{ij}= \nabla_i\nabla_jf \qquad\mbox{et cetera},$$ where $\nabla_i$ is the flat connection on ${\mathbb{R}}^n$ or, more generally, the metric connection on a Riemannian manifold. Also, let us ‘raise and lower’ indices with the metric in the usual fashion and write a repeated index to denote the invariant contraction over that index. Thus, $f^i{}_i=\Delta f$ is the Laplacian and $f^ig_i=\langle\nabla f,\nabla g\rangle$. We shall use round and square brackets to denote symmetrising and skewing over the indices they enclose. For example, $\phi_{(ij)k}=\frac12\phi_{ijk}+\frac12\phi_{jik}$ and $\nabla_{[i}\phi_{j]}$ is the exterior derivative of a $1$-form $\phi_i$. A necessary condition ===================== \[one\] Let $M$ be an $3$-dimensional Riemannian manifold and $f:M\to{\mathbb{R}}$ a smooth function. In order to admit a conjugate, $f$ must satisfy the differential inequality $$\label{differentialinequality} 2f_i{}^jf_jf^{ik}f_k-f^if_if^{jk}f_{jk}+f^if_i(f^j{}_j)^2\leq 0.$$ A proof of this theorem was given in [@be]. In fact, a version was proved there valid in any dimension. Here we give a more efficient proof only valid in three dimensions. However, this proof will allow us to draw additional and useful conclusions. In addition, the method of proof will provide a good illustration of the normalisation techniques occurring throughout the rest of this article. If $f$ is to admit a conjugate, then there must be a closed $1$-form $\omega_j$ so that $$\label{omega} f^j\omega_j=0\quad\mbox{and}\quad\omega^j\omega_j=f^jf_j.$$ Indeed, (\[definition\]) implies that we may find an $\omega_j$ that is exact. We shall show that the inequality (\[differentialinequality\]) is necessary in order to find a closed $\omega_j$ satisfying (\[omega\]). To proceed, let us differentiate the equations (\[omega\]) with $\nabla^i$. We obtain $$\label{diff1} f^{ij}\omega_j+\omega^{ij}f_j=0\quad\mbox{and}\quad \omega^{ij}\omega_j=f^{ij}f_j.$$ Since we are supposing that $\omega_{ij}=\nabla_i\omega_j$ is symmetric we may transvect the second of these with $f_i$ and use the first to eliminate $\omega^{ij}f_i$. This gives $$f^{ij}\omega_i\omega_j+f^{ij}f_if_j=0.$$ We now have the following equations $$\label{firstthree} f^i\omega_i=0\qquad\omega^i\omega_i=f^if_i\qquad f^{ij}\omega_i\omega_j+f^{ij}f_if_j=0$$ and we claim it is a matter of algebra to show that the inequality (\[differentialinequality\]) must hold if there is to be a solution $\omega_i$. This follows immediately from the following Lemma. \[magic\] If $f_{ij}$ is a $3\times 3$ symmetric matrix and $f_i$ is a $3$-vector, then $$\label{criticalidentity} f^if_i[2f_i{}^jf_jf^{ik}f_k-f^if_if^{jk}f_{jk}+f^if_i(f^j{}_j)^2] +12T_{ijk}T^{ijk}=0$$ where $$\label{Tijk} T_{ijk}=f_{[i}\omega_jf_{k]\ell}\omega^\ell$$ and $\omega_i$ is any solution, real or complex, of the equations [(\[firstthree\])]{}. The quantity on the left hand side of (\[differentialinequality\]) and in the statement of this lemma will arise repeatedly in this article. It is useful to introduce the notation $X$ for it. If $f_i=0$ then the conclusion is trivial. Otherwise, let us choose coördinates so that $f_1=f_2=0$. We may also orthogonally diagonalise the quadratic form $f_{ij}$ restricted to the plane orthogonal to $f_i$. In other words, we may further change coördinates to arrange that $f_{12}=0$. Having made these choices, the quantity $X$ becomes, after a short calculation, $$\label{Xnormform}X=2(f_3)^2(f_{11}+f_{33})(f_{22}+f_{33}).$$ Another short calculation yields $$\label{Tsquarednormform} \textstyle T_{ijk}T^{ijk} =\frac16(f_{22}-f_{11})^2\omega_1{}^2\omega_2{}^2$$ whilst the equations (\[firstthree\]) become $$\label{become} \omega_3=0\qquad\omega_1{}^2+\omega_2^2=f_3{}^2\qquad f_{11}\omega_1{}^2+f_{22}\omega_2{}^2+f_{33}f_3{}^2=0$$ the second two of which may be written as $$\label{matrixform} \left[\begin{array}{cc}1&1\\ f_{11}+f_{33}&f_{22}+f_{33}\end{array}\right] \left[\begin{array}c\omega_1{}^2\\ \omega_2{}^2 \end{array}\right]= \left[\begin{array}cf_3{}^2\\ 0 \end{array}\right].$$ Now there are two cases. If $f_{11}=f_{22}$, then (\[Tsquarednormform\]) implies that $T_{ijk}T^{ijk}=0$. But (\[matrixform\]) implies that $f_{11}+f_{33}=0$ and then (\[Xnormform\]) shows that $X=0$ and (\[criticalidentity\]) reduces to $0=0$. On the other hand, if $f_{11}\not=f_{22}$, then we may use (\[matrixform\]) to solve (\[become\]), obtaining $$\label{solution} \omega_1{}^2=f_3{}^2\frac{f_{22}+f_{33}}{f_{22}-f_{11}} \quad\mbox{and}\quad \omega_2{}^2=f_3{}^2\frac{f_{11}+f_{33}}{f_{11}-f_{22}}.$$ and compute $$12T_{ijk}T^{ijk}= 2(f_{22}-f_{11})^2\omega_1{}^2\omega_2{}^2= -2f_3{}^4(f_{11}+f_{33})(f_{22}+f_{33}).$$ A comparison with (\[Xnormform\]) immediately yields (\[criticalidentity\]), as required. [From]{} now on we shall suppose that $f_i$ is non-zero (at a particular point and hence nearby as well). In case that $f$ admit a conjugate, it is then clear from (\[definition\]) that the pair $(f,g)$ is a submersion (near the point in question). The nature of the singularities of a semiconformal mapping is not known in general [@jarcs2]. Notice that it follows from the proof of this lemma that the equations (\[firstthree\]) always have solutions if we allow $\omega_{i}$ to be complex and generically (in fact, precisely when $X\not=0$) there are four solutions. Alternatively, this is geometrically clear: the first equation restricts matters to a plane wherein the second and third equations describe planar quadrics. Perhaps our proof of Lemma \[magic\] seems bizarre but, in fact, we have used a familiar technique. The Cayley-Hamilton Theorem, for example, is often proved, even for real matrices, by employing Jordan canonical form over the complex numbers. Not only that, but Lemma \[magic\] can be proved without normalisation by means of the Cayley-Hamilton Theorem applied to $f_{ij}$ restricted, as a symmetric form, to the plane orthogonal to $f_i$ (the details of this proof being left to the reader). Another proof avoiding normalisation may be obtained by expanding the identity $0=f_{[i}\omega_jf_k{}^kf_{\ell]}{}^{\ell}$. In fact, it is a consequence of Weyl’s Second Fundamental Theorem of Invariant Theory [@w] that dimension-dependent identities must arise by ‘skewing over too many indices’. To use normalisation as we have done, however, is a simple enough method that we shall employ throughout this article. The quantities occurring in the proof of Lemma \[magic\] suggest other combinations of derivatives with geometric significance. The operator $$\label{3Lap} f\mapsto Z\equiv f^{ij}f_if_j+f^if_if^j{}_j,$$ for example is, up to a multiple, the well-known $3$-Laplacian [@dick; @tom] and in normal coördinates $$\label{nor}f_1=f_2=f_{12}=0$$ at a point becomes $$\label{thisisZ}Z=f_3{}^2(f_{11}+f_{22}+2f_{33}).$$ Also, the quantity $J\equiv f^if_i$ is $f_3{}^2$. Therefore, from (\[Xnormform\]), $$\label{thisisY} \begin{array}{rcl}Y&\equiv&Z^2-2JX\\[3pt] &=&f_3{}^4(f_{11}+f_{22}+2f_{33})^2 -4(f_3)^4(f_{11}+f_{33})(f_{22}+f_{33})\\[3pt] &=&f_3{}^4(f_{11}-f_{22})^2\end{array}$$ and we recognise that the vanishing of this expression when $X=0$ is exactly the criterion discovered in the proof of Lemma \[magic\] for there to be infinitely many solutions $\omega_i$ to the system (\[firstthree\]). In summary, if we allow complex solutions of (\[firstthree\]) then $$\begin{array}{rcl} X\not=0&\iff&\exists\mbox{ $4$ distinct solutions}\\[3pt] X=0\mbox{ and }Y\not=0&\iff&\exists\mbox{ $2$ distinct solutions}\\[3pt] X=0\mbox{ and }Y=0&\iff&\exists\mbox{ $\infty$-many solutions.} \end{array}$$ If we restrict attention to the case when (\[firstthree\]) has real solutions, then Lemma \[magic\] implies that $X\leq 0$ whence $$\label{solutionsintherealcase}\begin{array}{rcl} X\not=0&\iff&\mbox{$X<0$ and $\exists\ 4$ distinct solutions}\\[3pt] X=0\mbox{ and }Y\not=0&\iff& \mbox{$Y>0$ and $\exists\ 2$ distinct solutions}\\[3pt] Y=0&\iff&\mbox{$X=0$ and $\exists\ \infty$-many solutions,} \end{array}$$ the last two conclusions following from $Y=Z^2-2JX$ upon noting that both terms on the right hand side are non-negative. Integrability of the conjugate direction:\ the generic case ========================================== Recall that if $f$ is to admit a conjugate function near any particular point, then there must be a solution $\omega_j$ at that point of the algebraic equations (\[firstthree\]). These three equations, specifically the third one, were derived under the assumption that $\omega_j$ extend to a closed form near the point in question but our approach from now on is to take $\omega_j$ to be defined at a particular point by the equations (\[firstthree\]) and ask whether it may be extended to a smooth closed form near that point whilst maintaining (\[firstthree\]). This is entirely equivalent to finding a local conjugate for $f$. As a matter of terminology, we shall refer to a solution $\omega_j$ of (\[firstthree\]) as a conjugate direction. In case that $X<0$ (at the point in question and hence nearby as well), we have just seen from (\[solutionsintherealcase\]) that there are four distinct solutions of (\[firstthree\]) for $\omega_j$. It follows that any one of these solutions uniquely and smoothly extends as a conjugate direction. Therefore, the only remaining question in case $X<0$ is whether this extension is closed and we shall refer to this as integrability. We show that integrability is equivalent to a further two polynomial equations in $\omega^i$ and the derivatives of $f$. Resolution of these further equations combined with (\[firstthree\]) will lead to necessary and sufficient differential conditions on the function $f$ in order that it admit a conjugate. All of this is under the assumption that $X<0$ and we shall refer to this as the generic case. The case $X\equiv 0$ will be studied separately. \[thm:integrability1\] Let $\omega_j$ be a conjugate direction determined by [(\[firstthree\])]{}. Then provided $X<0$, the tensor field $\omega_{ij}$ is symmetric in its indices if and only if $$\begin{aligned} f^{ijk}f_if_jf_k + f^{ijk}f_i\omega_j\omega_k + 2f^{ij}f_j{}^kf_if_k - 2 f^{ij}f_j{}^k\omega_i\omega_k & = & 0 \label{eq4} \\ f^{ijk}f_if_j\omega_k + f^{ijk}\omega_i\omega_j\omega_k + 4 f^{ij}f_j{}^kf_i\omega_k & = & 0. \label{eq5}\end{aligned}$$ Since $X\neq 0$, the identity of Lemma \[magic\], namely $$\label{identity} f^jf_j X + 12 T_{ijk}T^{ijk} = 0\,,$$ where $T_{ijk} = f_{[i}\omega_jf_{k]l}\omega^l$, shows that the vector field $f^{ij}\omega_j$ is independent of $f^i$ and $\omega^i$. Therefore, the tensor field $\omega_{ij}$ is symmetric in its indices if and only if $$\label{symmetric} u^iv^j(\omega_{ij} - \omega_{ji}) = 0\,,$$ where $u^i$ and $v^j$ are any vector fields taken from the set $\{f^i,\omega^i,f^{ij}\omega_j\}$. Looking back at (\[diff1\]), which was obtained by differentiating (\[omega\]), we see that $$f^i\omega^j(\omega_{ij}-\omega_{ji})=f^{ij}f_if_j+f^{ij}\omega_i\omega_j.$$ This already vanishes by assumption. It is our third equation from (\[firstthree\]). Differentiating this third equation gives $$\begin{aligned} 0 & = & f^i\nabla_i(f^{jk}f_jf_k + f^{jk}\omega_j\omega_k) \\ & = & f^{ijk}f_if_jf_k + f^{ijk}f_i\omega_j\omega_k + 2f^{jk}f^i{}_jf_if_k + 2 f^{jk}\omega_{ij}f^i\omega_k\,.\end{aligned}$$ We notice that the last term $f^{jk}\omega_{ij}f^i\omega_k$ occurs as the first component of the symmetry condition $f^if^{jk}\omega_k(\omega_{ij} - \omega_{ji}) = 0$, which therefore holds if and only if $$f^{ijk}f_if_jf_k + f^{ijk}f_i\omega_j\omega_k + 2f^{jk}f^i{}_jf_if_k + 2 f^{jk}\omega_{ji}f^i\omega_k = 0\,,$$ where we have replaced $\omega_{ij}$ by $\omega_{ji}$ in the last term. But now (\[diff1\]) shows that we can replace $\omega_{ji}f^i$ with $-f_{ji}\omega^i$. This yields (\[eq4\]). Similarly, the equation $$0 = \omega^i\nabla_i(f^{jk}f_jf_k +f^{jk}\omega_j\omega_k)=\cdots$$ shows that the final symmetry condition $\omega^if^{jk}\omega_k(\omega_{ij}-\omega_{ji})=0$ reduces to (\[eq5\]). \[allfiveequations\] Locally, a smooth function $f$ with $X<0$ admits a smooth conjugate if and only if there is a smooth solution $\omega_i$ of the equations [(\[firstthree\]), (\[eq4\])]{} and [(\[eq5\])]{}. Symmetry of $\omega_{ij}$ is precisely the condition that $\omega_i$ be exact and, therefore, locally of the form $\nabla_ig$ for some smooth function $g$. Of course, we know that equations (\[firstthree\]) admit smooth solutions when $X<0$ so the only issue is whether we can find a solution for which (\[eq4\]) and (\[eq5\]) are also satisfied. Also, if $\omega_i$ is a solution then so is $-\omega_i$. Resolution of the equations: the generic case {#sec:resolution} ============================================= Throughout this section we shall suppose that $X<0$. Recall that under this hypothesis $f$ has four conjugate directions at each point, occurring in two pairs that differ only by sign. In other words, the solutions of the equations (\[firstthree\]) have the form $\{\pm\omega_i,\pm\eta_i\}$ for $\omega_i$ and $\eta_i$ smooth linearly independent $1$-forms. Let us consider the expressions $$\begin{array}{rcl} p^+&\equiv&f^{ijk}f_if_jf_k + f^{ijk}f_i\omega_j\omega_k + 2f^{ij}f_j{}^kf_if_k - 2 f^{ij}f_j{}^k\omega_i\omega_k\\ p^-&\equiv&f^{ijk}f_if_jf_k + f^{ijk}f_i\eta_j\eta_k + 2f^{ij}f_j{}^kf_if_k - 2 f^{ij}f_j{}^k\eta_i\eta_k\\ q^+&\equiv&f^{ijk}f_if_j\omega_k + f^{ijk}\omega_i\omega_j\omega_k + 4 f^{ij}f_j{}^kf_i\omega_k\\ q^-&\equiv&f^{ijk}f_if_j\eta_k + f^{ijk}\eta_i\eta_j\eta_k + 4 f^{ij}f_j{}^kf_i\eta_k \end{array}$$ According to Corollary \[allfiveequations\] and the discussion that immediately follows it, we now know that $f$ admits a conjugate if and only if $$p^+=q^+=0\qquad\mbox{or}\qquad p^-=q^-=0.$$ These two possibilities are captured by the following theorem. \[mainthm\] Locally, a smooth function $f$ with $X<0$ admits a smooth conjugate if and only if $$p^+p^-=0\qquad q^+q^-=0\qquad (p^+q^-)^2+(p^-q^+)^2=0.$$ Evidently, the vanishing of these three quantities is equivalent to $p^\pm=q^\pm=0$. The condition $p^+p^-=0$ was already resolved in [@be]. We recapitulate and refine the argument as follows. Firstly, we write $p^+$ using normal coordinates (\[nor\]) to discover that $$\label{pplus}p^+=p_e+p_o\omega_1\omega_2$$ where $$\label{pe}\begin{array}{l} p_e=f_3{}^3f_{333}+2f_3{}^2(f_{13}{}^2+f_{23}{}^2+f_{33}{}^2)\\ \phantom{p_e} +(f_3f_{113}-2f_{11}{}^2-2f_{13}{}^2)\omega_1{}^2 +(f_3f_{223}-2f_{22}{}^2-2f_{23}{}^2)\omega_2{}^2 \end{array}$$ and $$p_o=2f_3f_{123}-4f_{13}f_{23}.$$ In normal coördinates $(\eta_1,\eta_2)=(\pm\omega_1,\mp\omega_2)$. It follows that $$\label{pminus}p^-=p_e-p_o\omega_1\omega_2$$ and hence that $$\label{ppluspminus} p^+p^-=p_e{}^2-p_o{}^2\omega_1{}^2\omega_2{}^2.$$ But, since $\omega_i$ is subject to (\[firstthree\]), we know that $\omega_1{}^2$ and $\omega_2{}^2$ are determined in normal coördinates by (\[solution\]). In [@be] we used this to eliminate $\omega_1{}^2$ and $\omega_2{}^2$ from $p_e$ in (\[pe\]) and then from $p^+p^-$ in (\[ppluspminus\]) to discover by trial and error that $Y^2p^+p^-$ could be written as an explicit Riemannian invariant in the derivatives of $f$, where $Y$ is the invariant $Z^2-2JX$ from (\[thisisY\]). We can argue more systematically as follows. Firstly, we may obtain $\eta_i$ from $\omega_i$ without recourse to normal coördinates. \[formulaforeta\] The conjugate direction $\eta_i$ is determined by the conjugate direction $\omega_i$ via the formula $$\label{eta}\sqrt{Y}\eta_i= 2f^{jk}f_j\omega_kf_i+(Z-2f^{jk}f_jf_k)\omega_i-2Jf_i{}^j\omega_j.$$ Since it is evidently coördinate-free, we may verify this formula in normal coördinates (\[nor\]). Substituting from (\[thisisZ\]) we see that the right hand side of (\[eta\]) becomes $$2(f_{13}f_3\omega_1+f_{23}f_3\omega_2)f_i +f_3{}^2(f_{11}+f_{22})\omega_i-2f_3{}^2f_i{}^j\omega_j$$ In more detail, [c|c]{} $i$&right hand side of (\[eta\])\ $1$&$f_3{}^2(f_{11}+f_{22})\omega_1-2f_3{}^2(f_{11}\omega_1)= f_3{}^2(f_{22}-f_{11})\omega_1$ ------------------------------------------------------------------------ \ $2$&$f_3{}^2(f_{11}+f_{22})\omega_2-2f_3{}^2(f_{22}\omega_2)= f_3{}^2(f_{11}-f_{22})\omega_2$ ------------------------------------------------------------------------ \ $3$&$2(f_{13}f_3\omega_1+f_{23}f_3\omega_2)f_3 -2f_3{}^2(f_{13}\omega_1+f_{23}\omega_2)=0$ On the other hand, from (\[thisisY\]) the left hand side of (\[eta\]) becomes $$\sqrt{f_3{}^4(f_{11}-f_{22})^2}\eta_i$$ and the whole of (\[eta\]) reduces to $(\eta_1,\eta_2)=\pm(\omega_1,-\omega_2)$ depending on the sign chosen for the square root of $Y$. Note that since $Y>0$ when $X<0$ we could always insist of taking the positive square root of $Y$ in (\[eta\]) to obtain a consistent smooth choice of conjugate direction $\eta_i$ once $\omega_i$ is chosen. In any case, now let us consider $p_e$ in more detail. [From]{} (\[pplus\]) and (\[pminus\]) we see that $$\label{peinvariant}\textstyle p_e=\frac12(p^++p^-).$$ Note that $p^+$ does not see the sign of $\omega_i$ and $p^-$ does not see the sign of $\eta_i$. Moreover, interchanging $\omega_i$ and $\eta_i$ interchanges $p^+$ and $p^-$. Hence, from (\[peinvariant\]) we see that $p_e$ depends only on the derivatives of $f$. In principle, we could now use (\[eta\]) to substitute for $\eta_i$ in $p^-$. We conclude that $Yp_e$ is a polynomial in $f_i,f_{ij},f_{ijk}$, and $\omega_i$, which is actually independent of $\omega_i$ when (\[firstthree\]) holds. Equation (\[firstthree\]) may now be used to eliminate $\omega_i$ from $Yp_e$ leaving a polynomial in $f_i,f_{ij},f_{ijk}$. In practice, this is quite an intricate matter, which we consign to §\[sec:elim-om\]. The result is: $$\textstyle Yp_e=\frac12Y(p^++p^-)=\frac12(ZS-2XR+2XY),$$ where $R$ and $S$ are two further conformal invariants derived in §\[conformalinvariants\]. Let us apply similar reasoning to some of the other quantities occurring above. From (\[pplus\]) and (\[pminus\]) we see that $$\textstyle p_0\omega_1\omega_2=\frac12(p^+-p^-).$$ As we have already observed, interchanging $\omega_i$ and $\eta_i$ interchanges $p^+$ and $p^-$, hence changing the sign of $p^+-p^-$. As is readily verified in normal coördinates, another quantity with this property is $$E\equiv\epsilon^{ijk}f_i\omega_jf_k{}^\ell\omega_\ell$$ where $\epsilon^{ijk}$ is a choice of volume form, uniquely normalised up to sign by $\epsilon^{ijk}\epsilon_{ijk}=6$. Specifically, if we further constrain our normal coördinates (\[nor\]) by requiring that $\epsilon^{123}=1$, then $$E=f_3(f_{22}-f_{11})\omega_1\omega_2.$$ As above, it follows that we may use (\[eta\]) to eliminate $\eta_i$ from $$\textstyle YEp_o\omega_1\omega_2=\frac12E(Yp^+-Yp^-).$$ Moreover, this quantity is stable under interchange of $\omega_i$ and $\eta_i$. It must be a polynomial in $f_i,f_{ij},f_{ijk}$ alone, which is given by: $$\textstyle YEp_o\omega_1\omega_2=\frac12E(Yp^+-Yp^-)=-\frac14JXV,$$ where this calculation is once more detailed in §\[sec:elim-om\] and $V$ is one of our list of conformal invariants derived in §\[conformalinvariants\]. But from Lemma \[magic\], we have the identity $$\label{identityEX} \textstyle E^2=-\frac12J^2X.$$ We conclude that $$\begin{aligned} P & \equiv & 8Y^2p^+p^-=2Y^2(p^++p^-)^2-2Y^2(p^+-p^-)^2 \\ & = & 2(ZS-2XR+2XY)^2 + XV^2.\end{aligned}$$ The vanishing of $P$ is then our fourth conformally invariant condition (in addition to the first three (\[firstthree\])), obtained in [@be], for the existence of a conjugate in the generic case $X<0$. We now proceed similarly to obtain the two other conditions to provide a necessary and sufficient set of conditions. First we observe that $Q\equiv Y\sqrt{Y}q^+q^-$ is conformally invariant, where we use Lemma \[formulaforeta\] to define $\eta_i$ by a choice of square root for $Y$. Certainly it is a Riemannian invariant and we shall compute it in normal coördinates (\[nor\]). According to the proof of Lemma \[formulaforeta\], we may take $$\sqrt{Y}=f_3{}^2(f_{22}-f_{11})\qquad \eta_1=\omega_1\qquad\eta_2=-\omega_2,$$ in which case $$q^+=q_1\omega_1+q_2\omega_2\quad\mbox{and}\quad q^-=q_1\omega_1-q_2\omega_2,$$ where $$\begin{array}{rcl} q_1&=&f_3{}^2f_{133}+f_{111}\omega_1{}^2+3f_{122}\omega_2{}^2 +4f_3f_{13}(f_{11}+f_{33})\\ q_2&=&f_3{}^2f_{233}+f_{222}\omega_2{}^2+3f_{112}\omega_1{}^2 +4f_3f_{23}(f_{22}+f_{33})\\ \end{array}$$ so that $$Q=Y\sqrt{Y}q^+q^-=f_3{}^6(f_{22}-f_{11})^3 (q_1{}^2\omega_1{}^2-q_2{}^2\omega_2{}^2)$$ from which $\omega_1{}^2$ and $\omega_2{}^2$ may be eliminated with (\[solution\]). The result is a polynomial expression in $f$ and its derivatives. In terms of the various conformal invariants developed in §\[conformalinvariants\] it turns out that $$\begin{array}{rcl} Q&=&\frac{1}{6}JZB-\frac{1}{4}JU-\frac{1}{4}ZS^2\\ &&\enskip{}+X(XZ^3-JX^2Z+6W+\frac{1}{4}JM-\frac{2}{7}ZXR+\frac{5}{7}RS\\ &&\qquad\quad{}-\frac{15}{7}N+\frac{2}{9}ZA-\frac{9}{10}F -\frac{2}{21}ZK+\frac{10}{21}T+\frac{6}{25}G-\frac{17}{42}JD), \end{array}$$ as may be verified in normal form (\[nor\]). The final condition $(p^+q^-)^2 + (p^-q^+)^2 = 0$ can similarly be expressed in terms of conformal invariants; although we do not attempt to write down the expression, we discuss how this can be done in §\[sec:elim-om\]. Special cases ============= Functions with a unique conjugate direction {#sec:X=0} ------------------------------------------- Suppose now that $f$ is a function that admits a unique conjugate direction up to sign. By (\[solutionsintherealcase\]), this occurs when $X=0$ and $Y>0$. We first prove an analogue of Theorem \[thm:integrability1\]. \[thm:integrability2\] Let $\omega_j$ be a conjugate direction determined by [(\[firstthree\])]{}, with $X=0$ and $Y>0$. Then the tensor field $\omega_{ij}$ is symmetric in its indices if and only if $$\begin{aligned} \epsilon^{ijk}f_i\omega_j \left( Jf_k{}^{lm}f_l\omega_m - 2f_{kl}f^l(f^{mn}f_m\omega_n)\right) & = & 0 \label{4bis} \\ \epsilon^{ijk}f_i\omega_j \left( Jf_k{}^{lm}\omega_l\omega_m + f_k{}^lf_l(f^{mn}f_mf_n + Z)\right) & = & 0 \label{5bis}\end{aligned}$$ As in the proof of Theorem \[thm:integrability1\], $\omega_{ij}$ is symmetric in its indices if and only if $u^iv^j(\omega_{ij}-\omega_{ji})=0$, where $u^i$ and $v^j$ are linearly independent vector fields. However, since $X=0$, by Lemma \[magic\], the vector field $f^{ij}\omega_j$ is a linear combination of $f^i$ and $\omega^i$ and we have to use an alternative. A judicious choice turns out to be the vector field $$\nu^i = \epsilon^{ijk}f_jf_k{}^l\omega_l - \epsilon^{jkl}f_j\omega_kf_l{}^i\,.$$ A short calculation using the identity $$\epsilon^{ijk}\epsilon_{lmn} = 6 \delta_{[l}^i\delta_m^j\delta_{n]}^k\,,$$ shows that $\epsilon_{ijk}\nu^if^j\omega^k = - Z/J$, which is non-zero by hypothesis (since $Y = Z^2$). In particular, $\nu^i$ has a non-zero component orthogonal to $f^i$ and $\omega^i$. In order to bring this vector field into play, rather than differentiate the third equation from (\[firstthree\]), we differentiate the equation: $$\label{det} \epsilon^{ijk}f_i\omega_jf_k{}^l\omega_l = 0\,.$$ This gives $$\label{diff-det} \epsilon^{ijk}f_i\omega_jf_{klm}\omega^l + \epsilon^{ijk}f_{mi}\omega_jf_k{}^l\omega_l - \omega_{mi}\nu^i = 0\,.$$ First transvect this with $f^m$. Then the resulting symmetry condition $f^m\nu^i(\omega_{mi} - \omega_{im})=0$ holds if and only if $$\epsilon^{ijk}f_i\omega_jf_{klm}f^l\omega^m + \epsilon^{ijk}f_{im}f^m\omega_jf_k{}^l\omega_l - f^m\omega_{im}\nu^i = 0\,.$$ But from (\[diff1\]), the last term can be replaced by $\omega^mf_{im}\nu^i$ which is equal to $[\epsilon^{lmn}f_lf_m{}^rf_r\omega_n/(f^sf_s)] f^{ij}f_i\omega_j$ (since $\epsilon^{ijk}f_j\omega_kf_{im}\omega^m = 0$ by (\[det\])). On multiplying through by $J$, we obtain the equation $$\label{pre-4bis} J\epsilon^{ijk}f_i\omega_jf_k{}^{lm}f_l\omega_n - J\epsilon^{ijk}f_i{}^lf_lf_j{}^m\omega_m\omega_k - (\epsilon^{ijk}f_i\omega_jf_k{}^lf_l)f^{mn}f_m\omega_n = 0\,.$$ However, from (\[det\]) we deduce the identity $$Jf_{jm}\omega^m + (f^{kl}f_kf_l)\omega_j - (f^{kl}f_k\omega_l)f_j = 0\,.$$ Indeed, the left-hand side is both orthogonal and colinear to the span of $f_j$ and $\omega_j$. On replacing $Jf_{jm}\omega_m$ by $(f^{kl}f_k\omega_l)f_j - (f^{kl}f_kf_l)\omega_j$ in the middle term of (\[pre-4bis\]), we obtain (\[4bis\]). Similarly, on transvecting (\[diff-det\]) with $\omega^m$, we conclude that the symmetry condition $\omega^m\nu^i(\omega_{mi} - \omega_{im}) = 0$ is equivalent to (\[5bis\]). As for the generic case, we can summarise the conditions that $f$ admits a conjugate as follows. \[allfiveequations-bis\] Locally, a smooth function $f$ with $X=0$ admits a smooth conjugate if and only if there is a smooth solution $\omega_i$ of the equations [(\[firstthree\]), (\[4bis\])]{} and [(\[5bis\])]{}. We can express these conditions in terms of the derivatives of $f$ either by using invariant arguments, or by expressing them in normal coördinates. To do this invariantly, the following lemma can be employed to eliminate quadratic terms in $\omega^i$. \[lem:identity-quad\] Suppose $X= 0$ and $Y\neq 0$. Let $Q^{ij}$ be any symmetric form. Then $$\label{identity-quad} ZQ^{ij}\omega_i\omega_j = -ZQ^{ij}f_if_j + 2JQ^{ij}f_if_j{}^kf_k + J^2(f_k{}^kQ_l{}^l - Q^{kl}f_{kl})\,.$$ Recall that $E\equiv\epsilon^{ijk}f_i\omega_jf_k{}^\ell\omega_\ell$ satisfies $E^2 = - J^2X/2$, so that $$\label{identity-E} X=0 \quad \Leftrightarrow \quad E=0 \quad \Leftrightarrow \quad Jf_{jk}\omega^k + (f^{kl}f_kf_l)\omega_j - (f^{kl}f_k\omega_{\ell})f_j=0\,,$$ where the latter equality occurs since the LHS is both orthogonal and colinear to the span of $f_j$ and $\omega_j$. We then apply this to the identity given by transvecting $f_{[i}\omega_jf_k{}^kQ_{l]}{}^l = 0$ with $f^i\omega^j$. An alternative proof is simply to check that the formula holds in the Riemannian normalisation. Equation (\[4bis\]) can now be written in the form $Q^{ij}\omega_i\omega_j=0$, where $$\begin{aligned} Q^{ij} & = & -\epsilon^{ikl}f_k(Jf_l{}^{mj}f_m - 2f_{lm}f^m(f^{nj}f_n)) \\ & & \qquad -\epsilon^{jkl}f_k(Jf_l{}^{mi}f_m - 2f_{lm}f^m(f^{ni}f_n)),\end{aligned}$$ which, by Lemma \[lem:identity-quad\] can be written as an invariant expression in the derivatives of $f$. However, it is more direct and somewhat simpler to just write out (\[4bis\]) in the Riemannian normalisation. From the proof of Lemma \[magic\], we see that $X=0$ implies that the product $\omega_1\omega_2 = 0$. Thus (\[4bis\]) becomes: $$f_3{}^3(\omega_1{}^2-\omega_2{}^2)(f_3f_{123} -2f_{13}f_{23}) = 0\,.$$ But since $Y\neq 0$ ($f_{22}-f_{11} \neq 0$), $\omega_1{}^2-\omega_2{}^2 = J$ and this is equivalent to $$f_3{}^5(f_3f_{123} - 2f_{13}f_{23}) = 0\,,$$ which we recognize to be a multiple of $V$ (which is given in normal coördinates by $4J^2f_3(f_{22}- f_{11})(f_3f_{123}-2f_{13}f_{23})$). Thus (\[firstthree\]) and (\[4bis\]) correspond to the conformally invariant condition $V=0$. We give an invariant treatment of (\[5bis\]) as follows. Differentiate the right-hand identity of (\[identity-E\]): $$\begin{aligned} 0 & \!\!=\!\! & \nabla_i (Jf_{jk}\omega^k + (f^{kl}f_kf_l)\omega_j - (f^{kl}f_k\omega_l)f_j) \nonumber \\ & \!\!=\!\! & 2(f_{il}f^l)f_{jk}\omega^k + Jf_{ijk}\omega^k + J f_j{}^k\omega_{ik} + f_{ikl}f^kf^l\omega_j + 2 f^{kl}f_{ik}f_l\omega_j \nonumber \\ & & \enskip{}+f^{kl}f_kf_l\omega_{ij} - f_{ikl}f^k\omega^lf_j - f^{kl}f_{ik}\omega_l f_j - f^{kl}f_k\omega_{il}f_j - f^{kl}f_k\omega_l f_{ij}\,. \label{identity-E2} \end{aligned}$$ Note that for the moment we do not assume symmetry of $\omega_{ij}$. Recall the fundamental identities: $\omega^{ij}\omega_j = f^{ij}f_j$ and $\omega^{ij}f_j = - f^{ij}\omega_j$. Transvect (\[identity-E2\]) with $\omega^j$ to obtain: $$\begin{aligned} 0 & = & -2f_{il}f^lf^{jk}f_jf_k + J f_{ijk}\omega^j\omega^k + J(f_j{}^k\omega^j)\omega_{ik} \\ & & \qquad + J f_{ikl}f^kf^l + 2Jf^{kl}f_{ik}f_l + (f^{kl}f_kf_l)(f_{ij}f^j) - f^{kl}f_k\omega_lf_{ij}\omega^j\,.\end{aligned}$$ [From]{} (\[identity-E\]), $Jf_j{}^k\omega^j = (f^{lm}f_l\omega_m)f^k - (f^{lm}f_lf_m)\omega^k$, so that $$\begin{aligned} J(f_j{}^k\omega^j)\omega_{ik} & = & (f^{lm}f_l\omega_m)\omega_{ik}f^k - (f^{lm}f_lf_m)\omega_{ik}\omega^k \\ & = & - (f^{lm}f_l\omega_m)f_{ik}\omega^k - (f^{lm}f_lf_m)f_{ik}f^k\,,\end{aligned}$$ which gives the identity: $$Jf_{ijk}\omega^j\omega^k + J f_{ijk}f^jf^k - 2(f^{kl}f_kf_l)f_{ij}f^j - 2(f^{kl}f_k\omega_l)f_{ij}\omega^j + 2Jf^{kl}f_{ik}f_l\! =\! 0.$$ [From]{} this, we deduce that (\[5bis\]) has the equivalent form: $$\begin{aligned} & & \hspace{-20pt}\epsilon^{ijk}f_i\omega_j \left( -Jf_k{}^{lm}f_lf_m - 2Jf_{kl}f^{lm}f_m + f_k{}^lf_l(3f^{mn}f_mf_n + Z) \right) = 0 \Leftrightarrow \nonumber \\ & & \qquad \textstyle\epsilon^{ijk}f_i\omega_j \left(-\sigma_k+J(J\nabla_k(\Delta f) - \frac{1}{2} \Delta f\nabla_kJ)\right) = 0\,, \label{5bisbis}\end{aligned}$$ where $\sigma_k$ is the conformally invariant $1$-form given by Theorem \[usefullist\] of Appendix \[conformalinvariants\]. Even though $J\nabla_k(\Delta f) - \frac{1}{2} \Delta f\nabla_kJ$ is not itself conformally invariant, its component orthogonal to the span of $f_i$ and $\omega_i$ is, so the left-hand side of (\[5bisbis\]) is conformally invariant. Now square this and use Lemma \[lem:identity-quad\] to eliminate quadratic terms in $\omega_i$. We obtain an identity involving only the derivatives of $f$, which we identify in terms of conformal invariants as: $$\label{X=0-5th}\textstyle \frac{25}{14}N+\frac{3}{5}G+\frac{3}{4}F + \frac{1}{21}T - \frac{17}{21}ZK - \frac{7}{9}ZA = 0\,.$$ Locally, a smooth function $f$ with $X=0$ admits a smooth conjugate if and only if $V\equiv 0$ and [(\[X=0-5th\])]{} are satisfied. Functions that admit infinitely many conjugates ----------------------------------------------- When $X$ and $Y$ both vanish, the function $f$ admits infinitely many conjugate directions. The following gives a complete description. \[thm:XYzero\] Suppose $f$ is a smooth real-valued non-constant function such that its invariants $X$ and $Y$ both vanish. Then, up to scale and conformal transformation, $f$ is one of the following $$\label{XYzero} x_1 \quad \log(x_1{}^2+x_2{}^2+x_3{}^2)\quad \arctan\left(\frac{x_3}{x_2}\right) \quad\frac{x_1}{x_1{}^2+x_2{}^2+x_3{}^2}.$$ [From]{} (\[aha\]) we deduce immediately that $\phi_{ij}=0$. But $$\phi_{ij}=\mbox{the symmetric trace-free part of }J^2\nabla_i[J^{-1}f_j]$$ whose vanishing is precisely saying that $J^{-1}f_j$ is a conformal Killing field $V_j$ all of which can be written down explicitly. Following [@laplace], $$\textstyle V_j=-s_j-m_{jk}x^k+\lambda x_j+x_jr_kx^k-\frac12r_jx_kx^k$$ where $s_j$ and $r_j$ are arbitrary vectors, $\lambda$ is a arbitrary constant, and $m_{ij}$ is an arbitrary skew matrix. We may invert $$V_j=(f^kf_k)^{-1}f_j\iff f_j=(V^kV_k)^{-1}V_j$$ and inquire whether $f_j$ is closed. As a condition on $V_j$, this reads $$\label{testingV} V^kV_k\nabla_{[i}V_{j]}+2V^kV_{[i}\nabla_{j]}V_k=0,$$ the consequences of which are best viewed using a normal form for $V_j$ such as those provided by Theorem \[fivebyfivecase\] in §\[normalised\_conf\_Killing\]. Specifically, matrices of the form (\[firsttype\]) provide conformal Killing fields of the form $$\lambda\Big(x_1\frac{\partial}{\partial x_1} +x_2\frac{\partial}{\partial x_2}+x_3\frac{\partial}{\partial x_3}\Big) +\mu\Big(x_2\frac{\partial}{\partial x_3} -x_3\frac{\partial}{\partial x_2}\Big)$$ in accordance with the conventions of [@laplace]. However, only when $\mu=0$ or $\lambda=0$ is (\[testingV\]) satisfied. When both vanish, we obtain the linear functions which are equivalent under scaling and conformal transformation to the first of (\[XYzero\]). Otherwise we obtain the second two, respectively. Matrices from the next group provide nothing new but matrices of the form (\[thirdtype\]) correspond to the conformal Killing fields $$\mu\Big(x_2\frac{\partial}{\partial x_3} -x_3\frac{\partial}{\partial x_2}\Big) -(x_1{}^2-x_2{}^2-x_3{}^2)\frac{\partial}{\partial x_1} -2x_1x_2\frac{\partial}{\partial x_2}-2x_1x_3\frac{\partial}{\partial x_3}$$ and (\[testingV\]) is satisfied precisely when $\mu=0$. This gives rise to the final possibility for $f$ in the list (\[XYzero\]). In fact, all of the functions with $X=Y=0$ admit, not only infinitely many conjugate directions, but infinitely many conjugates. According to Theorem \[thm:XYzero\], it suffices to check this for the four cases (\[XYzero\]). The first three of these are discussed in detail elsewhere in this article, specifically in §\[lin\_and\_quad\], §\[subsec:spherical\], and §\[cylindrical\] respectively. Finally, the functions $$f=\frac{x_1}{x_1{}^2+x_2{}^2+x_3{}^2}\qquad g=\frac{x_2\cos\theta+x_3\sin\theta}{x_1{}^2+x_2{}^2+x_3{}^2}$$ form a conjugate pair for any $\theta$. Functions of two variables that admit a conjugate in ${\mathbb{R}}^3$ --------------------------------------------------------------------- Let $f = f(x_2, x_3)$ be a function of two variables only. Then many conformal invariants simplify and in the case of a unique conjugate direction, the equations have a simple interpretation. As a first observation, it is easily checked that $X$ factors as a product: $$X = (\Delta f)( f^i\nabla_iJ)\,,$$ so that we also have $$\textstyle Z = \frac12 f^i\nabla_iJ + J\Delta f \,,\quad Y = \left(\frac12 f^i\nabla_iJ - J\Delta f\right)^2\,.$$ Furthermore, by its expression in the Riemannian normalisation, one sees that $V\equiv 0$. In particular, the fourth condition for a conjugate: $P\equiv 0$ simplifies to $$ZS-2XR+2XY=0\,.$$ Now suppose $X=0$ and $Y>0$. Then either $\Delta f = 0$, in which case $\omega = (0, -f_3, f_2)$ is, up to sign, the unique integrable conjugate direction and we are in the case of a planar function with planar conjugate, or $f^i\nabla_i J=0$ and $\Delta f \neq 0$. We can now exploit Theorem \[thm:integrability2\]. Since (\[4bis\]) is equivalent to $V\equiv 0$, this is vacuous. However, (\[5bis\]) now comes into play. By going into the Riemannian normalisation, one sees that the third order terms of this equation vanish, and it becomes: $$(\epsilon^{ijk}f_i\omega_jf_k{}^lf_l)(f^{mn}f_mf_n+Z)=0\,.$$ However, since $\Delta f \neq 0$, it is also the case that $f^{mn}f_mf_n+Z\neq 0$ and the equation becomes $$\epsilon^{ijk}f_i\omega_jf_k{}^lf_l=0\,.$$ Let us write this out explicitly in coördinates: $$-\omega_1f_2f_3{}^lf_l + \omega_1f_3f_2{}^lf_l = 0\,.$$ But $\omega_1$ must be non-zero otherwise we are once more in the situation of a planar function with a planar conjugate whence $\Delta f=0$, contrary to our hypothesis. On combining this with the condition $f^i\nabla_iJ = 0$, we obtain the simultaneous equations in $f_2{}^kf_k$ and $f_3{}^kf_k$: $$\left\{ \begin{array}{rcl} f_3f_2{}^kf_k - f_2f_3{}^kf_k & = & 0 \\ f_2f_2{}^kf_k + f_3f_3{}^kf_k & = & 0 \end{array} \right.$$ Since $f_2{}^2+f_3{}^2\neq 0$, these only admit the solution $f_2{}^kf_k = f_3{}^kf_k = 0$. But this implies that $$\nabla_l(f^kf_k) = 0 \quad\Leftrightarrow\quad ||\nabla f|| = {\rm constant}\,.$$ The unique conjugate direction is thus given up to sign by $$\omega = (\sqrt{f_2{}^2+f_3{}^2},0,0).$$ Furthermore this case occurs precisely when $f$ satisfies the eikonal equation $||\nabla f||^2 =$ constant. This should be compared with the example of a function having spherical symmetry as discussed in §\[subsec:spherical\] below, where now the conjugate must satisfy an eikonal equation, even though there is no conformal transformation which sends concentric spheres to parallel planes. Some examples {#sec:examples} ============= In general, it is not the case that a function will admit a conjugate, even locally. For example, the function $f = x_1x_2x_3$ has the property that $X = 6f^2$. In particular $X$ cannot be $\leq 0$ on any open set, so that $f$ does not admit a conjugate on any open set. Recall from the Introduction that the pair $(f,g)$ of a function and its conjugate define a semi-conformal mapping into ${\mathbb{R}}^2$. In the analytic category, such mappings arise (i) as the extension to the boundary at infinity of a harmonic morphism on the associated heaven space of the domain, see [@Ba-Pa]; (ii) from local CR hypersurfaces in the standard Levi-indefinite hyperquadric in ${\mathbb{C}}P_3$, see [@Ba-Ea]. The latter perspective leads to an explicit construction of semiconformal mappings from a holomorphic function of two complex variables, which, in a first form was given in [@Nu] then refined in [@Ba-Ea]. In what follows, we highlight some particular cases of interest when a function $f$ admits a conjugate function. Linear and quadratic functions {#lin_and_quad} ------------------------------ Any linear function $f$ admits infinitely many conjugate functions, also linear; indeed the two invariants $X$ and $Y$ both vanish identically. The only quadratic function that admits a conjugate is, up to isometries and scaling, $f = x_1{}^2 - x_2{}^2 - x_3{}^2$. Note that $f$ has an isolated critical point at the origin, however its conjugate $g = x_1\sqrt{x_2{}^2 + x_3{}^2}$, although of class $C^1$ at the origin, is not smooth there. It is unknown if a pair of smooth conjugate functions $(f,g)$ can have an isolated critical point. When they are harmonic and so determine a harmonic morphism, this is impossible [@thebook]. Cylindrical symmetry {#cylindrical} -------------------- Let $r^2=x_2{}^2+x_3{}^2$ and suppose that $f=f(r)$ so that its level sets are concentric cylinders. Then by solving the equations (\[firstthree\]), we obtain the conjugate direction:– $$(\omega_1, \omega_2, \omega_3) = \left( \sqrt{f^{\prime \, 2} + rf^{\prime}f^{\prime\prime}} , x_3 \sqrt{\frac{-f^{\prime}f^{\prime\prime}}{r}}, - x_2 \sqrt{\frac{-f^{\prime}f^{\prime\prime}}{r}}\right)$$ whose four-valuedness corresponds to taking different signs for the square roots. Then for any branch, $d\omega = 0$ if and only if $$f^{\prime \, 2} + 2f^{\prime}f^{\prime\prime} = C,$$ where $C$ is a constant which is $\geq 0$. This has as first integral:– $$\label{first-int} f^{\prime \, 2} = \frac{A}{r^2} + C,$$ where $A\geq 0$ is a constant, and $\omega$ is now given by $$(\omega_1, \omega_2, \omega_3) = \left( \sqrt{C} , \frac{x_3\sqrt{A}}{r^2}, - \frac{x_2\sqrt{A}}{r^2}\right)$$ Then $X = 2Cf^{\prime}f^{\prime\prime}/r = - 2AC/r^4$ is $\leq 0$ with the inequality strict provided neither of $A$ nor $C$ vanish. In fact we can integrate (\[first-int\]) explicitly to obtain $$f = \left\{ \begin{array}{l} \sqrt{A} \ln\left\{ \frac{\sqrt{A + Cr^2} - \sqrt{A}}{\sqrt{C}r}\right\} + \sqrt{A + Cr^2} \quad (C>0) \\ \sqrt{A}\ln r \quad (C = 0) \end{array} \right.$$ The conjugate function is given by $g = \sqrt{C} x_1 - \sqrt{A} \arctan (x_3/x_2)$, interpolating between the two special case given by $A = 0$ $(f = \sqrt{C} r)$ and $C = 0$ $(f = \sqrt{A} \ln r)$. In fact the mapping $(f,g)$ has fibres which are helices lying on the cylinders $r =$ constant. When $C=0$ these helices become circles lying in planes orthogonal to the $x_1$-axis and when $A=0$ they become lines parallel to the $x_1$-axis. Geometrically, we can interpret the four-valuedness of $\omega$ as corresponding to the choice of a right-hand screw or a left-hand screw for the helices, together with a choice of orientation. In the special cases we obtain just two equal and opposite directions. Spherical symmetry {#subsec:spherical} ------------------ Let $r^2=x_1{}^2+x_2{}^2+x_3{}^2$ and suppose that $f = f(r)$ depends on the radial coordinate only. Then $$X = 2f^{\prime}(r)^2 \left( f^{\prime\prime}(r) + \frac{f^{\prime}(r)}{r}\right)^2$$ so that if $f$ is to admit a conjugate, the necessary condition $X\leq 0$ forces $f$ to be either constant or to satisfy the differential equation $$f^{\prime\prime}(r) + \frac{f^{\prime}(r)}{r} = 0\,.$$ This has general solution $f = A\log r + B$, where $A$ and $B$ are arbitrary constants. For convenience, we take $f = \log r$. Note that spherical symmetry implies that $Y \equiv 0$ and so there are infinitely many conjugate directions. In fact any conjugate function $g$ must satisfy $\partial g / \partial r = 0$ and $||\nabla g|| = 1/r$. Thus $g$ is determined by its values on say the sphere $r = 1$, where it must satisfy the equation $||\nabla g||=1$. Such an equation is know as an *eikonal equation* and solutions are determined by initial data on a hypersurface (i.e. a curve) in the sphere $S^2$. It should be noted that the sphere $S^2$ does not admit a nowhere vanishing vector field and since we require $||\nabla g||= 1$, then $g$ cannot be globally defined on $S^2$. Thus even though the function $f$ defined on ${{\mathbb R}^3}\setminus \{ 0\}$ admits infinitely many different conjugate functions in a neighbourhood of any point of its domain, the domain of any of these conjugate functions cannot coincide with that of $f$. An Ansatz --------- The following Ansatz provides a method of obtaining many pairs of conjugate functions. Let $h(x,y)$ satisfy the partial differential equation: $$\label{ansatz} \left(\frac{\partial h}{\partial x}\right)^2 + 4y\left(\frac{\partial h}{\partial y}\right)^2 + 4h\frac{\partial h}{\partial y} = 0\,.$$ Then the functions $$\left\{ \begin{array}{rcl} f & = & x_2h(x_1, {x_2}^2 + {x_3}^2) \\ g & = & x_3h(x_1, {x_2}^2 + {x_3}^2)\end{array} \right.$$ are conjugate. For example, by taking $h = (x^2/y) + 1$, we obtain the pair of conjugate functions of the Introduction. A straightforward calculation shows that the only product solutions $h(x,y) = u(x)v(y)$ to (\[ansatz\]), have the form $$h = \frac{be^{cx}e^{\sqrt{1 - c^2y}}}{1 + \sqrt{1 - c^2y}},$$ where $b$ and $c$ are constants. In fact, with reference to  §\[sec:X=0\], every solution obtained by this Ansatz satisfies $X\equiv 0$. Invariants of the conjugate =========================== For a function $f$ which admits a conjugate $g$, we can ask which of its properties are shared by its conjugate. More specifically, can we express the conformal invariants of $g$ in terms of those of $f$? For the invariant $X$, this turns out to be simply done. In order to be clear on which invariants are being considered, in this section we shall write $X(f)$ and $X(g)$ and so on, for the invariants of the respective functions. \[thm:Xconjugates\] If $f$ admits a conjugate function $g$, then $X(f) = X(g)$. In addition to (\[firstthree\]), we have the identities: $$g^{ij}f_j+f^{ij}g_j = 0 \quad {\rm and} \quad g^{ij}g_j = f^{ij}f_j\,.$$ Set $v_i = \epsilon_{ijk}f^jg^k$. Then we can decompose $g_{ij}$ in terms of a symmetric basis: $$\begin{aligned} g_{ij} & = & \frac{1}{J^2}(g^{kl}f_kf_l)f_if_j + \frac{1}{J^2}(g^{kl}g_kg_l)g_ig_j + \frac{1}{J^4}(g^{kl}v_kv_l)v_iv_j \\ & & + \frac{2}{J^2}(g^{kl}f_kg_l)f_{(i}g_{j)} + \frac{2}{J^3}(g^{kl}f_kv_l)f_{(i}v_{j)} + \frac{2}{J^3}(g^{kl}g_kv_l)g_{(i}v_{j)} \\ & = & \frac{1}{J}(g^k{}_k)(J\delta_{ij} - f_if_j-g_ig_j) - \frac{2}{J}f_{k(i}g^kf_{j)} + \frac{2}{J} f_{k(i}f^kg_{j)} \\ & & + \frac{1}{J^2}(f^{kl}f_kg_l)(f_if_j-g_ig_j) - \frac{2}{J^2}(f^{kl}f_kf_l)f_{(i}g_{j)}\,.\end{aligned}$$ As a first application of this formula, we deduce the identity: $$\label{identity-conjugates} f^{ij}g_{ij} - (f^i{}_i)(g^j{}_j) = 0\,.$$ Furthermore $$g^{ij}g_{ij} =(g^k{}_k)^2 + \frac{2}{J}f_{kj}g^kf^{lj}g_l + \frac{2}{J} f_{kj}f^kf^{lj}f_l - \frac{2}{J^2}(f^{kl}f_kg_l)^2 - \frac{2}{J^2}(f^{kl}f_kf_l)^2\,,$$ which implies that $$X(g) = - 2f_{kj}g^kf^{lj}g_l + \frac{2}{J}(f^{kl}f_kg_l)^2 + \frac{2}{J}(f^{kl}f_kf_l)^2\,.$$ In normal coördinates, on applying (\[solution\]), the RHS equals $$-2g_1{}^2f_{11}^2 - 2g_2{}^2f_{22}{}^2 + 2f_3{}^2f_{33}{}^2 = 2f_3{}^2(f_{11} + f_{33})(f_{22}+ f_{33})\,,$$ which is precisely $X(f)$. If $f$ admits a conjugate function $g$, then for any $\epsilon \in {\mathbb{R}}$, the function $f+\epsilon g$ admits $g-\epsilon f$ as a conjugate and $X(f+\epsilon g) = (1+\epsilon^2)^2X(f)$. That $f+\epsilon g$ and $g-\epsilon f$ are conjugates, is easily checked. Then $$\begin{aligned} X(f+\epsilon g) & \!\!=\!\! & X(f) \\ & & + \epsilon \{ 4(f_i{}^jg_j+4g_i{}^jf_j)f^{ik}f_k - 2J(g^{ij}f_{ij} - (f^i{}_i)(g^j{}_j))\} \\ & & + \epsilon^2\{ 4f_i{}^jf_jg^{ik}g_k+4f_i{}^jg_jg^{ik}f_k +2g_i{}^jf_jg^{ik}f_k+2f_i{}^jg_jf^{ik}g_k \\ & & \qquad - J[f^{ij}f_{ij} + g^{ij}g_{ij} - (f^i{}_i)^2 - (g^j{}_j)^2]\} \\ & & + \epsilon^3\{ 4(f_i{}^jg_j+4g_i{}^jf_j)g^{ik}g_k - 2J(g^{ij}f_{ij} - (f^i{}_i)(g^j{}_j))\}\\ & & \qquad + \epsilon^4X(g)\,.\end{aligned}$$ But the coefficients of the odd powers of $\epsilon$ vanish on account of (\[firstthree\]) and (\[identity-conjugates\]), so from Theorem \[thm:Xconjugates\], we obtain $$X(f+\epsilon g) = X(f) + \epsilon^2(X(f)+X(g)) + \epsilon^4X(g) = (1+\epsilon^2)^2X(f)\,.$$ Note that if we view the pair $(f,g)$ of a function and its conjugate as defining a semiconformal map into ${\mathbb{R}}^2$, then the replacement of $(f,g)$ by $(f+\epsilon g, g-\epsilon f)$ amounts to multiplication of $f+ig$ by $1-i\epsilon$ when we identify ${\mathbb{R}}^2$ with the complex plane ${\mathbb{C}}$. Indeed, semiconformality is preserved under conformal transformations of both the domain and codomain. To calculate the invariant $Z(g)$ in terms of invariants of $f$ turns out to be more challenging. In fact $Z(g)$ depends on the choice of conjugate direction, so that, in the generic case, the appropriate quantity to consider is the product $\sqrt{Y}Z(\omega )Z(\eta )$. This can be calculated by the methods of §\[sec:elim-om\] to produce an expression involving third order derivative of $f$ which we don’t attempt to write down. On the other hand, information about $Z(g)$ can be obtained as in the above Corollary. \[lem:Zfg\] If $f$ admits a conjugate $g$, then we have $$Z(f+\epsilon g) = (1+\epsilon^2)(Z(f) + \epsilon Z(g))\,.$$ Furthermore, $$Z(g) = \frac{d}{d\epsilon}Z(f+\epsilon g)\vert_{\epsilon =0}\,;$$ that is, $Z(g)={\mathcal Z}_f(g)$ where ${\mathcal Z}_f$ is the linearisation of the operator $Z$ at $f$. In fact the latter part of the lemma is easily deduced directly from (\[firstthree\]): $$Z(g) = g^{ij}g_ig_j+(g^ig_i)(g^j{}_j) = f^{ij}f_ig_j + (f^if_i)(g^j{}_j)\,,$$ where, for a given $f$ with $\nabla f$ non-zero, the RHS is now a linear operator on $g$, which, since the principal term is the Laplacian, is elliptic. We have: $$\begin{aligned} Z(f+\epsilon g) & = & Z(f) + \epsilon (g^{ij}f_if_j+2f^{ij}g_if_j+J\Delta g) \\ & & \quad \epsilon^2(2g^{ij}g_if_j+f^{ij}g_ig_j+J\Delta f) + \epsilon^3Z(g) \\ & = & Z(f) + \epsilon (f^{ij}f_ig_j+J\Delta g) + \epsilon^2(f^{ij}f_if_j +J\Delta f) + \epsilon^3Z(g) \\ & = & (1+\epsilon^2)(Z(f) + \epsilon Z(g))\,.\end{aligned}$$ The last part of the lemma now follows from this formula, or as indicated above, directly from (\[firstthree\]). An interesting problem is to characterize those conjugate pairs that are $3$-harmonic, i.e. conjugate pairs $(f,g)$ satisfying $Z(f)=Z(g)=0$, for then the mapping $(f,g)$ determines a $3$-harmonic morphism [@Lo]. If both $X$ and $Y$ vanish, then so does $Z$ and we have a complete description in this case given by Theorem \[thm:XYzero\]. Up to conformal transformation, the different conjugate $3$-harmonic pairs are given by $$\begin{array}{l} (x_1, x_2), \quad \big(\frac12\log (x_1{}^2+x_2{}^2+x_3{}^2), \arctan(x_3/x_2)\big),\\ \qquad \quad \displaystyle \big(\frac{x_1}{x_1{}^2+x_2{}^2+x_3{}^2}, \frac{x_2}{x_1{}^2+x_2{}^2+x_3{}^2}\big)\,. \end{array}$$ More generally, by the homogeneity of $Z(f)$ in $f$, the function $f$ is $3$-harmonic if and only if it satisfies the linearisation of $Z$ at $f$: ${\mathcal Z}_f(f)=0$, so that by Lemma \[lem:Zfg\], ${\mathcal Z}_f(f)={\mathcal Z}_f(g)=0$ is a necessary and sufficient condition for a conjugate pair $(f,g)$ to be $3$-harmonic. Conformal invariants {#conformalinvariants} ==================== Suppose $f$ is a smooth function defined on an open subset $U\subseteq{\mathbb{R}}^3$. As usual, we denote the partial derivatives of $f$ by subscripts $$f_i=\frac{\partial f}{\partial x^i},\quad f_{ij}= \frac{\partial^2f}{\partial x^i\partial x^j},\quad f_{ijk}= \frac{\partial^3f}{\partial x^i\partial x^j\partial x^k},\quad \ldots.$$ Equivalently, we may regard these quantities as tensors obtained by repeated application of the flat connection $\nabla_i$ corresponding to the flat metric $g_{ij}$. Suppose $\Omega$ is a smooth non-vanishing function defined on $U$ such that $\hat g_{ij}\equiv\Omega^2g_{ij}$ is also flat. If we let $\Upsilon_i=\nabla_i\log\Omega$, then it is well-known [@thebook] that these functions are precisely the solutions of $$\nabla_i\Upsilon_j=\Upsilon_i\Upsilon_j -\textstyle\frac{1}{2}g_{ij}\Upsilon^k\Upsilon_k$$ and that all solutions are obtained by the conformal transformations of the round sphere $S^3$ viewed as flat-to-flat conformal rescalings via stereographic projection. Let $\hat\nabla_i$ denote the metric connection for $\hat g_{ij}$ and write $$\hat f=f,\quad \hat f_i=\hat\nabla_if,\quad \hat f_{ij}=\hat\nabla_i\hat\nabla_jf,\quad \hat f_{ijk}=\hat\nabla_i\hat\nabla_j\hat\nabla_kf,\quad \ldots.$$ A conformal differential invariant of $f$ of weight $w$ is a polynomial $$I=I(g^{ij},f,f_i,f_{ij},f_{ijk},\ldots)$$ in the derivatives of $f$ and the inverse metric $g^{ij}$ with the property that it is invariant under arbitrary coördinate transformation and $$\label{defofinvariant} I(\hat g^{ij},\hat f,\hat f_i,\hat f_{ij},\hat f_{ijk},\ldots) =\Omega^wI(g^{ij},f,f_i,f_{ij},f_{ijk},\ldots)$$ for all flat-to-flat conformal rescalings $\Omega$. As detailed in [@eg], this notion of invariance is the same as requiring equivariance under the action of ${\mathrm{SO}}(4,1)$ on the $3$-sphere, with ${\mathbb{R}}^3\hookrightarrow S^3$ by stereographic projection. It is straightforward to write down explicit formulae for the effect of flat-to-flat rescalings on derivatives $$\label{jetchange}\begin{array}{rcl}\hat f_i&=&f_i\\ \hat f_{ij}&=&f_{ij}-2\Upsilon_{(i}f_{j)}+g_{ij}\Upsilon^kf_k\\ \hat f_{ijk}&=&f_{ijk}-6\Upsilon_{(i}f_{jk)}+3g_{(ij}\Upsilon^pf_{k)p}\\ &\vdots&\phantom{f_{ijk}}+6\Upsilon_{(i}\Upsilon_jf_{k)} -3g_{(ij}\Upsilon_{k)}\Upsilon^pf_p-\frac32\Upsilon^p\Upsilon_pg_{(ij}f_{k)} \end{array}$$ with a view to verifying (\[defofinvariant\]) by direct calculation. It is difficult to find conformal invariants from this direct point of view. Certainly $J\equiv g^{ij}f_if_j=f^if_i$ is an invariant of weight $-2$. Perhaps the simplest second order invariant is $$Z\equiv f^{ij}f_if_j+Jf^j{}_j.$$ It has weight $-4$ but it is usual to omit the powers of $\Omega$ in verifying invariance (this is easily made precise by regarding the invariant as taking its values in an appropriate line-bundle). Specifically, as a linear combination of complete contractions it is manifestly invariant under coördinate transformation and $$\begin{array}{rcl}\hat f^{ij}\hat f_i\hat f_j&=& f^{ij}f_if_j-\Upsilon^if_if^jf_j=f^{ij}f_if_j-J\Upsilon^kf_k\\ \hat J\hat f^j{}_j&=&Jf^j{}_j+J\Upsilon^kf_k \end{array}$$ whence $$\hat f^{ij}\hat f_i\hat f_j+\hat J\hat f^j{}_j=f^{ij}f_if_j+Jf^j{}_j,$$ as required. The familiar quantity $$\label{defofX} X=2f_i{}^jf_jf^{ik}f_k-f^if_if^{jk}f_{jk}+f^if_i(f^j{}_j)^2$$ is a conformal invariant of weight $-6$. That it is a polynomial in the derivatives of $f$ invariant under coördinate change is already manifest. Its conformal invariance, however, is most easily seen from the identity of Lemma \[magic\]:– $$JX+12T_{ijk}T^{ijk}=0,\quad\mbox{where }T_{ijk}= f_{[i}\omega_jf_{k]l}\omega^l.$$ Here, recall that $\omega_j$ is any solution of the equations (\[firstthree\]). We make take $\hat\omega_i=\omega_i$ to obtain a solution of the conformally transformed equations resulting from (\[jetchange\]). Then $$\hat f_{kl}\hat\omega^l =f_{kl}\omega^l-\Upsilon^l\omega_lf_k+\Upsilon^lf_l\omega_k$$ and so $T_{ijk}$ is a conformally invariant tensor (of weight $-2$). Notice, however, that $T_{ijk}$ is not an expression solely in $f$ and its derivatives but also involves $\omega_j$. It may also be imaginary-valued. It is only in the combination $T_{ijk}T^{ijk}$ that $\omega_j$ can be eliminated using the relations (\[firstthree\]). Of course, it is also possible to check the conformal invariance of $X$ directly from the expression (\[defofX\]). In the remainder of this section we construct an extensive menagerie of conformal differential invariants of $f$. It is possible, in principle [@eg], to list all such invariants. In practise, however, it is easier to construct invariants by a number of tricks (see [@s]). Apart from the particular invariant $V$ constructed below, these will turn out to be sufficient for our purposes. The new connection $\hat\nabla_i$ is related to $\nabla_i$ by $$\hat\nabla_i\phi_j=\nabla_i\phi_j-\Upsilon_i\phi_j-\Upsilon_j\phi_i +g_{ij}\Upsilon^k\phi_k$$ when acting on an arbitrary $1$-form $\phi_j$. It follows that $$\nabla^i[\Omega^{-1}\phi_i]=\Omega^{-1}\nabla^i\phi_i,$$ which we will more conveniently express by saying if $\phi_i$ has conformal weight $-1$, then $\phi_i\mapsto\nabla^i\phi_i$ is conformally invariant. Similarly, $$\textstyle\phi_j\mapsto\nabla_{(i}\phi_{j)}-\frac13\nabla^k\phi_kg_{ij}$$ is conformally invariant when $\phi_j$ has weight $2$. Where $J$ does not vanish we may consider the smooth $1$-form $J^{1/2}f_i$. It has weight $-1$ whence $$J^{1/2}\nabla^j[J^{1/2}f_j]$$ is conformally invariant (of weight $-4$). As written here, this is not a polynomial but if we expand it we obtain $$\textstyle \frac12[\nabla^jJ]f_j+J\nabla^jf_j=f^{ij}f_if_j+f^if_if^j{}_j\,,$$ which is a perfectly good polynomial. It follows that this is an invariant whether or not $J$ vanishes. It is our previous invariant $Z$. Another viewpoint on this construction is that $f^j\nabla_jJ+2J\nabla_jf^j$ is a conformally invariant bilinear differential pairing between $f_i$ and $J$. There are many such pairings on ${\mathbb{R}}^3$ as follows. \[firstpairings\] The following pairings are conformally invariant. $$\begin{array}{ccl} \underbrace{\psi}_{\mbox{\scriptsize\rm weight $v$}}\times \underbrace{\phi}_{\mbox{\scriptsize\rm weight $w$}}&\mapsto& \underbrace{v\psi\nabla_i\phi-w\phi\nabla_i\psi}_{ \mbox{\scriptsize\rm weight $v+w$}}\\ \rule{0pt}{16pt}\underbrace{\psi_i}_{\mbox{\scriptsize\rm weight $v$}}\times \underbrace{\phi}_{\mbox{\scriptsize\rm weight $w$}}&\mapsto& \underbrace{(v+1)\psi^i\nabla_i\phi-w\phi\nabla_i\psi^i}_{ \mbox{\scriptsize\rm scalar of weight $v+w-2$}}\\ \rule{0pt}{16pt}\mbox{ditto}&\mapsto& \underbrace{v\psi_{[i}\nabla_{j]}\phi+w\phi\nabla_{[i}\psi_{j]}}_{ \mbox{\scriptsize\rm skew of weight $v+w$}}\\ \rule{0pt}{16pt}\mbox{ditto}&\mapsto& (v-2)[\psi_{(i}\nabla_{j)}\phi-\frac13g_{ij}\psi^k\nabla_k\phi]\\ &&\underbrace{\rule{0pt}{12pt}\textstyle\qquad{} -w\phi[\nabla_{(i}\psi_{j)}-\frac13g_{ij}\nabla^k\psi_k]}_{ \mbox{\scriptsize\rm symmetric trace-free of weight $v+w$}}\\ \end{array}$$ These are all easily verified by direct calculation. Alternatively, we may employ evident variations on the trick used so far. For example, for non-vanishing $\psi$ and $\phi$ we may write the first pairing as $$\phi^{-v+1}\psi^{w+1}\nabla_i[\phi^v\psi^{-w}],$$ which is clearly invariant since $\phi^v\psi^{-w}$ has weight zero. All of these pairings are similarly based on well-known conformally invariant linear differential operators. Notice that the bundles occurring in these pairings are irreducible in the sense that they are associated to irreducible representations of the orthogonal group. These are the bundles between which it is relatively straightforward to find invariant pairings. Here are two more examples that we shall need. \[secondpairings\] The following pairings are conformally invariant for $\psi$ of weight $v$ and $\phi_{ij}$ being symmetric trace-free and of weight $w$. $$\begin{array}{ccl} \psi\times\phi_{ij}&\mapsto& \underbrace{v\psi\nabla^i\phi_{ij}-(w+1)\phi_{ij}\nabla^i\psi}_{ \mbox{\scriptsize\rm weight $v+w-2$}}\\ \rule{0pt}{20pt}\psi\times\phi_{ij}&\mapsto& v\psi[\nabla_{(i}\phi_{jk)}-\frac25g_{(ij}\nabla^l\phi_{k)l}]\\ &&\underbrace{\rule{0pt}{12pt}\textstyle\qquad{} -(w-4)[\phi_{(ij}\nabla_{k)}\psi-\frac25g_{(ij}\phi_{k)l}\nabla^l\psi]}_{ \mbox{\scriptsize\rm symmetric trace-free of weight $v+w$}} \end{array}$$ Easily verified by direct calculation. In fact, all the invariant pairings that we shall need may be constructed from invariant linear differential operators. (There are, however, many invariant pairings that do not arise in this way.) We are now able to list the almost all the conformal invariants that we shall use. \[usefullist\] The following are conformal differential invariants of a smooth function $f$ locally defined on ${\mathbb{R}}$. $$\begin{array}c J\equiv f^if_i\qquad Z\equiv f^{ij}f_if_j+Jf^j{}_j\\[3pt] X\equiv 2f_i{}^jf_jf^{ik}f_k-Jf^{jk}f_{jk}+J(f^j{}_j)^2\end{array}$$ If we now define $$\begin{array}l\sigma_i\equiv J\nabla_iZ-2Z\nabla_iJ\qquad \tau_i\equiv J\nabla_iX-3X\nabla_iJ\\[3pt] \phi_{ij}\equiv \textstyle Jf_{ij}-2f_{(i}f_{j)}{}^kf_k -\frac13Jf^k{}_kg_{ij}+\frac23f^{kl}f_kf_lg_{ij}, \end{array}$$ then the following are also conformal invariants. $$\begin{array}c R\equiv f^i\sigma_i \qquad S\equiv f^i\tau_i \qquad A\equiv \sigma^i\sigma_i \qquad B\equiv \tau^i\tau_i\\[3pt] D\equiv \sigma^i\tau_i \qquad T\equiv \phi^{ij}\sigma_i\sigma_j\qquad U\equiv \phi^{ij}\tau_i\tau_j \end{array}$$ If we now define $$\begin{array}l\textstyle\rho_{ijk}\equiv J\nabla_{(i}\phi_{jk)}-3\phi_{(ij}\nabla_{k)}J -\frac25g_{(ij}\nabla^l\phi_{k)l}+\frac65g_{(ij}\phi_{k)l}\nabla^lJ\\[3pt] \lambda_j\equiv 2J\nabla^i\phi_{ij}-\phi_{ij}\nabla^iJ,\end{array}$$ then the following are also conformal invariants. $$\begin{array}c F\equiv\rho^{ijk}\phi_{ij}\lambda_k\qquad G\equiv\phi^{ij}\lambda_i\lambda_j \qquad K\equiv \sigma^i\lambda_i\\[3pt] M\equiv\tau^i\lambda_i\qquad N\equiv\sigma_i\rho^{ijk}\phi_{jk} \qquad W\equiv\rho^{ijk}\rho_{ij}{}^l\phi_{kl}.\end{array}$$ We have already observed that $J$, $Z$, and $X$ are conformally invariant. The remaining invariants in this theorem are manufactured from these basic ones by using Lemmata \[firstpairings\] and \[secondpairings\] as appropriate. There is one more invariant that we shall need and its construction is slightly different. Let $Q^{ij}$ be any symmetric form and set $\upsilon = \epsilon^{jkl}(Jf_k{}{}^iQ_{ij} - f^iQ_{ij}f_{km}f^m)f_l$. Then the following identity holds: $$\label{a-three} Y(Q^{ij}\omega_i\omega_j - Q^{ij}\eta_i\eta_j) = 4E\upsilon$$ (recall that $E\equiv\epsilon^{ijk}f_i\omega_jf_k{}^\ell\omega_\ell$). In the case when $Q^{ij} = f^{ijk}f_k - 2f^{ik}f_k{}^j$, one may check that $\upsilon$ is conformally invariant. It is convenient and consistent with [@be] to define the related conformal invariant $V = 4J\upsilon$. It has a different character to our previous invariants in that it changes sign under change of orientation. It is said to be an odd invariant. It is useful to record the conformal weight and homogeneity in $f$ for each of the invariants of Theorem \[usefullist\] together with $V$:– $J$ $Z$ $X$ $R$ $S$ $V$ $A$ $B$ $D$ -- ------ ------ ------ ------ ------- ------- ------- ------- ------- $-2$ $-4$ $-6$ $-8$ $-10$ $-11$ $-14$ $-18$ $-16$ $2$ $3$ $4$ $6$ $7$ $8$ $10$ $12$ $11$ \ ------------------------------------------------------------------------ \ $T$ $U$ $F$ $G$ $K$ $M$ $N$ $W$ -- ------- ------- ------- ------- ------- ------- ------- ------- $-18$ $-22$ $-18$ $-18$ $-14$ $-16$ $-18$ $-18$ $13$ $15$ $13$ $13$ $10$ $11$ $13$ $13$ Any polynomial combination with consistent total weight will also be invariant. For example, the quantity $Y=Z^2-2JX$ introduced in (\[thisisY\]) is a conformal invariant of weight $-8$ (and homogeneity $6$). Other evident invariants are not necessarily new. For example, it is easily verified by direct computation that $$\label{aha}\textstyle\phi^{ij}\phi_{ij}=\frac23Z^2-JX.$$ This gives yet another verification that $X$ is conformally invariant. Invariant derivation of certain equations {#sec:elim-om} ========================================= Our aim is to eliminate $\omega_i$ from polynomial expressions of the form $F(f_i, f_{ij}, f_{ijk},...., \omega_i)$, given that the equations (\[firstthree\]) hold. We suppose that $X<0$, so that in particular $Y>0$. Recall that $$\eta_i = \frac{1}{\sqrt{Y}}\left\{ 2(f^{kl}f_k\omega_l)f_i + (Jf_k{}^k - f^{kl}f_kf_l)\omega_i - 2Jf_i{}^k\omega_k\right\}\,,$$ gives the other conjugate direction, where an ambiguity of sign arises with the choice of square root. Let $Q^{ij}$ be any symmetric form. Then $$\begin{aligned} & &Y(Q^{ij}\omega_i\omega_j+ Q^{ij}\eta_i\eta_j) = 2Q^{ij}f_if_j(JX-Z^2) \label{a-one} \\ & & \qquad + 2J^2Q_j{}^j(Zf_l{}^l-X) - 2J^2ZQ^{ij}f_{ij} +4JZQ^{ij}f_i{}^kf_kf_j \nonumber \\ & & \sqrt{Y}Q^{ij}\omega_i\eta_j = -ZQ^{ij}f_if_j + 2JQ^{ij}f_if_j{}^kf_k + J^2(f_k{}^kQ_l{}^l - Q^{kl}f_{kl}) \label{a-two}\end{aligned}$$ Both formulae can be deduced by skew-symmetrising over the indices of an appropriate $4$-tensor. For example, to derive the second, consider the four tensor: $T_{ijkl} = f_i\omega_jf_k{}^kQ_l{}^l$ and apply the identity: $T_{[ijkl]} = 0$. On transvecting first with $f^i$, then with $\omega^j$ and applying (\[firstthree\]), the result follows. Now let us find invariant proofs of some of the identities of §\[sec:resolution\]. Recall $$\begin{array}{rcl} p^+ & \equiv & f^{ijk}f_i\omega_j\omega_k + f^{ijk}f_if_jf_k - 2 f^{ij}f_j{}^k\omega_i\omega_k + 2f^{ij}f_j{}^kf_if_k \\ p^- & \equiv & f^{ijk}f_i\eta_j\eta_k + f^{ijk}f_if_jf_k - 2 f^{ij}f_j{}^k\eta_i\eta_k + 2f^{ij}f_j{}^kf_if_k \\ q^+ & \equiv & f^{ijk}\omega_i\omega_j\omega_k + f^{ijk}f_if_j\omega_k + 4 f^{ij}f_j{}^kf_i\omega_k \\ q^- & \equiv & f^{ijk}\eta_i\eta_j\eta_k + f^{ijk}f_if_j\eta_k + 4 f^{ij}f_j{}^kf_i\eta_k\,. \end{array}$$ \[thm:p-even\] The following identities hold: $$\begin{aligned} Y(p^++p^-) & = & ZS-2XR+2XY \label{p-even}\\ Y(p^+-p^-) & = & EV/J\,. \label{p-odd}\end{aligned}$$ where $X,Y,Z,R,S,V$ are the standard conformal invariants and where $E\equiv\epsilon^{ijk}f_i\omega_jf_k{}^\ell\omega_\ell$. The first identity is an application of (\[a-one\]), where we have set $Q^{ij} = f^{ijk}f_k - 2f^{ik}f_k{}^j$. For the second, we apply (\[a-three\]) with symmetric form $Q^{ij} = f^{ijk}f_k - 2f^{ik}f_k{}^j$. Note that both the LHS and the RHS of equation (\[p-odd\]) change sign under the interchange of the conjugate directions, the equation itself being well-defined and independent of this operation. The condition $p^+p^-\equiv0$ of Theorem \[mainthm\] now follows since $$4Y^2p^+p^-=Y^2(p^++p^-)^2 - Y^2(p^+-p^-)^2.$$ On applying (\[identityEX\]), this gives the necessary condition $P\equiv0$ of §\[sec:resolution\]: $$2(ZS-2XR+2XY)^2 + XV^2 = 0\,.$$ Now consider the remaining conditions. We claim that we can use (\[a-one\]) and (\[a-two\]) to write $q^{ijk}\omega_i\omega_j\omega_k$ as a linear form in $\omega_i$, where $q^{ijk}$ is any symmetric tensor. For this, first set $Q^{ij} = q^{ijk}\omega_k$. Then from (\[a-one\]), $$\begin{array}{l} Yq^{ijk}\omega_i\omega_j\omega_k = -Y q^{ijk}\eta_i\eta_j\omega_k +2q^{ijk}f_if_j\omega_k(JX-Z^2) \\ \enskip{}+ 2J^2q_j{}^{jk}\omega_k(Zf_l{}^l-X) - 2J^2Zq^{ijk}f_{ij}\omega_k +4JZq^{ijk}f_i{}^lf_lf_j\omega_k\,. \label{a-four} \end{array}$$ We now have to calculate $Y q^{ijk}\eta_i\eta_j\omega_k$. For this we set $Q^{ij} = \sqrt{Y}q^{ijk}\eta_k$ and apply (\[a-two\]): $$\begin{array}{l} Yq^{ijk}\eta_i\eta_j\omega_k = \sqrt{Y}Q^{ij}\omega_i\eta_j \\ = -Zq^{ijk}f_if_jv_k + 2Jq^{ijk}f_if_j{}^lf_lv_k + J^2(f_j{}^jq_l{}^{lk}v_k - q^{ijk}f_{ij}v_k) \end{array}$$ where $v_i=\sqrt{Y}\eta_i = 2(f^{kl}f_k\omega_l)f_i + (Jf_k{}^k - f^{kl}f_kf_l)\omega_i - 2Jf_i{}^k\omega_k$. On expanding the right-hand side and substituting into (\[a-four\]), we obtain: $$\begin{array}{l} Yq^{ijk}\omega_i\omega_j\omega_k = \omega_i\Big\{ q^{ijk}f_jf_k(-Y-2Zf^{lm}f_lf_m) \\ + Jq^{ij}{}_j\Big[ Y+Z(f^{mn}f_mf_n) - 2(f^{mn}f_mf_n)^2\Big] \\ +J(Z+2f^{lm}f_lf_m)(2q^{ijk}f_j{}^lf_lf_k - Jq^{ijk}f_{jk}) - 2JZq^{jkl}f_jf_kf_l{}^i \\ -2f^{in}f_n\Big[ 2Jq^{jkl}f_jf_kf_l{}^mf_m + J^2f_j{}^jq_k{}^{kl}f_l - J^2q^{jkl}f_{jk}f_l - Zq^{jkl}f_jf_kf_l\Big] \\ + 4J^2q^{jkl}f_jf_k{}^mf_mf_l{}^i + 2J^3(f_j{}^jq_k{}^{kl}f_l{}^i - q^{jkl}f_{jk}f_l{}^i) \Big\}\,, \end{array}$$ as claimed. We can now express $Yq^+$ by setting $q^{ijk} = f^{ijk}$ and then adding $Y(f^{ijk}f_jf_k\omega_i + 4f^{jk}f_k{}^if_j\omega_i)$: $$\begin{array}{l} Yq^+ = \omega_i\Big\{ -2Zf^{ijk}f_jf_k(f^{lm}f_lf_m) \\ +Jf^{ij}{}_j\Big[ Y+Z(f^{mn}f_mf_n) - 2(f^{mn}f_mf_n)^2\Big] \\ +J(Z+2f^{lm}f_lf_m)(2f^{ijk}f_j{}^lf_lf_k - Jf^{ijk}f_{jk}) - 2JZq^{jkl}f_jf_kf_l{}^i \\ -2f^{in}f_n\Big[ 2Jf^{jkl}f_jf_kf_l{}^mf_m + J^2f_j{}^jf_k{}^{kl}f_l - J^2f^{jkl}f_{jk}f_l - Zf^{jkl}f_jf_kf_l\Big] \\ + 4J^2f^{jkl}f_jf_k{}^mf_mf_l{}^i + 2J^3(f_j{}^jf_k{}^{kl}f_l{}^i - f^{jkl}f_{jk}f_l{}^i) + 4f^{jk}f_k{}^if_j\Big\} \end{array}$$ This has the form $Yq^+ \equiv \alpha^i\omega_i$, where each $\alpha^i$ is an explicit Riemannian invariant polynomial expression in $f_i, f_{ij}, f_{ijk}$, which at each point is defined up to addition of an arbitrary linear combination: $$af^i + b[(f^{kl}f_kf_l)\omega^i + Jf^{ik}\omega_k]\,.$$ By symmetry, we must also have $Yq^- = \alpha^i\eta_i$. Then the fifth condition $Y\sqrt{Y}q^+q^-\equiv 0$ has the form $r^{ij}\omega_i\eta_j = 0$, where $r^{ij}$ is the symmetric form $r^{ij} = (1/\sqrt{Y})\alpha^i\alpha^j$. We can now apply (\[a-two\]) to give an invariant derivation of the quantity $Q\equiv Y\sqrt{Y}q^+q^-$ of §\[sec:resolution\]. The final equation of Theorem \[mainthm\] is $(p^+q^-)^2 + (p^-q^+)^2 = 0$. But $$\begin{array}{l} 4\{ (p^+q^-)^2 + (p^-q^+)^2\} = \{ (p^++p^-)^2 + (p^+-p^-)^2\} \{ (q^+)^2 + (q^-)^2\} \\ - 2(p^++p^-)(p^+-p^-)\{ (q^+)^2 -(q^-)^2\}\,, \end{array}$$ which we can see as a product of conformally invariant terms that we can deal with. First, multiply the whole expression by $Y^3\sqrt{Y}$. Then $Y(p^++p^-)$ is given by (\[p-even\]), whilst $Y(p^+-p^-)$ is given by (\[p-odd\]). On the other hand, $$Y\sqrt{Y}((q^+)^2 + (q^-)^2) = r^{ij}\omega_i\omega_j +r^{ij}\eta_i\eta_j,$$ which can be expressed using (\[a-one\]) above, whereas $$Y\sqrt{Y}((q^+)^2 - (q^-)^2) = r^{ij}\omega_i\omega_j-r^{ij}\eta_i\eta_j$$ can be expressed using (\[a-three\]). Note that the result involves $E^2$, which by (\[identityEX\]) can be written in terms of conformal invariants of §\[conformalinvariants\]. Normalising conformal Killing fields {#normalised_conf_Killing} ==================================== The conformal Killing fields on ${\mathbb{R}}^3$ form a finite-dimensional vector space on which ${\mathrm{O}}(4,1)$ acts via the conformal automorphisms of $S^3$. It is the adjoint representation ${\mathfrak{o}}(4,1)$ and so the question of normalising a conformal Killing field up to conformal transformations comes down to finding canonical representatives for the orbits of this action. This is a question of linear algebra, which may be stated more generally as follows. Suppose we are given a real symmetric $n\times n$ matrix $H$ of Lorentzian signature meaning that there is a real invertible $n\times n$ matrix such that $$\label{Lorentz} A^tHA=\mbox{\small$\left[\begin{array}{cccc}1&0&0&0\\ 0&\raisebox{-1pt}[0pt]{$\ddots$}&0&0\\ 0&0&1&0\\ 0&0&0&-1 \end{array}\right]$}.$$ Suppose $N$ is a real skew $n\times n$ matrix. We would like to find a real invertible $n\times n$ matrix $A$ such that $A^tHA$ and $A^tNA$ are placed in some canonical form. For example, we may insist on (\[Lorentz\]) for $A^tHA$ but following [@laplace; @eg] we normally prefer (written in block form) $$\label{prefer} A^tHA=\mbox{\small$\left[\begin{array}{ccc}0&0&1\\ 0&{\mathrm{Id}}&0\\ 1&0&0 \end{array}\right]$},$$ where ${\mathrm{Id}}$ is the $(n-2)\times (n-2)$ identity matrix. \[onlyone\] Suppose $H$ is a real symmetric $n\times n$ matrix of Lorentzian signature and $N$ is a real skew $n\times n$ matrix. Suppose that, regarded as a complex matrix, $H^{-1}N$ has only one eigenvector up to scale. Then, the eigenvalue is zero, it must be that $n=3$, and we can find an invertible real $3\times 3$ matrix $A$ such that $$A^tHA=\mbox{\small$\left[\begin{array}{ccc}0&0&1\\ 0&1&0\\ 1&0&0 \end{array}\right]$}\quad\mbox{and}\quad A^tNA=\mbox{\small$\left[\begin{array}{ccc}0&0&0\\ 0&0&2\\ 0&-2&0 \end{array}\right]$}.$$ Notice that $$H\mapsto A^tHA\quad\mbox{and}\quad N\mapsto A^tNA\quad\implies H^{-1}N\mapsto A^{-1}H^{-1}NA.$$ Therefore, without loss of generality, we may suppose that $H^{-1}N$ is in Jordan canonical form. Our hypothesis says that there is just one Jordan block with the eigenvalue $\lambda$ down the diagonal. But $${\operatorname{tr}}(H^{-1}N)={\operatorname{tr}}(N^t(H^t)^{-1})= -{\operatorname{tr}}(NH^{-1})=-{\operatorname{tr}}(H^{-1}N)$$ so $\lambda=0$. In particular, the eigenspace is the same as the kernel of $N$. Suppose $u$ is a non-zero vector in this kernel and consider $$u^\perp\equiv\{v\mbox{ s.t. }u^tHv=0\}.$$ Since $$u^tHH^{-1}Nv=u^tNv=v^tN^tu=-v^tNu=0,$$ it follows that $H^{-1}N$ preserves $u^\perp$. The hypothesis that $H^{-1}N$ has only one eigenvector up to scale now forces $u\in u^\perp$. In other words $u$ is null, i.e. $u^tHu=0$. It is well-known that ${\mathrm{O}}(n-1,1)$ acts transitively on the null vectors. Therefore we may suppose that $$H=\mbox{\small$\left[\begin{array}{ccc}0&0&1\\ 0&{\mathrm{Id}}&0\\ 1&0&0 \end{array}\right]$}\quad\mbox{and}\quad u=\mbox{\small$\left[\begin{array}{c}1\\ 0\\ 0 \end{array}\right]$}.$$ It follows that $$N=\mbox{\small$\left[\begin{array}{ccc}0&0&0\\ 0&M&-r\\ 0&r^t&0\end{array}\right]$}$$ where $M$ is a skew $(n-2)\times(n-2)$ matrix. Therefore, $$H^{-1}N=\mbox{\small$\left[\begin{array}{ccc}0&r^t&0\\ 0&M&-r\\ 0&0&0\end{array}\right]$}\quad\mbox{and}\quad (H^{-1}N)^2=\mbox{\small$\left[\begin{array}{ccc}0&r^tM&-r^tr\\ 0&M^2&-Mr\\ 0&0&0\end{array}\right]$}$$ [From]{} the Jordan canonical form of $H^{-1}N$ we see that, not only does its trace vanish, but also the traces of its higher powers. In particular, $$0={\operatorname{tr}}((H^{-1}N)^2) = {\operatorname{tr}}(M^2)$$ and since $M$ is skew it follows that $M=0$ and hence that ${\operatorname{rank}}N=2$. Since the kernel of $N$ is supposedly $1$-dimensional, $n=3$ is forced and $$N=\mbox{\small$\left[\begin{array}{ccc}0&0&0\\ 0&0&-r\\ 0&r&0\end{array}\right]$}.$$ Finally, if we take $$A=\mbox{\small$\left[\begin{array}{ccc}\mu^{-1}&0&0\\ 0&1&0\\ 0&0&\mu\end{array}\right]$},$$ then $$A^tHA=\mbox{\small$\left[\begin{array}{ccc}0&0&1\\ 0&1&0\\ 1&0&0 \end{array}\right]$}\quad\mbox{and}\quad A^tNA=\mbox{\small$\left[\begin{array}{ccc}0&0&0\\ 0&0&-\mu r\\ 0&\mu r&0 \end{array}\right]$}$$ and so we can insist that $\mu r=-2$ if we so wish. \[ontheaxes\] Suppose $H$ is a real symmetric $n\times n$ matrix of Lorentzian signature and $N$ is a real skew $n\times n$ matrix. Then the eigenvalues of $H^{-1}N$ lie on the real or imaginary axes. Suppose that $x+iy$ is an eigenvalue, i.e.$$\label{eigenvalue} H^{-1}N(u+iv)=(x+iy)(u+iv)\quad\mbox{for some }u+iv\not=0.$$ Writing out the real and imaginary parts separately gives $$\label{realandimaginary} H^{-1}Nu=x u-y v\quad\mbox{and} \quad H^{-1}Nv=y u+x v.$$ We argue by contradiction, supposing that neither $x$ nor $y$ vanishes. In this case we see from (\[realandimaginary\]) that neither $u$ nor $v$ vanishes. Because $N$ is skew, we see from (\[realandimaginary\]) that $$\begin{array}l 0=u^tNu=u^tHH^{-1}Nu=x u^tHu-y u^tHv,\\ 0=v^tNv=v^tHH^{-1}Nv=y v^tHu+x v^tHv. \end{array}$$ Therefore $$x u^tHu=y u^tHv=y v^tHu=-x v^tHv.$$ Since we are supposing that $x\not=0$, we conclude that $u^tHu=-v^tHv$. Again using (\[realandimaginary\]), we now find that $$0=u^tNv+v^tNu=u^tH^{-1}HNv+v^tH^{-1}HNu=2y u^tHu+2x u^tHv,$$ whence $$0=x u^tHu-y u^tHv\quad\mbox{and}\quad 0=y u^tHu+x u^tHv.$$ Therefore $(x^2+y^2)u^tHu=0$ and so $u^tHu=0$. Bearing in mind our assumption that $y\not=0$, we have found two real vectors $u$ and $v$ with $$u\not =0,\quad v\not=0,\quad u^tHu=0,\quad v^tHv=0,\quad u^tHv=0.$$ For $H$ of Lorentzian signature this forces $v=tu$ for some $t\in{\mathbb{R}}$. Substituting back into (\[eigenvalue\]) and taking out a factor of $(1+it)$ gives $$H^{-1}Nu=(x+iy)u$$ and hence that $y=0$, our required contradiction. \[realnonzero\] Suppose $H$ is a real symmetric $n\times n$ matrix of Lorentzian signature and $N$ is a real skew $n\times n$ matrix. Suppose that $H^{-1}N$ has a non-zero real eigenvalue $\lambda$. Then $-\lambda$ is also an eigenvalue and we can find an invertible real $n\times n$ matrix $A$ such that (in block form) $$A^tHA=\mbox{\small$\left[\begin{array}{ccc}0&0&1\\ 0&{\mathrm{Id}}&0\\ 1&0&0 \end{array}\right]$}\quad\mbox{and}\quad A^tNA=\mbox{\small$\left[\begin{array}{ccc}0&0&\lambda\\ 0&M&0\\ -\lambda&0&0 \end{array}\right]$},$$ where $M$ is a skew $(n-2)\times(n-2)$ matrix. Certainly, we may arrange that $A^tHA$ is of the required form and we shall suppose, without loss of generality, that $H$ is already normalised like this. Write $H^{-1}Nu=\lambda u$ for $u\not=0$. Then $$0=u^tNu=u^tHH^{-1}Nu=\lambda u^tHu$$ so $u^tHu=0$. Therefore, by a suitable $A$ we may arrange $$u=\mbox{\small$\left[\begin{array}c0\\ 0\\ 1 \end{array}\right]$},\enskip\mbox{ and this forces }\enskip H^{-1}N=\mbox{\small$\left[\begin{array}{ccc}\cdot&\cdot&0\\ \cdot&\cdot&0\\ \cdot&\cdot&\lambda \end{array}\right]$}.$$ Bearing in the mind that $N$ is skew, this implies $$N=\mbox{\small$\left[\begin{array}{ccc}\cdot&\cdot&\lambda\\ \cdot&\cdot&0\\ -\lambda&0&0 \end{array}\right]$},\enskip\mbox{ and then } H^{-1}N=\mbox{\small$\left[\begin{array}{ccc}-\lambda&0&0\\ \cdot&\cdot&0\\ \cdot&\cdot&\lambda \end{array}\right]$}.$$ It follows that $-\lambda$ is an eigenvalue, say $H^{-1}Nv=-\lambda v$ for some $v\not=0$ and, reasoning as above, $v^tHv=0$. Since $u$ and $v$ are not proportional, we may scale them so that $u^tHv=1$. Finally, if we arrange that $$v=\mbox{\small$\left[\begin{array}c1\\ 0\\ 0 \end{array}\right]$} ,\enskip\mbox{ then}\enskip H^{-1}N=\mbox{\small$\left[\begin{array}{ccc}-\lambda&0&0\\ 0&\cdot&0\\ 0&\cdot&\lambda \end{array}\right]$}.$$ This immediately implies that $N$ has the desired form. With these Lemmata on hand we are now in a position to establish a general canonical form. As already mentioned, we shall prefer (\[prefer\]) for $A^tHA$. When $n=2$ there is almost nothing more to do:– $$A^tHA=\mbox{\small$\left[\begin{array}{ccc}0&1\\ 1&0 \end{array}\right]$}\quad\mbox{and}\quad A^tNA=\mbox{\small$\left[\begin{array}{ccc}0&\lambda\\ -\lambda&0 \end{array}\right]$}$$ simply because $N$ is skew. It remains to observe that we can change the sign of $\lambda$ using $$A=\mbox{\small$\left[\begin{array}{ccc}0&1\\ 1&0 \end{array}\right]$}$$ but that $\lambda^2$ is well-defined because the characteristic polynomial $$\det(H^{-1}N-t\,{\mathrm{id}})=t^2-\lambda^2$$ is invariant. The first interesting case is $n=3$. Suppose $H$ is a real symmetric $3\times 3$ matrix of Lorentzian signature and $N$ is a real skew $3\times 3$ matrix. Then we can find an invertible real $3\times 3$ matrix $A$ such that $$A^tHA=\mbox{\small$\left[\begin{array}{ccc}0&0&1\\ 0&1&0\\ 1&0&0 \end{array}\right]$}$$ and $A^tNA$ is $$\label{threecases} \mbox{\small$\left[\begin{array}{ccc}0&0&\lambda\\ 0&0&0\\ -\lambda&0&0 \end{array}\right]$}\quad\mbox{or}\quad \frac{1}{\sqrt 2}\mbox{\small$\left[\begin{array}{ccc}0&\lambda&0\\ -\lambda&0&-\lambda\\ 0&\lambda&0 \end{array}\right]$}\quad\mbox{or}\quad \mbox{\small$\left[\begin{array}{ccc}0&0&0\\ 0&0&2\\ 0&-2&0 \end{array}\right]$}.$$ Furthermore, these three possible canonical forms are distinct apart from changing the sign of $\lambda$ in the first two cases and the coincidence of the first two cases when $\lambda=0$. If $H^{-1}N$ has only one eigenvector up to scale, then Lemma \[onlyone\] applies and we obtain the third case of (\[threecases\]). Else, Lemma \[ontheaxes\] implies that either all eigenvalues are real or they are $i\lambda,-i\lambda,0$ for some $\lambda\not=0$. Firstly, let us suppose they are all real. They could still all be zero in which case the kernel $N$ is at least $2$-dimensional. But the rank of a skew matrix is always even so then $N=0$. Otherwise, if $\lambda\not=0$ is a real eigenvalue, then Lemma \[realnonzero\] gives the first of (\[threecases\]). When $i\lambda$ is an eigenvalue, then $$H^{-1}N(u+iv)=i\lambda(u+iv)$$ implies that $$H^{-1}Nu=-\lambda v\quad\mbox{and}\quad H^{-1}Nv=\lambda u.$$ It follows that $$\begin{array}l0=u^tNu=u^tHH^{-1}Nu=-\lambda u^tHv\\ 0=u^tNv+v^tNu=u^tHH^{-1}Nv+v^tHH^{-1}Nu=\lambda(u^tHu-v^tHv) \end{array}$$ and so if $\lambda\not=0$, we conclude that $$u^tHu=v^tHv\quad\mbox{and}\quad u^tHv=0.$$ In this case, by a suitable $A$ we may arrange $$u=\frac{1}{\sqrt 2} \mbox{\small$\left[\begin{array}c1\\ 0\\ 1\end{array}\right]$} \quad\mbox{and}\quad v=\mbox{\small$\left[\begin{array}c0\\ 1\\ 0\end{array}\right]$},$$ from which the second of (\[threecases\]) is forced. Interchanging $u$ and $v$ changes the sign of $\lambda$. Otherwise, the distinctions between these canonical forms is clear from the Jordan canonical form of $H^{-1}N$ and its characteristic polynomial. It is easy to generalise these canonical forms to $n\times n$ matrices. The only one we shall need is the $5\times 5$ case and we state it here. \[fivebyfivecase\] Suppose $H$ is a real symmetric $5\times 5$ matrix of Lorentzian signature and $N$ is a real skew $5\times 5$ matrix. Then we can find an invertible real $5\times 5$ matrix $A$ such that $$A^tHA=\mbox{\small$\left[\begin{array}{ccccc}0&0&0&0&1\\ 0&1&0&0&0\\ 0&0&1&0&0\\ 0&0&0&1&0\\ 1&0&0&0&0 \end{array}\right]$}$$ and $A^tNA$ is $$\label{firsttype} \mbox{\small$\left[\begin{array}{ccccc}0&0&0&0&\lambda\\ 0&0&0&0&0\\ 0&0&0&\mu&0\\ 0&0&-\mu&0&0\\ -\lambda&0&0&0&0 \end{array}\right]$}\quad \begin{array}l\mbox{well-defined up to}\\ (\lambda,\mu)\mapsto(-\lambda,\mu)\mbox{ or }(\lambda,-\mu)\\ \mbox{or }(-\lambda,-\mu),\end{array}$$ or $$\mbox{\small$\left[\begin{array}{ccccc}0&\lambda/\sqrt 2&0&0&0\\ -\lambda/\sqrt 2&0&0&0&-\lambda/\sqrt 2\\ 0&0&0&\mu&0\\ 0&0&-\mu&0&0\\ 0&\lambda/\sqrt 2&0&0&0 \end{array}\right]$}\quad \begin{array}l\mbox{well-defined up to}\\ (\lambda,\mu)\mapsto(-\lambda,\mu)\mbox{ or }(\lambda,-\mu)\\ \mbox{or }(-\lambda,-\mu)\mbox{ or }(\mu,\lambda)\\ \mbox{or }(-\mu,\lambda)\mbox{ or }(\mu,-\lambda)\\ \mbox{or }(-\mu,-\lambda), \end{array}$$ or $$\label{thirdtype} \mbox{\small$\left[\begin{array}{ccccc}0&0&0&0&0\\ 0&0&0&0&2\\ 0&0&0&\mu&0\\ 0&0&-\mu&0&0\\ 0&-2&0&0&0 \end{array}\right]$} \quad\mbox{well-defined up to }\mu\mapsto-\mu.$$ Furthermore, these canonical forms are distinct except for the evident coincidence of the first two cases when $\lambda=0$. [xx]{} R. Ababou, P. Baird, and J. Brossard, [*Polynômes semi-conformes et morphismes harmoniques*]{}, Math. Zeit. [**231**]{} (1999) 589–604. P. Baird and M.G. Eastwood, [*Conjugate functions and semiconformal mappings*]{}, Differential Geometry and its Applications 9, Prague (eds. J. Bureš, O. Kowalski, D. Krupka, and J. Slovák), Matfyz Press 2005, pp. 479–486. P. Baird and M.G. Eastwood, [*Singularities of semiconformal mappings*]{}, Kyoto University RIMS Kokyuroku [**1610**]{} (2008) 1–10. P. Baird and M.G. Eastwood, [*CR geometry and conformal foliations*]{}, arXiv: 1011.4717. P. Baird and R. Pantilie, [*Harmonic morhisms on heaven spaces*]{}, Bull. London Math. Soc. [**41**]{} (2009) 198–204. P. Baird and J.C. Wood, [*Harmonic Morphisms between Riemannian Manifolds*]{}, Oxford University Press 2003. B. Bojarski and T. Iwaniec, [*$p$-Harmonic equation and quasiregular mappings*]{}, Partial Differential Equations (Warsaw 1984), Banach Center Publ. vol. 19, PWN, Warsaw 1987, pp. 25–38. M.G. Eastwood, [*Higher symmetries of the Laplacian*]{}, Ann. Math. [**161**]{} (2005) 1645–1665. M.G. Eastwood and C.R. Graham, [*Invariants of conformal densities*]{}, Duke Math. Jour. [**63**]{} (1991) 633–671. R. Hardt and F.H. Lin, [*Mappings minimizing the $L^p$ norm of the gradient*]{}, Comm. Pure Appl. Math. [**40**]{} (1987) 555–588. E. Loubeau, [*On $p$-harmonic morphisms*]{}, Diff. Geom. Appl. [**12**]{} (2000) 219–229. P. Nurowski, [*Construction of conjugate functions*]{}, Ann. Glob. Anal. Geom. [**37**]{} (2010) 321–326. R. Penrose and W. Rindler, [*Spinors and Space-time, Volume 1*]{}, Cambridge University Press 1984. P. Szekeres, [*Conformal tensors*]{}, Proc. Roy. Soc. London [**A304**]{} (1968) 113–122. H. Weyl [*The Classical Groups*]{}, Princeton University Press 1939. [^1]: The first author is grateful for support provided by the Australian Research Council and to the Mathematical Sciences Institute at the Australian National University; part of this work was carried out under the award of a *délégation auprès du CNRS*. The second author is a Federation Fellow of the Australian Research Council and is grateful to the Département de Mathématiques á l’Université de Bretagne Occidentale for support and hospitality while working on this article.
While many people associate sports with competitiveness, sports also promote social integration. Students who play sports learn to work together as a team and develop emotional strength. They also learn to accept victory and defeat without getting emotionally hurt. These qualities are essential in success. Here are five benefits of participating in sports. Let’s examine them one by one. 1. The Value of Sports A sports is an activity that involves intense physical activity. This type of activity usually involves burning calories, sweating, and physical exhaustion. It also improves the body part involved. Sports can involve two sides, individual athletes, or teams. The purpose of sports is to create entertainment and health benefits for its participants. They are a great source of entertainment and health for the spectators. Most sports are played outdoors or indoors. Some involve both sides. The competition in most sports is governed by customs and rules. These standards ensure a level playing field, and consistent adjudication of winners. Several factors contribute to the definition of winning in different sports. Both physical events and judges’ scores determine winning. The judges can score subjective and objective performance elements to determine a winner. This can make or break a team. In team sports, the goal is to win. By establishing standards, teams can compete in better competitions. The history of sports dates back as far as 2000 BC in China. It appears that this culture was the earliest to practice sports, and it was often associated with gymnastics. Ancient Egypt was also a popular place for sports, as evidenced by a wide range of monuments. The Pharaohs were known to engage in sports, which included javelin throwing, wrestling, and high jumping. Even in prehistoric times, there are examples of hunting, which is regarded as an art form by French and Italian fencers. Even the ancient Greek physician Galen encouraged ball games for health benefits.
https://nypizzapubofdenver.com/five-benefits-of-sports/
Concussion, a form of mild traumatic brain injury (TBI), is a common consequence of trauma to the head in youth sports and related recreational activities. An estimated 1.6 to 3.8 million sports-related concussions occur in the United States each year. While the majority of concussions are self-limited injuries, catastrophic results can occur and the long-term effects of multiple concussions are unknown. A history of prior concussion significantly increases risk for recurrent concussions. The effect of concussion on developing brains is of particular concern. Children with concussion, particularly multiple concussions, are at high risk for developing headaches and suffering from impaired memory, cognitive function, attention, or other behavioral changes. Unfortunately, during the last decade, emergency department visits for sports- and recreation-related TBIs, including concussions, among children and adolescents has been increasing over the past years. This toolkit is designed to aid program administrators, coaching directors, coaches and others with a concussion management plan. Because each youth sports program is unique, different parts of the plan can be adapted to your program but the basic concepts of an overall plan will be the same. If you have any questions or concerns about this toolkit please click the following link to Contact the Brain Injury Association of VT. d) Program should designate the responsibility for informing parents/guardians if a child sustained a concussion during an activity of the youth sports or recreation program. • Understanding Vermont’s law regarding school sports and concussion; the need for better communication between a child’s school and outside athletic and recreation related activity. Best Practice RTA and RTP forms and tools – Best practice is one that uses the most up to date scientific evidence and recommendations for concussion care. Using these ensures that a concussed child gets the best care possible. • When can I return to activities?
https://www.biavt.org/vermont-s-youth-athletes-and-concussion-a-return-to-activity-return-to-play-toolkit.html
In March of 2021, the Cumberland Community Forest Society (CCFS) responded to harvest flagging in the forests along Lower Perseverance Creek west of the Village of Cumberland in the Comox Valley. The CCFS had to mobilize fast to interrupt the harvest with equipment on site and road building completed. Thanks to a long-standing relationship with the owner, Hancock Timber, from whom they have purchased over 500 acres of forest so far, the harvest was deferred. For now. The CCFS is now tasked with completing the purchase of this 40-acre parcel to ensure it will be protected in perpetuity. Lower Perseverance Creek is an ecological corridor that links Vancouver Island Mountains to Perseverance Creek to Comox Lake. The forest is a rich ecosystem, filled with Red cedar and Douglas fir, some over 125 years old. The lower creek has been identified as high priority for habitat restoration and the area offers refuge and safe passage for species big and small from the upland mountains to the lake. This corridor has been identified as a protection priority by the CCFS, Comox Valley Land Trust, Comox Valley Regional District, K’ómoks First Nation, Perseverance Stream keepers and the Village of Cumberland. It feeds Comox Lake, the drinking water for 50,000 Comox Valley residents through the Comox Valley Regional District water service. It flanks the old Wellington Rail path to the historic #4 Coal Mine site and connects directly to Coal Creek Historic Park and the Cumberland Community Forest. Since 2005 the CCFS has protected 500 acres of threatened land for low impact recreation, ecological protection, and climate resilience. Their most recent purchase was 225 acres in September of 2020. This small community NGO now finds itself in the unexpected position of leading negotiations for another land purchase less that 7 months after completing the last one. They did NOT expect to be here so soon. However, there is a lot of action in the forests of Vancouver Island right now. How can you help? The CCFS is leading fundraising to realize this important Lower Perseverance Corridor purchase. Project costs are estimated at $800,000 and they are currently negotiating a formal purchase agreement. As of June 30th, 1/3 of these funds ($265,000) have been raised by the CCFS. They are now hard at work leveraging the other 2/3 working with their conservation and government partners. The goal is to have 100% of the funds secured by March 31st 2022. Benefits of the Lower Perseverance Corridor Project Carbon Sequestration / Natural Climate Solutions: The Lower Perseverance Corridor is an important carbon sink, with the trees absorbing carbon dioxide from the atmosphere and storing it in biomass and the soil. Harvesting of this forest would not only remove the trees that are absorbing CO2 and temporarily halt carbon sequestration, it would also turn the area into a carbon source for 15 years following harvest, as the left over wood waste decomposes. Protection of this forest provides exceptional value as a carbon sink. Natural Climate Solutions can make up 37% of the global reduction in emissions that must be achieved by 2030 to keep global temperature increases to below 2 degrees celsius (www.nature.org). One such solution is to prevent forest loss through conservation. The biomass and soils of old and mature forests, such as the 12 hectares within the Lower Perseverance Creek, are important carbon sinks. Relationships with Indigenous Government: The project has opened the door for dialogue and research work with K’ómoks First Nation and the K’ómoks Guardians. Discussions are underway about the feasibility of an Indigenous Land Use Study in the Lower Perseverance Creek corridor and in the Perseverance Watershed as a whole. These studies explore the past, present and potential future land use. The Perseverance Corridor is also directly adjacent to K’ómoks Treat Lands. Protection of Biodiversity: This biodiversity corridor offers safe passage for a variety of species from mountains to the lake. The creek side forest offers habitat for birds and cougar sightings are common. Bear prints are found on the creek bank and the corridor is a hot spot for bats, including the at-risk little brown myotis (Myotis lucifugus). Riparian wetlands flank the creek and nourish ferns and Devils club (Oplopanax horridus). Big firs and cedars shade deep pools and gravel bars where Coho salmon spawn. Protection of Community Drinking Water: Perseverance Creek is a tributary to Comox Lake, the source of drinking water for over 50,000 Comox Valley residents. The creek has also been the source of turbidity events that have resulted in boil water advisories. The protection of creekside riparian forests, and the future enhancement and restoration efforts along the creek are important for protecting water quality and ensuring the long term sustainability of new drinking water treatment facilities. Fish Habitat Protection and Restoration: Lower Perseverance Creek has been a study area for a Fish Habitat 1 and Proper Functioning Condition Assessment. Both studies indicated that protection, engagement, and restoration efforts in this corridor hold great potential to support future fish populations. *This past summer the Perseverance Stream keepers rescued over 3000 smolts from the drying pool of the upper creek and relocated them to the lower reaches.* The protection of this forest will set the stage for this work and remove the lands from the harvest cycle. The Creek provides habitat for Sculpin, Cutthroat Trout, Dolly Varden Char, and Coho Salmon (https://maps.gov.bc.ca/ess/hm/habwiz/). Education: The accessibility of the corridor makes it an excellent location for education and interpretive activities for schools, daycares, and others. The area offers opportunities to learn how riparian and wetland forest ecosystem’s function and the biodiversity they support. The Wellington Colliery Trail (the old train line) runs through the centre and offers a defined walking path from which to view the forest. The restoration and engagement projects proposed are accessible for volunteer groups and observers Heritage Conservation: The area is a significant heritage corridor where the Wellington Colliery Rail Line reaches the site of the historic #4 Coal Mine at Comox Lake. The area helps to tell the story of Cumberland’s coal mining and logging history. Landscape and Recreation Connectivity: The protection of this area links Cumberland Community Forest Park, Coal Creek Historic Park, the Wellington Colliery Rail line, and protected areas at Comox Lake into a connected corridor of protected lands. This stitching together of the landscapes reconnects ecological, hydrological, historic, and recreational values for the benefit of nature and community.
https://www.cumberlandforest.com/lower-perseverance-corridor-project/
The market intelligence report from TMR is a valuable tool that enables vendors to identify growth avenues, and strategize for launch of products and services. These findings help businesses pave way in a crowded business landscape, and make way into the future with confidence. To identify growth avenues, analysts carried out a succinct analysis of demand drivers, restraints, opportunities, and threats that are likely to influence the Tumblers Market over the forecast period. These market indicators serve valuable for market stakeholders for business planning, scope of expansion, financial modelling, investment proposition, and to understand competitive dynamics in the Tumblers Market. The market research report on Tumblers Market also offers valuable insights into key business strategies employed by established players, along with impact of these strategies on the future business landscape. The analysis of the Tumblers Market presented in our reports provides valuable insights for strategic planning for businesses to obtain competitive advantage. Included in our research reports are valuable projections to understand market share that key players might hold in the future. For More Details, Request Brochure@ https://www.transparencymarketresearch.com/sample/sample.php?flag=S&rep_id=42935 The report includes SWOT analysis of key players, which shall be a crucial market intelligence indicator for mergers, acquisitions, collaborations, or partnerships between market stakeholders. In addition, the report carries out robust groundwork for inclusion of market segmentation by type, application, and geography. This helps market stakeholders gauge the best bet to make investments in the Tumblers Market over the forecast period. Key Questions Answered in the Tumblers Market Report 1. How much will be overall revenue generation in the Tumblers Market by the end of the forecast period? 2. Which product segment is likely to gather maximum share by the end of the forecast period? 3. Which region is likely to hold maximum revenue share by the end of the forecast period? 4. What are winning strategies adopted by key stakeholders in the Tumblers Market to consolidate their position?
https://tmrblog.com/opportunities-of-tumblers-market-sales-future-trends-top-leading-10-players-2027/
From Wikipedia, S&P 500 with 20-day, two-standard-deviation Bollinger Bands, %b and bandwidth.Bollinger Bands is a tool invented by John Bollinger in the 1980s as well as a term trademarked by him in 2011.[Having evolved from the concept of trading bands, Bollinger Bands and the related indicators %b and bandwidth can be used to measure the "highness" or "lowness" of the price relative to previous trades. Bollinger Bands are a volatility indicator similar to the Keltner channel.Bollinger Bands consist of:an N-period moving average (MA)an upper band at K times an N-period standard deviation above the moving average (MA + K?)a lower band at K times an N-period standard deviation below the moving average (MA ? K?)Typical values for N and K are 20 and 2, respectively. The default choice for the average is a simple moving average, but other types of averages can be employed as needed. Exponential moving averages is a common second choice.[Usually the same period is used for both the middle band and the calculation of standard deviation. In Spring, 2010, John Bollinger introduced three new indicators based on Bollinger Bands. They are BBImpulse, which measures price change as a function of the bands; percent bandwidth (%b), which normalizes the width of the bands over time; and bandwidth delta, which quantifies the changing width of the bands.%b (pronounced "percent b") is derived from the formula for Stochastics and shows where price is in relation to the bands. %b equals 1 at the upper band and 0 at the lower band. Writing upperBB for the upper Bollinger Band, lowerBB for the lower Bollinger Band, and last for the last (price) value:%b = (last ? lowerBB) / (upperBB ? lowerBB)Bandwidth tells how wide the Bollinger Bands are on a normalized basis. Writing the same symbols as before, and middleBB for the moving average, or middle Bollinger Band:Bandwidth = (upperBB ? lowerBB) / middleBBUsing the default parameters of a 20-period look back and plus/minus two standard deviations, bandwidth is equal to four times the 20-period coefficient of variation.Uses for %b include system building and pattern recognition. Uses for bandwidth include identification of opportunities arising from relative extremes in volatility and trend identification. The use of Bollinger Bands varies widely among traders. Some traders buy when price touches the lower Bollinger Band and exit when price touches the moving average in the center of the bands. Other traders buy when price breaks above the upper Bollinger Band or sell when price falls below the lower Bollinger Band. Moreover, the use of Bollinger Bands is not confined to stock traders; options traders, most notably implied volatility traders, often sell options when Bollinger Bands are historically far apart or buy options when the Bollinger Bands are historically close together, in both instances, expecting volatility to revert towards the average historical volatility level for the stock.When the bands lie close together, a period of low volatility is indicated.Conversely, as the bands expand, an increase in price action/market volatility is indicated.When the bands have only a slight slope and track approximately parallel for an extended time, the price will generally be found to oscillate between the bands as though in a channel.Traders are often inclined to use Bollinger Bands with other indicators to confirm price action. In particular, the use of oscillator-like Bollinger Bands will often be coupled with a non-oscillator indicator-like chart patterns or a trendline. If these indicators confirm the recommendation of the Bollinger Bands, the trader will have greater conviction that the bands are predicting correct price action in relation to market volatility. Various studies of the effectiveness of the Bollinger Band strategy have been performed with mixed results. In 2007 Lento et al. published an analysis using a variety of formats (different moving average timescales, and standard deviation ranges) and markets (e.g., Dow Jones and Forex).[Analysis of the trades, spanning a decade from 1995 onwards, found no evidence of consistent performance over the standard "buy and hold" approach. The authors did, however, find that a simple reversal of the strategy ("contrarian Bollinger Band") produced positive returns in a variety of markets.Similar results were found in another study, which concluded that Bollinger Band trading strategies may be effective in the Chinese marketplace, stating: "Finally, we find significant positive returns on buy trades generated by the contrarian version of the moving-average crossover rule, the channel breakout rule, and the Bollinger Band trading rule, after accounting for transaction costs of 0.50 percent."(By "the contrarian version", they mean buying when the conventional rule mandates selling, and vice versa.) A recent study examined the application of Bollinger Band trading strategies combined with the ADX for Equity Market indices with similar results.A paper from 2008 uses Bollinger Bands in forecasting the yield curve. Security price returns have no known statistical distribution, normal or otherwise; they are known to have fat tails, compared to a normal distribution.The sample size typically used, 20, is too small for conclusions derived from statistical techniques like the central limit theorem to be reliable. Such techniques usually require the sample to be independent and identically distributed, which is not the case for a time series like security prices. Just the opposite is true; it is well recognized by practitioners that such price series are very commonly serially correlated that is, each price will be closely related to its ancestor "most of the time". Adjusting for serial correlation is the purpose of moving standard deviations, which use deviations from the moving average, but the possibility remains of high order price autocorrelation not accounted for by simple differencing from the moving average.For such reasons, it is incorrect to assume that the long-term percentage of the data that will be observed in the future outside the Bollinger Bands range will always be constrained to a certain amount. Instead of finding about 95% of the data inside the bands, as would be the expectation with the default parameters if the data were normally distributed, studies have found that only about 88% of security prices (85%-90%) remain within the bands. For an individual security, one can always find factors for which certain percentages of data are contained by the factor defined bands for a certain period of time. Practitioners may also use related measures such as the Keltner channels, or the related Stoller average range channels, which base their band widths on different measures of price volatility, such as the difference between daily high and low prices, rather than on standard deviation. This is a rsi super smoother using bollinger band stops. great to see you here, Mr. Tools! and thanks for this one. mrtools wrote: This is a bb stops rsi_super smooth, and big thanks to Mladen for keeping the torch burning. I would like to know, possibly, the rest of indicators that appear on the chart .... if you can share the tpl file would be perfect. do you have it for mt5 version? Hi Dimitri, This is the template, the template is using an older version of Mladens bb stops chart version, would recommend you use the newer version he posted here in this forum. Hi Baraozemo, did a version but so far it's not working will post it once make a working version. Be aware, that this offline heikinashi indicator paints its bars few bars after normal bars appear. Mladen said on tsd, we should not use it as a signal giver.
https://forex-station.com/viewtopic.php?f=579496&t=8412977
# IBM Master Inventor IBM Master Inventor is an honorific title bestowed by the IBM Corporation to a qualifying employee. The qualification and appointment to Master Inventor is governed by the value to IBM of an inventor's contribution to the patent portfolio, and through defensive publication. IBM weighs many aspects of an inventor's contributions, including impact of invention through licensing, inclusion in product, and percentage of patents with a measurable impact. IBM also considers an individual's contribution to the inventing community inside IBM, whether by acting as a patent reviewer, or providing feedback and guidance to new inventors. IBM Master Inventor is a privilege and title afforded to IBM inventors who have exhibited sustained invention activity. Each Master Inventor is reviewed every three years to ensure they maintain invention and mentoring activity. To be selected as an IBM Master Inventor, an inventor must (1) create valuable inventions resulting in patents and defensive publications that are in line with IBM’s criteria, and (2) support the IBM patent process such as by coaching other inventors, serving on invention development teams (IDTs), and helping the IBM IP Law organization in other ways. The IBM Master Inventor program recognizes IBM’s leaders in the patent community. The objectives of the program are: Recognize model inventors who have a sustained personal history of invention, mentorship, and assisting IP law Create a community of Master Inventors to collectively improve awareness of IP importance & improve IBM's IP Process Support a climate of innovation to enable IBM's IP strategy of freedom of leadership Create role models that advocate IBM’s innovation to clients and external stakeholders Nominees to the Master Inventor program must have contributed to IBM patent process through invention participation and least two of the remaining three areas: Demonstrate mastery of the process through active invention participation with patents which are filed and issued with the USPTO Leverage their mastery of patent knowledge as a role model by: Mentoring new inventors who have ideas, but who are unfamiliar with the process Helping educate inexperienced inventors in understanding the IP process and how to effectively document and submit inventions Pro-actively arranging and leading patent mining sessions Being a catalyst for innovation and invention Actively contribute in the IP creation process by participation in Invention Development Teams (IDTs) and identification of technology areas and projects that are strategic for IBM’s patent portfolio Serve as a resource for IP Law in areas of patent prosecution & patent licensing Identify themselves as an IBM Master Inventor when working with clients and external organizations to serve as a: reminder of our innovation heritage conversation starter on IBM’s innovation practices According to one Master Inventor the citation reads: Each year, IBM asks a small group of employees to join the ranks of Master Inventor. This group of people is asked to assist in the identification of new inventions and mentor others in the use of the patent process, among other things. The invitation to become a Master Inventor is based on the value to IBM of an inventors' United States patents during the three prior calendar years. This achievement is significant because it is the result of a cumulative contribution to the IBM patent portfolio, including Corporate Patent Portfolio Awards, Division Patent Portfolio Awards, and Division Supplemental Patent Issuance Awards. Stories about a few master inventors appear in IBM web pages and external media.
https://en.wikipedia.org/wiki/IBM_Master_Inventor
Author(s): J. H. Akash Email(s): [email protected] DOI: 10.5958/2321-5828.2018.00048.7 Address: J. H. Akash Media Science Research Scholar, Department of Chemistry, Anna University, Chennai, India *Corresponding Author Published In: Volume - 9, Issue - 1, Year - 2018 ABSTRACT: Tourism management is an interdisciplinary approach and practice. Primarily, nature is the marketing substance in tourism – it deals with ‘nature with preservation, protection of species, and their habitats’ (Pillai, 2010). The right awareness mostly can be spread through the media only (Kumar, 2014). Only with the active collaboration with the media, the wildlife conservation movement involves common citizens, NGOs, civil society groups, research organizations, educational institutions and volunteers in protecting the endangered (Wildlife Conservation and Management in Tamil Nadu, 2016). Tourism is viewed by most governments as a means of economic development and as a result, investment in the industry is usually encouraged (Glasson, 1999). At the same time, tourism can lead to heavy damaging impacts on the environment such as increased water use, increased pollution loadings through waste and emissions, and direct and indirect disturbance to wildlife and vegetation (Fennell, 2003). This may ruin the beauty of the natural destination and the tourists reject the destinations which are polluted and natural environment is destroyed. The need of the hour is sustainable tourism that can easily be achieved through ecotourism. Therefore, tourism calls for awareness for conservation activities which can be done by the mass media. Mass media is the most powerful tool to change audience cognition, belief systems, and attitudes, as well as emotional, physiological and behavioral effects (Potter, 2012). The Government of India has taken some initiatives for the promotion of eco-tourism. Its 'SwadeshDarshan' under the Ministry of Tourism also funds for ecotourism. Tamil Nadu has a spectrum of scenic landscapes, pristine forests, wildlife reserves and a rich cultural heritage. Tamil Nadu has a good potentiality for the ecotourism but the steps taken by the State Government to promote ecotourism are not up to the mark.In the last three financial years, most proposed projects of Tamil Nadu had not been sanctioned due to the non-submission of utilization certificates for tourism projects sanctioned earlier.The media should properly inform the public about the funds and needs of ecotourism. It can do a lot for the economic growth and natural conservation.This paper is in an attempt to study the scope of ecotourism in modern life. Ecotourism not only supports the local communities but also deals with environmental conservation and awareness. The most important element of ecotourism is that cultural, historical and geographical information exchange through real experience. As tourism supports economic development, it has another side of environmental degradation. Negative impacts from tourism arises when the quantum of visitors is greater than the environment's ability to cope with. Cite this article: J. H. Akash. Role of Media in the Development of Ecotourism in Kanyakumari District. Res. J. Humanities and Social Sciences. 2018; 9(1): 263-268. doi: 10.5958/2321-5828.2018.00048.7 Cite(Electronic): J. H. Akash. Role of Media in the Development of Ecotourism in Kanyakumari District. Res. J. Humanities and Social Sciences. 2018; 9(1): 263-268. doi: 10.5958/2321-5828.2018.00048.7 Available on: https://rjhssonline.com/AbstractView.aspx?PID=2018-9-1-48 Research Journal of Humanities and Social Sciences (RJHSS) is an international, peer-reviewed journal, correspondence in the fields of arts, commerce and social sciences.......
https://rjhssonline.com/AbstractView.aspx?PID=2018-9-1-48
Habitat Change (Habitat Fragmentation (habitat fragments differ from… Habitat Change Habitat Fragmentation Habitat fragmentation occurs when a large, continuous area is subdivided into smaller plots. creates smaller populations habitat fragments differ from original habitat fragments have greater amount of edge per area of habitat the center of a habitat fragment is closer to an edge habitat fragments host smaller populations than the original habitat limits species dispersal and colonization restricts access to food and mates edge effects changes in light, humidity, temperature, and wind that may be less favorable for species living there human population growth Human populations entered an exponential growth phase about 300 years ago. Human activities result in DIRECT threats to biodiversity. Growing human populations result in INDIRECT threats to biodiversity. Together, indirect and direct threats amplify biodiversity loss rates. environmental degradation Habitat that appears to be intact might be degraded by different types of pollution Pesticide pollution DDT egg effect Water pollution negative consequences for all species Light pollution Noise pollution air pollution acid rain lowers pH of rainwater, soil moister and water bodies damages plant and animal species ozone production and nitrogen deposition smog toxic metals directly poisonous to plant and animal life can cause permanent injury to children Biomagnification occurs as poisons become more concentrated as they move through the food web. Microplastics may be biomagnified, but we don’t know yet. land conversion Habitat loss is the primary cause of biodiversity declines Many biomes have had large proportions converted to human uses. In some parts of the world, >75% of the land has been converted to human uses.
https://coggle.it/diagram/XlRnhzi4MWFweO1p/t/habitat-change
47 So.3d 478 (2010) LOUTRE LAND AND TIMBER COMPANY, Plaintiff v. Wilton A. ROBERTS, Edward Roberts, Mark A. Roberts and Toni L. Roberts Daschke, Defendants. No. 45,355-CA. Court of Appeal of Louisiana, Second Circuit. August 4, 2010. Dissenting Opinion of Judge Moore August 11, 2010. Rehearing Denied September 16, 2010. *479 Robert T. Knight, for appellant, Edward Roberts. Cotton, Bolton, Hoychick & Doughty, L.L.P., Rayville, LA, by John Hoychick, Jr. for appellee, Loutre Land and Timber Company. Before BROWN, CARAWAY, DREW, MOORE and LOLLEY, JJ. CARAWAY, J. This is a real action involving the ownership of immovable property. The former owners of the property had adversely possessed the disputed tract of approximately 15 to 18 acres along with 100 additional and adjacent acres to which they held title. The former owners' ownership of this property was conveyed in succession proceedings by two deeds to the parties' to this action. On the strength of those deeds executed in 2002 and 2003, the parties now claim ownership of the disputed tract. From a ruling in favor of the plaintiff, the defendant now appeals. Finding error in the trial court's ruling, we reverse and recognize the ownership of the defendant. The case is remanded to fix the boundary to the property in accordance with survey data submitted at trial. Facts Prior to deeds executed in 2002-2003 which prompted this lawsuit, the owners of these adjacent properties held title to the land under longstanding recorded deeds which described the following two tracts: East Half of the Southeast Quarter (E/2 of SE/4) of Section 3, Township 16 North, Range 8 East (hereinafter the "Section 3 Tract") The North 15.50 chains (or 1023 feet) of the Northeast Quarter of the Northeast Quarter (NE/4 of NE/4) of Section 10, Township 16 North, Range 8 East (hereinafter the "Section 10 Tract"). The ideal boundary between these two tracts therefore was the governmental section line between Section 3 to the north and Section 10 to the south separating the SE/4 of the SE/4 of Section 3 and the NE/4 of the NE/4 of Section 10 (hereinafter the "Ideal Boundary"). The Marie Wilson Morgan family owned the 80-acre Section 3 Tract along with 20 additional and contiguous acres lying in the SW/4 of Section 2 (hereinafter collectively the "100 Acres"). The Morgan chain of title to this 100 Acres is evidenced in the record dating back to a deed in 1943 and the Morgan family's ownership of the 100 Acres is not in dispute. The Wilton A. Roberts family has held title to the Section 10 Tract for over 40 years. In 1964, Wilton A. Roberts, husband of Rebecca Jane Roberts, was conveyed the Section 10 Tract in a deed from Dorothy Harbour, et al. Edward W. Roberts ("Roberts"), who inherited the interests of his parents, Wilton and Rebecca, following their deaths, is now the defendant in this action. At the heart of this property dispute is an old fence which runs from east to west *480 approximately in the middle of the Section 10 Tract. The land between the old fence north to the Ideal Boundary is the property now in dispute (hereinafter the "Disputed Tract"). The size of the Disputed Tract revealed by the survey data introduced at trial appears to be 14.36 acres but had been referred to by the parties in varying amounts as comprising up to 18 acres. The Disputed Tract is a portion of the Section 10 Tract, and is roughly described in the present judgment as follows: [T]hat part of the Northeast Quarter, Section 10, Township 16 North, Range 8 East, lying north of the boundary fence, which fence separates the property owned by Edward Roberts (previously property of Wilton A. Roberts, et al) from the "Morgan Place"[1] While the record does not disclose who constructed the old fence, the conflict between the two tract owners arose because of acts of adverse possession by the Morgan family extending from their Section 3 Tract into Section 10 down to the old fence. The evidence shows that even before 1964, when Wilton Roberts acquired title to the Section 10 Tract, approximately half of his land, this Disputed Tract north of the old fence, was in the possession of the Morgans. At all times, the Morgans, or their tenant farmers, actively farmed the Disputed Tract. Testimony from Alton McKeithen, previous game warden for Franklin Parish; Susan F. Turner, Mrs. Morgan's daughter-in-law; and Harold Dean Cole, who previously hunted and farmed the Disputed Tract, consistently revealed that the fence formed the boundary line between the two properties and had done so for over thirty years. Edward Roberts even acknowledged that when he was a small child his father farmed the Disputed Tract by renting the land from the Morgans and presumably paying rent in order to do so. From these facts, the trial court determined that the Morgan family possessed the Disputed Tract for over thirty years and further found that the possession was continuous, uninterrupted, public, and unequivocal and extending up to the old fence. Roberts makes no assignment of error as to this finding, and we therefore agree with the trial court that the Morgans corporally possessed the Disputed Tract for over thirty years. On July 29, 2002, the Succession of Marie Wilson Morgan ("the Succession") executed a full warranty deed in favor of Loutre Land and Timber Company ("Loutre") transferring the following described tract of land situated in Franklin Parish: The South Half of the Southwest Quarter of the Southwest Quarter (S-1/2 of SW-1/4 of SW-1/4) of Section 2, Township 16 North, Range 8 East, Franklin Parish, Louisiana, and the East Half of the Southeast Quarter (E-1/2 of SE-1/4) of Section 3, Township 16 North, Range 8 East, Franklin Parish, Louisiana, consisting of 100 acres, more or less, including all crop base acres (65.2), "together with all rights or prescription, whether acquisitive or liberative, to which said vendor may be entitled." This deed (hereinafter the "Loutre Deed") was recorded on August 5, 2002, in the conveyance records of Franklin Parish. The price for this conveyance, as stipulated in the Act of Sale, was $75,000. Subsequent to Loutre's acquisition of the above described tract, Roberts obtained a survey which confirmed that his family's 1964 record title did in fact include the Disputed Tract. On advise of counsel, *481 Roberts procured a quitclaim deed from the Succession (hereinafter the "Quitclaim Deed"). Daniel C. Wirtz, the Succession's attorney, testified that he was uncertain if the Succession still maintained ownership of the Disputed Tract after its sale to Loutre. Despite his reluctance, Wirtz accepted consideration in the amount of $3,000 on the Succession's behalf. The Quitclaim Deed was dated January 29, 2003, and recorded on February 27, 2003. It conveyed without warranty any rights, title, or interest of the Succession in the Section 10 Tract, described as follows: Beginning at the northeast corner of Northeast Quarter of Northeast Quarter of Section 10, Township 16 North, Range 8 East, and running due west along the north line of said forty to the Northwest corner thereof, thence due south a distance of 15.50 chains, thence due east to the eastern boundary of said forty, thence due north a distance of 15.50 chains, to the northeast corner of said forty and the point of beginning, containing 32 acres, more or less, in the Northeast Quarter of Northeast Quarter of Section 10, Township 16 North, Range 8 East. Thus, while the description in the Quitclaim Deed is overly broad, including all of the Section 10 Tract, the portion of the tract north of the old fence, the Disputed Tract, was clearly included in the description. In June 2003, after obtaining the Quitclaim Deed, Roberts went on the Disputed Tract and attempted to erect a new fence along the Ideal Boundary according to the recent survey. In doing so, he crossed the existing fence and "bush hogged" a path for the new fence, destroying a number of pine seedlings previously planted by Loutre. On June 30, 2003, Loutre filed suit, claiming possession for over thirty years to the Disputed Tract by virtue of tacking the possession of its ancestors in title, the Morgans. Based on this possessory interest, Loutre sought, among other things, damages for trespass and destruction of property, including damages commensurate with Louisiana's statutory scheme relegating treble damages for destroying trees on the land of another. Roberts answered and reconvened, asserting ownership of the Disputed Tract and seeking damages. On October 7, 2004, Loutre filed a motion for partial summary judgment, seeking a declaration that the fence constituted the boundary between the property owned by it and that owned by the Roberts. By judgment, rendered and signed on June 2, 2005, the trial court recognized Loutre as the owner of the Disputed Tract by virtue of acquisitive prescription. On a later date, June 25, 2007, the trial court further ordered, after a trial on the merits, that Edward Roberts pay $15,250.00 to Loutre. Defendants appealed these judgments to this court. In Loutre Land and Timber Co. v. Roberts, 42,918 (La.App.2d Cir.4/16/08), 981 So.2d 775, writ denied, 08-1422 (La.10/31/08), 994 So.2d 535 ("hereinafter Loutre I"), this court held that genuine issues of material fact existed so as to preclude summary judgment.[2] On remand, during a trial on the merits, the court heard testimony regarding the Morgan family's possession of the Disputed Tract. Additionally, the court received *482 evidence concerning the two sales by the Succession to Loutre and Roberts, including evidence of the considerations paid by the parties to the Succession and the parties' intentions concerning those deeds. At the conclusion of trial, the trial court ruled in favor of Loutre, recognizing its ownership of the Disputed Tract. Considering the Quitclaim Deed of Roberts, the trial court expressed as follows its concerns regarding the impact upon the rule for tacking of boundary possession under Civil Code Article 794 if the Quitclaim Deed were to be given effect: The problem I have with this situation is in my mind it would — it could set a very dangerous precedent for Louisiana property law. To allow a seller to sell to Buyer A and then find out well, wait a minute there was three extra acres stuck on that east boundary I can sell it to someone else now. I think that would cause such a tremendous upheaval in the property law in the state that there's no way we can allow that to happen. Additionally, the court awarded $17,750 in damages for trespass and attorneys fees. It is from this judgment that both Loutre and Roberts now appeal. Discussion In its petition commencing this action, Loutre first acknowledged that Roberts was "purportedly" the "owner" of the Section 10 Tract which included the parcel of land in dispute. This was recognition of Wilton A. Roberts's 1964 deed to the Section 10 Tract. Nevertheless, in paragraph 10 of the petition, Loutre asserted: Defendants [Roberts] have intentionally disregarded occupational fences that have been used as boundaries for possession for more than thirty years and is liable to Loutre for trespass and intentional injury to property. In response to Loutre's suit, Roberts reconvened, asserting his ownership of the Disputed Tract. At the trial of this matter, prior deeds, including the parties' recent deeds from the Succession, and the facts of the Morgan family's lengthy adverse possession were presented as the evidence for the resolution of Loutre's claim and Roberts's reconventional demand. From the allegations in the parties' pleadings and the evidence produced at trial, this action is not a simple tort action in trespass, involving a defendant with no ownership claim or intention to possess as owner. The dispute involves "real action" claims of both parties addressed under Title II of the Special Proceedings of Book VII of the Code of Civil Procedure, whether characterized as a petitory or boundary action. Addressing such actions, Article 3654 of the Code of Civil Procedure sets the parties' burdens of proof as follows: When the issue of ownership of immovable property or of a real right therein is presented in an action for a declaratory judgment, or in a concursus, expropriation, or similar proceeding, or the issue of the ownership of funds deposited in the registry of the court and which belong to the owner of the immovable property or of the real right therein is so presented, the court shall render judgment in favor of the party: (1) Who would be entitled to the possession of the immovable property or real right therein in a possessory action, unless the adverse party proves that he has acquired ownership from a previous owner or by acquisitive prescription; or (2) Who proves better title to the immovable property or real right therein, when neither party would be entitled to the possession of the immovable property *483 or real right therein in a possessory action.[3] The possession of the Disputed Tract prior to the time of the deeds from the Succession in 2002-2003 is now undisputedly established as having been in the Morgans. Their possession, however, was more than mere possession but had extended in time for over thirty years. As such, the Morgans had acquired ownership of the Disputed Tract by acquisitive prescription of thirty years prior to the execution of the two deeds of the Succession. La. C.C. art. 3486.[4] At the time of 2002-2003 deeds, the Morgans' existing ownership did not involve a written title to the Disputed Tract or anything recorded in the public records, but nevertheless could be established, and has now been established, by evidentiary proof of facts outside the public records. After the Loutre Deed, Loutre continued with acts of possession over the Disputed Tract by the planting of the pine tree seedlings on the property. Thus, under the test of La. C.C.P. art. 3654(1), Roberts's brief actions in coming on the Disputed Tract and destroying some of those seedlings precipitated this suit and placed Roberts in the position of the "adverse party." Roberts's burden of proof therefore for the resolution of "the issue of ownership of immovable property" in this real action was to prove that "he has acquired ownership" of the Disputed Tract "from a previous owner." Roberts's claim for the ownership of the Disputed Tract rests upon the rights he purportedly received from the Succession in the Quitclaim Deed. Roberts recorded the Quitclaim Deed in the conveyance records, and the Quitclaim Deed purports to be a transfer of rights "from a previous owner" of the Disputed Tract which is fully described in the deed. The recordation of the Quitclaim Deed implicates Louisiana's public records doctrine, which must now be reviewed for consideration of Roberts's claim. On the other hand, Loutre's claim for ownership of the Disputed Tract rests upon its assertions regarding Civil Code Article 794 (hereinafter "Article 794"), which it claims operates to its benefit in a manner superior to the public records doctrine. When asked at oral argument whether the recorded deed to Loutre with its lack of any description of the Disputed Tract gave "notice to third parties that the ownership rights of the Morgans in Section 10 have been conveyed," counsel responded as follows: No, Sir, it does not. But that's not the issue. The issue is possession. The "possession issue" which Loutre asserts rests on Article 794, which provides as follows: When a party proves acquisitive prescription, the boundary shall be fixed according to limits established by prescription rather than titles. If a party and his ancestors in title possessed for thirty years without interruption, within visible bounds, more land than their title called for, the boundary shall be fixed along these bounds. To summarize this dispute, therefore, Roberts's claim of ownership rests upon a recorded Quitclaim Deed from "the previous *484 owner" specifically describing the Disputed Tract. Loutre's claim for ownership rests upon the transfer of the Succession's title to the 100 Acres in Sections 2 and 3 and the rights afforded Loutre under the last sentence of Article 794 for the so-called "tacking" of possession of "the previous owner" to the Disputed Tract in Section 10. This asserted clash between the public records doctrine and Article 794's tacking rule in boundary actions requires our review of both bodies of law and their importance for the resolution of ownership disputes. The public records doctrine as now expressed in the Civil Code's new articles on registry provides that the rights established or created by an instrument that transfers an immovable are without effect as to a third person unless the transfer instrument is registered by recording it in the conveyance records. La. C.C. art. 3338. The Code defines a "third person" as a person who is not a party to or personally bound by an instrument. La. C.C. art. 3343. The public records doctrine therefore has been given effect to the prejudice of the acquiring party in favor of a third party where there is an absence of recordation of the transfer instrument to the acquiring party. Camel v. Waller, 526 So.2d 1086 (La.1988). Louisiana's prior statute addressing the law of registry, La. R.S. 9:2721, repealed by Act 169 of 2005, provided that "neither secret claims or equities nor other matters outside the public records shall be binding on or affect such third parties." This rule is now reflected in the new Article 3342, effective January 1, 2006. "A party to a recorded instrument may not contradict the terms of the instrument or statements of fact it contains to the prejudice of a third person who after its recordation acquires an interest in or over the immovable to which the instrument relates." La. C.C. art. 3342. In Professor Redman's discussion of Louisiana's public records doctrine in 1965, he articulated the so-called "pure race" principle, as follows: Since an interest is null as to third persons until recorded, among otherwise equal claimants, priority in ranking goes to the winner of the race to the public records office. William V. Redmann, The Louisiana Law of Recordation: Some Principles and Problems, 39 Tul. L.Rev. 491 (1965). He then gives the example of a double sale or conveyance of an immovable, as follows: If the sale from O to A is not recorded, it is not effective against third person B, whether B knew of the sale or not; if the sale from O to A is recorded, it is effective against B, whether B knew it or not. Thus, in case of either recordation or non-recordation, whether B actually knows of the sale or not has no bearing on the result. Id. Such double sale was indeed the fact situation involved in Louisiana's seminal public records case, McDuffie v. Walker, 125 La. 152, 51 So. 100 (1909), where the second purchaser with a recorded act of title prevailed over the first purchaser with an unrecorded deed. A quitclaim deed at common law is recognized in the civil law as an assignment of rights without warranty. See La. C.C. art. 2502, comment (c). A quitclaim deed has been held to be a deed translative of title. Bolding v. Eason Oil Co., 248 La. 269, 178 So.2d 246 (1965); Board of Com'rs for Lafourche Basin Levee Dist. v. Elmer, 268 So.2d 274 (La.App. 4th Cir. 1972), writ denied, 263 La. 613, 268 So.2d 675 (La.1972), citing Bolding v. Eason Oil Co., 248 La. 269, 178 So.2d 246 (1965). In other words, the ownership to immovable property may be as effectually transferred *485 by quitclaim as by any other form of conveyance. Waterman v. Tidewater Associated Oil Co., 213 La. 588, 35 So.2d 225 (La.1947). Furthermore, although such a deed conveys only such title or interest that the grantor had at the time it is given, it is sufficient to support a plea of acquisitive prescription. Id. These rulings have now been included in the revision of the law of Sale, and new Article 2502 of the Civil Code provides: Such a transfer does not give rise to a presumption of bad faith on the part of the transferee and is just title for purposes of acquisitive prescription. From these principles, it follows that a quitclaim deed would be a sufficient transfer of rights so that the public records doctrine provision of Civil Code Article 3338(1) applies to the recorded quitclaim deed. Critical to the public records doctrine and the notice which is given by a recorded instrument is the description of the immovable which is the subject of such instrument. Louisiana jurisprudence has not established precise criteria to determine what description in the public records is sufficient to place third persons on notice, and such determination is to be made on a case by case basis. Nitro Energy, L.L.C. v. Nelson Energy, Inc., 45,201 (La.App.2d Cir.4/14/10), 34 So.3d 524, quoting Consolidated Ass'n of Planters of Louisiana v. Mason, 24 La. Ann. 518 (1872). In Hargrove v. Hodge, 9 La.App. 434, 121 So. 224, 225 (La.App. 2d Cir.1928), it was determined that the property description in the instrument must be such that the property intended to be conveyed could be located and identified, and the general rule is that the description must fully appear within the four corners of the instrument itself, or that the instrument should refer to some map, plat, or deed as a part of the description, so that the same may be clear. It is not permissible to indulge in speculation when interpreting deeds to real property. Id. In reference to the sectional subdivision of public lands in the official plats of the governmental surveys, the courts have said that the "description [of a governmental quarter/quarter section] is mathematically certain and calls for no extrinsic evidence to explain the intention of the parties as to the tract intended to be conveyed." Haas v. Fontenot, 132 La. 812, 61 So. 831 (1913). On the other hand, certain omnibus or similar descriptions have been uniformly held not to put third parties on notice of the location and identity of the property which is the subject of an instrument. Williams v. Bowie Lumber Co., 214 La. 750, 38 So.2d 729 (1948) (It seems to be settled now by the jurisprudence in Louisiana that such a vague and indefinite description, in an instrument purporting to convey title to real estate, as all of the land owned by the seller in a named parish, is not sufficiently specific to give notice to third parties thereafter dealing with the seller.) Blevins v. Manufacturers Record Pub. Co., 235 La. 708, 105 So.2d 392 (1957) (A sale by given bounds conveys only the property within such bounds, and acreage designations appended to such specific descriptions do not enlarge or restrict the grant described by the specific bounds.) W.B. Thompson & Co. v. McNair, 199 La. 918, 7 So.2d 184 (1942) (Innocent third purchasers cannot be held to the necessity of ascertaining whether or not the land remaining to their vendors is equal in area to the body of land purchased.) Considering the two property descriptions contained in the deeds conveyed by the Succession, we agree with Loutre's counsel that the Loutre Deed does not describe any lands in Section 10 so as to place a third party on notice that Loutre *486 had acquired from the Succession any interest in the Disputed Tract. The Loutre Deed only describes, by referencing the governmental survey, the 100 Acres in Sections 2 and 3. Additionally, the deed's omnibus expression of a transfer of "all rights of prescription, whether acquisitive or liberative, to which vendor may be entitled," does not direct a third party viewing the Loutre Deed to the Disputed Tract where the Morgans' right of ownership by thirty-years acquisitive prescription had accrued. Nevertheless, Loutre's claim for ownership is now argued to rest on something beyond a recorded written conveyance to Loutre with a description of the Disputed Tract. Loutre claims rights afforded it under Article 794. Article 794 is contained in Book II of the Civil Code which deals with "The Different Modifications of Ownership." One of those modifications concerns "Boundaries" between contiguous lands, Book II, Title VI, and the "Effect of Titles, Prescription or Possession" in a boundary dispute as addressed in Title VI, Chapter 2 of Book II. La. C.C. arts. 784 et seq. Article 794 is best understood, therefore, by reviewing the first three articles of Chapter 2 dealing with the boundary action, which provide: La. C.C. art. 792. Fixing of boundary according to ownership or possession The court shall fix the boundary according to the ownership of the parties; if neither party proves ownership, the boundary shall be fixed according to limits established by possession. La. C.C. art. 793. Determination of ownership according to titles When both parties rely on titles only, the boundary shall be fixed according to titles. When the parties trace their titles to a common author preference shall be given to the more ancient title. La. C.C. art. 794. Determination of ownership according to prescription When a party proves acquisitive prescription, the boundary shall be fixed according to limits established by prescription rather than titles. If a party and his ancestors in title possessed for thirty years without interruption, within visible bounds, more land than their title called for, the boundary shall be fixed along these bounds. These articles concern the boundary action where the court considers recorded titles and possible acts of adverse possession to "fix the boundary according to the ownership of the parties." The boundary is the line of separation between contiguous lands. La. C.C. art. 784. Therefore, the conflict is between one landowner against an adjacent neighbor. As in this case, the conflict may involve one party and the facts of possession concerning the ancestors in his chain of title on one side of an ideal boundary against the neighboring party and the facts concerning her ancestors in her title chain. The two ancestral title chains therefore usually describe a common or ideal boundary, as in this case. Turning specifically to Article 794 and its final sentence, the rule calls the court to credit the proof by one of the adjacent landowners of the acts of adverse possession for over 30 years which occur on land extending beyond the ideal boundary to a "visible bound" (hereinafter the "Extra Land"). According to Article 794, that landowner, who makes the claim of ownership to the Extra Land attributable to adverse possession of over 30 years, need not have been in possession himself for 30 years but may rely upon or "tack" the possession of his ancestors in title. Moreover, if those "ancestors in title" executed previous deeds or transfers to the tract, *487 describing land only to the ideal boundary and not including the Extra Land, the lack of a descriptive and juridical link or "particular title" to the Extra Land does not prevent the current landowner's proof of acquisitive prescription through evidence of the combined acts of possession of himself and all his ancestors. Such proof by the tacking of possession allows for a judicial recognition of the ownership of the Extra Land from which the court shall fix the new boundary. On the whole, the final sentence of Article 794 provides a litigant an evidentiary proof allowance in the trial of a boundary action. The important benefit of Article 794's boundary tacking, therefore, is that the established visible bound that has existed for over 30 years becomes the new boundary superseding the ideal boundary expressed in the adjacent landowners' titles. The Extra Land becomes owned by the landowner who has used and employed that land through acts of corporeal possession up to the visible bound even though his use and adverse possession extended beyond his title. Finally, an erroneously fixed visible boundary may in many instances only involve a few feet and a minimal quantity of land so that neither of the adjoining landowners may have been alerted to the problem over a lengthy passage of time. This means that from the prior transfers of the land the party in possession of the Extra Land may not have had it transferred to him from his ancestors in title by a particular title with an appropriate metes and bounds description of the Extra Land.[5] Therefore, upon its employment for proof in the boundary action, the boundary tacking rule of Article 794 operates as an exception to the general rule of Civil Code Article 3441[6] which otherwise requires a "particular title" for the transfer of possession. Brown v. Wood, 451 So.2d 569 (La.App. 2d Cir.1984), writ denied, 452 So.2d 1176 (La.1984).[7] *488 Nevertheless, there are significant aspects of this boundary dispute which are not specifically addressed in Article 794. Most importantly, the "ancestors in title" expression in the article concerns the predecessors/transferors of the landowner/litigant who is asserting ownership to the Extra Land derived in part from the acts of corporeal possession of those predecessors who had also previously possessed beyond their title to the visible bound. Thus, Loutre's "ancestor in title" for purposes of Article 794 is the Succession which conveyed by particular title only the lands in Sections 2 and 3. Nevertheless, the benefit of the boundary tacking rule of Article 794 is now claimed by Loutre as attendant to the Succession's sale extending to Loutre the Succession's rights in the Extra Land, which in this case is the Disputed Tract. The peculiarity of this case, however, is that the Succession is also the "ancestor in title" to Roberts. Clearly, under Article 794, when a landowner/litigant asserts his ancestor in title's adverse possession, that "ancestor in title" is not understood as also an "ancestor in title" to the neighboring and opposing landowner. The Succession's unusual dual role as an "ancestor in title," or an owner who purportedly conveyed the same land to both adjacent landowner claimants immediately before this boundary dispute, suggests that something other than Article 794 must be considered for the ranking of these competing transfers[8] of rights in the immovable from the same transferor. Second, Article 794 addresses the effect of the combined possessions of the party claimant in the boundary action and his "ancestors in title" when cumulatively amounting to thirty years of uninterrupted possession. In this case, Loutre did not need to tack the mere possession of the Morgans to its own possession to effect an accrual of the thirty years for acquisitive prescription through their combined adverse possession. The Morgans alone had amassed thirty years of possession and thus ownership through acquisitive prescription at the time of the sale to Loutre. In that sense, a deed by particular title describing the Disputed Tract from the Succession to Loutre would have conveyed ownership to the Disputed Tract, and with *489 recordation of such title, Loutre could have resolved this boundary dispute in its favor without the need for the possession tacking rule of Article 794.[9] In summary, Article 794 allows for a special mode of proof for the determination of thirty-year acquisitive prescription, and thus ownership, in a boundary action between neighboring landowners. The "ancestor in title" of one party whose prior acts of adverse possession serve to contribute to that party's proof of acquisitive prescription is generally understood not to also be the "ancestor in title" of the neighboring and opposing landowner. However, if two successive sales are made by that ancestor in title after the time that the adverse possession of the ancestor has occurred, such double sale in our opinion brings into play the application of the public records doctrine to determine which of the two transferees shall prevail. The fact that Article 794 is a special evidentiary rule for proof in a court proceeding to establish acquisitive prescription does not mean that the policy principles for the transfer of ownership of an immovable under the public records doctrine are in conflict with Article 794 or, in any way, superseded by Article 794.[10] The interplay between the public records doctrine and Article 794 in this case was clearly illuminated in a hypothetical illustration upon which the trial court remarked in the parties' oral argument, as follows: Obviously, as Mr. Hoychick pointed out if the Morgan Estate had sold Mr. Ed [Roberts] that 14.6 acres before it sold to Loutre . . . that would be a legitimate and valid sale of . . . a property acquired . . . by acquisitive prescription. This illustration correctly acknowledges that the Succession could have intended to sell the Disputed Tract and the 100 Acres separately to different parties. If so, the deeds in such illustration would describe the separate properties in exactly the same manner as the separate deeds in this case — the Quitclaim Deed and the Loutre Deed — describing respectively the 14.6 acres in Section 10 and the 100 Acres in Sections 2 and 3. Therefore, since the recorded descriptions reflect on the face of each deed separate transfers of differently described immovables, it does not matter which deed occurred first or was recorded first. Moreover, it is clear under the public records doctrine that if a deed to Loutre had described all 114.6 acres (the 100 Acres and the Disputed Tract) but not been recorded, a second sale by the Succession of the 14.6 acres to Roberts gains the protection of the public records doctrine after its recordation; and the prior transfer to Loutre is "without effect" as to the rights acquired by Roberts. La. C.C. art. 3338. From yet another perspective, *490 after the recordation of the Loutre Deed which occurred first in this case, Roberts as a third party to the Loutre Deed may consider that the Succession intended only to sell the 100 Acres as identified in that deed and to retain the 14.6-acre Disputed Tract. If a contrary intent existed between the Succession and Loutre, a third party seeking to purchase the Disputed Tract was not bound by such secret equity between the parties that was not expressed by the inclusion of a description of the Disputed Tract in the recorded Loutre Deed. La. C.C. art. 3342. This does not mean that Loutre was unprotected at the time of its purchase nor that it could not have brought a boundary action against Roberts and asserted the acquisitive prescription obtained by acts of the Morgan family over the Disputed Tract. Clearly, a complete assessment of the lands involved in the proposed sale from the Succession to Loutre would have revealed the sizable tract of land of the Morgan farm that extended into Section 10. As shown by the survey data presented at trial, the Disputed Tract is obviously not in Sections 2 and 3. The southern boundary of the 100 Acres stretches east to west one-half mile running in a straight line along the south section lines for Sections 2 and 3. Yet, the Disputed Tract extends some 400 feet off of that line to the south. The Loutre Deed neglected to describe this unusually large tract extending beyond the Ideal Boundary into the Section 10 Tract over which the Roberts family held record title. Thus, the first protection available to Loutre was the execution and recordation of a deed accurately describing the entire 115-acre tract which it claims to have purchased from the Succession. Nevertheless, even with the inadequate description contained in the Loutre Deed, Loutre could have immediately instituted a boundary action and proven the acquisitive prescription by which its ancestor in title had acquired ownership of the Disputed Tract. Such suit would have allowed Loutre to establish the Morgans' ownership of the Disputed Tract and itself as successor to the Morgans. With the recordation of a notice of lis pendens of the real action under La. C.C.P. arts. 3751, et seq., such action would also prevent the possibility of the double sale by the Succession which later occurred. In proving the acquisitive prescription of its predecessors, the Morgans, Loutre would be meeting the burden of proof in the boundary action of the first sentence of Article 794 without the need for the tacking rule of its second sentence for the accumulation of a thirty-year period of possession between multiple parties. In conclusion, the facts of this boundary dispute are unusual. The misplaced boundary is not one which merely strayed slightly off course from the ideal boundary called for in the title deeds of the two adjacent landowners. In such case, double sales involving a minimal strip and quantity of land would not be expected. The misplaced boundary in this case is some 400 feet south of the Ideal Boundary. The attorney representing the Succession was apparently unclear whether the sizable 15 to 18-acre tract in Section 10 had been sold to Loutre. So the Succession sold again. This is therefore not a case of the proof of an ownership change caused by acquisitive prescription along a boundary line where Article 794 resolves the dispute. This is a case of the transfer of that ownership by parties with two competing deeds from the same prior owner of the immovable where the public records doctrine must govern. Under our law of registry, Roberts's deed was the superior deed recorded in the conveyance records, and he therefore proved that he acquired ownership from the previous owner. *491 Conclusion For the above reasons, we reverse the trial court's judgment. It is hereby ordered, adjudged and decreed that Edward W. Roberts is the owner of the Disputed Tract which is described as that portion of the Northeast Quarter of the Northeast Quarter of Section 10, Township 16 North, Range 8 East, lying north of the old fence shown on the two surveys presented at trial. Although the surveys of the parties appear to coincide and place the Ideal Boundary in approximately the same location, there is apparently no visible boundary along the section line between Sections 3 and 10. Therefore, the case is remanded to the trial court to fix the boundary visibly by reference to markers on the ground between the parties' adjacent tracts in accordance with the two surveys and with Roberts's ownership as recognized herein. Additionally, we find nothing in the record to support Roberts's claim for damages and that claim is dismissed. Costs of appeal are assessed to Loutre Land and Timber Company. REVERSED AND REMANDED. BROWN, C.J., concurs with written reasons. DREW, J., concurs for the reasons assigned by Judge BROWN. MOORE, J., dissents and with written reasons. BROWN, Chief Judge, concurring. I agree fully with Judge Caraway's opinion but write to emphasize that Loutre Land & Timber Company specifically bought a 100-acre tract with the intent to obtain a windfall of an additional 14-18 acres. H.E. Perry, an experienced forester, represented Loutre in this acquisition from the Morgan estate. He testified as follows: Q. Tell me what you did in preparation for the-for the sale going through? A. Well, I walked the boundaries and I already knew where part of them were and then talked to Dr. Holder and I knew approximately how many acres were involved. Q. So — and Dr. Holder told you, you said you talked to him about the acres involved, how many acres did you believe was involved? A. He — he offered us the land — well, we asked if he would sell it to us, he offered us the land and he said a hundred acres at seventy — at $750 an acre. Q. Is that believe — was that your belief on how many acres were being transferred to Loutre was a hundred acres? A. I knew there was — I knew there was more acres than that. Q. Did you let Dr. Holder know about that? A. Dr. Holder didn't ask me, he told me what they wanted and we offered that to him. Q. How did you know that there was more acres involved than — than a hundred acres? A. Because I've been there a long time and I've looked at lots of maps in that area. Q. So would it be fair to say you knew you were getting a deal, you were getting. . . A. I knew that there was some adverse possession there, yes. H.E. Perry walked the boundaries and knew exactly where the section line was and that Loutre was only buying and paying for 100 acres. Mr. Perry omitted to disclose the information about the extra 14-18 acres when he talked with Dr. Holder. *492 He knew that Dr. Holder was misinformed. MOORE, J, dissents. I dissent. The majority has taken so many liberties with the law and with the trial court record that it is hard to know where to begin. The burning motive behind the majority's labored and opaque opinion seems to be moral indignation that Loutre Land might possibly acquire 14 to 18 acres of land for which it did not pay. To avoid this perceived inequity, the majority has revised the law and disregarded the factual findings. La. C.C. art. 794 regulates boundary actions, such as this case. It states the simple rule, "When a party proves acquisitive prescription, the boundary shall be fixed according to limits established by prescription rather than titles." The district court found, and the record fully supports, that the Morgan Estate possessed the disputed tract continuously, without interruption, peaceably, publicly and unequivocally for well over 30 years. As a result, it owned the disputed tract at the time of its cash deed to Loutre. In addition to this clear Civil Code mandate, the caselaw is settled that "ownership of immovable property under record title may be eclipsed and superseded by ownership acquired under prescriptive title." Brown v. Wood, 451 So.2d 569 (La. App. 2 Cir.), writ denied, 452 So.2d 1176 (1984); McIlwain v. Manville Forest Products Corp., 499 So.2d 1138 (La.App. 2 Cir.1986). Contrary to the majority's suggestion, acquisitive prescription actually preserves the stability of titles. Board of Com'rs v. Elmer, 268 So.2d 274 (La.App. 4 Cir.), writ ref'd, 263 La. 613, 268 So.2d 675 (1974). To circumvent this definitive principle, the majority has woven a bizarre and unprecedented theory based on the public records doctrine. However, there is nothing in the text of the new La. C.C. art. 3338 or in the long jurisprudence following McDuffie v. Walker, supra, to support the vain attempt to excise Art. 794 from the law. Even if the public records doctrine somehow trumped acquisitive prescription, it would not do so in this case. First, the cash deed from the Morgan Estate to Loutre conveyed 100 acres "more or less, * * * together with all rights or prescriptions, whether acquisitive or liberative, to which said vendor may be entitled," evidencing a clear intent by both seller and buyer to convey any portion not strictly described. Tracts far larger than 18 acres have been conveyed by acquisitive title. Broussard v. Guidry, 127 La. 708, 53 So. 964 (1911) (over 84 acres). Second, La. C.C. art. 793 provides, "When the parties trace their titles to a common author preference shall be given to the more ancient title." Loutre acquired title by deed dated July 29 and filed on August 5, 2002; Roberts acquired title by quitclaim dated January 29 and filed February 27, 2003. Loutre's title is obviously "more ancient." The concurring opinion quotes the testimony of Loutre's forester, H.E. Perry, to show that Loutre was fully aware of the "windfall" of an additional 14 to 18 acres; ergo, it deserved to lose this case. Despite the appearance of inequity, Loutre's good faith or bad faith at the time of the deed is irrelevant. Under La. C.C. art. 3486, "Ownership and other real rights in immovables may be acquired by the prescription of thirty years without the need of just title or possession in good faith." (Emphasis added.) Perplexingly, the majority makes much of Roberts's quitclaim deed, but the law is settled that such a nonwarranty declaration can convey only whatever interest the *493 seller has in the property. Scurlock Oil Co. v. Getty Oil Co., 294 So.2d 810 (La. 1974). As the Morgan Estate had conveyed 100 acres more or less, plus prescriptive rights, six months earlier, it obviously could not convey them to Roberts. Pilcher v. Paulk, 228 So.2d 663 (La.App. 3 Cir. 1969). Indeed, the fact that Roberts requested only a quitclaim deed shows that he was aware of a potential title problem. The late Mrs. Morgan's attorney, Daniel Wirtz, testified that in his view, the estate no longer owned the disputed tract, but because of the insistence of Roberts's counsel, he executed the quitclaim deed. The trial court fully credited Mr. Wirtz's testimony; for reasons never explained, the majority now dismisses it as "unclear." This point leads to the majority's coup de grace, a reversal of the district court's credibility calls and factual findings without one mention of the concept of manifest error. Where is the manifest error in the district court's findings of undisturbed possession, the passage of over 30 years, the interpretation of Loutre's cash deed, the reservations of the estate's attorney, and the interpretation of Roberts's quitclaim? The majority does not even favor us with a finding of legal error, but instead drapes a new and fantastic theory over the whole case. This is not the proper role of the intermediate court. There is no manifest error in the district court's factual findings and no legal error in its conclusions. I would affirm. APPLICATION FOR REHEARING Before BROWN, CARAWAY, DREW, MOORE and LOLLEY, JJ. Rehearing denied. MOORE, J., would grant rehearing. NOTES [1] This description describing the entire NE/4 of Section 10 is misleadingly broad, as the old fence in dispute only extends east and west through the NE/4 of the NE/4. [2] We reject Loutre's present assertions in brief that the plurality opinion of four judges in Loutre I decided in any manner legal issues in the case so that the law of case doctrine has application to this appeal. In considering the two undisputed deeds executed by the Succession, the concurring opinion did express the legal conclusion that "Roberts has the best recorded title from a common author." [3] This twofold proof burden of Article 3654 would be the same for the boundary action, as Article 3693 of the Code of Civil Procedure directs the court to fix the boundary "in accordance with the ownership or possession of the parties." [4] La. C.C. art. 3486. Immovables; prescription of thirty years. Ownership and other real rights in immovables may be acquired by the prescription of thirty years without the need of just title or possession in good faith. [5] On the other hand, if the misplaced visible boundary involves more than a few feet, runs a course totally different from the ideal boundary, or involves a large expanse of Extra Land as a possessory encroachment upon a neighboring tract of land, it becomes more difficult to understand why the chain of transfers by the parties with adverse possession does not include in their transfers the Extra Land by a metes and bounds description. As emphasized by this court in Loutre I, there arises a question of the intent of the parties to such transfer, or as in this case, whether the Succession intended to transfer only 100 acres for $750 per acre or 115 acres. On remand, the evidence showed that the parties intended a $750 per acre price, yet the Succession was only paid $75,000 by Loutre. [6] Article 3441 provides that "[p]ossession is transferable by universal title or by particular title." La. C.C. art. 3441. Thus, in a case where a party has obtained the right to possess (La. C.C. art. 3422) through adequate acts of corporeal possession over the land of another and that party has no title to adjacent lands, the party must appropriately describe in an instrument the land in his possession in order to transfer his right to possess by "particular title." This principle is the general rule for the transfer and tacking of possession in a non-boundary setting. See, La. C.C. art. 3442. Likewise, if that same party's possession had extended in time for over thirty years so that he had acquired ownership by acquisitive prescription, the party's transfer of that ownership would require a "particular title" describing the property which would then allow the transferee the protection of the public records doctrine by the recordation of that title. [7] Article 794's beneficial effect was memorably expressed by the Louisiana Supreme Court in Opdenwyer v. Brown, 155 La. 617, 626-627, 99 So. 482 (1924), where the court explained the source articles to present Articles 794 and 3441, holding that boundary tacking is an exception to the general rule, as follows: . . . [I]f perchance it should be discovered that Bienville had misread the plan of his engineer and located his "place d'armes" a few hundred feet higher up, or lower down, the Mississippi than such plan calls for, there is no title to a foot of land in the city of New Orleans, which would not call for correction; and since the land which each successive purchaser took possession of would not be the same land which his title called for, it follows (if we accept the Le Rosen Case) that he could not "tack" onto his own possession that of his supposed author, and thus could not protect his boundaries, by the prescription of 30 years. That would be against all common sense; and law is common sense, as far as legislators, courts and men of law will let it remain so. [8] Loutre has argued to this court that Brown v. Wood, supra, presents "almost exactly the same facts" as the present dispute. This is incorrect. In that case the defendants, the Woods, had possessed the extra land beyond that called for in their title. Their title was acquired from Oliveaux 26 years prior to the suit, and Oliveaux also had previously been in possession of the extra land for over four years. Therefore, utilizing Article 794, the Woods proved that they and their ancestor in title had possessed the extra land for over 30 years, and their ownership was recognized by this court. Additionally, immediately prior to the suit, Oliveaux had executed a second transfer, a quitclaim deed, to the Woods specifically describing the extra land. The quitclaim was unnecessary for the ruling since the Woods had acquired the extra land by virtue of the operation of the tacking rule of Article 794 and the earlier deed from Oliveaux. Likewise, unlike the present case, Oliveaux made no quitclaim transfer to the other party in the boundary dispute, the Browns. The only case Loutre cites with apparently similar facts is Mcllwain v. Manville Forest Products Corp., 499 So.2d 1138 (La.App. 2d Cir. 1986). However, in that ruling the public record doctrine was never addressed by the court. [9] This is not to say, as explained below, that Loutre was not entitled to have immediately instituted a boundary action against Roberts after its acquisition from the Succession and before the Quitclaim Deed, to have asserted the ownership of the Disputed Tract as transferred to Loutre by the Succession, and to have had the court fix the boundary line between the two tracts. [10] The trial court's concern expressed in its oral ruling, quoted above, is a concern that sellers sometimes sell an immovable twice because of unscrupulous conduct, error, or some other cause. This is what the public records doctrine addresses; yet such double dealing, particularly misconduct or fraud, is not the subject matter of Article 794. A seller, who intends to sell all of his rights in a tract within existing visible bounds and who warrants that sale, would generally be expected to understand that he is breaching that sales contract and its warranties by executing a second sale. Yet, when the rare double sale occurs, the public records doctrine will have application for the determination of the competing claims of the vendees.
To send astronauts back to the moon, NASA is planning to begin by making maximum use of existing U.S. and foreign rockets as launching systems. Vehicles under consideration may use updated propulsion systems that could blast a flotilla of spacecraft from the Earth to the vicinity of the moon. For voyages of longer duration, however — to Mars and possibly even more distant destinations — NASA is designing a whole new system for both space propulsion and space power. If successful, the system could provide future astronauts a swifter means of voyaging far beyond the moon and equip their ships and robotic scouts with far more electrical power than ever has been available to space missions before.
http://marsnews.com/archives/2004/08/02/nasas-new-space-hot-rod.html
cheeks and glistened in the rising sun. "It's beautiful..." she thought to herself. "He would have loved to see it...." Her mind began to wander. It was about two months after Talpa and the Dynasty were defeated. Mia and the other Ronins could now return to their normal lives. They all still stayed at Mia's house, still weary but more relaxed knowing the Dynasty was beaten. One thing had been on Mia's mind for the entire month. Someone she loved dearly was killed in the fight. Her thoughts trailed to her loved one when a familiar, black hair young man walked up to her. "You're up early." The friendly voice caught Mia by surprise and she jumped up. Seeing who it was, she quickly wiped the tears from her eyes and smiled. "You scared me Ryo. I'm glad you're up though, I was getting a little lonely." Ryo smiled, pretending not to notice her tears. He began walking back inside. "The other guys are up. We were hoping that we could go hiking in the woods around here. Wanna come? We can continue your training." Mia smiled. After Talpa's defeat, the five boys promised to teach Mia to defend herself better. She was doing really good, and could probably easily take out a couple of Dynasty soldiers if she needed to. She smiled. "Yeah, I'll come. I'll be in in a minute ok?" She turned to the yellow sun burning in the horizon. Ryo walked back inside as Mia sighed. Mia whispered softly to herself. "Oh Anubis...where are you?" * * * * * * * * * In a dark and shadowed throne room, a young man sat in the lavish throne. He was in black armor, exactly like the warlord's, that was trimmed in gold. His dark blue eyes glistened with an essence of evil and his black hair only added to his sinister look. He grinned as a Dynasty soldier knelt before him. "Sire, we have found the girl." The metalic creature spoke in a harsh voice. The man smiled evilly. "I am pleased. Keep up with her, and don't let her out of your sight for long, understand?" The soldier nodded obediently as the man waved his hand, signalling that he was to be left alone. He stood and held his hand out as a jeweled necklace appeared in his hand. It was a silver chain, a delicate piece of jewelry. It had a soft, icy blue jewel in the shape of a tear drop connected the chain. The pearl emitted a soft blue light which sent warmth through the man's hand. He grinned as his voice echoed in the room. "At last my queen, you will be mine."
http://miaandanubis.theshoppe.com/stories/luvr01.html
https://doi.org/10.1016/j.pecon.201... | |Keywords||Conservation base-lines, Ecological restoration, Megafauna, Pleistocene extinctions, Trophic rewilding| |Subject categories||Behavioral Sciences Biology, Evolutionary Biology| © 2017 Associação Brasileira de Ciência Ecológica e Conservação A promising, but also controversial approach to ecological restoration is trophic rewilding, i.e., species introductions to restore top-down trophic interactions and associated trophic cascades to promote self-regulating biodiverse ecosystems. To provide historically-informed base-lines for trophic rewilding in the Neotropics, we aggregate data on late-Quaternary (last 130,000 years) large-bodied (megafauna, here: ≥10 kg body mass) mammals to estimate two base-lines: megafaunas including historically (post-1500 AD) extinct species and accounting for regional extirpations of extant species (historic base-line), and megafaunas additionally including Late Pleistocene-Holocene prehistorically extinct species (prehistoric base-line). The historic base-line is less controversial, while the prehistoric base-line is more relevant from an evolutionary, long-term perspective. The estimated potential distributions indicate strong scope for trophic rewilding, with high levels for the prehistoric baseline (with > 20 species missing in many regions and biomes), but also considerable values for the historical baseline. Many areas have strongly reduced diversities for a range of functional and phylogenetic subgroups. We discuss implications, highlighting the need for a more nuanced view on non-native megafauna species as they may sometimes represent taxon substitutions for missing species. We emphasize that trophic rewilding should be implemented flexibly and in dialogue with society, e.g., handling human–wildlife conflicts and ensuring benefits for local livelihoods.
https://www.gu.se/english/research/publication/?publicationId=261646
Read the Report! The final report from the High Peaks Advisory Group was released on March 5, 2021. Read our commentary and responses here, and download the report by clicking the button below. HPAG Final Report In November of 2019 the State of New York Department of Environmental Conservation (DEC) convened a High Peaks Strategic Planning Advisory Group (HPAG), to address the problems and challenges in the High Peaks, which see increasing use, parking contention at trail heads and along roadsides, poor and heavily eroded trails and pressure on fragile ecosystems, including the state’s highest summits. Under the auspices of the DEC, this group will work for the next several months to develop a planning and management framework for use of the High Peaks and Giant Wilderness areas and the Route 73 corridor that runs from the Adirondack Northway to Lake Placid. Adirondack Wilderness Advocates is one of only three environmental advocacy organizations named to the HPAG. AWA has a strong perspective on this work. We are concerned that others are crying “overuse” and leading with solutions before the problems and challenges with visitor use are understood and measured. We believe science, data and planning need to come first, even as short term strategies are tried. Consistent with that, AWA has called for the following as part of our participation on the HPAG: - Use of a robust visitor management planning framework. We champion the Visitor Use Management Framework – VUMF – developed by the National Park Service and successfully used in the Northeast. - Actively including experts. The HPAG is a good start on involving a broad spectrum of interests, but much more expertise is needed, including in wilderness ecology, trail design, public safety, transportation, biology, other sciences and more. - Leading with education: AWA’s mission statement begins with knowledge, which is fundamental to addressing visitor use. The success of the Summit Steward program and the positive impact from trailhead stewards last season serve as excellent examples. - Engaging in an open, public process. The HPAG must not work in secret, but rather share meeting information freely and solicit public input. - Expanding remoteness and solitude. This is a core AWA value that we will continue pursue across the Park, including in the High Peaks. The bottom line is that the High Peaks need to be better protected as Wilderness. AWA will actively work to support your interests in protecting a magnificent, wild place. Link to the DEC web page and the meeting summaries http://www.dec.ny.gov/lands/119187.html Updates 10/08/20 Update- High Peaks Advisory Group Nearing a Final Recommendation We wanted to provide an update on the State of New York High Peaks Advisory Group (HPAG), convened to recommend a plan for managing the High Peaks region in the face of increasing use. AWA has served on the HPAG since it began at the end of 2019.. Those interests include: - ensuring Wilderness protection is the paramount requirement of any management plan - adoption of policies to enhance remoteness and solitude - trail assessment and an “all-in” approach to improving poor or damaged trails - development of a smart, green transportation strategy to provide better service to visitors and help alleviate parking and trail head pressures - increased visitor education - implementation of a robust on-line application to manage users, allow them to register for hikes and provide them with relevant information (AWA is developing such an app) - adoption of an adaptive management strategy organized around the concepts of Limits of Acceptable Change - use of a proven management framework such as the National Park Service’s Visitor Use Management Framework (VUMF: https://visitorusemanagement.nps.gov/VUM/Framework) - improved data modeling and collection - Decision-making based on upon science and data, not politics or anecdotal information. By and large these interests are prevailing in the work we are doing. As you would expect, the COVID-19 pandemic and New York State’s PAUSE program impacted our work. During the spring it caused us to refocus on short-term recommendations to ensure public safety, reduce the potential spread of the coronavirus and prepare for uncertain levels of visitation. This interim report of immediate recommendations was delivered to DEC Commissioner Basil Seggos in June (https://www.dec.ny.gov/docs/lands_forests_pdf/hpagintrmrpt.pdf). Since then we have continued to meet on-line every two weeks and are nearing our final, comprehensive recommendations, due in the late fall. While we cannot share details of our developing recommendation, we are confident that AWA’s interests and those of you, our supporters, will be well served. We’re excited by the direction we are heading. The key will be what the DEC does with the report. The State’s intentions have been sincere throughout this process and I commend their participation and willingness to let the stakeholder group lead. But the DEC has many priorities to meet, limited staff, and regulatory and statutory constraints within which they must operate. In addition, the State faces a massive budget crisis due to the pandemic and continuing Federal inaction. That means your activism and support will be critical in urging the State to adopt these recommendations under potentially dire circumstances. We must use our collective influence to ensure that the Adirondack Park gets the support that an irreplaceable, world-class treasure deserves, even more so in uncertain times. The final HPAG report will be the most significant and comprehensive recommendation for the High Peaks Wilderness in decades. It will serve as a model for how to approach preservation and management of the rest of the Adirondack Park. That means it will deserve your full attention. When it is released we will post an analysis of the recommendations, how they align with AWA’s interests, how they can be implemented and how you can help to make them happen. Wilderness-loving New Yorkers can and will make the difference in seeing these recommendations adopted. 2/12/20 Update As we approach mid-February and four meetings in, the High Peaks Advisory Group (HPAG) is hard at work looking at short, mid and long range strategies and a planning framework for managing the High Peaks Wilderness. So far in our work on the group we have been impressed with the positive, good faith effort being made by all parties to address the myriad issues we face. Real progress has been made on the specific interests for which AWA has been advocating. Among them: - Employ the Visitor Use Management Framework (VUMF) as the planning framework for the High Peaks A subgroup is evaluating the VUMF to recommend how it could be adopted for the group’s use. A decision on using the VUMF will probably be made at the next meeting. - Actively include outside experts as needed Outside expertise has been brought in on several issues. For example, we were able to bring in SUNY ESF Emeritus Professor Chad Dawson to consult on visitor information data gathering and surveying strategies. Another example is the evaluation and excellent draft report on recreational use in the Adirondack Park conducted by the Leave No Trace Center for Outdoor Ethics. Their draft findings have been released to the HPAG and are part of the discussion. - Advocate for an open process with opportunities for public input AWA voiced a strong interest in making sure the work of the HPAG was as open as possible and publicly available, including detailed summaries of every meeting and opportunities for public comment. The group agreed with this interest and the state has made meeting notes available and has a mechanism for public comment, here (http://www.dec.ny.gov/lands/119187.html). We expect the rest of February to produce a lot of progress towards AWA’s interests and will have another update soon.
https://adirondackwilderness.org/high-peaks-advisory-group/
This new teacher’s struggle (which many of us undoubtedly understand) can be informed by Kristin Neff’s cutting edge self-compassion research. In her book, she describes the three components of self-compassion: - Self-kindness—the ability to be gentle and accepting rather than harsh or critical with ourselves - Common humanity—the recognition that we are not alone in our suffering—and that we can feel connected to others in the world who feel similar pain - Mindfulness—the ability to be balanced, present and aware of our experiences (rather than exaggerating them or running from them) Self-compassion emphasizes acceptance while self-esteem relies on social comparison—being above average, distinctive and special. Regardless of this difference, Neff’s research findings indicate that individuals with high self-compassion and high self-esteem can actually experience similar benefits such as lower anxiety and depression as well as greater happiness, optimism, and positive emotions. However, unlike self-compassion, self-esteem has its downsides. In several of Neff’s studies, participants with low self-compassion and high self-esteem really struggled, in the moment, when their abilities were challenged and their egos were threatened in some way. For example, in one study, participants who reported high self-compassion experienced less anxiety than those with low self-compassion when asked to discuss their weaknesses in a mock interview. On the other hand, the participants reporting both high and low levels of self-esteem experienced similar levels of anxiety. Regardless of self-esteem level, they appeared to be uncomfortable discussing their shortcomings. In another study where participants were asked to imagine their reactions to potentially embarrassing situations (e.g., forgetting your lines in the middle of a play or being responsible for losing a big game), the more self-compassionate participants were less likely to feel humiliated and incompetent. Those with both low and high self-esteem, however, were significantly self-critical. Some individuals initially express discomfort with the idea of self-compassion, associating it with something like self-indulgence or self-pity, which it is not. Further research by Neff and Vonk revealed that people with high self-esteem were more likely to demonstrate narcissism than those with low self-esteem, while self-compassion levels didn’t correlate with narcissism at all. Bottom line, self-compassion is a good thing to practice—and it can be learned. (See Neff’s website for more information.) If we can 1) extend kindness to ourselves (e.g., telling ourselves “It’s okay” in those seemingly catastrophic moments), 2) remember that we aren’t alone in our struggles, and 3) practice a more balanced, non-judgmental, and accepting stance when we feel inadequate, we can begin to experience greater calm in our lives.
http://amyleva.com/why-self-compassion-is-more-important-than-self-esteem/
B. What is Restraining Labor Productivity Growth? C. How Does Firm Productivity Relate to Investment? D. How Important is Technology and Productivity Diffusion from the U.S. to Canada? 1. The strong cyclical upturn helped boost labor productivity growth in Canada last year.2 As oil prices stabilized and aggregate demand was boosted by accommodative monetary and fiscal policies, output growth rebounded strongly to 3 percent in 2017 (top among the G7). With output growth outpacing labor input growth, labor productivity also rebounded strongly to 1.7 percent. 2. Nonetheless, from a long-term perspective, Canada’s productivity remains much weaker than the leading G7 economies. OECD estimates of labor productivity (at constant purchasing power parity) suggest that Canada enjoyed the second highest productivity level after the U.S. in the 1970s. However, labor productivity has since grown more slowly in Canada than in other economies, and as a result, Canada has fallen behind France and Germany, and its productivity gap with the U.S. has widened from around 12 percent in the 1970s to 24 percent today. 3. Looking forward, an aging population will put a drag on growth in Canada. Statistics Canada projects that the share of working age population (ages 15–64) would fall from around 67–68 percent today to 60 percent in 2040 (under its medium-growth scenario). This implies that growth of the working age population would decelerate from 1 percent to less than 0.5 percent a year. Were labor productivity growth to stay the same (an average of 1.2 percent in 2010–17), GDP growth would decelerate to 1.7 percent a year, significantly below the average growth rate of 2.2 percent over the past one and a half decades. To reverse the negative implications of an aging population, Canada will need to boost labor productivity. Q1. What is restraining labor productivity growth? We look at labor productivity trends using a shift-share approach and growth accounting approach (Section B). Q2. How has firms’ productivity been associated with investment? We estimate markup measures as proxy for firm-level productivity and examine how markups are associated with business investment (Section C). Q3. How important is the technology and productivity diffusion channel from the U.S. to Canada? The U.S. is the most important trade partner for Canada. Many studies show that trade is an important channel for technology diffusion (IMF, 2017). We attempt to find the evidence of spillover effects from the U.S. to Canada (Section D). 5. The structure of Canadian industry has evolved markedly over the past decades. As in many other advanced economies, Canada’s industry structure has shifted towards the service sector, with the share of manufacturing industry halved from over 20 percent in the 1960s to about 10 percent today. Given that the growth of labor productivity in manufacturing industry has been much higher than most of other industries, its shrinking share could explain part of the long-term declining trend of labor productivity growth. 6. To analyze if aggregate productivity growth has been driven by specific sectors (“within effects”) or changes in the sector composition of employment (“shift effects”), we employ a shift-share decomposition analysis (see Box 1). We compare the pattern of labor productivity growth (excluding the public sector) in Canada with that in the U.S., and split the sample before and after 2000 when the stagnation of productivity growth became evident. The “within effects” contribution of the mining, oil and gas sector fell from 0.3 percentage points (annual average) in 1984–2000 to –0.1 percentage point in 2000–16 (Table 1). Similarly, the “within effects” contribution of the manufacturing sector decreased sharply from 0.5 percentage points in the first period to 0.2 percentage points in the second period. In both sectors, “shift effects” were small or negative, reflecting a decline in employment shares. In the U.S., the contribution of the mining, oil and gas sector and the manufacturing sector has also fallen, but less so than in Canada. Encouragingly, “shifts effects” have turned positive in Canada in 2000–16 (from -0.1 percentage points in the first period to 0.2 percentage points in the second period). This implies that more labor was allocated to sectors with higher labor productivity growth, contributing to higher aggregate-level productivity growth. 1/ Comparable US 2016 data not available. Sources: OECD Stat. and IMF staff calculations. Source: OECD and staff calculations. Note: Comparable US 2016 data not available. Total growth divided by period length shown. 7. Using growth accounting, we also ask whether the weakened productivity growth reflected multifactor productivity or capital accumulation. Growth accounting estimates by Statistics Canada show that the deceleration in labor productivity growth in the 2000s mainly reflected a decrease in multifactor productivity (in part due to the impact of the 2008–09 global financial crisis), while capital intensity (defined as capital stock per total hours worked) increased its positive contribution to overall labor productivity growth. Since 2010, multifactor productivity growth has recovered, but instead, capital intensity growth has slowed markedly, with its contribution to overall productivity growth halved. The decline in capital intensity growth was broad based: all industries (except for few industries, such as mining, oil and gas, and transportation) had lower capital intensity growth, with some (such as manufacturing, construction, retail and finance) incurring negative growth. 1/ The business sector, which includes the whole economy less public administration, non-profit institutions and the rental value owner-occupied dwellings. 2/ Growth in capital stock per total hours worked. 3/ Growth in the educational attainment and work experience of the labor force. Sources: Statistics Canada CANSIM 383–0021; and IMF staff calculations. 1/ The size of bubbles indicate the size of GDP. 8. Several factors could explain the slowdown in business investment growth. Among them, aggregate demand, financial constraints, and policy uncertainty are generally viewed as the most important drivers of the dynamics of business investment (see for example, IMF, 2015). In the aftermath of the global financial crisis, a recovery in economic activity in Canada’s trading partners (most importantly, the U.S.) was weak. Moreover, although U.S. economy finally began to gain momentum around 2014, global oil prices dropped sharply, hitting the Canadian economy. More recently, heighted trade tensions in the North America region may have contributed to dampening business investment. 9. We look at another possible factor: Canadian firms’ productivity. Because measuring productivity using micro firm-level data has some challenges (for example, due to the lack of data for firms’ output prices), we instead estimated firms’ markups (defined as price over marginal costs), following the empirical framework developed by De Loecker and Warzynski (2012). As well argued in De Loecker and Warzynski (2012), firms’ productivity and markups are closely associated, as productive firms tend to set higher markups.4 Due to data constraints, our analysis below focuses on markups for large Canadian (non-energy) firms using Worldscope database (see Appendix I for more detail). Note that energy firms are excluded from our analysis because we are mainly interested in the productivity trend in the non-energy sector. 10. We found some evidence of close correlations between markups and business investment in our sample data. It appears that markups and business investment are positively associated, but less so when markups are too high. This could suggest that highly profitable firms with too high markups might not be motivated to invest. Accordingly, positive relations between markups and business investment are not necessarily monotonic, but nonlinear. We test this hypothesis in the empirical analysis below. 11. Furthermore, consistent with firm-level data, some industry-level indicators suggest waning competitiveness of Canadian industries. Sources: U.S. Census Bureau; and Haver Analytics. 12. We estimate Tobin Q’s type investment models to examine whether these markup and industry competitiveness measures could be considered as part of business investment determinants. We embed markups and industry level competitive indicators, such as entry and exit rates and China’s import penetration rates, in a standard Tobin Q’s type investment model (Appendix II). The sample period is 1997–2016. The estimation methodology is OLS with fixed effects, and regression results are reported in Table 2. The coefficient on markups is positive and highly significant, indicating positive relations between markups and business investment (Model 1). The positive association is stronger for exporters than domestic firms (Model 2 and 3). For exporters, Model 2 suggests that a 10 percent increase in markup is associated with 0.6 percentage points increase in the investment to capital stock ratio for non-energy exporters. Evidence of nonlinearity. Model 4 (all firms) and Model 5 (exporters) show that the coefficient on the quadratic term of the markup variable is negative, indicating that if markup is too high, business investment would decline. This said, this result should be treated as tentative because the estimated coefficients are not statistically significant. Industry level competitiveness and business investment. The coefficient on the entry and exit rate is positive but not statistically significant (Model 6).7 We also tried FDI inflows (as a percent of GDP)—our hypothesis is that higher FDI inflows directly boost business investment but also indirectly by enhancing competition. But the estimated coefficient is nearly zero and not statistically significant (Model 7). We thus attempted to interact these two variables and found that the coefficient on the cross term is positive and highly significant. This would suggest that higher FDI combined with entry and exit rates are associated with higher business investment, possibly through positive competition effects (Model 8). Impact of China’s import penetration. In Model 9 (all firms), the coefficient on China’s important penetration is negative and highly significant: a one percentage point increase in China’s share in total U.S. imports led to a 0.2 percentage points decline in Canada’s investment ratio. This competition effect is more evident for exporters (Model 10) than for domestic producers (Model 11). 1/ Robust standard errors in parentheses, with ***, **, * indicating significance level at 1 percent, 5 percent, and 10 percent level, respectively. 13. R&D activity in Canada remains relatively weak, especially compared to that in the U.S. R&D stock in the U.S. was about 9 percent of GDP in the early 1970s, and has since increased to 17 percent of GDP in 2016, although the pace of growth has decelerated since the global financial crisis. In Canada, R&D stock was much lower, compared to the U.S., at about 3 percent of GDP in the early 1970s. R&D stock in Canada has since increased, but only to about 9½ percent of GDP by 2008, and has been flat over the past decade. 1/ R$D stock is defined as the stock of non-residential intellectual property products in the private sector (CANSIM 0310005). 1/ R$D stock is defined as the stock of non-residential intellectual property products in the private sector. 14. What about spillovers from the U.S. to Canada? Even though R&D stock in Canada remains lower than that in the U.S., Canada should have been benefitted from technology and knowledge spillover effects across its southern border, and such spillover effects may have been magnified as the economic ties between the two economies have become stronger since the Canada-United States Free Trade Agreement (1987) and North American Free Trade Agreement (1994). 15. We test productivity spillover channels from the U.S. to Canada. Using data from 10 Canadian provinces, labor productivity growth models are estimated (Appendix III).8 The sample period is from 1990 to 2015, and the annual data are averaged for five 5-year periods (a balanced panel data set). We are interested in long-term relationships and thus want to exclude cyclical effects arising from short-run business fluctuations. Our hypothesis is that labor productivity growth or real R&D expenditure in the U.S. would affect Canada’s productivity through trade channels. We calculated Weighti,j as Canadian province i’s total trade (=exports + imports) with U.S. state j as a percent of province i’s GDP, which is used to weight U.S. labor productivity growth or real R&D expenditure (as percent of employment) in each U.S. state. 16. The regression results are presented in Table 3. In Model 9, both simple average U.S. productivity growth and weighted U.S. productivity growth are included. The coefficient on the former turns to be insignificant, while the coefficient on the latter remains highly significant, which suggests evidence of the productivity spillover through trade channels. In Model 10, we also found similar evidence for R&D spending, with the coefficient on the weighted U.S. R&D spending greater than that on the simple U.S. R&D spending. However, these coefficients are not significant, suggesting that productivity spillover channels are more complex and factors beyond R&D and trade could matter. 1/ Robust standard errors in parentheses with ***, **, and * indicating significance level at 1 percent, 5 percent, and 10 percent, respectively. 17. Key empirical findings in this chapter are as follows. The recent slowdown in labor productivity growth can be explained mainly by a deceleration in capital intensity growth. Disaggregated analysis shows that the slowdown in capital intensity and labor productivity has been broad-based and not attributed to particular industries. The firm-level panel data analysis suggests positive relations between markups and business investment, together with some evidence of nonlinearity. We also found some evidence that lackluster business investment in recent years could also be associated with weakened firm dynamism (as reflected in lower entry and exit rate). We found evidence that is consistent with spillover effects from U.S. productivity or U.S. technology investment to Canada productivity through trade channels. 18. The Canadian authorities’ renewed efforts to boost labor productivity are welcome. The authorities are rightly focusing on measures to enhance innovation activity, given that spending on R&D and the density of industrial robots in Canada are much lower than top performers in OECD economies. 19. But more can be done to enhance investment, innovation, and the diffusion of new technologies. By analogy, although this chapter has not covered internal trade issues, our analysis suggests that reducing barriers to internal trade should also be important to enhance the diffusion of technology across Canadian provinces. The implementation of the Canadian Free Trade Agreement should be accelerated, aimed at reducing barriers to internal trade, investment, and labor mobility, and harmonizing regulations and standards. Another area that requires concerted efforts by all levels of jurisdiction is product market reform. OECD Study (2016) shows that Canada’s regulatory framework is relatively restrictive compared to other OECD economies (Table 4). There is apparently room to reduce barriers in professional, retail, and network services, and regulatory protection of incumbents by streamlining licensing and registration requirements. 1/ The 2013 questionnaire contains around 1,400 questions on economy-wide or industry-specific regulatory provisions. A bit more than 700 of the questions are used to compute the economy-wide PMR indicator and the NMR indicators on sector regulation.5 All of these questions are closed questions that can either be answered with numerical values (e.g. the number of bodies that need to be contacted to start a business) or by selecting an answer from a pre-defined set of menu (e.g. the question whether a specific regulation exists can be answered with ‘yes’ or ‘no’). The qualitative information is transformed into quantitative information by assigning a numerical value to each possible response to a given question The coded information is normalized over a zero to six scale, where a lower value reflects a more competition-friendly regulatory stance. 2/ “Green” indicates below the OECD average; and “pink” indicats above the OECD average. Aggregate productivity growth can be decomposed into growth of sectoral productivity, and gains from the reallocation of labor resource across sectors (Fagerberg, 2000 and Andersson, 2006). where sjt is the employment share of sector j at time t; labor productivity LPt is defined as gross value added per total hours worked (excluding the public sector). The first component measures the effect of labor productivity growth within each sector holding the employment share constant (“within effects”). The second component measures the impact on aggregate labor productivity growth resulting from the movement of labor across sectors holding the level of labor productivity in each sector constant (“shift effects”). Finally, the cross-sectoral component measures the effect of the change in both labor productivity and the employment share (“co-movement effects”). The positive sign of the cross-sectoral component indicates that the “within effects” and “shift effects” are complementary, thus labor resources are reallocated towards sectors with sectors with higher productivity growth. For both Canada and the U.S., we decompose aggregate productivity growth into key 6 sectors: agriculture, forestry, fishing, and hunting; mining, quarrying, and oil and gas; manufacturing; construction; utilities; and other sectors including services. where Pitl and rit are the prices of labor and capital respectively, Yit (·) is production technology, and Yit¯ is a scalar. Note that the Lagrangian parameter associated with the first-order condition can be interpreted as a direct measure of marginal cost (MC). We define the markup as the price for the output good over the marginal cost, which are both not observable. However, by solving the first order condition, we get a simple expression for the markup as following. where θitι the output elasticity of laborit and αitι is the share of expenditures on laborit in total net sales. 2. We can directly observe αitι , calculated as total wages divided by net sales, where total wages are calculated as the number of employees in each firm multiplied by the average industry- level wage. However, θitι is not directly observable and needs to be estimated. We estimated the following production function by industry (in logarithm). where ωit is the firm’s productivity, and at is idiosyncratic shock. The estimated coefficient β^ι is the output elasticity of labor input, θitι , which we can use for calculating markups. 3. However, in estimating this production function, there could be potential correlation between labor input and unobserved firm-specific shocks, ωit, leading to biased estimates. To solve this endogeneity problem, Olley and Pakes (1996) assume that the firm can observe productivity term ωit and adjust inputs depending on ωit. We can rewrite the production function as following. where ϕit(iit,kit) = β0 + βkcapitalstockit + ωit (investmentit, capitalstockit), and ηit is idiosyncratic shock. We approximate ϕit(.) with a second-order polynomial. The partially linear production function above can then be estimated by OLS. Since ϕit(.) controls for unobserved productivity, the error term is no longer correlated with the inputs. 4. In the Worldscope database, data for real output is not available, and thus we used “net sales” deflated by industry-level GDP deflators. All other nominal variables such as capital and investment are also deflated using industry-level deflators. Data for industry-level wages is from Statistics Canada. The sample period is 1997–2016 (annual data). Because we are interested in the productivity trend of non-energy firms, our sample dataset excludes energy firms. The output elasticity is estimated using industry-level panel data, and constant though the sample period. Ideally, time varying elasticities for each company could be estimated, but such data are not available. Thus, the up and down of this markup measures is purely driven by a change in labor shares (e.g., lower labor share means, higher θitX/αitX and thus higher markups). It is assumed that cost minimizing firms take wage setting as given, which may not always hold if firms’ wage setting is determined by their productivity levels. 1. We run firm-level panel regressions, using data from the Worldscope database for publicly traded Canadian companies. We restrict our sample to include non-financial firms (excluding energy firms). The sample period is from 1997 to 2016 (annual data), and the panel dataset is unbalanced. The following standard Tobin Q’s investment model is estimated. where i denotes a company, lit is fixed investment, Kit fixed capital stock, dt time fixed effect, ηi firm fixed effect, and vit idiosyncratic shock. MUit is a vector of firm level markups that we discussed in the previous section. Xit is a vector of determinants of investment, including return on assets (reflecting profitability), the effective interest rate on debt (reflecting cost of borrowing), U.S. output gap; and Tobin’s Q. Zit is a vector of market-level competitiveness variables, including firm entry and exit rates, foreign direct investment (FDI) inflows, and China’s import share in the United States (all at the industry level). Real effective exchange rate. In logarithm. Source, Haver Analytics. United States output gap. In percent. Source, IMF World Economic Outlook database. Entry and exit rates. Calculated as Number of Entrant+ExitsNumber of Active Employer Business×100% by industry. Source, CANSIM Table 527–0001. Foreign Direct Investment inflows. FDI inward inflows as a percent of GDP (constant terms) by industry. Source, CANSIM Table 376–0122. Share of Chinese imports in the United States. Calculated as U.S.imports from ChinaU.S.domestic GDP+U.S.imports−U.S.exports by industry. Trade data are from UN Comtrade; and U.S. industry GDP data are from the Bureau of Economic Analysis. where i, j, and t denote Canadian provinces, US states, and time, respectively; μi denotes an unobserved fixed effect capturing time-invariable heterogeneity across Canadian provinces; and εit∼IID(0,σg2) is a white-noise error term. 2. The dependent variable, ΔLPit, is labor productivity growth for each Canadian province. Explanatory variables are: ΔLPjtUS , labor productivity growth for each US state; ΔR&DjtUS real research and development expenditure per employee growth for each US state; and ΔXit, control variables including the initial level of labor productivity; the growth rate of interprovincial trade; the change in net migration inflows as a percent of population; and the rule of law index (a proxy for the quality of institutions). 3. We estimate the above equation using OLS with fixed-effects and the Generalized Method of Moments (GMM) estimator. Among various GMM estimators, we choose the difference GMM estimator from Arellano and Bond (1991), because it addresses problems related to inconsistent estimators due to variable endogeneity and a relatively short sample period combined with a fairly large cross section data (“small T, and large N”). We use as instrument the initial level of labor productivity. Canada productivity growth. Growth rate of real GDP divided by hours worked. Gross domestic product at market prices, chained 2007 comes from CANSIM Table 384–0038. Data for provincial GDP prior to 1980 were estimated using nominal GDP data (CANSIM Table 384–0015) divided by the GDP deflator for Canada. Actual hours worked (all Jobs, both sexes, 15 years and over) is from the Labor Force Survey. Exports and Imports as a percent of GDP. Canada nominal exports and imports from the US by province are from https://open.canada.ca/data/en/dataset?sort=metadata_modified+desc&q=CIMT&organization=statcan. Nominal GDP is from CANSIM Table 384–0038. Change in net-migration in provinces to population. Net migration is from CANSIM Table 051 -0018, and total population is from CANSIM Table 051–0001. Growth rate exports to other provinces. CANSIM TABLE 384–0038. Rule of Law. Worldwide Governance Indicators database, World Bank Group. U.S. productivity growth. Growth rate of real GDP divided by number of employees. GDP (chained 2009) by state is from Gross State Product database (Bureau of Economic Analysis). Number employed is from U.S. Regional Household Employment database (total U.S., states and selected areas). U.S. R & D per employee growth. Total R & D expenditure (constant PPP prices) is from OECD Statistics. Number employed is from U.S. Regional Household Employment database (total U.S., states and selected areas). AcemogluD.etal2017 “Innovation, Reallocation, and Growth” Becker Friedman Institute for Research in Economics Working Paper No. 21. AnderssonL. F.2006 “Firm Demography and Aggregate Productivity Growth” ITPS Swedish Institute for Growth Policy Studieswww.oecd.org/std/productivity-stats/37490582.pdf. ArellanoM. andS.Bond1991 “Some Test of Specification for Panel Data: Monte Carlo Evidence and an Application to Employment Equations” Review of Economic Studies Vol. 58. ArellanoM. andO.Bover. 1995 “Another Look at the Instrumental Variable Estimation of Error-components Models.” Journal of Econometrics Vol. 68. BailyM. N. andN.Montalbano2016 “Why is productivity growth so slow? Possible explanations and policy responses” Brookings Institutionhttps://www.brookings.edu/research/why-is-us-productivity-growth-so-slow-possible-explanations-and-policy-responses/. BarrowR. J. andJ.W.Lee2001 “International Data on Educational Attainment: Updates and Implications” Oxford Economic Papers Vol. 53 No. 3. BlalockG. andF.M.Veloso2007 “Imports, Productivity Growth, and Supply Chain Learning” World Development Vol. 35 Issue 7. BloomN.M.Draca andJ. V.Reenen2016 “Trade Induced Technical Change? The Impact of Chinese Imports on Innovation, IT and Productivity” The Review of Economic Studies Vol. 83 Issue 1. Canadian Chamber of Commerce2016 “Canada’s Top 10 Barriers to Competitiveness in 2016” http://www.chamber.ca/media/blog/160218-top-10-barriers-to-competitiveness-for-2016/. CaoS.M.SalamehM.Seki andP.St-Amant2017 “Trends in Firm Entry and New Entrepreneurship in Canada” Canadian Public Policies Vol. 43 Issue 3. De LoeckerJ. andJ.Eeckhout2017 “The Rise of Market Power and the Macroeconomic Implications” NBER Working Paper No. 23687. De LoeckerJ. andF.Warzynski2012 “Markups and Firm-Level Export Status” American Economic Review Vol. 102 No.6. FagerbergJ.2000 “Technological Progress, Structural Change and Productivity Growth: a Comparative Study” Structural Change and Economic Dynamics Vol. 11. Garcia-MaciaD.C.T.Hsieh andP.J.Klenow2018 “How Destructive is Innovation?” US Census Bureau Center for Economic Studies Paper No. CES-WP-17-04. International Monetary Fund2015 “World Economic Outlook: Private Investment: What’s the Hold Up?” April. International Monetary Fund2018 “World Economic Outlook: Is Productivity Growth Shared in a Globalized Economy?” April. IshiK. andR.Mariscal (forthcoming) “Estimating the Growth Effect of Public Infrastructure: Evidence from Canadian Provinces” IMF Working Paper. KellerW.2000 “Do Trade Patterns and Technology Flows Affect Productivity Growth?” The World Bank Economic Review Vol. 14 Issue 1. OlleyG. S. andA.Pakes1996 “The Dynamics of Productivity in the Telecommunications Equipment Industry” Economietrica Vol. 64 No.6. PeterssonB.R.Marisical andK.Ishi2018 “Women are Key for Future Growth: Evidence from Canada” IMF Working Paper WP/17/166. St-AmantP. andD.Tessier2018 “Firm Dynamics and Multifactor Productivity: An Empirical Exploration” March Bank of Canada Staff Working Paper 2018–15. Prepared by Jorge Alvarez, Yurani Arias Granada, Kotaro Ishi (all WHD); and Sanjana Goswami (University of California, Irvine). In this chapter, unless otherwise indicated, labor productivity is measured as output per total hours worked. There are many other channels to explain labor productivity. For example, using Canadian provincial data, Petersson et al (2017) present empirical evidence that an increase in female labor force participation is positively associated with labor productivity growth. Ishi and Mariscal (forthcoming) present some evidence that public investment in infrastructure could boost economic growth and complement private investment. Our focus on firms’ productivity and markups is in part motivated by some growing concerns that there are not so many globally competitive firms in Canada. For example, in the list of Fortune 500 (2017), only 11 Canadian firms made it to the list, of which 6 companies are from the financial or the energy sector. Many also argued that Canada’s cooperate sector is dominated by small-and medium-sized enterprises, which are less competitive and less capital intensive than big firms (Canadian Chamber of Commerce, 2016). See Cao et al (2017) and St-Amant, P., and D. Tessier (2018). Possible factors discussed in the literature are: increased industrial concentration, like the entry of a big retailer such as Walmart, which operates on a large and increasing scale, discouraging new entry; and less interest in entrepreneurship among highly educated young people. They estimated that two-thirds of the decline in Canada’s share of the U.S. non-energy import market (between 2002 and 2014) is attributable to reduced competitiveness, and 16 percent of the decline is attributable to changes in the composition of U.S. import demand. By sector, almost three-quarters of Canada’s total loss in market share was concentrated in two sectors: motor vehicles and parts (reflecting a reduction in U.S. demand for large cars) and forestry products and building and packaging materials (reflecting the collapse in the U.S. housing market). Entrants and incumbents can create new products and displace the products of competitors. How exactly the process of innovation works has been much debated since Schumpeter (1939). Most recently, Acemoglu et al (2017) argue that policies to encourage exit of less productive firms would help free up resources and improve economic growth and welfare. In contrast, Gracia-Macia, Hsieh, and Klenow (2018) show that innovation comes more from incumbents, using U.S. firm-level data. The 10 Canadian provinces are Alberta (AB), British Columbia (BC), Manitoba (MB), New Brunswick (NB), Nova Scotia (NS), Newfoundland and Labrador (NL), Ontario (ON), Prince Edward Island (PE), Quebec (QC), and Saskatchewan (SK). Trade and productivity linkages could arise through several channels. For example, Keller (2000) stresses the technology diffusion channel through intermediate goods imports from technological leaders, while Blalock and Veloso (2007) present evidence that vertical supply relationships are the channel through which import-driven technology transfer occurs. Bloom, Draca, and Reenen (2016) also show some evidence of import competition and technical advancement. Note that our GMM models do not fully take account of endogeneity problems arising from omitted variables. For example, Canada’s labor productivity could rise due to an increase in more competitive US imports, leading to exits of less productive Canadian firms. Foreign ownership is restricted in some sectors (e.g., network industry), and foreign suppliers may not be able to fully participate in public procurement contracts in selected sectors (e.g. transportation services, computer services, construction, telecom, and professional services).
https://www.elibrary.imf.org/abstract/IMF002/25353-9781484368398/25353-9781484368398/25353-9781484368398_A004.xml?rskey=IG8Tlf&amp;result=8
184 S.W.3d 686 (2005) W. Michael BYRD v. Mary Etta BYRD. Court of Appeals of Tennessee, Middle Section, at Nashville. January 4, 2005 Session. July 6, 2005. Permission to Appeal Denied February 21, 2006. Rehearing Denied March 27, 2006. *688 Jeffrey L. Levy, Nashville, Tennessee, for the appellant, W. Michael Byrd. *689 Mary Etta Byrd, Washington, D.C., Pro Se. Permission to Appeal Denied by Supreme Court February 21, 2006. FRANK G. CLEMENT, JR., J., delivered the opinion of the court, in which WILLIAM C. KOCH, JR., P.J., M.S., and WILLIAM B. CAIN, J., joined. OPINION Husband appeals the denial of his third petition to terminate or reduce his in futuro alimony obligations. He contends he is unable to work due to a medical disability, that Wife has experienced an increase in her earning capacity, and that she no longer has a need for alimony. He also contends that his current alimony obligation exceeds 50% of his income in violation of 15 U.S.C. § 1673. Finding the evidence preponderates in favor of a reduction of alimony, we modify the judgment and remand with instructions to reduce Husband's alimony in futuro obligation. We affirm the trial court in all other respects. W. Michael Byrd, M.D., and Mary Etta Byrd (Husband and Wife, respectively) were married for nineteen years. Wife was granted a divorce in August of 1990[1] on the grounds of cruel and inhuman treatment. Following a five-year long, bitterly contested divorce proceeding Wife was awarded $1,000 per month as alimony in futuro, and $1,000 per month in child support payments for their then 15-year old son.[2] The parties' affinity for protracted litigation did not end with their divorce.[3] The issues on appeal arise from Husband's third petition to terminate or reduce alimony. A review of some of the prior proceedings will aid in understanding the facts presently at issue. Husband's first petition to terminate or reduce alimony was filed pendente lite, in November of 1991, four years prior to the entry of the final order in the divorce proceedings.[4] The stated basis for Husband's first petition was his desire to pursue a master's degree at Harvard University, which he claimed would increase his earning capacity. He contended he would be required to cease his medical practice while attending graduate school. The trial court granted the petition and reduced alimony and child support to $500 each per month until September 1992.[5] That order, however, did not conclude the first petition to modify alimony. In April 1993, the trial court "reviewed" the status of the first petition for modification and restored the original $1,000 per month alimony obligation. This was based on findings that Husband had the ability to pay $1,000 per month and that Wife needed the support.[6] Husband was then endowed with both a medical degree and a master's degree and thus his earning capacity had been restored if not enhanced. Significantly, the trial court made a finding at that time that Husband was voluntarily underemployed, in an attempt to avoid or minimize his duty to pay alimony and child support, and that Husband's petition to reduce the alimony and child support was not in good faith. *690 Husband filed a second petition to terminate or reduce alimony in 1996. He contended that he had suffered severe health problems since the original alimony award and that his medical condition prevented him from obtaining gainful employment. The trial court denied the second petition based upon a finding that Husband failed to carry his burden of proof. Husband appealed. This court affirmed, finding Husband had the ability to pay $1,000 per month and that Wife still had a need for such support. The petition now at issue, Husband's third, was filed in 2001. He contends that his medical condition has deteriorated since the 1996 petition. He provided proof that he had undergone open heart surgery in 2000. He also testified that the heart surgery had contributed to the further deterioration of his health and greatly impaired his earning capacity. Husband contended that he was incapable of earning income, except for infrequent speaking engagements. He also testified that he had established his weakened medical state to the satisfaction of the Social Security Administration. He receives a disability benefit of $15,600 per annum. Husband testified that his disability benefits are his only income. Husband also presented expert medical proof. J. Jacques Carter, M.D. testified on his behalf via deposition. Husband also presented evidence that Wife had a job, working as an executive assistant to the president of the Village Foundation in Alexandria, Virginia, earning $65,000 in 2001. Wife, however, countered explaining that her $65,000 a year employment terminated and that she was unable to find similar compensation. She further testified she could not find employment for months.[7] With the exception of her employment with Village Foundation, for which she was handsomely compensated for a period of time, Wife's annual compensation since her divorce has ranged between $22,000, her compensation at the time of the previous petition to modify, and $28,000, her present compensation at the filing of this petition. Following an evidentiary hearing, the trial court denied the petition based upon findings that Husband's health had improved since the open heart surgery and that his health problems were manageable. The trial court further found that Husband was voluntarily unemployed and that he had an earning capacity sufficient to justify an alimony obligation of $1,000 per month. In the order from which this appeal lies, the trial court stated: The petition for termination of alimony or reduction thereof is most respectfully denied and the petition is hereby dismissed. . . . The Court finds although Dr. Byrd has had health problems they are manageable and have improved since his surgery. He can and must produce enough income to meet his alimony obligation. He continues to hold down his income in an effort to avoid this Court's order. He now relies on his present wife's six figure income to meet the expenses he desires to pay. The Court further finds the former wife, Mary Etta Byrd has a need for the alimony at the rate of one thousand dollars ($1,000.00) per month as of the trial of this cause and she must further supplement the same by finding employment to pay her total expenses. Further, this Court has reviewed all the evidence presented at the trial and has reviewed Dr. Byrd's present medical history through the deposition of Dr. J. *691 Jacques Carter and finds his health has improved. The Court concludes Dr. Byrd continues to set upon a course to defeat the alimony order of this Court. The Court finds he has the ability to pay said amount and his former wife has a continuing need for this assistance. STANDARD OF REVIEW The standard of review of a trial court's findings of fact is de novo and we presume that the findings of fact are correct unless the preponderance of the evidence is otherwise. Tenn. R.App. P. 13(d); Rawlings v. John Hancock Mut. Life Ins. Co., 78 S.W.3d 291, 296 (Tenn.Ct.App. 2001). For the evidence to preponderate against a trial court's finding of fact, it must support another finding of fact with greater convincing effect. Walker v. Sidney Gilreath & Assocs., 40 S.W.3d 66, 71 (Tenn.Ct.App.2000); The Realty Shop, Inc. v. RR. Westminster Holding, Inc., 7 S.W.3d 581, 596 (Tenn.Ct.App.1999). Where the trial court does not make findings of fact, there is no presumption of correctness and we "must conduct our own independent review of the record to determine where the preponderance of the evidence lies." Brooks v. Brooks, 992 S.W.2d 403, 405 (Tenn.1999). We also give great weight to a trial court's determinations of credibility of witnesses. In re Estate of Walton, 950 S.W.2d 956, 959 (Tenn.1997); B & G Constr., Inc. v. Polk, 37 S.W.3d 462, 465 (Tenn.Ct.App.2000). Issues of law are reviewed de novo with no presumption of correctness. Nelson v. Wal-Mart Stores, Inc., 8 S.W.3d 625, 628 (Tenn.1999). ALIMONY Modifications of alimony may be granted only upon a showing of substantial and material change in circumstances since entry of the original support order. Tenn. Code Ann. § 36-5-101(a)(1). A change is considered substantial when it significantly affects either the obligor's ability to pay or obligee's need for support. Bogan v. Bogan, 60 S.W.3d 721, 728 (Tenn.2001); Watters v. Watters, 22 S.W.3d 817, 821 (Tenn. Ct.App.1999). A change is considered material if the change occurred since the original support decree's entry. Even a substantial and material change of circumstances does not automatically result in a modification. Bogan, 60 S.W.3d at 730. Modification must also be justified under the factors relevant to an initial award of alimony, particularly the receiving spouse's need and the paying spouse's ability to pay. Id. Where there has been such a change in circumstances, the ability of the obligor spouse to provide support must be given equal consideration to the obligee spouse's need. Id. Generally, the party seeking the modification bears the burden of proving the modification is warranted. Freeman v. Freeman, 147 S.W.3d 234, 239 (Tenn.Ct.App.2003). It is clear that willful and voluntary unemployment or underemployment will not provide a basis for modifying spousal support. Watters, 22 S.W.3d at 823. When called upon to determine whether a person is willfully and voluntarily unemployed or underemployed, the courts must consider the person's past and present employment, as well as the reasons for the unemployment or the taking of a lower paying job. Id. If the decision for unemployment or for taking a lower paying job is reasonable, the court will not find the person to be willfully and voluntarily underemployed. Willis v. Willis, 62 S.W.3d 735, 738 (Tenn.Ct.App.2001). Courts have confronted situations in which a divorced spouse seeks to avoid an alimony obligation by quitting work or by taking a lower paying job. Walker v. Walker, M2002-02786-COA-R3-CV, 2005 WL *692 229847 (Tenn.Ct.App. Jan.28, 2005). To remedy this strategy, a spouse's support obligation should not be measured by his actual income, but rather by his earning capacity. Tenn.Code Ann. § 36-5-101(d)(1)(E)(i) (2005). The trial court concluded that Husband was voluntarily unemployed because he does not want to pay alimony. We agree with this conclusion. However, we are unable to agree that Husband's alimony obligation should not be reduced. While Husband's motives and credibility are suspect, as the trial court noted, his petition to reduce alimony is supported by uncontroverted medical proof provided in the deposition of Dr. Carter that his earning capacity is diminished due to a deterioration of his medical condition. The most significant facts provided in Dr. Carter's testimony are the following: An echocardiography report dated June 20, 2000 was significantly worse, showing deterioration of the left-hand side of the heart — "it's not pumping well"; the right-hand side of the heart is still functionally depressed, although not as bad as it had been; husband has a major embolus (blood clot) to his lungs that led to a significant right-heart failure; he is in a frequent weakened condition; he sleeps a lot, has little endurance and suffers from several illnesses; he will not be able to do any work that requires physical endurance; he must rest several times during the day, and without this rest, his "two or three hours awake at a time" would not be very productive; he cannot drive; he cannot walk more than one-quarter block without sitting and resting; he can only be without oxygen for a limited amount of time. The significance of the foregoing findings by Dr. Carter are ameliorated by the following additional findings by Dr. Carter: with pulmonary rehabilitation, his breathing may improve slightly; he can lecture but not on a full-time or day-to-day basis; and he cannot practice as an OB-GYN on a full-time basis. We read these findings by Dr. Carter to mean that Husband is impaired, he cannot work on a full-time basis, but he can work.[8] As a medical doctor, Husband's services are valuable, even in an impaired physical condition. Thus, Husband has an earning capacity; it is merely less than it would be if he were able to work full time, whether in an OB-GYN practice or as a lecturer. The evidence in the record shows that Husband has authored two books and has been compensated for such efforts with royalties. He has also been retained for speaking engagements for which he has been compensated. While Husband may no longer be able to practice medicine in the same manner and be compensated as before, he is economically empowered by a medical degree, thus he has an earning capacity. Willful and voluntary unemployment or underemployment will not provide a basis for modifying spousal support. Watters, 22 S.W.3d at 823. Rather than using his medical education to earn income, Husband has voluntarily chosen to rely on Social Security disability payments and support provided by his current wife. Husband's voluntary unemployment does not exempt him from his obligations; to the contrary, his obligation should be measured not by his actual income but by his earning capacity. See Tenn.Code Ann. § 36-5-101(d)(1)(E)(i). We therefore find *693 that the evidence does not preponderate against the trial court's finding that Husband is voluntarily unemployed. Therefore, Husband's alimony obligation should not be terminated but should be modified based on his ability to pay and Wife's need. The second component in an alimony analysis is need, that being whether and to what extent the recipient of alimony needs such support. Bogan, 60 S.W.3d at 730. Husband contends that Wife's earning capacity is now $65,000, instead of $22,000, which was her rate of compensation as of the previous petition to modify alimony. Wife, however, has explained that her $65,000 a year employment was short lived and she has been unable to find similar compensation. In fact, she has not found employment providing a salary equal to one-half of that amount. With the exception of her work for the Village Foundation, Wife's annual compensation has not exceeded $28,000 per annum. Evidence that Wife was temporarily employed at a higher income is a factor to be considered along with all other relevant factors. However, Wife's temporary employment at a higher pay scale should not be the only factor. Her increased income was short lived and she has been unable to find other employment at half the compensation. Based on these factors, we find that Wife's present need is not as great as before; however, she still has a need for support. Husband's earning capacity has been reduced by the deterioration of his physical condition and Wife's need is not as great as before. Therefore, Husband's alimony in futuro obligation is reduced to $350 per month, retroactive to the filing of the petition at issue. ATTORNEY'S FEES Lastly, Husband appeals the trial court's award of $3,500 attorney's fees to Wife. The trial court is given wide discretion in awarding attorney's fees and expenses. Threadgill v. Threadgill, 740 S.W.2d 419, 426 (Tenn.App.1987). This court will not interfere with the trial court's award unless there is an abuse of discretion. Id. While Husband's petition to reduce alimony is partly successful, it does not preclude him from paying attorney's fees. Husband brought this action and Wife employed counsel at the trial level to defend the action. We find that the trial court did not abuse its discretion, and thus affirm the assessment of Wife's attorney's fees against Husband. CONCLUSION The judgment of the trial court is therefore reversed and this matter is remanded with instructions to set Husband's alimony obligation at $350 per month, with such modification retroactive to the filing of the petition at issue. We affirm the award of attorneys fees to Appellee. Appellee was not represented by counsel on appeal; therefore, she did not incur such fees on appeal and there are none to award. Costs of appeal are assessed against the appellant, Dr. W. Michael Byrd. NOTES [1] The divorce was granted in 1990 but the divorce proceedings continued until the division of marital property and final order was entered in September of 1996. [2] The child is now emancipated and child support is not at issue. [3] Both Husband and Wife are frequent filers of petitions for contempt and to modify. [4] He sought a temporary termination or reduction in alimony and child support. [5] The September 1992 date coincided with Husband's expected graduation from graduate school. [6] Wife was also awarded reasonable attorney's fees in the amount of $3,500.00. [7] Wife collected unemployment compensation for several months while looking for work. [8] We are mindful that Husband was approved for Social Security disability status in 1997 and that he has received disability payments since that date. In 2002, Husband received $16,044.00 in Social Security payments after medical insurance deductions. This however does not preclude this court from finding that he has an earning capacity and is voluntarily unemployed.
If you want Maria Rejt, Macmillan and Picador publishing director and one of the most respected editors in London, to notice your manuscript it is simple: create a unique outsider’s voice and characters that move her. Not as easy as it sounds, but that formula is what makes a script shine out like a ‘little golden nugget in the Yukon River’ from the mountain of scripts that clutter up her impossibly untidy office near King’s Cross. ‘I am always asked what am I look for, and there are obvious answers like: what is selling at the moment,’ she explains, name-checking some star performers – C J Sansom, Kate Moreton, Sue Grafton. But most important is a unique voice that instantly engages. In a world where publishers seem to slavishly follow the market, aspiring authors often feel confused by repeated demands for a ‘unique voices.’ Rejt attempts to illuminate: ‘What moved me about Kate’s first book was the awesome respect she showed old people. I thought, “Why is it that I am so moved?” And I realised it is because it doesn’t happen that often. That respect and love for her older characters spoke to me. That is the voice.’ Subject matters too: ‘It is also what the voice is speaking to you about.’ Sansom’s debut, Dissolution, made an impact because it was ‘this most amazingly constructed and written moral crime novel.’ His Tudor ‘tec stories may sound like Brother Cadfael in ruffs, but, Rejt explains, hunchbacked lawyer Matthew Shardlake is unique. He engages and develops, not only within each book, but across the series. Shardlake, like Colin Dexter’s Morse, had something else that made Rejt respond. ‘If I try and analyse what makes me make the decision to go with an author, there is one common thread: whether it is a literary book or a commercial book, it’s always about an outsider.’ So what’s the attraction? ‘I think the best criticism comes from that perspective. It is very lonely and isolated place to be but it is one that we have to respect.’ It is a perspective that suits Rejt. Her wry observations about everything from the state of feminism to misery memoirs are refreshing in an industry dominated by suits unwilling or unable to voice an opinion. It is easy to see why her authors, who also include Minette Walters and Charlotte Mendelson, are fiercely loyal. ‘She is a fantastic editor,’ enthuses Walters. ‘You want to give her your best as a writer.’ The commitment is mutual. Rejt is not interested in pouncing on the fresh meat of ‘stunning debuts’ in the way her rivals do, like wolves going one fresh kill to another. She is wary of over-priced first novels, regarding them as a short-term career move that reflect the neophile culture of the wider media rather than the quality of the books being marketed ‘If your ambitions as a new author are to make a big splash with your first book and then not be too bothered about your career as a writer, then obviously go for the money,’ she warns. ‘But if you feel that you want to grow as a writer and learn and mature and be in it for the long game, then you go for less money but a longer commitment – a multiple book deal.’ She winces when I mention the rapidity with which some authors are dropped after they fail to live up to their advances: ‘I prefer to publish an author over their entire career.’ This ambition explains her glee at her publisher role at Macmillan. While passionate about shaping an author’s work for publication, she also relishes strategic planning, whether it’s deciding when to publish or which book to back as their breakthrough to the A-List. ‘It’s like doing a Rubik’s Cube,’ she says of the challenge. Her nose for the market is legendary. She famously launched Kathy Reichs in January, at a time when it was regarded as a deadzone. Rejt realised the crime author would have the market to herself. Her rivals watched in awe as the book sailed up the charts – and promptly followed her lead. Given her ability to read the market, what is she tipping as the Next Big Thing? ‘I know some people are saying the Western is coming back and that the horror novel is about to be big, but I would like to make a personal pitch for the ghost story.’ She cites her friend Kate Mosse’s success with Sepulchre – ‘one of the best set piece openings I have read. It’s just brilliant.’ What she will not publish are the gorefests of writers like Karin Slaughter and Mo Hayder, or the grinding anguish of misery memoirists. ‘If [violence and sexual abuse] is used as a tool for entertainment, I have problems with that, I really do,’ she says of the increasingly explicit abuse that features in some books. ‘The longer you are on this planet, the more misery you have seen the less you want to exploit it.’ As long as Rejt’s instincts for finding nuggets in the Yukon last, it is unlikely she will have to be forced to compromise.
http://www.danutakean.eu/blog/uncategorized/the-insider-maria-rejt-2/
It’s common these days to hear frequent warnings about the dangers of a sedentary lifestyle. For most of the population, these warnings are needed, as we are, as a whole, moving less than ever before. However, on the flip side, there is another portion of the population that is taking these warnings too seriously. While there are plenty of people who aren’t exercising at all, there is also a significant number of people who are exercising too much. In the same way that insufficient exercise can set you up for a number of health problems, overtraining comes with its own negative side effects, including irregular heart rhythms, chronic inflammation, weakened bones, and an increased risk of developing intestinal hyperpermeability (also known as leaky gut). So, how do you figure out if you’re exercising too much? Read on to learn about ten common signs of overtraining. From time to time, everyone has days when they’d rather not go to the gym. But, if you feel like you’re dragging yourself through your workouts every single day, this could be a sign that you need to take a break and let your body rest. Another lesser-known sign of overtraining is being chronically thirsty, no matter how much water you’re drinking. When you over exercise, your body often ends up in a chronically catabolic state. This means it’s beginning to consume its own muscle in order to get sufficient protein. This leeches water from your muscles and leaves you dehydrated. It’s normal to feel a little sore for one or two days after a difficult workout. But, if you’re still feeling sore on Thursday from Monday’s workout, you could be overdoing it. Extended soreness is a sign that your muscles are not recovering properly, which means that you’re not going to see positive results from your strength and muscle-building efforts. While regular, moderate exercise can help improve sleep quality, over-exercising can have the opposite effect. This is especially true if you’re exercising in the evenings. A tough workout shortly before bed can leave you feeling wired and unable to fall asleep. Moderate exercise is good for mental health, but overtraining can negatively affect your mood in the same way that it can negatively affect your sleep. Overtraining often stems from poor body image and a need to “fix” certain aspects of one’s physique. It’s easy to become obsessed with what you see in the mirror and feel a compulsive need to train. And, when you don’t see the results you’re looking for right away, you might feel frustrated or depressed. If you’re overtraining and not giving your body sufficient fuel, you’re likely to feel chronically hungry throughout the day. It’s important to take a step back and make sure you’re eating enough to give yourself the energy you need to get through your workouts. Are you always coming down with colds? Feeling chronically ill is a sign that you’re overtraining and are no longer living a healthy, balanced lifestyle. When you’re in a continuous catabolic state, your immunity decreases and your chances of getting sick increase. Are you struggling to keep up with assignments at work or in school? Do you regularly experience “brain fog” throughout the day? This could be a sign that you’re doing too much in the gym (especially if you’re not eating enough calories on top of overtraining). If you’re not fueling your body sufficiently and you’re placing significant demands on it in the gym, you’re not going to have enough energy left over for all the other tasks you need to accomplish. Are you getting hurt more often? Are you constantly taping or bracing your ankle? Or, do you have an old injury that’s acting up? Frequent injuries are a sign that your body is in a weakened state and is not recovering properly from your workouts. Most people workout to lose weight or maintain their current physique. If the opposite is happening for you and you’re either gaining weight or have stopped seeing the number of the scale decrease, it’s important to take a look at the amount of exercise you’re doing. While, in some cases, a plateau or weight loss regression is a sign that you need to increase the intensity of your workouts, it can also indicate the opposite. Overtraining often leads to chronic inflammation and water retention, which will make you look and feel “puffy” or bloated and will lead to a higher number on the scale. Overtraining can also disrupt your hormones and cause chronically elevated cortisol levels. When your cortisol is too high for too long, your body may start to store fat and become resistant to your weight loss efforts. If you’re experiencing any of these symptoms, there’s a very good chance that you could be overtraining. But, what can you do about it? How often should you actually be working out? There’s no one-size-fits-all plan when it comes to training frequency. But, as a general rule, most people can see results from limiting themselves to 2-3 strength training sessions per week paired with moderate cardiovascular activity (walking, jogging, swimming, etc.). If you enjoy going to workout classes like spin or kickboxing, try to only go once or twice a week. These intense classes are fun, and it’s great if they get you moving, but it’s easy to overdo them. Keep these basic guidelines in mind as you start to give yourself a little more rest. Pair them with better sleep and possibly an increase in calories and you’ll be feeling better before you know it!
http://www.iemiller.net/overtraining-ten-signs-need-scale-back-workouts/
Purdue Owl How to put 3 questions in one sentence? When you list three things, do you use a comma? Rule 1. Use commas to separate words and groups of words in a simple series of three or more items. Example: My estate goes to my husband, my son, my daughter-in-law and my nephew. Note: When the last comma in a series precedes and or or (after the daughter-in-law in the example above), it is called the Oxford comma. How do you use commas in Purdue? Commas Quick Guide Use a comma before to indicate the beginning of the pause and one at the end to indicate the end of the pause. Do not use commas to delimit essential parts of the sentence, such as clauses beginning with this (relative clauses). That clauses after nouns are always essential. How do you use a Purdue Colon? Use a colon after an independent clause when it is followed by a list, quotation, appositive, or other ideas directly related to the independent clause. Purdue Owl How to Put 3 Questions in One Sentence – Related Questions What is a simple sentence example? A simple sentence has the most basic elements that make it a sentence: a subject, a verb, and a full thought. Here are examples of simple sentences: Joe waited for the train. The train was late. What is the rule for articles in a series? COMMA RULE #1 – THE COMMA IN A SERIES: Use commas to separate items in a series. What is a “series”? A “series” is a list of 3 or more elements, the last two of which are joined by and, or, or neither. What are examples of semicolons? Examples of semicolons: Joan likes eggs; not Jennifer. The cat slept through the storm; the dog curled up under the bed. Semicolons are also used in a sentence when something stronger than a comma is needed. Is the comma a symbol? Punctuation marks are symbols used to aid clarity and understanding of written language. Some common punctuation marks are period, comma, question mark, exclamation mark, apostrophe, quotation mark, and hyphen. Which is or is it? In a definition clause, use this. In non-definitive clauses, use which. Remember, that’s as disposable as a sandwich bag. If you can remove the clause without destroying the meaning of the sentence, the clause is not essential and you can use which one. Why use a semicolon instead of a comma? Use a semicolon to replace a comma when using a coordinating conjunction to link independent clauses that already contain commas. In this example, the use of a semicolon makes it easier to read the two independent clauses on either side of the coordinating conjunction: Correct: My dog is sick. What does a smiley with a semicolon mean? Typically, a colon is used for the eyes of a face, unless it’s winking, in which case a semicolon is used. The symbols for the mouth vary, for example “)” for a smiling face or “(” for a sad face. When to use a colon or a semicolon? Semicolons should introduce some proof or reason for the preceding statement; for example, this sentence appropriately uses a semicolon. A colon, on the other hand, should be used for a stronger and more direct relationship. It should provide emphasis, an example, or an explanation. What do you call a very short sentence? A simple sentence is constructed from the minimum of a subject and a main verb. It can be very short, but it doesn’t have to be. There are several reasons to use simple sentences. What type of sentence? declarative sentence (utterance) interrogative sentence (question) imperative sentence (command) exclamatory sentence (exclamation) What is needed for a simple sentence? A simple sentence contains a subject and a verb, and it can also have an object and modifiers. However, it contains only one independent clause. What does a simple sentence look like? A simple sentence contains a single independent clause. An independent clause is a group of words that has a subject and a verb and can stand on its own as a complete thought. These types of sentences have only one independent clause and do not contain any subordinate clauses. Should I put a comma before and ? 1. Use a comma before any coordinating conjunction (and, but, for, or, nor, then, again) that connects two independent clauses. Do commas always go after because? Because is a subordinating conjunction, which means that it joins a subordinate clause to an independent clause; good style dictates that there is no comma between these two clauses. There should generally be no comma between the two. Michael went to the forest, because he loves walking among the trees. Can you put a comma after and? The word and is a conjunction, and when a conjunction joins two independent clauses, you must use a comma with it. The correct place for the comma is before the conjunction. On Monday we will see the Eiffel Tower and on Tuesday we will visit the Louvre. How to list more than 3 things in a sentence? An Oxford comma is a comma used before the last list item in a list of three or more items. When there are three or more list items, those following “American convention” should use a comma (often called an Oxford comma) with the conjunction (usually “and” or “or”). What is a word in a series? The elements of a series can be single words or sentences. Also, the elements of a series can be short sentences connected by commas and and. How to use semicolons in a list? Use a semicolon between items in a list or series if any of the items contain commas. There are basically two ways to write: with a pen or pencil, which is inexpensive and readily available; or by computer and printer, which is more expensive but quick and neat. What are semicolons and examples for? A semicolon can be used between independent clauses joined by a connector, such as and, but, or, nor, etc., when one or more commas appear in the first clause. Example: When I’m done here, and I will soon, I’ll be happy to help you; and that’s a promise I’ll keep. How can I check my grammar online? Online Editor – Grammar Checker. Enter the text you want to check for grammar, spelling, and punctuation errors; then click the gray button below. Click on the underlined words for a list of suitable alternatives, suggestions and explanations. Which is used in grammar? We also use which to introduce a relative clause when it refers to a clause or an entire sentence: it seemed more talkative than usual, because it was nervous. People think I sit around drinking coffee all day. Which I do, of course.
https://mypetszone.com/purdue-owl-how-to-put-3-questions-in-one-sentence/
How do you realign cervical vertebrae? Contents How do you realign cervical vertebrae? So, what should you do to promote proper neck curvature? - Have a chiropractor check you for neck bone misalignment. - Keep your head directly above your shoulders. - Limit your electronic usage, such as taking time away from your phone, laptop, or notebook. - Perform Bruegger’s Maneuver (also known as Bruegger’s Exercise). What happens when C5 is out of alignment? Cervical C5 Vertebrae Those with misalignments can experience issues ranging from sore throat to laryngitis to certain skin problems. The nerves in your C5 affect your dermatomes, areas of skin that indicate nerve root pathways, allowing for bicep, elbow and shoulder movement. How do you correct a misaligned vertebrae? Misalignment is often corrected with spinal fusion surgery. During this procedure, the spine is fused in a correct position with screws and rods. Can cervical vertebrae move out of place? Spondylolisthesis is where one of the bones in your spine, known as a vertebra, slips out of position. It’s most common in the lower back, but it can also happen in the mid to upper back or at the top of the spine at the back of your neck. How can I realign my neck and spine at home? Tilt your whole body with your hands as well. Neck tilts: Grab the top of your head with your right hand. Slowly pull your head to the right, allowing the left side of your neck to stretch for 20 to 25 seconds. Repeat the same motion to the left side with the opposite hand. How can I realign my spine at home? Keep your posture in mind, even if you’re taking it easy. - Moving regularly is key! Don’t sit for too long, even in an ergonomic office chair. - Keep both of your feet flat on the floor. Consider a footrest if necessary. - Keep your back aligned against the back of your chair. Avoid leaning forward or slouching. What happens when a vertebrae is out of place? A vertebra slips out of place onto the vertebra below. It may put pressure on a nerve, which could cause lower back pain or leg pain.
https://www.mexico-insights.com/how-do-you-realign-cervical-vertebrae/
RESEARCHERS AT NUI Maynooth have been given €2.3m of funding for a major five-year project which will analyse how software and technology can influence life in a city. Professor Rob Kitchin, director of the National Institute of Regional and Spatial Analysis at NUI, will lead the research which will focus on two cities: Dublin and Boston in the US. Boston is ranked number one on a global index of ‘smart’ cities while Dublin is a key tech hub in Europe and is home to IBM’s Smarter Cities Technology Centre. Some of the questions Kitchin will be considering include how such digital data is collected and processed, how software can influence how we live our lives in cities and how we work and behave. The research is being funded by a five-year ERC (European Reaserch Council) grant. The president of NUI Maynooth, Professor Philip Nolan, congratulated Kitchin on the award saying that the research was “significant” and would analyse a previously unchartered area which is becoming “hugely relevant as technology becomes more influential in our lives”. The project will conduct an in-depth analysis of how policy and governance is codified in algorithms, how data are about citizens and places are collected and processed, how software and digital sensors are increasingly being embedded into everyday environments, and how new digital technologies are being used to routinely tackle everyday issues. A good example is shopping and how retail companies are using software and data about products, staff and customers to organise complex supply chains of goods, to monitor stock levels, to process payments, to manage staff, to profile shoppers, to work out what sells best where and to whom, and where to put new stores. As well as auditing data, the study will conduct interviews with those involved in the all aspects of technology creation, implementation and operation in urban areas, analyse policy and company documents and create what Prof Kitchin calls “algorithm archaeology”, as a tool to measure the impact of such technology. Email “Dublin to be studied in its capacity as a 'smart city'”. Feedback on “Dublin to be studied in its capacity as a 'smart city'”.
https://www.thejournal.ie/smart-city-dublin-study-maynooth-765748-Jan2013/
This unit combines current events with traditional math skills, and uses open-ended math questions for constructed response, challenging students' writing and problem solving skills. - Grades: 6–8 Overview Constructed response writing and performance events are designed to keep pace with changes in assessment. Constructed response questions require students to supply, rather than select, an appropriate response. Also referred to as open-ended response, constructed response usually supports more than a one-solution process and a wider range of possible responses. Performance events, requiring students to apply skills, also support a multi-solution process. This unit combines knowledge of current events with traditional math skills, culminating in a fun performance event that allows students to create their own solutions to the problem. Objective Students will: - Explore cause and effect in relation to gas prices. - Analyze information on a pie chart. - Working within defined parameters; develop a budget for a trip. - Estimate distances and costs. - Substantiate appropriate methods of calculations. - Create an appropriate constructed response. Lesson Plans for this Unit Lesson 1: Interpreting Pie Charts Lesson 2: Budgeting for a Trip Lesson 3: Writing Constructed Responses Culminating Activity Have students design travel brochures showcasing their itineraries. These can feature real photos, prices, maps, charts. Display them after they have been presented to the class. Supporting Books Professional Resources 16 Writing Lessons to Prepare Students for the State Assessment by Mary Lynn Woods Targeted lessons to improve test scores. Classroom Tip: Use these effective lessons to practice content area writing techniques. 50 Graphic Organizers for Reading, Writing & More: Reproducible Templates, Student Samples, and Strategies to Support Every Learner by Karen Bromley, Marcia Modlo, Linda Irwin-DeVitis Creative graphics to organize writing in all content areas. Classroom Tip: From note taking to presentations, this handy resource will help students prepare for writing assignments. Practice, Practice, Practice! Word Problems by Gary Robert Muschla Ready to use, language-oriented math problems in a variety of skills. Classroom Tip: Use this book to reinforce lessons through independent practice. Writing in Math Class by Marilyn Burns Explores writing across the curriculum to assist in math instruction and assessment. Classroom Tip: Offers insight in how children learn mathematics, includes best practices. Writing to Prompts in the Trait-Based Classroom: Content Areas by Carol Avery, Amanda Wheeler Builds writing proficiency for test taking Classroom Tip: Use this book to increase student confidence in content knowledge and test taking skills. Handy Books for Classroom Activities All Around the United States These wall maps and great activities will encourage mapping skills. Classroom Tip: Use the activities as great icebreakers to peak student interest in map skills. Scholastic Atlas of the United States by David Rubel This nonfiction book is an exciting presentation of the 50 states with detailed maps and facts. Classroom Tip: I encourage students to use this book to gather in-depth data on the states. The United States of America: A State-by-State Guide by Millie Miller and Cyndi Nelson This book contains everything you need to know about the 50 states, plus interesting trivia. Classroom Tip: A great source for plotting the trip activities in Lesson Two! - Part of Collection:
http://www2.scholastic.com/teachers/lesson-plan/creative-writing-math-classroom
(covers information from several alternate timelines) Blindness was the condition of lacking visual perception due to physiological or psychological factors. There are varying degrees of blindness, ranging from minor visual impairment to total loss of eyesight. Causes of blindness Most visual impairments are caused by disease and malnutrition, though blindness could also be caused by various abnormalities, injuries, genetic defects and poisoning. Temporary vision loss could also be a side effect of some vaccinations. (Star Trek) - Genetic defects – Geordi La Forge was born blind due to a birth defect - Physiology – Some species, like the Aenar, were born blind - Injury – Martok's eyesight was impaired when he lost an eye in a battle with Ikat'ika - Magnetic fields – Prolonged exposure of humanoids to the intense magnetic fields on Galorndon Core resulted in synaptic breakdown, which rendered La Forge blind even though his VISOR worked perfectly. (TNG: "The Enemy") - Other intense energy – Tuvok was blinded by a detonating chroniton torpedo in an alternate timeline. (VOY: "Year of Hell") - Spock was rendered temporarily blind after intense light was used to destroy a flying parasite infection, his sight saved only due to his inner eyelids. (TOS: "Operation -- Annihilate!") - Dukat was temporarily blinded by a burst of energy released from the Book of the Kosst Amojan by the Pah-wraiths. (DS9: "When It Rains...", "What You Leave Behind") - Leonard McCoy asked James T. Kirk whether he was trying to go blind after the captain admitted in 2263 of the alternate reality that he was downing the last of the Saurian brandy they'd picked up on Thasus. (Star Trek Beyond) Attitudes towards blindness On Earth, the practice of institutionalizing the blind in asylums had a history extending back into the 9th century, and it was not until the 18th century that authorities created schools where blind children, particularly those more privileged, could obtain an education in specialized settings. Despite the negative connotations associated with blindness, many blind Humans throughout history led rich lives despite their handicap, including the famous poets Homer and John Milton, artist Claude Monet, and musician Stevie Wonder. (TNG: "A Matter of Time") Romulans killed children who were born with blindness or other such defects. When La Forge told Bochra that he had been born blind, he asked incredulously "And your parents let you live?", stating that the Human race was weak because "You waste time and resources on defective children." (TNG: "The Enemy") On some planets, genetic engineering was utilized to ensure that blindness is a condition of the past. On Moab IV, someone with such a disability would have been terminated as a fertilized egg. (TNG: "The Masterpiece Society") Adaptive technologies for the blind - A sensor web was a garment of finely woven sensor units, typically utilized by the blind during the 23rd century. The web could be worn naturally over everyday clothing, and emitted low-level sonar scans undetectable to the Human senses. The web then translated the return signals into media perceptible by the trained wearer. Dr. Miranda Jones wore such a web which she used, along with her telepathic prowess, to hide her blindness from others. (TOS: "Is There in Truth No Beauty?") - The VISOR was an external medical device used in the Federation to aid patients who had suffered loss of eyesight. The VISOR detected electromagnetic signals across the entire EM spectrum, and transmitted those signals to the brain through neural implants in the temples of the individual via delta-compressed wavelengths. Geordi La Forge, born blind, was given a VISOR after his fifth birthday. (TNG: "Hero Worship") - Ocular implants were internal, surgically-implanted medical devices which replaced or enhanced the eyesight of an individual. Geordi La Forge received ocular implants in 2373, which eliminated his need for an external VISOR. The Borg also utilized ocular implants as enhancements for their drones. (Star Trek: First Contact; VOY: "The Gift", "Unimatrix Zero") - The tactile interface was a feature of 24th century LCARS panels, which altered the normally flat panels (intended to be read) so that beings with visual impairments could use the consoles. (VOY: "Year of Hell, Part II") Blind species - Aenar, intelligent beings native to the planet Andoria, were completely blind, though they had highly-evolved telepathic abilities that largely compensated for it. - The Tiberian bat was a blind, winged mammal.
https://memory-alpha.fandom.com/wiki/Blindness
What is Hepatitis? Hepatitis is a type of liver inflammation that can be caused due to several factors including infections, medicines, alcohol, immune system abnormalities, or a lack of blood supply to the liver. The liver is a vital organ in the body that performs a variety of functions including detoxification, energy storage, and blood coagulation control. Hepatitis can affect these liver functions and can cause scarring or fibrosis inside the liver. Many viruses can infect the liver, but viral hepatitis refers to inflammation of the liver caused by one of several viruses that particularly attack the liver. These viruses are denoted by the letters A, B, C, D, and E. The most common viruses in the United States are viral hepatitis A, B, and C. Onlymyhealth editorial team spoke to Dr. Manish Kak, Consultant Gastroenterologist, Manipal Hospital, Ghaziabad, to know about the treatment of viral hepatitis. How is Viral Hepatitis transmitted? Viral hepatitis A and E enter the body through the gastrointestinal tract. These viruses are contracted by consuming food or drinking fluids contaminated with the virus, which is commonly found in the stool of an infected individual. Hepatitis A can also be transmitted in overcrowded places, such as day care centres and penal facilities, by eating raw shellfish from sewage-contaminated water, or by sexual (typically anal-oral) contact. Hepatitis E, albeit related to hepatitis A, is uncommon in the United States. This virus is mostly found in the Indian subcontinent and certain areas of Africa. It is primarily spread through fecal-oral contamination (as mentioned above). Hepatitis B and C viruses are typically spread by contact with infected blood or blood products, as well as through sexual interaction. In the United States, intravenous drug use is the most common mode of hepatitis C transmission. Heterosexual transmission of hepatitis C is uncommon, although males having sex with men is becoming more widely recognised as a risk factor for hepatitis C transmission. Hepatitis B is widely spread sexually as well as through intravenous drug use, and it can even be conveyed from a mother to her foetus during delivery. Hepatitis D (also known as Delta hepatitis) affects only people who are infected with hepatitis B. Hepatitis D is transmitted in the same way as hepatitis B is. Also read: Hepatitis B: Types, Symptoms, Diagnosis And Treatment What is Acute Viral Hepatitis and what are its symptoms and consequences? Acute viral hepatitis is defined as liver inflammation accompanied by symptoms and abnormalities in liver enzymes that last less than six months. All of the viruses described above are capable of causing acute hepatitis. Acute viral hepatitis symptoms can include a low-grade fever, headaches, muscle pains, weariness, loss of appetite, nausea, vomiting, diarrhoea, dark-colored urine, or light-colored faeces. Jaundice, a yellow colouring of the skin and the whites of the eyes, is the most noticeable symptom of acute viral hepatitis. Patients frequently report vague upper abdominal pain. Very few individuals with acute viral hepatitis develop liver failure, which necessitates liver transplantation or results in death. However, if a person is infected with hepatitis E during pregnancy, it might have serious consequences. With the exception of patients infected with hepatitis C, most cases of acute viral hepatitis recover on their own. More than 80% of people with hepatitis C will develop a chronic infection called chronic hepatitis. Although most people with acute hepatitis B will recover, a considerable number of newborns and young children will acquire chronic hepatitis B. What is Chronic Hepatitis? What are its consequences? Chronic viral hepatitis is defined as persistent inflammation and/or abnormalities in liver enzymes that last for more than six months. Unless treated, most persons with chronic hepatitis will have the condition for the rest of their lives. In the United States, chronic viral hepatitis is mostly limited to hepatitis B and C. Chronic viral hepatitis can lead to progressive liver disease, including cirrhosis and its consequences, liver failure, liver cancer, and bleeding disorders, however many people never experience any of these symptoms. Furthermore, chronic hepatitis may be increased in those who use liver-toxic medicines. Most of these problems can be avoided with early detection and treatment, and in the case of hepatitis B, immunisation can prevent acute infection in the event of exposure. Also read: Follow These 5 Vital Tips To Keep Hepatitis C At Bay How is Viral Hepatitis diagnosed? Simple blood tests can easily diagnose viral hepatitis (both acute and chronic). While a liver sample (called a biopsy) is not always necessary, it can be useful in difficult-to-diagnose situations or when deciding on treatment based on the degree of the liver scarring. How is Viral Hepatitis treated? - Acute viral hepatitis does not usually require treatment because most individuals recover on their own. Acute hepatitis C is a notable exception, as only 15% of patients will clear the virus on their own, and the majority of people will acquire chronic hepatitis C if not treated. Furthermore, when patients are treated during the acute hepatitis infection stage, there is a very high cure rate. - Chronic hepatitis therapies are available for the most common causes of chronic hepatitis, hepatitis B and C. Medication that inhibits the virus's capacity to proliferate and replicate is commonly used to treat chronic hepatitis B. These drugs include both oral and injectable treatments. Injectable pegylated interferons and oral drugs known as directly acting antivirals (DAAs) are approved for the treatment of chronic hepatitis B. These DAAs have almost no side effects and are the mainstay of therapy. There is presently no medicine available that will totally eradicate the body of the hepatitis B virus (cure). These drugs keep the virus under control but do not totally eliminate it. - Treatment duration can range from one year for pegylated interferon to possibly indefinite for oral DAAs. Scientists are working on treatments that will entirely remove the virus and achieve what is known as a functional cure.
https://www.onlymyhealth.com/viral-hepatitis-treatment-expert-tips-1648629689
INTRODUCTION: There are different views and definition of multiculturalism; the definition of multiculturalism depends on the context in which it is used. In sociology, multiculturalism is the idea that various cultures exist in a society and all these cultures deserve equal treatment (Macionis, 2010). Sociologists believe that members of different cultures can live peacefully alongside each other and assimilation is not necessary; but this does not happen in all multicultural societies. This essay will place emphasis on both the positive aspects and the main tensions that arise in a multicultural society. SAMPLE BACKGROUND – HISTORY OF MULTICULTURALISM IN BRITAIN Britain today has many ...view middle of the document... The first group of immigrants, who started the process of multiculturalism, arrived in Britain on the Empire Windrush in 1948. Most of these immigrants were from the Caribbean and did not intend to stay in Britain for more than a few years, but eventually did. POSITIVE ASPECTS The diversity of cultures has played a significant role in shaping the cultural landscape. When people live together in a community, communication is unavoidable and communication involves sharing ideas and perspectives, creating a body of collectively acceptable principles and policies, therefore, leading to a more innovative, creative and prosperous society. According to professor Bhikhu Parekh (2006), multiculturalism is “about intercultural fusion in which a culture borrows bits of others and creatively transforms both itself and them". One culture might be influenced by the beliefs and practices of another, so they borrow what they find valuable and enrich and broaden it, and this also helps to build common bonds between the two cultures. The various skills or ideas obtained from another group can be used in various areas of life: Communities educate each other, provided that none is too overbearing and self righteous to welcome criticism. They also represent different talents, skills, forms of imagination, forms of social organization, and psychological and moral energies, all of which constitute a most valuable resource which can be fruitfully harnessed in various areas of life such as sports, business, management, creative arts, industry and government (Parekh, 2006:168). Multiculturalism is an important constituent of human freedom. If individuals do not have access to other cultures but theirs alone, they remain confined to it and imagine it to be the only natural way to understand and organize human life (Parekh, 2006). Furthermore, diversity of cultures creates awareness to the diversity within one’s culture. Individuals or communities acknowledge that their culture is a product of various influences, contains different ‘strands of thoughts’, therefore, encouraging internal debate within the culture and creating a space for critical and independent thoughts (Parekh, 2006). NEGATIVE EFFECTS Like every other thing, multiculturalism has its negative aspects as well. After...
https://brightkite.com/essay-on/effects-of-multiculticulturalism
The City of Alameda’s holiday light display is powered with renewable energy and uses energy-efficient light-emitting diode (LED) lights, the City said today. The Alameda Recreation and Parks Department worked with city-owned Alameda Municipal Power to make the display more environmentally friendly this year, according to a City of Alameda press release; the lights are powered with renewable energy from wind and solar sources. And the new LED lights are said to use up to 90 percent less energy than traditional incandescent bulbs and last up to 10 times longer. The display will be turned on this coming Saturday during the Mayor’s Tree Lighting Ceremony at City Hall.
http://www.action-alameda-news.com/2012/11/26/city-greens-holiday-display/
On the afternoon of November 13, 2017 local time, Premier Li Keqiang attended the 20th China-ASEAN (10+1) Leaders' Meeting at the Philippine International Convention Center. Leaders from the ten ASEAN countries attended the meeting. Li Keqiang co-hosted the meeting with President Rodrigo Duterte of the Philippines. Li Keqiang said in his speech that this year marks the 50th anniversary of the establishment of ASEAN, and China is pleased with the ASEAN's development and progress and full of confidence in ASEAN's future prospects. China firmly supports the construction of ASEAN community, supports ASEAN's central role in regional cooperation, backs ASEAN in playing a greater role in international and regional affairs, and always takes ASEAN as a priority in its neighborhood diplomacy. China sticks to be a good neighbor, a good friend and a good partner with ASEAN through thick and thin and caring and helping each other, so as to jointly establish a community of common destiny featuring common ideals, common prosperity, and common responsibility. Li Keqiang pointed out that the 19th National Congress of the Communist Party of China held recently made a strategic plan and grand goals for China's development from now on to the middle of this century, which will create more opportunities and vast space for cooperation between China and other countries all over the world. Li Keqiang made five suggestions to further elevate China-ASEAN relations to new highs in the future: First, jointly plan the development vision of China-ASEAN relations. We should formulate "2030 Vision for China-ASEAN Strategic Partnership", upgrade "2+7 Cooperation Framework" to "3+X Cooperation Framework", and build a new cooperation framework that takes the three pillars including political security, economy and trade as well as people-to-people and cultural exchanges as the mainline and with multi-field cooperation as the support. Second, advance the docking of the "Belt and Road" initiative with ASEAN's development strategies. We should uphold the principle of extensive consultation, joint contribution and shared benefits, enhance the docking of the "Belt and Road" initiative with the Master Plan on ASEAN Connectivity 2025 (MPAC 2025), and deepen all-round cooperation in such fields as economy and trade, finance, infrastructure, regulation and personnel. Third, steadily strengthen bilateral cooperation in political security. We should intensify close high-level exchanges, strengthen policy communication and dialogue, deepen cooperation in political security, enhance mutual understanding and trust, and reinforce cooperation in judicial affairs, fighting transnational crimes, counter-terrorism, cyber security and other non-traditional security areas. Fourth, further tighten the bond of economic and trade cooperation. We hope that all ASEAN countries will approve the upgraded version of the China-ASEAN Free Trade Area as soon as possible, so that the upgrading results of the FTA will benefit both sides. We should actively promote the negotiations of Regional Comprehensive Economic Partnership to lay the foundation for constructing the East Asia Economic Community. We should push forward the implementation of major projects in international production capacity cooperation. China is willing to intensify its cooperation with ASEAN countries in the financial field during the process of RMB internationalization. Fifth, continuously improve the level of people-to-people and cultural exchanges and cooperation and elevate China-ASEAN tourism cooperation to a new level. China will provide the ten ASEAN countries with no fewer than 20,000 Chinese government scholarships in the coming three years. China proposes to carry out the "China-ASEAN Talents Development Plan", provides ASEAN with 3,000 study offers in China in 2018, and strengthens capacity building cooperation in fields of economy and trade, agriculture, science, education, culture, health care, public management, and transportation between both sides. China agrees to set 2018 as the "China-ASEAN Year of Innovation", and is willing to arrange 500 person-time ASEAN young scientists to go to China for a short period of scientific research work in the next 5 years, train 1,200 person-time ASEAN scientific and technical as well as management personnel, and put 10 joint laboratories into operation, so as to guide comprehensive innovation cooperation of both sides with scientific and technological innovation. Li Keqiang stressed that China proposes this meeting to officially announce the launch of the next consultation paper on the Code of Conduct in the South China Sea (COC). Present leaders of ASEAN countries said that ASEAN-China relations have maintained a strong, stable and mutually beneficial development momentum and become one of the most substantial diplomatic partnerships with ASEAN. Over the past year, exchanges and cooperation between the two sides in the fields of economy and trade, and people-to-people and cultural engagement have achieved fruitful results again. It is believed that this leaders' meeting will chart the course for the future development of bilateral relations. ASEAN spoke positively of the two sides officially launching the next consultation paper on the COC, which reflects the current positive trend of stability in the South China Sea and consensus of the two sides being committed to maintaining regional peace and stability. The meeting adopted outcome documents such as the Joint Statement between China and ASEAN on Further Deepening Cooperation in Infrastructure Connectivity, the Joint Statement between China and ASEAN on Comprehensively Strengthening Effective Anti-corruption Cooperation, the Joint statement on China-ASEAN Tourism Cooperation, and the Declaration for a Decade of Coastal and Marine Environmental Protection in the South China Sea (2017-2027). Li Keqiang and leaders from the ten ASEAN countries and dialogue partners also jointly attended the commemorative activities marking the 50th anniversary of the establishment of ASEAN held on the evening of November 12 and the opening ceremony of the series of Leaders' Meetings on East Asia Cooperation held on the morning of November 13.
https://www.fmprc.gov.cn/mfa_eng/zxxx_662805/t1510689.shtml
I teach nurses and have done so now for the past ten years. I wish I could remember everyone I have taught but I remember quite a few. I taught Cathy and her class mates a total of four classes, including the very first class and the very last nursing class of the program. I was also happy to teach them Holistic Nursing, my very favorite course...actually my passion. I remember that Cathy was a nervous wreck, as usual, the day of her presentation, which happened to fall on "Bring Your Child To Work Day". And now, out of the blue, one of Cathy's daughters remembered me and asked to interview me for a high school paper on Holistic Medicine. I am delighted to have registered in this beautiful young mind. Karlee's questions were thought provoking and I greatly enjoyed the opportunity. I thought I would take the time to share my responses with you as well. We never know the impressions we make on others... never stop sharing your gifts and your passions with each other, young and old. Hello, thank you so much for taking the time to answer these questions for me. We have met before, but for a brief introduction when you taught my Mom. I am Karlee and I am doing my research paper on holistic medicine. The answers could be as minimal or thorough as you please. Q: Have you ever experienced any type of bias toward holistic approaches? If so, can you give some examples? A: Yes. As a nurse and as a teacher of nurses, I have encountered many experiences of bias towards holistic approaches. A key facet of holistic health is self care. I find in general, as a society, we are quite resistant to caring for ourselves...eating properly, getting enough opportunities for exercise each week, keeping the stress 'down to a low roar', having fun along life's way...! Then one day, we get sick or have a catastrophic accident...and the stress and injury and trauma is even more compounded. If we are fortunate, this happens once...and not to others in our life that we love as well. Needless to say, those who are resistant or biased towards a holistic lifestyle will have a much harder road to travel. There is no magical pill or surgery for handling life stressors or chronic illness. I once taught a male nurse who argued vehemently that he would never be a holistic nurse. He thought it was "ridiculous and demeaning". Throughout the 5-week class, I saw a compassionate man reveal many therapeutic interactions and a gifted use of humor with oncology patients. In his evaluation, he apologized to me saying he would not have wanted to teach himself. I have used this nurse countless times in my classroom as an example of the kind of nurse I want to care for me, whether he considers himself holistic or not. I once cared for an elderly diabetic patient in the community who resisted taking insulin. Although the idea of holistic nutrition was akin to worship of the devil, she was willing to introduce cinnamon to her diet every day. It actually worked to the point that she didn't need medicine. That was a beautiful mind - body - spirit connection! Q: Do you yourself practice holism? If so, in what ways? A: Yes. I am fortunate to teach Holistic Health so I am always keeping current in the latest literature and research, along with my nursing students. I believe in "practicing what I preach" so I am an avid believer in self care. I think that stress is constantly trying to invade my / our life / lives. Much of my self care focuses on decreasing my stress and focusing on the positive elements in my life. I use holistic nutrition, music, aroma therapy, journaling / creative writing, walking (with my 'Baby'/ pet therapy), and water therapy (as much as I can/ weather permitting). Cognitive therapy and imagery are two strategies I call upon when feeling especially negative or stressed. Q: Which, out of all holistic practices, do you consider to be the most effective? A: Without a doubt, guided imagery... This sounds complex? From children in abusive situations to soldiers in combat to any one of us being inconvenienced while sitting in rush hour traffic, we all have the power to take our minds to a happy, peaceful place... for as long as we need to. Our mind - body - spirit connection allows us to get through the horrors / traumas / inconveniences of the present as we place our minds and our senses into an environment that we create, free of harm...beautiful, tranquil and healing. This is a practice that is life saving. And with or without training, it can kick in... I know, it happened to me. Q: Do you feel that the public accepts holistic approaches for its deserved values? With similar awareness, we are all capable of applying holistic strategies to our daily lives. It helps when our nurses accept and introduce holistic practices to us, whether at the physician's office or in casual conversations. Q: Is getting people to understand the aspects of holism difficult due to bias perceptions? A: With a respectful and open - minded approach, most people are receptive to at least learning about holistic strategies. Initially some folks generalize holism as 'voodoo' and need an overview of the mind - body - spirit connection to get past that mindset. Q: Do you consider holistic approaches traditional or modern? A: I believe that most holistic approaches originate from our traditional roots ...as far back as Buddha in practices like Reiki and Florence Nightengale in basic principles of a therapeutic environment and the healing powers of touch. There have been modern variations through the years, such as Zumba. Q: Do you consider holistic approaches strictly scientific, philosophical or both? A: My instant association with holism is the mind - body - spirit connection. As such, my answer to this question is 'both'. That being said, a fair amount of holistic research and literature tends to be qualitative / descriptive (philosophical) versus quantitative / measurable (scientific). Q: Do you believe that holistic treatments should be offered to the public in greater ways, such as through health care? A: Absolutely. In no way am I saying that holistic treatments will totally take the place of conventional (allopathic) therapies. However, as complementary approaches, holistic treatments are of essential benefit in all stages of preventive health care. In primary prevention, we are keeping as healthy as possible. Holistic nutrition, a regular exercise program and being conscious of our stress levels are key. After diagnosis, in tertiary care,ideally an individualized treatment program will be developed balancing holistic and medical approaches. Yoga classes need to be given the same credibility as a medication prescription in the eyes of insurance companies. Q: Who are the most frequent users of holistic practices? I take a walk on a Farm Park Road which I consider a holistic practice. On that walk, I might encounter: a young mother biking with her baby in a basket; a male jogger going up a hill at a pretty good clip; an elderly Chinese woman picking dandelions in the field with her grandchild; a middle aged couple walking their dog; two older buddies fishing in the pond; and a team of youngsters playing softball in the field. Q: What do you believe are good ways to expand holistic accessibility to the public? A: I believe the first step to any expansion is awareness. I think it is awesome that you are exploring this issue in high school. I think our youth has an amazing power base to influence general awareness of the benefits of holistic health. You are our future. You all have a long road ahead. You need to keep healthy and this is a challenge in today's world. If there are natural ways to keep ourselves feeling better and living longer, then we all need to be on board with this...including our politicians and legislators. Q: What impact would allowing holistic approaches have on society if they were to be furthered? If you would like to leave any personal comments on holistic medicine that was not established in a question, feel free to leave them. Thank you again for taking the time to answer these questions for me. It is greatly appreciated! When we take responsibility for our self care, we start to see the need to care for our Mother (Earth). This is without doubt one of the most touching and amazing interviews ever written. How lovely to see your student-led approach in teaching come to fruition in this way. What a beautiful thing for Cathy to see her work with her daughter culminate in such a respectful and admiring way. There is so much in this post that has affected me very powerfully, because it is what I believe too. I will read again very carefully, and know I will have to comment more than once, as I analyse the depth of it. Many thanks to all three if you - we have to include Cathy in this! Thank you, dear Vicki. Your feedback means the world, as I hope you know. Come back as often as you like...I love when you stop by for tea. Hello Maria, What a richness of philosophy that is displayed here. Your Holistic ideals are being taught so that many can carry the knowledge forward. Not everything is fixed with a pill and you have learned this lesson personally. Your position as a nurse and instructor puts you in a good place to foster this idea for future nurses. You are so generous in your remarks and support to me. Thank you for taking the time to stop by. This is a very interesting interview, and since I am a RN and believe in holistic nursing it was a perfect topic for me. I am glad to know holistic nursing is being taught now as it surely wasn't back when I became a nurse. I marvel at our similarities each time you comment! I believe part of the reason I love teaching Holistic Nursing is because I was "not" taught it 30 - years ago. And, wow, would it have come in handy (LOL)! I loved this article and think people of all ages can benefit from reading it so I shared it on Facebook. Like Maria, I am a nurse (although I'm now retired), but I still learned a lot from this article. I thought Karlee's questions were very well written and Maria's answers helped me see that many people already practice holistic methods without even realizing they are doing so. It was great to see someone in high school taking an interest in this topic and I hope Karlee helps spread the word about living a holistic lifestyle to her friends and others of her generation. Thanks for your beautiful and detailed comment. Thanks so much for sharing this. I know Karlee appreciates it as well.
https://www.marcoujor.com/mars-desk/marcoujor-you-never-know
How long does Dfeh have to investigate a complaint? 1 year How many steps are in the OSHA accident investigation process? OSHA created this Guide to help employers conduct workplace incident investigations using a four-step systems approach. This process is supported by an Incident Investigation Form, found in Appendix A, which employers can use to be sure all details of the incident investigation are covered. What is the first safety step you should take before an investigation? Before any investigation begins, first be sure to: Provide first aid for any injured person, Control the hazard(s) to prevent further injury, and. Secure the scene. What are examples of near misses? Examples of Near-Misses - An employee trips on the loose edge of a rug that they couldn’t see because of the poor corridor lighting. They manage to steady themselves by grabbing a bookcase. - A customer in a busy restaurant spills their drink onto the floor. - An employee in a large warehouse is walking down an aisle. What is accident and incident investigation? Accident/Incident investigation and analysis is a means used to prevent future accidents by determining root cause. As such, the investigation or analysis must produce information leading to corrective actions to prevent or reduce the number of accidents in the workplace. What are 3 types of incidents? 3 Types of Incidents You Must Be Prepared to Deal With - Major Incidents. Large-scale incidents may not come up too often, but when they do hit, organizations need to be prepared to deal with them quickly and efficiently. - Repetitive Incidents. Some incidents just keep coming up, regardless of what you do to resolve them. - Complex Incidents. Why should Near Misses be investigated? A near-miss incident should be investigated to determine how it happened, what caused it to happen and how it can be prevented in the future. Any weaknesses in the system should be identified and hazards should be removed. How do you tell if you are being investigated? You may receive a subpoena or a target letter. This is evidence that you’re under criminal investigation. If no one has contacted you yet, you could ask a private investigator to check criminal databases. Investigators would have clearances that help them access records not available to the public. Are HR investigations confidential? Employers Can Ask for Confidentiality in Open Investigations Once Again. However, a recent National Labor Relations Board (NLRB) ruling has reversed and held that workplace rules that require employees to keep pending workplace investigations confidential are generally legal. What are the steps in an investigation? The following steps should be taken as soon as the employer receives a verbal or written complaint. - Step 1: Ensure Confidentiality. - Step 2: Provide Interim Protection. - Step 3: Select the investigator. - Step 4: Create a Plan for the Investigation. - Step 5: Develop Interview Questions. - Step 6: Conduct Interviews. How many near misses should be reported? A Near Miss is an unplanned event that did not result in an injury or property damage, but had the potential to do so. Given a slight shift in time or position, damage or injury easily could have occurred. Such incidents are estimated to occur at a rate of 50 near-misses for each injury reported. What are some common components of an investigation kit? what are some common components of an investigation kit?… - they only informally identify sequences of events. - they only informally identify causes. - the investigation reveals the obvious direct causes and misses the underlying root causes. - root causes are identified and corrected. What happens after an investigation meeting at work? After an investigation, the employer might find there’s no evidence to carry on with the disciplinary or grievance procedure. If the employer finds there’s an issue that cannot be resolved informally, they should carry on with the procedure for either: discipline: the disciplinary hearing. Can you resign if under investigation? If an employee gives notice of their resignation… However, if the disciplinary process determines that the employee has committed an act of gross misconduct, such as theft, physical violence, gross negligence or serious insubordination, they can be summarily dismissed (in other words, dismissed without notice). Is asking a coworker on a date harassment? In most situations, being asked on a date by a coworker is not sexual harassment. Of course, if the coworker or supervisor continues to request a date, makes other unwanted advances toward you, or hints that accepting or declining the date could affect your job standing then it may constitute sexual harassment. Should near misses be reported? In addition to internal reporting, near misses classed as “dangerous occurrences” must be reported to the HSE under the Reporting of Injuries, Diseases and Dangerous Occurrences Regulations (RIDDOR) 2013. The HSE encourages internal recording and investigation of “non-reportable near misses”. What is the difference between EEOC and DFEH? The EEOC is the federal civil rights agency that enforces federal civil rights law. The DFEH is the state civil rights agency that enforces California civil rights law. EEOC only accepts complaints if the employer has 15 or more employees. DFEH accepts complaints if the employer has 5 or more employees. What is the first key stage in any accident investigation? The steps to conducting an effective accident investigation are: Provide first aid and/or medical care to the injured persons and take action to prevent further injury or damage. This is the first priority. Report the accident as required by your company’s policies. Which incidents must be reported and investigated? Section 24 incidents that should be reported and investigated include the following types of incidents: When a person dies….When lives were endangered by: - Dangerous spilled substances. - Uncontrolled release of a substance under pressure. - Flying, falling, uncontrolled moving object. - Machinery that ran out of control. What are the 3 factors that cause accidents? Cause factors can be grouped into the following categories: - human factors/personnel error. - malfunction or failure of aircraft structures, engines, or other systems. - deficient maintenance. - hazardous environment involving weather, volcanic ash, birds, etc. - air traffic management errors. - any combination of the above. What are the 5 Whys of root cause analysis? Five whys (or 5 whys) is an iterative interrogative technique used to explore the cause-and-effect relationships underlying a particular problem. The primary goal of the technique is to determine the root cause of a defect or problem by repeating the question “Why?”. Each answer forms the basis of the next question. What is limited confidentiality harassment? Employers can only promise limited confidentiality – that the information will be limited to those who “need to know.” An investigator cannot promise complete confidentiality because it may be necessary to disclose information obtained during the investigation in order to complete the investigation and take appropriate … What are the three levels of cause analysis in an incident investigation? ACCIDENT PREVENTION A detailed analysis of an accident will normally reveal three cause levels: basic, indirect, and direct. What are the basic steps for conducting an accident investigation? 6 Steps to a Basic Accident Investigation - Step 1: Gather information. Get a brief overview of the situation from witnesses and employees directly involved in the incident. - Step 2: Search for and establish facts. - Step 3: Establish essential contributing factors. - Step 4: Find root causes. - Step 6: Implement corrective actions. What are the types of investigation? Scientists use three types of investigations to research and develop explanations for events in the nature: descriptive investigation, comparative investigation, and experimental investigation. How long does an employer have to investigate a complaint?
https://www.hotels-in-budapest-hungary.com/how-long-does-dfeh-have-to-investigate-a-complaint/
March 30, 2021 The Final Conference of the MAGNETO project took place online on the 30th of March 2021, where the technologies and solutions developed by MAGNETO were presented to the participants. The developed technologies and tools allow for an effective handling of large volumes of heterogeneous data, thus providing Law Enforcement Agencies with additional capabilities for crime prevention and investigation. Emphasis was also placed on ethical and legal rules and guidelines that should be respected towards the development of powerful tools and exchange of information between operators and other users. CONNEXIONs participated in this event and presented the main outcomes of the project with particular emphasis on the methods and tools developed so far that provide Law Enforcement Agencies with advanced capabilities for gathering intelligence and analysing evidence to ultimately investigate crime and terrorism in an effective and efficient manner.
https://www.connexions-project.eu/news-events/86-magneto-final-event-multimedia-analysis-and-correlation-engine-for-organized-crime-prevention-and-investigation
Later this month (3-23) I’m joining British novelist Graham Joyce at the Rubin Museum in New York City to discuss “Are Dreams Pure Fantasy?” as part of the museum’s “Brainwave” lecture series on dreams. I’ve just read Joyce’s first novel, Dreamside, and it’s a hauntingly beautiful tale, both frightening and inspiring. It raises vital questions about the perils and potentials of lucid dreaming. Written in 1991, the novel accurately conveys the naïve excitement many people felt at that time about early psychological research on consciousness in dreaming. The story concerns four college students who sign up for a study on the induction of lucid dreams. The students form an unlikely team, each driven by very different motives. Ella, a mercurial, sexually alluring spiritual seeker, will do and say anything to achieve transcendence. Lee, the central character, is a stolid, rather conventional guy painfully captivated by Ella’s erotic energy. Brad, a medical student, has the most advanced innate skills at lucid dreaming, but he’s a cynical, drunken lout who can only express his sexual desires in the crudest of ways. Honora, from Ireland, is the quietest and most innocent of the group. Of them all, she is the most sincere in her desire to learn about dreaming. Their guide from waking reality into Dreamside is Professor Burns, an elderly psychologist with a hobbyist’s interest in parapsychology and an ornery disregard for other people’s feelings. Initially the lucid dream induction seminar is just a sham, as the Professor is in fact conducting a study of small group dynamics. But when the students begin succeeding in their efforts—when they learn how to become aware in dreams, interact with each other, and perform various experiments to test their Dreamside abilities—Prof. Burns becomes excited, too, and pushes them further and further. Without revealing any other plot developments, it may simply be said that everyone involved reaches a point where they deeply regret their blind rush into alien realms of psychic experience. The moral of the story is not that lucid dreaming is bad. Nor is it that Prof. Burns might have benefited from the input of a human subjects committee, though that’s undoubtedly true. It’s rather that we need to ask the right questions about lucid dreaming. The characters in Dreamside are so intent on figuring out how to induce lucid dreaming that they never ask themselves why they want to do so in the first place. The “how” question is relatively easy, but if you haven’t reflected carefully on the “why” question you may find yourself woefully unprepared for what you encounter. This is the same message that Hindu and Buddhist sages have taught for centuries: it is indeed possible to learn lucid dreaming techniques, but those techniques are best practiced within a context of spiritual training, guidance, and self-reflection. The college students in Dreamside have grown up in the morally impoverished world of Thatcher-era Britain, and they have few cultural resources to help them make sense of their experiences. Perhaps the greatest achievement of Joyce’s novel is that it provides what its characters lack—a wise and healthily cautious understanding of human dreaming potential.
https://kellybulkeley.org/tag/rubin-museum/
Presentation to the Melbourne Atheist Society, Tuesday May 10th, 2011 As David Miller, co-ordinator of the Atheist Society has pointed out Dr. Joe Toscano, of the Anarchist Media Institute, was supposed to be speaking this evening. It is very unfortunate that the has been unable to attend due to family matters and I am humbled that he nominated me to take his place; although I have had only a short period to prepare for this presentation, I will be using the title nominated by Dr. Toscano, and hopefully it will be in a similar spirit. I will take this opportunity to mention that Dr. Toscano is one of the great radicals of Melbourne. A medical practitioner and surgeon, he was the chief organiser of the 1986 Australian Anarchist Centenary Celebrations, has run the Anarchist World radio show on 3CR since 1977 and produced a weekly newsletter, the Anarchist Age Review, since 1991, which is nearing a thousand issues. One of the most prominent recent campaigns he has been involved in is founding and promoting "Defend and Extend Medicare" through decentralised community groups. That attracted not only the criticism of the government's health minister as well as briefing papers on the activists by "a senior intelligence official". If there are any "senior intelligence officials" in the audience, I hope you enjoy tonight. Please listen carefully and take plenty of notes. You and your masters might learn something. Imposed authority; it can blunt and obvious, as the truncheon on the skull, or can be subtle, through laws, regulations and very importantly property relations. It can be carried out by legal authority which claim a legitimate monopoly on violence, or it can be carried out by illegal groups. It can be carried out in an organised fashion or randomly. It can be carried out by individuals, groups, or through formal institutions. But ultimately it relies on the use of force against individuals who have not breached their natural, subjective rights or those rights that arise from inter-subjective agreement. That particular classification is noted in order to distinguish against that those who engage in imposed authority against these natural rights of others will find that their rights are temporarily suspended. One who engages in violence against another may discover that, contrary to their will or consent, that others will restrain their actions of harm, and this applies equally to the criminal or the government. More radically, one include in this is the right to an equal share of natural resources; the distinction between economic land, labour and capital is often overlooked since political economy has become a very specialised rather than general discipline. "Land rights" are natural rights - following Locke, Rousseau, Paine, Adam Smith, David Ricardo and through to contemporary economists such as Galbraith, Friedman, Solow, Samuelson, Vickery - the withholding of natural resource to the exclusion of others without compensation is an act of subtle violence. As this address is being made in a Unitarian church hall, I feel it appropriate to refer to Harriet Martineau's comment: "The old practice of man holding man as property is nearly exploded among civilised nations; and the analogous barbarism of man holding the surface of the globe as property cannot long survive. The idea of this being a barbarism is now fairly formed, admitted and established among some of the best minds of the time; and the result is, as in all such cases, ultimately secure"; to secure land to exclusion of others without compensation to the community is to be a enslaver. In government, authority is often used interchangeably with "power". However, their meanings differ: while "power" is defined as "the ability to influence somebody to do something that he/she would not have done", "authority" refers to a claim of legitimacy, the justification and right to exercise that power. An angry mob has the power to punish a murderer for example by lynching, the legal system may court of law has the authority to order execution; either way the criminal is dead and yet another body is added to the pile. The importance of legitimacy in a modern context was particularly explored by the sociologist Max Weber who defined authority as the chance of commands being obeyed by a specifiable group of people. Legitimate authority is that which is recognised as legitimate and justified by both the ruler and the ruled. Authoritarianism however is perceived to be the use of power without legitimacy - it is imposed authority, rather than legitimate or accepted authority. In politics, an authoritarian government is one in which political power is concentrated in a leader or leaders, typically unelected by the people, who possess exclusive, unaccountable, and arbitrary power. Authoritarianism differs from totalitarianism in that social and economic institutions exist that are not under the government's control. Authoritarianism is the method, totalitarianism is the scope. John Duckitt of the University of the Witwatersrand suggests a link between authoritarianism and involuntary collectivism, asserting that both stand in opposition to civil liberties and democratic processes. Paul C. Sondrol of the University of Colorado argues that whilst authoritarianism and totalitarianism are forms of autocracy, they differ in "key dichotomies" in terms of leadership, role conceptions and utilisation of power, the totalitarian system being ideologically-driven. While authoritarianism and democracy are opposed to one another, it is possible for democracies to be authoritarian and totalitarian. A procedural democracy, the rule - and tyranny - of the majority is distinguished from a substantive democracy that includes civil rights, the rule of law, an independent judiciary. The Economist Intelligence Unit conducts a Democracy Index every two years with 60 indicators grouped in five different categories: electoral process and pluralism, civil liberties, functioning of government, political participation and political culture. The Index was first produced in 2006, with updates produced in 2008 and 2010. Countries are categorized into full democracies, flawed democracies, hybrid regimes and authoritarian regimes; only 12% of the world's population live in "Full", that is, substantive, democracies. At the top of the list are the countries you would expect; the Scandinavian, Australia and New Zealand, Canada. Whatever criticism we have of such governments when they breach the natural rights expressed in the beginning of this presentation, we recognise that they are far in advance of the governments of the 36% of the world who live in "authoritarian" regimes. A discussion like we're having tonight would certainly not be possible. The promise of The Enlightenment, freedom and democracy, is a project that is far from complete. What are the justifications for imposed authority? Typically claims of social stability, normalcy, predictability are given. More so, they are based on the application of other criteria over freedom and agreement. A collective loyalty is made over that stands above common humanity; for some it is their state, for others their nationality, for others their religion or church, for others their political party, and perhaps in the future for others it will be the company their work for. However the greatest appeal comes from divine authority, an appeal beyond human justification. Often, astute politicians can combine the supernatural appeal with national appeals; I have quoted it here in the past, and I shall do so again - Adolf Hitler on the Jews: "I believe that I am acting in accordance with the will of the Almighty Creator: by defending myself against the Jew, I am fighting for the work of the Lord.." How clever of him to be a German Christian against the Semitic Jew! The core concept of fundamentalism, whether religious or political, is its inability to engage in reflexive reasoning. Historically, the term is associated with the Christian Niagara Bible Conference at the end of the 19th century and further defined by the 1910 General Assembly of the Presbyterian Church into five fundamentals (inerrancy of scripture, the virgin birth, Christ's atonement through death, the bodily resurrection, the reality of miracles). These beliefs, as strange as they may seem, are not so much the problem at least on a personal level. But when they are transferred to the political they are dangerous, as the famous XKCD cartoon on belief illustrates. When transformed from a personal to a political level fundamentalist - the human-mediated imposition of divine authority - must inevitably come in conflict with those who have the temerity to think and act differently. And because the belief system allows only reinterpretation within narrowly defined criteria - the sacred texts - then reaching a point of commonality with all beings becomes impossible, as there are no texts which are perfect for all time and all situations. At best we can only make appeals towards that orientation; and the fundamentalists often do not even bother to go that far. I am particularly concerned that there are religious beliefs that encompass an entire lifeworld, that do not make the mental separation between 'my' belief and 'others' beliefs, that do not recognise how the separation of church and civil society provides freedom for both. It is this perspective which I think is particularly prone to engaging in the imposition of authority. There are those who will point to progressive claims within a religious context. For example there is Marx's famous statement; "It is the fantastic realisation of the human essence since the human essence has not acquired any true reality.... Religious suffering is, at one and the same time, the expression of real suffering and a protest against real suffering. Religion is the sigh of the oppressed creature, the heart of a heartless world, and the soul of soulless conditions. It is the opium of the people.... The criticism of religion is, therefore, in embryo, the criticism of that vale of tears of which religion is the halo." For Christian anarchists a founding text is Tolstoi's "The Kingdom of God Is Within You". Tolstoy argues for of the principle of non-violent resistance when confronted by violence, as taught by Jesus separated Orthodox Russian Christianity, which was merged with the state, from what he believed was the true message of Jesus Christ. Another Christian anarchist also from Russia, Nicolas Berdyaev, argued in his book 'Slavery and Freedom', that "There is absolute truth in anarchism and it is to be seen in its attitude to the sovereignty of the state and to every form of state absolutism. [...] The religious truth of anarchism consists in this, that power over man is bound up with sin and evil, that a state of perfection is a state where there is no power of man over man, that is to say, anarchy. The Kingdom of God is freedom and the absence of such power... the Kingdom of God is anarchy". Although these statements are framed with religious expression, they represent the natural freedom of conscience and a search for inner strength against imposed authority, whether human or human with divine justifications. This is no mere utopian fancy; consider Viktor Frankl, who in From Death-Camp to Existentialism (also published as Man's Search for Meaning) argued that the human search for meaning is more powerful that either the Freudian search for pleasure or Nietzsche's will to power. Frankl, who was (let's say) "intimate" with the conditions of the camps write: "We who lived in concentration camps can remember the men who walked through the huts comforting others, giving away their last piece of bread. They may have been few in number, but they offer sufficient proof that everything can be taken from a man but one thing: the last of the human freedoms—to choose one's attitude in any given set of circumstances, to choose one's own way... We have come to know man as he really is. After all, man is that being who invented the gas chambers of Auschwitz; however, he is also that being who entered those gas chambers upright, with the Lord's prayer or the Shema Yisrael on his lips." Atheists must realise that although such statements are phrased in a religious manner, they are, in fact, representing ideal states of humanism. 'God' is not essential in these expressions, just as God as not essential in the expressions of human oppression. Whether it is for the love of one's fellow or the hatred, whether it is for for the ultimate degree of solace or for the greatest disruptions, 'God' is being used as a poetic metaphor for extremism, both good and bad. So what constitutes acceptance of authority in a non-imposed manner? This is not as trivial as it sounds, and naive libertarians simply espouse ideal conditions as if they were actual conditions. Because ideally, authority could be derived solely from reputation of instrumental skills and respect for value-leadership. Individuals would be free and rational, and through argumentation alone, the force of reason, they would be able to reach consensus. However being able to engage in such practise requires an ideal speech situation and the practise of discourse ethics, as outlined by the German social theorist Jürgen Habermas. Not surprisingly this concept of an ideal speech situation and an elaborated requirements for discourse ethics have come under some criticism as being utopian and idealistic, for ignoring the issues of gender, race, ethnicity, and sexuality But it is strongly stated that the ideal speech situation as a desirable objective, not a existing condition. It is phrased in the counter-factual, of what could exist. As such the rejection of imposed authority, divine or human, also requires the practical task of removing the conditions that distort the achievement of free association. It is no surprising there in studies on what constitutes universal rights there is actually a great degree of uniformity, obviously dating as far back to such radicals as John Locke, Thomas Paine and Mary Wollstonecraft, including classic liberals from John Stuart Mill to Isiah Berlin and John Rawls, and to modern practical philosophers such as Jurgen Habermas and Noam Chomsky. For example, among all such authors one will find that it considered almost trivially self-evident that all adults of adult reasoning should be allowed freedom of conscience and expression and have the right to make decisions concerning their own body. It logically follows likewise that like individuals are therefore entitle to engage with relevant others on the basis of mutual and informed consent. Likewise one would also expect, given these freedoms and autonomy, that the individual would be protected from violence, the threat of violence and from discrimination by the social system. After all, there is little point in having, for example, freedom of religion, if persons of a particular religion are systematically discriminated against. None of this is terribly difficult to understand, yet it would be a challenge to find a legislature in the world which has established such principles. Nevertheless, the purpose of this presentation is to engage in a bit of speculation which is at least possible, if apparently, against conventional real-politik. So to continue, imagine a situation where the State, the armed body enforcing laws, is actually established to ensure that individuals have the freedom to go about their lives as peaceful acting and transacting members of the public – and to protect those individuals from violent individuals within the State or from external forces which would wish to enslave them. Assuming a State, one where there the government has deliberately, purposefully and timelessly, limited its own jurisdiction (for anarchy is that area of life where the State does not intervene) - this raises the question of what actually is the legitimate role of democratic government at all, if it is not for the rule of the government over people. The answer to this lies in the Roman concept of res publica,"the public thing". If the lives of peaceful flesh and blood humans is not subject to public rule, then all that is left for the State is administer is quite correctly "things", to paraphrase Saint-Simon, "the government of persons is replaced by the administration of things". It is, in fact, no longer a State at all, but it remains a government. The most obvious "thing" and one which no human being in the right mind to have any legitimate claim over creating of their own labour or investment, is natural resources itself. Consider also the fact that in 1991 no less than thirty five of the top economists of the United States – all Nobel prize winners, professors, and university deans, across the political spectrum – urged then President of the Soviet Union, Mikhail Gorbachev that, in the transition from a command to a market economy, that public ownership of natural resources be retained and common income be generated from land-rents. That did not happen of course, and with the inevitable consequences. In summary, imposed violence, whether human or divinely-inspired, can vary from the blunt imposition to subtle regulation. Power and Authority has varied claims of legitimacy. Authoritarianism is the method and Totalitarianism the scope of imposed power. Although democracies could be authoritarian or totalitarian (and indeed they often are on particular issues) they mostly are not. Only 12% minority of the world live in "full democracies" (democratic governance, liberal protection of individuals). Justifications for imposed authority come from a collectivist mentality that places loyalty to other criteria than common humanity. Ideologies for imposed authority do not engage in universalism, nor do they engage in reflexive evaluation and criticism beyond their narrowly defined 'sacred ideas'. Religious approaches can be used to represent common humanity, and orientation towards humanism etc. as an extreme expression of individual freedom and moral behaviour. The rejection of imposed authority implies an acceptance of justified authority (reputation and respect). This can be achieved by through rational argumentation however, the capacity to engage in rational argumentation is conditional on civil rights and social welfare. Commenting on this Story will be automatically closed on July 15, 2011. I discovered your blog web site on google and examine a few of your early posts. Continue to keep up the very good operate. I simply further up your RSS feed to my MSN News Reader. Seeking forward to reading extra from you in a while!Â? I just found this website and network. My views may be closer to Isonomy than Isocracy, if isocracy implies a system or state but isonomy can be better practiced/integrated into any form of government that somebody chooses to affiliate with. On that note, I believe in working "equally" with theists even theocrats, as well as secular atheists; and promote ways to resolve conflicts and form agreement where NO ONE is imposed upon or threatened by views or ways of other people/groups. The reason either theists/nontheists impose on each other is if "conflicts are left unresolved" so that this escalates and becomes a lawsuit in a court under a judge to make a decision for these warring parties. The only way to prevent unequal imposition is for the parties to resolve their own conflicts directly. I can cite examples in America, such as the removal of crosses from public memorials, or the lawsuit by an atheist to remove a reference to "heaven" from a public street sign. More serious life-or-death issues include the case of Terri Schiavo in Florida and the death penalty cases such as Troy Davis that also received worldwide attention. All of these situations where the state authorities are dragged into a religious issue of whether the termination or sparing of life can be "justified legally" could be prevented by the individual parties mediating and resolving their own conflicts instead of invoking the government to step in and decide for one side over the other. Personally, as a Constitutionalist, I believe this violates religious freedom (or "separation of church and state") for government authority to take one side of a religious issue and impose a biased decision that excludes or discriminates against the dissenting parties; I believe our Constitutional laws protect all persons equally, including the minority as well as the majority opinion in any matter, especially religious issues involving decisions of life, death, and termination. The difference in my approach seems to be that I will take any "given" system, in this case, Constitutional law, and use THAT to correct the wrongs according to the laws WITHIN that system. My point is not simple to protest or block a decision, but to compel the parties to resolve conflicts in keeping with their own given systems. Same with using Christian laws or the Bible to resolve conflicts with someone who cites and commits to those scriptures as their laws. I don't know if this approach falls under "isocracy" or is more like "isonomy" or equal law enforcement (regardless which laws an individual or group subscribes to). I believe people will still govern themselves under their laws they associate or affiliate with, but my point is to make sure they are enforcing their own laws and principles equally for themselves as they would hold others to their laws. Most conflicts seem to involve people contradicting their own principles, and then projecting the blame onto the other party, who is usually doing the same thing. So by just enforcing one's own laws, beliefs, or principles CONSISTENTLY, the conflicts can be resolved, prevented or corrected; the systems people use can be harmonized to get along civilly without infringement or threat thereof; and nobody has to feel imposed upon with the risk of being overruled or politically bullied by a different group, especially not by abusing government or physical force to do so. I encourage all people to learn basic laws of due process and conflict resolution, whether using the Bible or Bill of Rights or any unifying principles that the given parties relate to respectively, in order to fulfill the laws establishing equality of justice and persons, either by natural laws as in the US Constitution or by divine laws as in the Bible. In order to be equal, we must have equal knowledge of the laws, or there will be competition for power and unresolved conflicts where people are prone to use force to outnumber, subdue, or oppress the other side. I believe this equality can be established, but with respect for people's diverse views, including theist or theocratic views that traditionally exclude and discriminate against secular and nontheist and easily clash with universalist approaches that don't. I don't believe in excluding or attacking even seemingly opposite views, religious or political, or else that is not universal either, but contributes to the same mutual rejection and projection of blame by both sides onto the other group. If such conflicts are not resolved directly between the parties, that is why a third party like the government can be called in to try to settle the conflict by force of law. If anyone reading this knows of a group that promotes mediation between religious and political members of different groups in order to resolve conflicts, I would like to support more training and assistance in that area. People would need access to this kind of mediation, training and assistance in order to resolve conflicts and keep their decisions in their own hands instead of submitting to third-party authorities to step in and make or impose decisions for them. The process of resolving conflicts is a key part of the education and enforcement of higher standards of informed consent and consensus decision-making. We learn by doing, so if anyone knows a group that does this, provides free outreach, training, and direct assistance in conflict resolution of religious/political issues, please contact me! Thank you for hosting this website and network Yours truly,
http://isocracy.org/node/78
The world has trekked from a hegemonic uni-polarity towards bipolarity and now the phenomenon of globalization has given rise to a multipolar world in current international relations which indicates that more and more countries are having influence over world politics, economy and security as opposed to past. The scales of global politics are now tipping in the favour of regionalization and multilateralism. Eurasia and especially Central-Asia has emerged as the most important region in respect of strategic location, natural resources, man power and economic potential in recent times. Such speculations about Eurasian region are not newly found. A cursory glance at the map purposes that supremacy over Eurasian region would guarantee supremacy over African continent, Western hemisphere, and its peripheries. Currently, Eurasia has about 75% of the world’s population and about three-fourth of the world’s energy sources. It was perhaps the realization of the potential of Eurasian region that prompted the countries in this region to formulate Shanghai Cooperation Organization (SCO). SCO was formulated to enhance regional cooperation between these countries to optimize mutual benefits and minimize shared threats. SCO is the world’s largest organization in terms of member countries having largest portions of world’s overall population and world’s total energy resources. Currently SCO has eight permanent member countries out of which four members are international nuclear powers. Furthermore, SCO member countries have 18% of the total of world’s road network. The charter of SCO was signed in 2002 by founding countries including China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan to mark the establishment of the organization. Pakistan and India were accepted into organization as members in 2017. Additionally, Afghanistan, Belarus, Iran and Mongolia has been given the status of observer states. United States’ request of observer state membership was rejected by the organization. The possible reason of rejection is the presence of US forces in the central Asian member countries of the organization which is in conflict with the regional cooperation goals of the organization. Furthermore, the cooperation of member countries over terrorism and security will most likely curb US interference in the region and will accelerate economic and trade exchange in the region. The objectives and accomplishments of SCO is to ensure regional cooperation in politics, economy and security as a priority and expand that cooperation to culture, health, education, tourism, technology, media and sports and to mitigate the evils of terrorism, extremism and separatism in the region.SCO has signed multiple MOUs (Memorandum of Understanding) with different international and regional organizations to achieve its objectives. A Memorandum of Understanding (MoU) was signed between the United Nations and SCO to prevent human trafficking, drug smuggling, and organized transnational crimes. SCO signed a MoU with ASEAN (Association of Southeast Asian Nations) to cooperate over issues of arms trafficking, money laundering and transnational terrorism in the region. Furthermore, CSTO (Collective Security Treaty Organization) and SCO signed a memorandum to combine efforts to maintain regional stability, security and counter terrorism. To increase cooperation over trade, economy, transportation and infrastructure, a Memorandum of Understanding was signed between ECO (Economic Cooperation Organization) and SCO. All members enjoy equal status when it comes to decision making process. Decisions can only be made through consensus. This structure ensures that all countries have their concerns met at this platform regardless of the opportunities or potential they have to offer. This structure is unique to the organization and has met with appreciation as well as criticism from the international forums. Experts seem divided over the fact whether the structure will promote or demote regional cooperation. It is assumed that the extent of diversity in the countries involved can make it difficult to reach consensus. However, it is important to note that these countries have shared concerns over security and economy which has gathered them over the platform of SCO in the first place. It is the realization of the fact that only regional connectivity can capitalize the potential of this region that has prompted these countries to form this organization. Consensus based decision making process will tap into the resources and potential of all countries and prevent exploitation of smaller countries to pave the way of regional connectivity that is stable and long term in nature. Member countries of SCO have already started projects that are connecting the region for trade and economic exchange. These include One Belt One Road (OBOR) or Belt and Road Initiative (BRI) project by China. This initiative plans to build roads and infrastructure that will connect China to Europe through Central and South Asia through Silk Route and simultaneously linking China to Southeast Asia, gulf countries and North Africa. This project has already started and its objective is to not just build road but overall infrastructure that will help the growth of mutual trade and economic exchange by connecting the region. The advanced phase of BRI involves construction of trade zones, industrial parks, and energy sources in the connecting countries along its way. The project also aims to achieve regulating the industry standards across the region, standardizing trade rules, hassle free currency exchange and sharing credit information. Through the platform of SCO, BRI project and EAEU (Eurasian Economic Union) are linked and different agreement between China and Russia have been signed to ensure cooperation in this regard. This link will enable BRI and EAEU to reciprocate each other in achieving their goals. The materialization of conflict between Russia and China was a real possibility because of contrast of interests in the region. However, SCO has eliminated that possible threat to regional connectivity in Eurasia by joining both the countries on its platform. Other projects of trade and transport connectivity in the region have found integration with BRI through the platform of SCO. These include INSTC (International North-South Transport Corridor) by India and Nurly Zhol project by Kazakhstan. INSTC is a project of launching freight from India to Europe through central Asia and Nurly Zhol is a project of building transportation infrastructure in Kazakhstan. SCO has facilitated the smooth amalgamation of these projects with BRI by gathering the concerned countries on a platform that gives them equal say in the process of making any decision related to Eurasian region. It does not only help economic development in the region but accelerates transnational relations by creating a sense of security among the member countries. Additionally, it preventing exploitation of smaller regional countries through consensus based structure. Furthermore, SCO will also strengthen culture ties through new visa opportunities. Road transport licensing will increase cross border trade and tourism from Pacific Ocean to Baltic Sea in the region. Furthermore, transportation by road will only require single entry permit and the transnational transportation activities will be observed by joint commission of the member states of SCO. This comes as no surprise that like any other international cooperation organization, SCO has some challenges that may hinder the process of achieving greater regional connectivity in Eurasia. Afghanistan is a destabilizing factor in the whole region that may pose a threat to achieving stability in central Asia. Although, Afghanistan has obtained the status of observer state in SCO, it needs urgent attention of the organization for its infrastructural reconstruction. The traditional hostility among India and Pakistan may also find its way into the organization in future and form opposing blocks in the organization. However, until now, there have been no such conflicts. Additionally, China and Russia may find themselves locking horn over creating their hegemony in the region in future. The overall history of achievements by SCO makes the challenges in the region seem important but resolvable. Still, the dream of greater regional connectivity in Eurasia is still to be achieved and SCO is just the first step towards it. SCO is a good start towards regional cooperation as a platform and all factors point to an optimistic future of the organization in achieving regional connectivity.
https://moderndiplomacy.eu/2019/01/31/sco-external-relations-and-focus-on-regional-cooperation/
Let There Be Light, Part I Now that we’ve passed the winter solstice, the days are getting longer again. While this delights me in general (I’ve always hated winter), I also must admit that I’ve come to appreciate the changing light throughout the whole year. Since moving to Palos Verdes, California, I’ve started looking at light in a whole new way as I more closely observe the grand vistas of seascape and landscape around me, the abundance of nature and natural terrain. I have realized that the strong, summer sun reflects differently on the ocean cove or steep hillside, for example, than the weaker winter sun. This range of illumination changes the colors of the scenery, so that what I’ve looked at for three months, suddenly looks totally different. It’s a new vista, a fresh outlook, a contrasting perspective. As an artist, I’m particularly drawn to Impressionism and Impressionism, more than any other art movement, concerned itself with the quality of light. The creators often painted the same subject matter repeatedly under different weather conditions, often studying en plein air, and using complimentary colors to play with shadow and light. When I design jewelry, I’m always using natural daylight to choose my stones. It helps me see the true tones of each gem. And I’ve always said I like to “paint with gems” because in this brightness, I can see all the nuances in each piece. When I mix the gems together, it’s like using each as its own pigment; while they might look individual, when they’re combined, it creates a whole. Much like you would witness in an impressionist painting. The quality of light doesn’t just affect my surroundings, it can also affect gemstones themselves! In the gemology world, there are phenomenon stones, which interact with light in unusual ways. Think moonstones or star sapphires. One of my favorites in this category are color-change gemstones that display a different hue when a stone is in natural light versus incandescent light. Due to a freak of nature, the properties of the gem’s crystal lattice is what make these rocks unique as it alters light waves as they enter and exit. A great example is this ring (at bottom) I created with a particular type of garnet that appears a deep greeny-blue outdoors and reddish-purple inside. Or these Silhouette Earrings, that have faceted round brilliant color-change garnets that beautifully pick up the greys of the rest of the earrings. Throughout the year, whether because the axis of the earth rotates and changes the distance to the sun or we head indoors, light waves fluctuate to constantly shift the colors we see. And as Los Angeles enters its rainy season, all the plants start to pop – blazing bougainvillea blossoms, sprouting tender green grass, secret buried agapanthus bulbs shooting up long verdant leaves…. But no matter whether it’s the changing angle of the sun or vibrant vegetation coming to life, it’s all opening a door to a whole new palette of inspiration. More Posts - color-change• impressionism• light Let There Be Light,... Now that we’ve passed the winter solstice, the days are getting longer again. While this delights me in general (I’ve always hated winter), I also ...Read More - The Gifts that Keep... Growing up, my family (like most) gave presents you could physically unwrap under the Christmas Tree. And don’t get me wrong, I love the excitement...Read More - jason momoa• man jewelry• mens• pete davidson The Yin Yang Energy... Jewelry has been the unspoken and unwritten way people could signal to the world their caste or class or profession – to show off one’s wealth and ...Read More Bespoke. Yes, we do. Ask for a unique color combo, or remount an inherited stone. Personally designed by Daria.
https://www.dariadekoning.com/blogs/happenings/let-there-be-light-i
When calculating the free-energy of ions permeating membrane proteins, an initial decision to make is how many ions needs to be included in the calculation. This decision is usually based on previous knowledge (both experiments and simulations), and on the intuition of the researcher. But intuition might be wrong… And taking the number of ions wrong might render free-energy profiles that are ... Concentration gradients in simulations with PBCContributed by Simone Furini Selectivity in bacterial Na+ channelsContributed by Simone Furini Microenvironmental signals control hybrid EMT phenotypesContributed by Emanuele Giordano A Scaffold Simulator to study of cancer cell survival and 3D spatial distribution (SALSA)Contributed by Marilisa Cortesi Computational models of Epithelial to Mesenchymal TransitionContributed by Marilisa Cortesi Computational representation of complex biological processes is becoming an increasingly established approach to complement the experimental analysis and study methods to halt/redirect pathological processes. In this review paper we focus on Epithelial to Mesenchymal transition (EMT), a phenotypic transformation with a pivotal role in cancer progression and metastases formation, and present a ... Computational model of cell phenotype decision makingContributed by Marilisa Cortesi Epithelial to Mesenchymal transition (EMT) is an exceedingly complex biological process that plays a key role in cancer progression and metastases formation. To unravel this complexity and isolate specific genetic markers important for this transition, we have developed a computational model recapitulating both single cell and population behaviours. The former was represented with a boolean ... Semi-Automatic Analysis of Invasion and Migration Transwell Assays (I-AbACUS)Contributed by Marilisa Cortesi Transwell assays are another common experimental approach for the quantification of migration and invasion (see also Automatic quantification of (cancer) cell invasiveness). This method relies on a semi-permeable membrane and a layer of Matrigel coating to simulate ... Molecular Dynamics simulations reveal how K+-channels might conduct K+ ions at high speedContributed by Simone Furini The selectivity of ion channels to different ion species is crucial for important biological processes, as nerve transmission and muscular contraction. Thanks to the availability of experimental atomic structures of several ion channels, including K+-channels, Na+-channels and Ca2+-channels, it is now possible to investigate the microscopic details of conduction ... Molecular Dynamics simulations can analyze how protein might move along DNA sequencesContributed by Simone Furini The binding of proteins to DNA controls many cellular events, including gene expression. In order to work properly, DNA binding proteins need to find their target sequences on DNA with high speed and accuracy. The recognition of the specific DNA binding site requires intimate contacts between the protein and the DNA molecule. However, strong atomic interactions between the two molecules are ...
https://www.mcbeng.it/en/all-topics.html
Solar-powered water splitting is a promising means of generating clean and storable energy. A novel catalyst based on semiconductor nanoparticles has now been shown to facilitate all the reactions needed for “artificial photosynthesis”. In the light of global climate change, there is an urgent need to develop efficient ways of obtaining and storing power from renewable energy sources. The photocatalytic splitting of water into hydrogen fuel and oxygen provides a particularly attractive approach in this context. However, efficient implementation of this process, which mimics biological photosynthesis, is technically very challenging, since it involves a combination of processes that can interfere with each other. Now, LMU physicists led by Dr. Jacek Stolarczyk and Professor Jochen Feldmann, in collaboration with chemists at the University of Würzburg led by Professor Frank Würthner, have succeeded in demonstrating the complete splitting of water with the help of an all-in-one catalytic system for the first time. Their new study appears in the journal Nature Energy. Technical methods for the photocatalytic splitting of water molecules use synthetic components to mimic the complex processes that take place during natural photosynthesis. In such systems, semiconductor nanoparticles that absorb light quanta (photons) can, in principle, serve as the photocatalysts. Absorption of a photon generates a negatively charged particle (an electron) and a positively charged species known as a ‘hole’, and the two must be spatially separated so that a water molecule can be reduced to hydrogen by the electron and oxidized by the hole to form oxygen. “If one only wants to generate hydrogen gas from water, the holes are usually removed rapidly by adding sacrificial chemical reagents,” says Stolarczyk. “But to achieve complete water splitting, the holes must be retained in the system to drive the slow process of water oxidation.” The problem lies in enabling the two half-reactions to take place simultaneously on a single particle – while ensuring that the oppositely charged species do not recombine. In addition, many semiconductors can be oxidized themselves, and thereby destroyed, by the positively charged holes. Nanorods with spatially separated reaction sites “We solved the problem by using nanorods made of the semiconducting material cadmium sulfate, and spatially separated the areas on which the oxidation and reduction reactions occurred on these nanocrystals,” Stolarczyk explains. The researchers decorated the tips of the nanorods with tiny particles of platinum, which act as acceptors for the electrons excited by the light absorption. As the LMU group had previously shown, this configuration provides an efficient photocatalyst for the reduction of water to hydrogen. The oxidation reaction, on the other hand, takes place on the sides of the nanorod. To this end, , the LMU researchers attached to the lateral surfaces a ruthenium-based oxidation catalyst developed by Würthner‘s team. The compound was equipped with functional groups that anchored it to the nanorod. “These groups provide for extremely fast transport of holes to the catalyst, which facilitates the efficient generation of oxygen and minimizes damage to the nanorods,” says Dr. Peter Frischmann, one of the initiators of the project in Würzburg. The Latest on: Artificial photosynthesis via Google News The Latest on: Artificial photosynthesis - New Catalyst Process Recycles Plastic Waste into Useful Materialson January 6, 2021 at 12:37 pm Scientists have used an innovative catalyst process to recycle a certain kind of plastic for the first time. This plastic is found in everything, such as food packaging, grocery bags¸ wax, liquid ... - Harnessing the hidden powers of plants could help fix the climateon January 2, 2021 at 11:44 pm Photosynthesis has been critical to the Earth's survival over billions of years. Now it's time for humans to learn a few tricks from plants ... - Artificial photosynthesis: The two-in-one technology that could save the planeton December 18, 2020 at 4:00 pm Alex Reis In a previous life, Alex was a researcher in the University of Newcastle in the field of cell and molecular biology, following a PhD in embryology looking at cow ovaries! After a slight ... - Artificial Photosynthesis Market Research Report, Growth Trends And Competitive Analysis 2020-2026on December 18, 2020 at 7:20 am The Artificial Photosynthesis Market provides detailed statistics extracted from a systematic analysis of actual and projected market data for the Artificial Photosynthesis Sector. Global market ... - Japanese Researchers Pave Way for Artificial Photosynthesison December 17, 2020 at 10:00 am Unlimited access to our free news articles Unlimited access to our free webinars, white papers, and videos Special offers and discounts on Events and Squared Updates on breaking news and current ... - Mapping quantum structures with light to unlock their capabilitieson December 3, 2020 at 12:00 pm A paper on the work is published in Science. Applications include LED lights, solar cells and artificial photosynthesis. “Quantum materials could have an impact way beyond quantum computing ... - Copper Catalyst Converts Carbonon November 19, 2020 at 3:59 pm That’s why a discovery by researchers at the U.S. Department of Energy’s Lawrence Berkeley National Laboratory (Berkeley Lab) and Joint Center for Artificial Photosynthesis (JCAP) is so significant. - Creating fuel from thin air with artificial leaveson October 12, 2020 at 7:10 pm "I really believe that artificial photosynthesis will be one part of that energy portfolio over the next two decades." When plants photosynthesise, they take up water and carbon dioxide ... - Researchers drive artificial photosynthesis energy conversion rate higheron August 21, 2020 at 5:46 am Chinese researchers have developed an artificial photosynthetic system with solar-to-fuel conversion efficiency in excess of 20 percent, China Science Daily reported Thursday. Plants transform solar ...
https://innovationtoronto.com/2018/09/artificial-photosynthesis-with-the-help-of-an-all-in-one-catalytic-system-for-the-first-time/
Twenty-five of the 28 students from local colleges who participated in the Sequence to Success DNA Barcoding Challenge held at UC Riverside. Photo credit: STEM Connections, UC Riverside. RIVERSIDE, Calif. — Twenty-eight students from three local colleges spent the bulk of Saturday, Feb. 23, in a laboratory at the University of California, Riverside to gain the kind of university-level research experience they likely will remember for a long time. Selected from Mount San Jacinto College (MSJC), Moreno Valley College (MVC) and Riverside City College (RCC), the students are participating in a four-week research project, called the “Sequence to Success DNA Barcoding Challenge,” that was launched on Saturday. The project aims at surveying the diversity of Salvia — a common drought tolerant plant — in Western Riverside County. The participants characterized Salvia plant communities from their respective campuses. The visiting students analyzed leaf samples in the Neil A. Campbell Science Learning Laboratory. In the process, they learned DNA extraction and sequencing, used DNA barcoding software to identify species, and applied various other molecular biology and bioinformatics techniques on the leaf samples they had collected. The students, who are U.S. citizens or permanent residents and meet Hispanic or low-income criteria as defined by the U.S. Department of Education, will present the results from their work at a special poster presentation to be held at UC Riverside on March 23. Their four-week research experience is supported by a five-year $3.93 million grant to UCR in 2011 from the Department of Education. It aims specifically at supporting underrepresented student populations in the science, technology, engineering, and mathematics (STEM) fields, steering them on to a path leading to bachelor’s and advanced degrees. MSJC, MVC and RCC are formal partners with UCR for the duration of the grant. Richard Cardullo (right) addresses the participants of the Sequence to Success DNA Barcoding Challenge.Photo credit: STEM Connections, UC Riverside. Sophomores in the UCR Dynamic Genome Program worked alongside the visiting students to guide the research. The visitors also received rigorous coaching from James Burnette III, a molecular biologist and academic coordinator in CNAS who develops research-intensive undergraduate lab courses; and Alejandro Cortez, a laboratory assistant in the Department of Botany and Plant Sciences. Jose Luis Orozco of MVC, who participated in the Sequence to Success DNA Barcoding Challenge on Saturday, is interested in becoming a research physician, spending time in the clinic and conducting research in a laboratory environment. In the Neil A. Campbell Science Learning Laboratory at UC Riverside, the visiting students applied various molecular biology and bioinformatics techniques on leaf samples they had collected.Photo credit: STEM Connections, UC Riverside. Participant Giovanna Jocelyn Mendez, also of MVC, has a dream: to understand math and science. Maureen Wanjiru Njuguna of MSJC would like to transfer to a four-year institution and earn first a bachelor’s degree and later advanced degrees in chemical engineering. Joseph Renteria of RCC wants to become a physician specializing in oncology or emergency medicine. Participating in the Sequence to Success DNA Barcoding Challenge allows him, he said, to demonstrate his scientific skills in a discipline he is passionate about. “It provides an opportunity to gain an advantage over other students with the same goals,” he said. James Burnette III (second from right), a molecular biologist and academic coordinator at UC Riverside, instructs some of the participants of the Sequence to Success DNA Barcoding Challenge.Photo credit: STEM Connections, UC Riverside. Cardullo said the event on Saturday was an enormous success and far exceeded his expectations. “We had 28 highly motivated students who get what it means to be serious about education,” he said. “These young people are intensely curious and coachable, with their eyes set firmly on the next steps they will take in their career paths. Approximately 50 students in total from MSJC, MVR and RCC applied to take part in the Sequence to Success DNA Barcoding Challenge. The selected students received no stipend and incurred no fees to participate.
https://ucrtoday.ucr.edu/12304
Alexander Tochilovsky, typographer, teacher, curator This week we asked Alexander Tochilovsky, graphic designer, typographer, teacher, and Curator of the Herb Lubalin Study Center of Design and Typography in New York, to select his favourite magazines. Alexander is currently programming the ‘Typographics 2016’ conference, and he spends most of his day in the Herb Lubalin archive surrounded by stacks of magazines. We asked him to choose three issues from the archive: an old one, a new one, and a detail that’s especially interesting. “I am a big fan of older magazines, especially from the sixties, and am fortunate to have a dream job which allows me daily contact with some of the most memorable magazines ever made. As such my home collection is quite modest, it’s mostly books, since I have relocated all my magazines into the archive. That way I have frequent access to them, plus they are useful to the visitors to the archive as well as to my students. “The archive has many titles that I go back to time and time again. There are issues of Brodovitch’s Portfolio, Lubalin’s Eros and Avant Garde, Gertner’s Capital, Vignelli’s Dot Zero, Lois’ Esquire, Kalman’s Interview, and too many others to name. Here are some of my favorites.” Old Issue: Show Magazine, 1961 I really had a hard time picking between this one and an issue of Nest magazine, but the content of this one clinched it for me. So my choice for the “Old Issue” is, Show Magazine’s December of 1961 issue. The cover of this magazine is perhaps not the most memorable, but the interior more than makes up for it. Henry Wolf brilliantly art directed this magazine for three short years. He created what should easily be considered the American equivalent of Twen—albeit it is relatively unknown today. Wolf, the Brodovitch protegee, found a great opportunity at this brand new magazine, with seemingly a wide range of creative freedom. His design is restrained, but incredibly delicate, thoughtful and innovative. For something that came out in the beginning of the 60s it feels incredibly contemporary, especially in its use of photography. I love so many of its details. The transition from the front of the book—with the header twisting its way across the top towards the short edge, and jumping onto the opening of the well—is playful and smart. I love the way the opening of the well is signalled by a completely abstracted, blurry photo. This then comes into sharp, almost stark focus on the following spread. It’s really mind-blowing. And that page then transitions seamlessly onto the next spread. What a great sense of pacing. It is just so good. This issue as a whole has stunning features, especially the fantastic article by Gay Talese on the old, (and appropriately seedy for that time), 42nd Street, illustrated by the wonderful, (and very rarely seen), photos by Robert Frank. It’s an issue that never disappoints every time I look at it, or show it to others. New Issue: Human Being There are lots of new magazines out there these days, and I am glad to see so much energy in publishing, especially from small upstarts who are challenging the existing norms of big publishers. Much in the same way Show magazine carved a niche for itself, I see a lot of new vibrant magazines. I am currently reading a couple of issues that came my way from Richmond, Virginia: Issues five and seven of Human Being magazine. I am a sucker for small format magazines, (this one is only 6.5 x 8.5 in.) because I like the challenge it presents for the designers. I appreciate well-resolved small formats. This is one I like a lot. The design might feel like it’s of its time, but it feels considered and convincing. There is a sense of earnestness about it. The articles are well crafted. The writing is good. The art direction of the fashion pieces is interesting, and different without being too trendy, or too esoteric. The typography feels right to me, with a nice level of fussiness which I appreciate. It’s also nice to recognize people who are covered in the magazine. They all feel like real people. And another thing: Flair Magazine, Jan. 1951 Lots of things to pick for this, but I decided to settle on one of the most memorable moments in a magazine I’ve ever encountered. It comes from the last issue of Flair Magazine, from January 1951. The issue has a few amazing details, but this one takes the cake. The detail in question is a single spread of a beauty feature, called “Shades and Shadows”. The feature takes up exactly one solitary spread, consisting of a full bleed image across the spread and a headline with a subheading. That’s all. But, the ingenious part is that the text of the actual article lives at the bottom of the page, and is achieved—concealed if you will— by the use of a die cut to overlap and superimpose the bottom ¼ of the page. This leaves the expansive and airy feel the image at the top of the spread creates. It is so simple but so stunningly effective.
https://magculture.com/blogs/journal/alexander-tochilovsky-typographer-teacher-curator
Lies, damned lies and crime statistics The problem with crime statistics, or just about any statistics is that they can be used to prove just about anything. In the aftermath of the Arab oil embargo of 1973, the United States introduced a federal 55mph speed limit to save fuel. Following a drop in fatalities during the first year the law was introduced, the speed limit was made permanent in 1974. With hindsight, the drop in fatalities may have had more to do with the fact that fewer car journeys were made due to the very high cost of fuel. And it wasn't long till the fatalities started going up again. I don't mean to get into a debate about road safety, but it's a good illustration of how facts on the ground often relate little to the actual statistics. Back to the subject of crime. The government says that overall crime (with the exception of violent crime) is falling and the liberal media keep telling us that fear of crime is just a lot of hysteria whipped up by the Daily Mail. Our course their arguments have little to do with personal experience, and everything to do with their political agenda: Namely that violent youth crime is a figment of our imagination and that feral youths are not criminals, but victims of social deprivation. Try telling that to the family of a stabbing victim or the residents of a sink estate living in constant fear of the thugs terrorising their neighbourhood. You can fool some people some of the time, but can't fool all the people all the time.
http://www.bermant.com/blog/2008/07/lies-damned-lies-and-crime-statistics.html
Before my journey overseas, I had slowly been gathering all the clothes I could find to bring with me. Being a fashion major, this was a bit tricky. Especially since I was unable to bring all of the pieces I wanted to. As I started to pack my 26” suitcases, which has to be under 50 pounds, I began to notice this was going to be a bit of a challenge. So, I made a list. Starting with all of my favorite staple pieces, to a few of my trendy favorites. After a few days I had packed both of my suitcases to the maximum weight requirement. I thought to myself well this is perfect! I have all of my staple pieces and few more, including all of my favorite shoes. I thought I had it all figured out; I was ready to start my stylish journey. Once I arrived in London, I was so excited. I was putting some of my favorite pieces together, and starting to pick up on the fashion trends here as well. Little did I know that after a week I would have worn all of my outfits and ran out of ideas to work with in my small 50-pound closet. Being a fashion major, this was a bit heartbreaking for me. I am so used to being able to travel with all my favorite pieces to school, but now I had a limit and I had to make the best of it. I can’t lie, I have made a few trips to Primark, my new favorite store in the U.K. Which, is a store that is filled with the all of the latest trends for the best bargain prices. I have gone in for things like sweaters, since when I packed I did not realize how chilly it would be either. So, after grabbing a few sweaters and scarfs, I still had a much smaller closet than I was used to. Being creative has been something I have come accustomed to. Not only has it made me think more about the pieces I love, but think about how this could help my career as well. I have learned how to turn a few pieces of clothing into an entire wardrobe of looks and outfits. To me, this is an extremely valuable skill, especially when entering the fashion world. This will not only allow me to become stronger with styling skills, but help strengthen my creative mind. Comfort has also been something I have come to love. Before when I would dress, it would be all for looks. Now, while I am still dressing to achieve some sort of look, I am also dressing to achieve comfort and warmth. Both things I am learning to adapt to. Here, most people have grown up in this type of climate, so they are used to achieving their style while also staying warm. I, on the other hand, am very new to this type of living. I am not used to having to walk everywhere, and be in colder temperatures for longer periods of time. Now that I am living in the center of a city, one much comparable to the windy city of New York, I have to adapt to its climate. I am learning to love sweaters and leggings, as much as I love high fashion. Layering and warm coats have also become my best friends. Learning to adapt to a new climate and city is definitely a big change. Overall, I believe it has been a great thing for me. It has not only allowed me to expand my fashion pallet, but also learn how to become a better traveler. I now know how to pack. That being for comfort and fashion, and not just because I love a stylish piece of clothing. It has been a big change from what I am used to, but I think it is overall extremely helpful for me and my future career.
https://commons.marymount.edu/global/2017/09/20/living-out-of-a-suitcase-as-a-fashion-major/
The undergraduate major in linguistics will provide you with a solid background in the core areas of linguistics as an academic discipline, in at least two languages, and in linguistically relevant areas of neighboring fields. Perhaps more importantly, it will build up your skills in analytic reasoning and argumentation, writing, and observation. Linguistics is therefore an appropriate major not just for students planning to pursue academic careers in linguistics itself, but also for those seeking careers in any area where such skills may be of value. Some typical careers for linguistics majors include: - Work in the computer industry. Linguists may work on speech synthesis, text processing, search engines, artificial intelligence, and in many other computational areas where the analysis of speech and language plays a role. Students planning careers in this area are advised to combine their linguistics major with appropriate computational training, such as a minor or double major in computer science. - Language teaching. Many linguistics majors go on to teach English to speakers of other languages, or to teach other languages in which they have expertise. Students pursuing a career in language teaching may wish to combine the linguistics major with a Certificate in Teaching English as a Second Language. - Translation and interpreting. Students with strong skills in a particular language may pursue a career translating or interpreting that language. Translators and interpreters are needed for business, diplomatic, and national security purposes; in courtroom and medical settings; and in a variety of other circumstances. Students pursuing a career in translation and interpreting may wish to combine the linguistics major with a Certificate in Translation Studies. - Academic research and teaching. Linguistics is primarily an academic field, and many linguistics students pursue careers in academia — either in linguistics itself, or in related fields such as anthropology or speech and hearing science. Most work of this kind requires a Ph.D., so start thinking about graduate school early. - Law. With its emphasis on careful argumentation and analysis, and attention to the details of language use and interpretation, a linguistics major is highly appropriate for students planning to continue on to law school. Be sure to consult early with Prelaw Advising Services. - Publishing and editing. Many linguistics majors pursue careers in the publishing industry. Our graduates work for companies such as: Academia Sinica, Taiwan Accenture Activision Blizzard Arity Boeing Box Brigham and Women's Hospital C3.ai Capital One Charles Schwab Chungdahm Learning Clumio CME Group CMT Capital Markets Trading Cornell University Cruise Automation Eastern Agencies Aromatics Epic Systems Facebook Fulbright Association GlobaLexicon GoHealth Google Green Spate Bulk Stations JPMorgan Chase Ken's Beverage Mastercard McMaster-Carr Microsoft Mu Sigma NBCUniversal Novumind Pixo Publicis Sapient Qualitest Saggezza State Farm Insurance The Ohio State University Under Armour Walkthrough ZL Technologies and hold a variety of job titles: Associate Software Engineer Backend Developer Bilingual Engineer Clinical Research Coordinator Data Analyst Data Scientist Developer Academy / Technical Development Program Software Engineer English Teaching Assistant Founder Graduate Research Fellow Human Performance Analyst Information Technology Specialist IT Programmer Junior Associate Junior Experience Designer Junior Project Coordinator Management Trainee Member of Technical Staff Merchandising Coordinator Real Estate Intern Research Assistant Research Technician Software Developer Software Engineer Systems Analyst Teacher Technical Program Manager For more ideas and information, see the Linguistic Society of America's pamphlet Why Major in Linguistics?
https://linguistics.illinois.edu/career-paths/big-business-wants-linguistics
Groove studies in time and space. The idea for MTBP Vol. 2 was conceived as a follow up to Vol.1, which dealt largely with developing time keeping and a sense of swing within a straight-ahead jazz context and featured Paul Morgan (Double Bass) and Hugh Burns (Guitar). Vol. 2 has been requested many times over - it wasn’t meant to take 15 years but here it is! I’ve always been fascinated by how different drummers can make a simple groove sound so good, so right, and so personal, even though they are technically playing the same thing. Like the jazz ride feel, I believe we each have our own discoverable and unique groove - just listen closely to Steve Gadd, Rick Marotta, Jeff Porcaro or Bernard Purdie. In the course of teaching developing players for many years, concerning trends are emerging in that a very high percentage are now arriving with very fast hand technique already in place, but seem to be missing the point when playing a simple groove and making it feel good for other musicians, with their bass drum and hi hat accuracy lacking way behind their hands. Awareness of the space between the notes has been sacrificed in the pursuit of being able to play as fast as possible… The idea behind this collection of tracks is quite simply to provide a musical context to discover and develop an awareness of simple groove playing that is the basis of what we need to work consistently with other musicians. I recommend working with a good teacher who can guide you through the abundance of material already available concerning hand technique and groove development. With my students I work with, and recommend, Jim Blackley’s Syncopated Rolls, Gary Chaffee’s Patterns series Vol. 3 ‘Time Functioning’ and Zoro’s The Commandments of R&B Drumming’, amongst other material. This little quote from Steve Gadd is food for thought… ‘Usually I’m concentrating on the quarter notes, that’s where my focus has to be to keep the tempo locked in. Whatever subdivisions I play in those spaces, I make sure they’re locked in with the quarter note so that I don’t rush them… I just try to be a part of the foundation…’ _________________________________________________________________________ 1 - 1/4 basic time 2 - 50 bpm 3 - 60 bpm 4 - 70 bpm 5 - 1/8 basic time 6 - 80 bpm 7 - 10 bpm 8 - 117 bpm (Iconic Bonus Track) 9 - 1/8 note triplet basic time 10 - 1/8 note triplet basic time 11 - 55 bpm 12 - 80 bpm 13 - 110 bpm 14 - 1/16 note basic time 15 - 1/16 note basic time 16 - 60 bpm 17 - 78 bpm 18 - 112 bpm 19 - 1/16 note triplet basic time 20 - 60 bpm 21 - 72 bpm Bass: Zoltan Dekany Drums: Allan Cox Bass tracks recorded by Zoltan Dekany at Zoltan’s Bass Lounge, September 2019. Drum tracks and post production by Ollie Boorman at Brook Street Studio, October/November 2019. Allan Cox plays with Vic Firth Sticks on Paiste Cymbals and Yamaha Drums. Connect with Al at [email protected] Connect with Zoltan at zoltansbasslounge.com Connect with Ollie Boorman at ollieboormandrums.com Design by Ed Ling Special thanks to Leon Sweet at zero8 Web Design and to Dave Hassell for continuing to inspire!
https://allancox.co.uk/products/meet-the-bass-player-vol-2-digital-download
What are the minimum size current-carrying copper conductors required for the outlet that serves a professional xenon projector? The projector current rating is 55A. The projector is not considered to be a continuous load. The terminals are marked as 60°C. - No. 8 THHN - No. 6 THHN - No. 4 THHN - No. 3 THHN Answer: B As per 540.13, "Conductors supplying outlets for arc and xenon projectors of the professional type shall not be smaller than 8 AWG and shall have an ampacity not less than the projector current rating. Conductors for incandescent projectors shall conform to normal wiring standards, as noted in 210.24." As noted in this example, the nameplate ampere rating of the projector is 55A and the terminals are marked with a temperature rating of 60°C. Section 110.14(C) requires the rating of the lowest rated component of a circuit to be used. In this case, the 60°C rating of the terminals is lower than the 90°C rating of the THHN insulation. From the 90°C column of Table 310.16, a No. 8 THHN is listed as 55A, however, we have no adjustments to make, and the terminals are not marked as 90°C. Therefore, we cannot use the No. 8 THHN rated at 55A from the 90°C column, rather, we must use the 60°C column because of the terminal rating of 60°C. From the 60°C column, a 6 AWG conductor is rated 55A, which is the minimum size conductor allowed for this example. Owen is the owner and president of National Code Seminars and the holder of master electrician certifications in 46 states. He can be reached at [email protected].
https://www.ecmweb.com/quizzes/code-quiz-108
The Black Lives Matter Global Network is a chapter-based, member-led organization whose mission is to build local power and to intervene in violence inflicted on Black communities by the state and vigilantes. The National Center for Transgender Equality This Center advocates to change policies and society to increase understanding and acceptance of transgender people. In the nation’s capital and throughout the country, NCTE works to replace disrespect, discrimination, and violence with empathy, opportunity, and justice. Young Feminist Wire This online platform was created in March 2010 by the Young Feminist Activism (YFA) program at the Association for Women’s Rights in Development (AWID). The Young Feminist Wire is an online community for and by young feminists working on women’s human rights, gender equality and social justice around the world. Feminist Majority Foundation Find ideas on how to take action on local and global women's issues through this site, as well as linking to scholarly resources, such as archives and academic research. Grassroots Leadership Grassroots Leadership works for a more just society where prison profiteering, mass incarceration, deportation and criminalization are things of the past. Human Rights Watch Established in 1978, Human Rights Watch is known for its accurate fact-finding, impartial reporting, effective use of media, and targeted advocacy, often in partnership with local human rights groups. This link will take you to the section of their website that addresses women's rights. Organizations Institute for Women's Policy Research American Association of University Women Association for Women in Science League of Women Voters National Council of Negro Women National Women's Studies Association (NWSA) Society for Women in Philosophy Society of Women Engineers United Nations - Advancement of Women About-Face MADRE Center for American Women and Politics International Union of Sex Workers (IUSW) National Organization for Women (NOW) World Health Organization NAACP ACLU << Previous: International Next: Citation Styles >> Last Updated: Mar 19, 2020 9:21 AM URL: https://libguides.gwu.edu/wstu Print Page Login to LibApps Subjects: Gender Studies , Women's Studies Tags: activism , Critical_theory , equality , feminism , feminist , gender , gender_activism , gender_studies , LGBTQ , Queer_studies , transgender , women , women's_movements ,
https://libguides.gwu.edu/c.php?g=258716&p=1728102
A small crowd gathers at the gate outside Duon Hua Chinese high school, across from Phsar Kandal, eager to catch a glimpse of the lions inside. The lions—one red, one blue, one green and one white—leap and dance around each other to the continuous clash of cymbals and thudding beat of a drum. All the while, they shake their heads, flap their ears, blink their eyes and wag their tails. The red lion shows signs of tiring. It pulls off its head and the hind legs separate. The hind legs, in the form of Zhou Bi Shi, take to the sidelines. Drenched with sweat, the 23-year-old student strains to catch his breath. His face matches the redness of his fur-lined pants. Zhou says he has been practicing the traditional Chinese lion dance for nearly seven years. Still, after about 15 minutes of performing the continuous acrobatic movements, he says, his legs begin to get sore. “Being the tail is harder,” he says. He explains that he must support his partner, the lion’s head, lifting him onto his shoulders and bracing him when he springs forward. “If the head wants to jump and the tail is tired, it cannot jump,” he says. The hind legs, he says, are also responsible for wagging the lion’s tail, which is controlled by a short bamboo rod inside the cloth costume. The head, wearing a 4-kg mask, uses concealed wires to control the blinking eyelids and flapping ears. In anticipation of the Chinese New Year, which starts Thursday, the nearly 80 lion dance students at Duon Hua high school have been practicing at least an hour and a half each day since September, says Chun Xian Chung, a teacher at the school. They are preparing not for public performances but for private shows to raise money for the school, he says. The students receive many requests during this time of year, especially from families and businesses who want the lion dancers to bring them luck for the new year. For a single performance, they can raise about $1,000, Chun says. Many of the students have never danced before this season started, but he says it doesn’t take them long to learn. The school has recruited a teacher from Malaysia specifically for the task of training them. “It’s not hard,” Chun says. “Three months is enough.” Student Wang Ming, who has been practicing the dance for about four years, agrees. “It’s not difficult once you know how,” the 18-year-old says. Outside in the school’s courtyard, one lion head has climbed up a 7-meter wooden pole. He flips around and cinches back down, curling and winding around the pole as he descends upside-down. The lion up there is one of the new dancers, Zhou says. If he were more experienced, he’d be able to do more flips. “Yes, it’s dangerous,” Zhou admits. “Foreigners wouldn’t dare to do this without wires to support them.” Beside the pole-dancing lion, another lion makes its way across a series of upright beams of various heights. It hops between beams, kicking its furry, white feet and shaking its gold-lined mane in time with the cymbals. This lion is heading to the other end to pick a big, plastic flower attached to the farthest beam, Zhou explains. Once he gets there and picks it, the dance is over, he says. Sometimes the new dancers are scared to climb up on the 2-meter high beams, Zhou says. But, he says: “When you know how, you know how.” Zhou and Wang say they train to dance to preserve this part of their Chinese heritage. Like many of the school’s students, they were born here, their ancestors having arrived in Cambodia a generation ago. “It’s tradition,” Zhou says.
https://english.cambodiadaily.com/news/students-learn-lion-dance-for-holiday-performances-37669/
A combined syndrome of juvenile polyposis and hereditary haemorrhagic telangiectasia associated with mutations in MADH4 (SMAD4). Juvenile polyposis and hereditary haemorrhagic telangiectasia are autosomal dominant disorders with distinct and non-overlapping clinical features. The former, an inherited gastrointestinal malignancy predisposition, is caused by mutations in MADH4 (encoding SMAD4) or BMPR1A, and the latter is a vascular malformation disorder caused by mutations in ENG (endoglin) or ACVRL1 (ALK1). All four genes encode proteins involved in the transforming-growth-factor-beta signalling pathway. Although there are reports of patients and families with phenotypes of both disorders combined, the genetic aetiology of this association is unknown. Blood samples were collected from seven unrelated families segregating both phenotypes. DNA from the proband of each family was sequenced for the ACVRL1, ENG, and MADH4 genes. Mutations were examined for familial cosegregation with phenotype and presence or absence in population controls. Findings No patient had mutations in the ENG or ACVRL1 genes; all had MADH4 mutations. Three cases of de-novo MADH4 mutations were found. In one, the mutation was passed on to a similarly affected child. Each mutation cosegregated with the syndromic phenotype in other affected family members. Mutations in MADH4 can cause a syndrome consisting of both juvenile polyposis and hereditary haemorrhagic telangiectasia phenotypes. Since patients with these disorders are generally ascertained through distinct medical specialties, genetic testing is recommended for patients presenting with either phenotype to identify those at risk of this syndrome. Patients with juvenile polyposis who have an MADH4 mutation should be screened for the vascular lesions associated with hereditary haemorrhagic telangiectasia, especially occult arteriovenous malformations in visceral organs that may otherwise present suddenly with serious medical consequences.
- Published: Seed production, seed dispersal and seedling establishment of two afromontane tree species in and around a church forest: implications for forest restoration Forest Ecosystems volume 3, Article number: 16 (2016) Article metrics - 2901 Accesses - 4 Citations Abstract Background Seed production, seed dispersal and seedling establishment are relevant life phases of plants. Understanding these processes and their patterns is essential to recognize vegetation dynamics and to apply it to forest restoration. Methods For Olea europaea and Schefflera abyssinica, fecundity was estimated using randomized branch sampling. Seed dispersal and seedling establishment were monitored using spatially explicit seed traps and plots. Dispersal functions were calibrated applying inverse modeling. Results O. europaea produced more seeds and had longer dispersal distances compared to S. abyssinica. Correlations between observed and predicted number of recruits were statistically significant. Seedlings of the two species showed different niche requirements. Conclusions The studied species were recruitment-limited due to low dispersal activity or lack of suitable microsites. Restoration relying on natural regeneration should overcome these limitations by increasing disperser visitation and reducing biotic and abiotic stresses. Background Deforestation is almost a synonym for Ethiopian forest history. Small patches of forests that surround churches, hence called church forests, are the only remnants after past deforestation in the northern part of the highlands (Nyssen et al. 2004, 2009). Church forests are located as islands in a matrix of a highly degraded agricultural landscape (Wassie et al. 2005). They represent hotspots of biodiversity and are critical conservation areas in the Afromontane region (Aerts et al. 2016). Ecosystem restoration with the objective of watershed and riparian repair functions as well as livelihood and landscape diversification is a national priority in current land management in these degraded highlands (Nyssen et al. 2004). The most appropriate strategy to restore degraded agricultural landscapes involves the reconstruction of native plant communities through re-colonization of native flora, reforestation or afforestation (Stanturf et al. 2014). Restoration can be achieved using tree species (active restoration), relying on natural re-colonization, or through assisted natural regeneration (passive restoration). Both approaches have been discussed as restoration options to re-vegetate the highlands of Ethiopia (Abiyu et al. 2011). In the past, reforestation programs with plantation species were successful due to the fast growth of such species and their well-known management practices (Zanne and Chapman 2001; Lemenih and Teketay 2006). While these plantations improve soil fertility (Lemma et al. 2006; Abiyu et al. 2011), they do not have any positive effect on biodiversity (Chazdon 2008) and therefore represent an incomplete first step of a restoration process (Stanturf et al. 2001). Assisted natural regeneration and natural regeneration rank highest on the restoration ladder (sensu Chazdon 2008) with the highest ranks in biodiversity and ecosystem services at the lowest associated cost. These approaches, however, have the highest requirements in terms of spatial distribution of residual vegetation or biological legacies (Bannister et al. 2014). In order to achieve cost-efficient and timely restoration, a combination of mixed passive and active restoration strategies are favored in certain situations (Bannister et al. 2014). Thus, strategies and methods of forest restoration may follow different paradigms depending on stakeholder objectives, regional climate and degree of degradation (Jacobs et al. 2015). Fruit production, seed dispersal, germination and seedling establishment are critical life phases in plants (Harper 1997). A clear understanding of these issues are crucial to recognize patterns of colonization and extinction, directional changes in species composition or succession over time, which have strong relevance for ecosystem restoration (Hobbs et al. 2007). Information on relevant life phases of Afromontane plant species is scarce. In the absence of this information there are no means to identify the risks of failure of management measures and the means to overcome them. This information helps to understand filters of succession that determine the floristic composition of the secondary forest resulting from a passive restoration treatment. An understanding of these key processes allows the prediction of the likely outcome of any silvicultural measure in terms of vitality, density, survival, growth and quality of regeneration at an appropriate time (Wagner et al. 2010). Studies on the regeneration ecology of trees in the Afromontane forest regions in Ethiopia have characterized propagule pools, particularly soil seed banks and seedling banks, thus focusing on storage effects of reproductive potentials (Teketay and Granström 1995, 1997). Soil seed banks have little potential as a source of tree regeneration in the Afromontane region given the lack of available seeds due to soil erosion or the failure to form persistent soil seed banks owing to the physiological requirements of seeds (Teketay and Granström 1995, 1997). Apart from a study carried out for Leptonychia usambarensis in Tanzania (Cordeiro et al. 2009), no studies have been conducted to characterize seed dispersal of tree species in Afromontane forests. Some studies conducted so far acknowledge the importance of this information for East African Afromontane forests (Aerts et al. 2006). In principle, recruitment limitation can be caused by limited seed availability or by constraints on seedling establishment (Clark et al. 1999, 2007; Nathan et al. 2000; Muller-Landau et al. 2002). Dispersal mediated recruitment limitation is especially severe with fleshy fruited trees (Rey and Alcántara 2000; Zywiec et al. 2013). While these limitations may promote coexistence in plant communities at stand levels (Herrera and Jordano 1981; Herrera et al. 1998; Abrams 2003), they severely inhibit ecosystem restoration (Holl 1998, 1999, 2008). Ecosystem restoration in general requires knowledge on seed dispersal characteristics of targeted tree species and an understanding of constraints to seedling establishment and survival. The objective of this study was to compare the similarities and differences between the seed dispersal, seed rain and seedling establishment patterns of two selected native tree species in an Afromontane church-forest of the northern Ethiopian Highlands. Methods Study area The research was conducted in and around Tara-Gedam church forest in northwestern Ethiopia (12°08′35′′N and 37°44′29′′E), situated in steep mountain terrain. The northern and northwestern boundaries of the forest are defined by steep hill slopes, the western boundary by a highway. The southern and the southeastern boundaries delimit it towards a matrix of farm and grazing land settled by subsistence farmers. Leaving a diversity of trees, which have positive interaction with crops and livestock scattered in the landscape (parkland agroforestry), is a typical land use system. The elevation ranges from 2175 to 2390 m. The mean annual minimum temperature is 13 °C and the maximum 27 °C. The mean annual rainfall is 1085 mm and occurs from June to September. The composition of the forest consists of the following native trees and shrubs: Olea europaea L. ssp. cuspidata (Wall. ex G. Don) Cif., Schefflera abyssinica (Hochst. ex A. Rich.) Harms, Albizia schimperiana Oliv., Ekebergia capensis Sparrm., Croton macrostachyus Hochst. ex Del., Acacia negrii Pic.-Serm., Apodytes dimidiata E. Mey. ex Arn., Nuxia congesta R. Br. ex Fresen., Schrebera alata (Hochst.) Welw., Grewia ferruginea Hochst. ex A. Rich., Vernonia amygdalina Del., Calpurnia aurea (Ait.) Benth., Carrisa spinarum L., Dovyalis abyssinica (A. Rich.) Warb., Bersama abyssinica Fresen., Rhus glutinosa A. Rich., Clausena anisata (Willd.) Benth., Osyris quadripartita Decn., Maesa lanceolata Forssk. and Myrsine africana L. Eucalyptus camaldulensis Dehnh. is the dominant non-native tree species in the matrix of degraded land beyond the church forest. Two native tree species, i.e., Olea europaea L. ssp. cuspidata (Wall. ex G. Don) Cif. (from here on referred to as O. europaea) and Schefflera abyssinica (Hochst. ex A. Rich.) Harms (S. abyssinica) were selected for this study, considering their dominance as upper canopy trees in forest remnants and also for their timber and non-timber importance to local people. The study was carried out from February to November 2009 and from January to October 2010. O. europaea is an evergreen tree or shrub, reaching a height of up to 18 m. The flowers and fruits are clustered on auxiliary panicles. Fruits are dark violet when ripe, one seeded and 0.5 to 1 cm in diameter. Flowering and fruiting time is between September and January. Dispersal is predominantly by frugivorous birds. S. abyssinica is a deciduous tree species reaching up to a height of 30 m. The flowers and fruits are clustered at the end of 30 to 40 cm racemes. The multi-seeded fruits are red and 0.26 to 0.31 cm long. Flowering and fruiting time is from March to May. Dispersal is mostly carried out by fruit eating birds (Bamps 1989). In our study area, it starts its life as an epiphyte and becomes an upper canopy tree when fully grown (Abiyu et al. 2013). Seed trap placement for dispersal distance estimation Seed traps were used to sample seed rain inside and outside the forest patch. The seed traps were circular baskets with a 60 cm radius, made from bamboo and lined with plastic sheets. Three 1.5-m high stakes were used to raise the seed traps above the ground to avoid predation by rodents (Additional file 1). However, not all traps were at similar height above the ground, given differences caused by pit preparation. Traps were arranged inside the forest and in the matrix outside the forest. In the matrix outside the forest, traps were arranged along transects, under trees and along water bodies and drainage lines (Fig. 1). The total number of traps set inside and outside the forest was 388. The coordinates (x, y) of each trap and potential seed source tree were established. The traps were set up in November 2009 and were monitored during the fruit setting period up to July 2010. Seeds from traps were collected once a week, counted at the spot, bagged, labeled and transported to the laboratory. This routine was repeated until no more seeds were recovered from the traps. Regeneration study Next to each trap, 1 m2 (1 m × 1 m) plots were prepared, where seeds were marked with toothpicks and monitored for emerging seedlings. These plots were stratified into: (i) open habitats, (ii) stones/boulders, (iii) trees/shrubs and (iv) banks and the immediate neighborhood of water bodies (springs, ponds and creeks). While established plants and germinants are rare in the studied habitats, tree establishment was observed in areas with freshly exposed soil by human activity. In addition and in order to validate seed dispersal kernels with plant distribution, we laid out a further set of 34 square plots (2 m × 2 m) along additional transects running from seed sources into the open habitats, perpendicular to the first set of transects. Habitats for these plots were classified into road side boulders (12 plots), stone bunds on farms (10 plots) and open spaces between these habitats (12 plots). Modeling seed dispersal: fecundity and distance The approach developed by Ribbens et al. (1994) is widely used in modeling seed dispersal (Loiselle et al. 1996; Wada and Ribbens 1997; LePage et al. 2000; Canham and Uriarte 2006). It models both components of dispersal functions, i.e., the amount of seeds produced and the dispersal distance. Poisson distribution functions are used to predict the seedling recruitment patterns using the following equation: where R is the predicted number of recruits (seeds and seedlings) and STR (standard total recruitment) denotes the number of fruits produced by a tree of standard dbh (diameter at breast height). The parameter β modifies STR as a power function of the actual dbh observed. The second part of the equation represents the mean density of recruits in a trap located at distance m from the parent tree, where n is a normalizer ensuring that the area under the second portion of the equation is equal to 1, ɵ determines the shape of the distribution and D determines the steepness of decline in the number of recruits as the distance from the parent tree increases. Therefore, the number of recruits (R) predicted for trap i, given T trees, is: where m ij is the distance from the i th sample trap to the j th tree. Fecundity estimation We used randomized branch sampling (RBS) for the initial estimation of fecundity or standard total recruitment (STR) (Gregoire et al. 1995). RBS is a multistage sampling procedure, which defines a unidirectional random walk along the natural branching pattern within the crown of a tree. In this procedure, the most important points are defining the nodes (points where branching begins), segments (inter-nodal points) and paths (series of successive segments). A path is selected starting from the first node. The following segment is chosen by randomized selection weighted by the relative cross sectional area (CSA) of the radiating segments on the node. The thicker the segment, the more likely its selection. Eight individual trees of both species were randomly selected, since the church limited destructive sampling. From each individual tree, a limb (segment) was chosen from a pair or couple of limbs (segments) according to the probability proportional to its CSA. The number of seeds on the chosen limb (segment) was counted. This process continued until a terminal limb (segment), with a predetermined specific size was reached. The terminal limb circumference was between 4 and 6 cm. Fecundity then is defined as the total number of fruit counts at the final stage of the selected limb divided by the product of probabilities along the path (Jessen 1955; Cancino and Saborowski 2005, 2007; Peter et al. 2010). The total number of seeds per tree varied from 7,000 to 110,000 for both species. Thus, the initial value of STR was set at 50,000 and the fixed dbh was set at 45 cm based on the average value of sampled trees. Initial values for the parameters were made to fluctuate and wander up to 40 % of their original values, without fixing them, as suggested by E. Ribbens (personal communications). Data analysis Model evaluation Models were evaluated using maximum likelihood estimation, resulting in a likelihood function, which states the probability of obtaining a set of observations. In our case, maximum likelihood based dispersal functions determined the probability to observe a certain number of seeds, given a particular set of parameters. RECRUITS 3.1 (Ribbens 2002) was used to calibrate the dispersal function (equation 2), using the Metropolis algorithm to find a combination of parameter values that are likely to produce the observed values. Mean dispersal distance (MDD), percentage of strange recruits or percentage strangers (PS), observed-predicted correlation and confidence intervals were calculated for the statistical evaluation of the model. RECRUITS calculates MDD by distributing the expected seeds on a circle around a parent tree and determining the average distance from the tree. The observed-predicted correlation is the measure of spatial association between observed and model predicted values; this method uses product—moment correlation coefficients between observed values and expected means for every species. Approximate bivariate 95 % confidence intervals were fitted for estimates of STR and MDD values using the inverse likelihood ratio test. The percentage strangers (PS) calculates the amount of seeds contributed by trees outside the observation distance or the amount of seeds contributed from unmapped trees in the vicinity of the traps inside the observation distance. Model validation The recruitment functions (equation 2) were cross-validated by omitting every third trap, computing a new model and using the new model to predict traps omitted from the new model (Ribbens et al. 1994). Regeneration study Descriptive statistics were used to visualize the number of seeds reaching different traps located in the various habitats. In the 2 m × 2 m plots along the transects, one way ANOVA with unequal sample sizes was used to test the hypothesis of differences between the various habitats (micro sites) in the emergence of seedlings. Results and Discussion The amounts of seeds produced per parent tree varied between the two species. The STR value denoting the seed production for the standardized parental size was higher for O. europaea (36,219) than for S. abyssinica (28,221) (Table 1). The standard total recruitment (STR) values show seed production potential and hence fecundity. The total seed production values for both species studied are within the range of estimates of fruit production reported for tropical trees in Africa, e.g., 12,000–72,000 reported from Cameroon (Norghauer and Newbery 2015). Clark et al. (2005) estimated the fecundity of trees in the Dja Reserve, Cameroon between 25,000 to 65,000 for bird dispersed seeds and from 22,000 to 79,000 for mammal dispersed seeds. Seed dispersal profiles of the two species showed that up to 55 m dispersal distance seed densities were higher for S. abyssinica than for O. europaea, while the latter species had higher seed densities compared to S. abyssinica at longer distances (Fig. 2). The difference in the dispersal profile of the two tree species may be a reflection of the reproductive ability of their mother trees, their seed disperser activity and differential requirements of the seeds and seedlings (Rey and Alcántara 2000). S. abyssinica is represented by few large and sparsely scattered trees in the forest (Abiyu et al. 2013). It produces lipid and protein rich fruits (Saracco et al. 2005) with attractive colors which can be tracked by specialist and generalist frugivorous birds, probably with short gut retention time, dropping the seeds close to the seed source. O. europaea trees are distributed abundantly in the study area. Their fruits are mostly tracked by specialized frugivorous birds, which may disperse the seeds over longer distances. The median distance was 200 m for O. europaea and 100 m for S. abyssinica. The mean dispersal distance (MDD) was 191 m for O. europaea and 92 m for S. abyssinica (Table 1). The percentage of strangers was higher for O. europaea (46 %) than for S. abyssinica (40 %). Dispersal distances for both species can be included in the range of long distance dispersal (Norghauer and Newbery 2015), even though they are shorter than reported by other studies from the tropics. Clark et al. (2005) found up to 473 m dispersal distances for animal-dispersed species. Farther distances (316 m) were also reported (Godoy and Jordano 2001). In general, animal dispersed tree species seeds have longer dispersal distances than wind dispersed ones (Ribbens et al. 1994). The number of predicted and observed recruits are shown for both species (Fig. 3). The correlation coefficient, indicating intensity of association or spatial congruence between observed and predicted data sets, was 0.38 for O. europaea and 0.39 for S. abyssinica (Table 1). These values were also statistically significant when cross-validated, i.e., 0.55 for O. europaea and 0.35 for S. abyssinica. The highest number of dispersed seeds was located near their source trees (Fig. 4). Despite the arrival of seeds, there was no seedling recruitment on the 1 m2 plots located near to the seed traps. Seeds of S. abyssinica were found in traps placed under fruiting trees of its own species, while no seeds were found in traps placed in other habitats. The highest average number of seeds of O. europaea per trap was recorded in traps placed close to springs (681) followed by traps adjacent to bigger stones (183), under trees/shrubs (22) and on open sites (<1) (Table 2). No seedling recruitment from the ground was recorded for S. abyssinica in the 2 m × 2 m plots. There were no statistically significant (F = 2.29, p = 0.12) differences in the number of seedlings of O. europaea among the various habitats. However, a large number of O. europaea seedlings were found on human-made structures such as between boulders excavated during road construction and on stone bunds constructed for soil and water conservation (Fig. 4). On these selected habitats, seedling density diminished with increasing distance from the seed source. Except on certain human-made structures, seed dispersal was not accompanied by successful germination. Two conditions, non-random arrival and survival in predictable locations, should be met for directed seed dispersal to occur. Therefore, its contribution is minimal for vegetation dynamics in the study area. This may arise mainly from the uncoupling of different selective forces acting on seeds and seedlings (Rey and Alcántara 2000) or from onthogenic shifts in stress and resource requirement in various microhabitats (Jordano and Herrera 1995; Schupp 1995). O. europaea and S. abyssinica are recruitment-limited in our studied landscape. Although there are several mother trees at the population level for the production of recruits for O. europaea, this species is recruitment-limited due to low dispersal activity as well as its failure to germinate and establish after dispersal. Dispersers birds do not take seeds of O. europaea to microsites. On the other hand, S. abyssinica is recruitment-limited because there are few mother trees at the population level and too few available microsites such as branch forks and stem wounds. These available microsites can be saturated easily (Abiyu et al. 2013). The location of restoration sites in relation to the seed source critically affects restoration success (Holl 1998, 1999, 2008). Our study corroborates the need to maintain patches of forests as islands and stepping stones for biodiversity conservation and restoration. Church forests in northern Ethiopia are remnants of the original tree population (Aerts et al. 2016). Currently, these forests are facing strong anthropogenic pressure and dispersal of propagules from these remnants is crucial to form viable populations at the patch level. As well, restoration of those areas, devoid of their natural vegetation in the landscape, need seed input from the remnant forests. Seed dispersal is a filter for succession and affects the quality of regeneration in the context of passive restoration. This raises the importance of other landscape elements and biological legacies, such as trees on hedges and homesteads to support restoration as seed sources. In the absence of these supplementary seed sources, deliberate introduction of these two species may be needed in highly degraded areas. Conclusions The median dispersal distance for both species is less than 200 m. For successful dispersal and recruitment of O. europaea and S. abyssinica in degraded ecosystems in the Ethiopian highlands, the potential mother trees should be located not farther than the median dispersal distance. In the absence of seed sources within the indicated distance, reliance on natural regeneration may not be a suitable restoration strategy. References Abiyu A, Gratzer G, Teketay D, Glatzel G, Aerts R (2013) Epiphytic recruitment of Schefflera abyssinica (A. Rich) Harms. and the rle of microsites in affecting tree community structure in remnant forests in northwest Ethiopia. SINET: Ethiopian J Sci 36(1):41–44 Abiyu A, Lemenih M, Gratzer G, Aerts R, Teketay D, Glatzel G (2011) Status of native woody species diversity and soil characteristics in an exclosure and in plantations of Eucalyptus globulus and Cupressus lusitanica in Northern Ethiopia. Mt Res Dev 31(2):144–152 Abrams MD (2003) Where has all the white oak gone? Bioscience 53(10):927–939 Aerts R, van Overtveld K, November E, Wassie A, Abiyu A, Demissew S, Daye DD, Giday K, Haile M, TewoldeBerhan S, Teketay D, Teklehaimanot Z, Binggeli P, Deckers J, Friis I, Gratzer G, Hermy M, Heyn M, Honnay O, Paris M, Frank JS, Muys B, Bongers F, Healey JR (2016) Conservation of the Ethiopian church forests: Threats, opportunities and implications for their management. Sci Total Enviro 551:404–414 Aerts R, Maes W, November E, Negussie A, Hermy M, Muys B (2006) Restoring dry Afromontane forest using bird and nurse plant effects: Direct sowing of Olea europaea ssp. cuspidata seeds. Forest Ecol Manage 230(1–3):23–31 Bamps R (1989) Araliaceae. In: Hedberg I, Edwards S (eds) Flora of Ethiopia, vol 3, Addis Abeba University. Addis Abeba & Uppsala University, Uppsala, Addis Abeba, pp 537–543 Bannister JR, Wagner S, Donoso PJ, Bauhus J (2014) The importance of seed trees in the dioecious conifer Pilgerodendron uviferum for passive restoration of fire disturbed southern bog forests. Aust Ecol 39(2):204–213 Cancino J, Saborowski J (2005) Comparison of randomized branch sampling with and without replacement at the first stage. Silva Fennica 39(2):201–216 Cancino J, Saborowski J (2007) Improving RBS estimates–effects of the auxiliary variable, stratification of the crown, and deletion of segments on the precision of estimates. J For Sci 53(7):320–333 Canham CD, Uriarte M (2006) Analysis of neighborhood dynamics of forest ecosystems using likelihood methods and modeling. Ecol Appl 16(1):62–73 Chazdon RL (2008) Beyond deforestation: restoring forests and ecosystem services on degraded lands. Science 320(5882):1458–1460 Clark C, Poulsen J, Bolker B, Connor E, Parker V (2005) Comparative seed shadows of bird-, monkey-, and wind-dispersed trees. Ecology 86(10):2684–2694 Clark C, Poulsen J, Levey D, Osenberg C (2007) Are plant populations seed limited? A critique and meta-analysis of seed addition experiments. Am Nat 170(1):128–142 Clark J, Beckage B, Camill P, Cleveland B, HilleRisLambers J, Lichter J, McLachlan J, Mohan J, Wyckoff P (1999) Interpreting recruitment limitation in forests. Am J Bot 86(1):1–16 Cordeiro NJ, Ndangalasi HJ, McEntee JP, Howe HF (2009) Disperser limitation and recruitment of an endemic African tree in a fragmented landscape. Ecology 90(4):1030–1041 Godoy JA, Jordano P (2001) Seed dispersal by animals: exact identification of source trees with endocarp DNA microsatellites. Mol Ecol 10(9):2275–2283 Gregoire TG, Valentine HT, Furnival GM (1995) Sampling methods to estimate foliage and other characteristics of individual trees. Ecology 76(4):1181–1194 Harper JL (1997) Population biology of plants. Academic, London Herrera CM, Jordano P (1981) Prunus mahaleb and birds: the high-efficiency seed dispersal system of a temperate fruiting tree. Ecol Monogr 51(2):203–218 Herrera CM, Jordano P, Guitián J, Traveset A (1998) Annual variability in seed production by woody plants and the masting concept: reassessment of principles and relationship to pollination and seed dispersal. Am Nat 152(4):576–594 Hobbs RJ, Jentsch A, Temperton VM (2007) Restoration as a process of assembly and succession mediated by disturbance. In: Walker LR, Walker J, Hobbs RJ (eds) Linking restoration and ecological succession. Springer, New York, pp 150–167 Holl KD (1998) Do bird perching structures elevate seed rain and seedling establishment in abandoned tropical pasture? Restor Ecol 6(3):253–261 Holl KD (1999) Factors limiting tropical rain forest regeneration in abandoned pasture: seed rain, seed germination, microclimate, and soil. Biotropica 31(2):229–242 Holl KD (2008) Are there benefits of bat roosts for tropical forest restoration? Conserv Biol 22(5):1090 Jacobs DF, Oliet JA, Aronson J, Bolte A, Bullock JM, Donoso PJ, Landhäusser SM, Madsen P, Peng S, Rey-Benayas JM (2015) Restoring forests: What constitutes success in the twenty-first century? New Forests 46(5–6):601–614 Jessen RJ (1955) Determining the fruit count on a tree by randomized branch sampling. Biometrics 11(1):99–109 Jordano P, Herrera CM (1995) Shuffling the offspring: uncoupling and spatial discordance of multiple stages in vertebrate seed dispersal. Écoscience 2:230–237 Lemenih M, Teketay D (2006) Changes in soil seed bank composition and density following deforestation and subsequent cultivation of a tropical dry Afromontane forest in Ethiopia. Trop Ecol 47(1):1–12 Lemma B, Kleja DB, Nilsson I, Olsson M (2006) Soil carbon sequestration under different exotic tree species in the southwestern highlands of Ethiopia. Geoderma 136(3–4):886–898 LePage PT, Canham CD, Coates KD, Bartemucci P (2000) Seed abundance versus substrate limitation of seedling recruitment in northern temperate forests of British Columbia. Can J For Res 30(3):415–427 Loiselle BA, Ribbens E, Vargas O (1996) Spatial and temporal variation of seed rain in a tropical lowland wet forest. Biotropica 28(1):82–95 Muller-Landau HC, Wright SJ, Calderón O, Hubbell SP, Foster RB (2002) Assessing recruitment limitation: concepts, methods and case-studies from a tropical forest. In: Levey DJ, Silva WR, Galetti M (eds) Seed dispersal and frugivory: ecology, evolution and conservation. CABI Publishing, Wallingford, pp 35–53 Nathan R, Safriel UN, Noy-Meir I, Schiller G (2000) Spatiotemporal variation in seed dispersal and recruitment near and far from Pinus halepensis trees. Ecology 81(8):2156–2169 Norghauer JM, Newbery DM (2015) Tree size and fecundity influence ballistic seed dispersal of two dominant mast-fruiting species in a tropical rain forest. For Ecol Manage 338:100–113 Nyssen J, Haile M, Naudts J, Munro N, Poesen J, Moeyersons J, Frankl A, Deckers J, Pankhurst R (2009) Desertification? Northern Ethiopia re-photographed after 140 years. Sci Total Environ 407(8):2749–2755 Nyssen J, Poesen J, Moeyersons J, Deckers J, Haile M, Lang A (2004) Human impact on the environment in the Ethiopian and Eritrean highlands—a state of the art. Earth Sci Rev 64(3–4):273–320 Peter H, Otto E, Hubert S (2010) Leaf area of beech (Fagus sylvatica L.) from different stands in eastern Austria studied by randomized branch sampling. Eur J For Res 129(3):401–408. doi:10.1007/s10342-009-0345-8 Rey PJ, Alcántara JM (2000) Recruitment dynamics of a fleshy fruited plant (Olea europaea): connecting patterns of seed dispersal to seedling establishment. J Ecol 88(4):622–633 Ribbens E (2002) RECRUITS 3.1 Operating manual. Department of Biology. Western Illinois University, Macomb Ribbens E, Silander JA, Pacala SW (1994) Seedling recruitment in forests: calibrating models to predict patterns of tree seedling dispersion. Ecology 75(6):1794–1806. doi:10.2307/1939638 Saracco JF, Collazo JA, Groom MJ, Carlo TA (2005) Crop size and fruit neighborhood effects on bird visitation to fruiting Schefflera morototoni trees in Puerto Rico. Biotropica 37(1):81–87 Schupp EW (1995) Seed-seedling conflicts, habitat choice, and patterns of plant recruitment. Am J Bot 82:399–409 Stanturf JA, Palik BJ, Dumroese RK (2014) Contemporary forest restoration: A review emphasizing function. For Ecol Manage 331:292–323 Stanturf JA, Schoenholtz SH, Schweitzer CJ, Shepard JP (2001) Achieving restoration success: myths in bottomland hardwood forests. Restor Ecol 9(2):189–200 Teketay D, Granström A (1995) Soil seed banks in dry Afromontane forests of Ethiopia. J Veg Sci 6(6):777–786 Teketay D, Granström A (1997) Germination ecology of forest species from the highlands of Ethiopia. J Trop Ecol 13(6):805–831 Wada N, Ribbens E (1997) Japanese maple (Acer palmatum var. matsumurae, Aceraceae) recruitment patterns: seeds, seedlings, and saplings in relation to conspecific adult neighbors. Am J Bot 84(9):1294–1300 Wagner S, Collet C, Madsen P, Nakashizuka T, Nyland RD, Sagheb-Talebi K (2010) Beech regeneration research: from ecological to silvicultural aspects. For Ecol Manage 259(11):2172–2182 Wassie A, Teketay D, Powell N (2005) Church forests provide clues to restoring ecosystems in the degraded highlands of Northern Ethiopia. J Ecol Rest 23(2):131–132 Zanne AE, Chapman CA (2001) Expediting reforestation in tropical grasslands: distance and isolation from seed sources in plantations. Ecol Appl 11:1610–1621 Zywiec M, Holeksa J, Wesolowska M, Szewczyk J, Zwijacz-Kozica T, Kapusta P (2013) Sorbus aucuparia regeneration in a coarse-grained spruce forest–a landscape scale. J Veg Sci 24(4):735–743 Acknowledgements The authors thank the Commission for Development Studies (KEF), ÖAD and the International Foundation for Science (IFS) for financial support to A.A. Molla Addisu and Fikirte Shewatatek assisted in data collection and the late Sinatyehu Bayeh provided valuable comments on the arrangement of the seed traps. Eric Ribbens provided support with the RECRUITS software, Menale Wondie provided GIS support and Andras Darabant provided English language editing and correction support. We thank the reviewers who helped us to improve an earlier version of the manuscript. Authors’ Contribution All authors conceived the study. All authors helped to draft the manuscript. All authors read and approved the final manuscript. Competing interests The authors declare that they have no competing interests. Additional file Rights and permissions Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
https://forestecosyst.springeropen.com/articles/10.1186/s40663-016-0076-5
Broadcasting by the numbers Despite the dramas at SABC, the past five years has seen significant growth in broadcasting, both in audiences, choices and revenue. The National Association of Broadcasters released its latest State of the Broadcasting Industry Report late in 2019. These are the headlines. There is no doubt the period between 2015 and 2018 was a turbulent time for broadcasting, not least due to ongoing issues at the SABC, and the continued impact of technological developments. It was against this backdrop that the National Association of Broadcasters (NAB) researched its State of the Broadcasting Industry Report, the first edition of which was released in 2014 as South Africa celebrated its first 20 years of democracy. The second report, issued in November 2019, was the result of PricewaterhouseCoopers research into what has happened in the five years since then, as South Africa marked 25 years since the landmark democratic elections in 1994. As the CEO of the NAB, Nadia Bulbilia, says, “It provides clear indicators of the contribution made by broadcasters to the economy through job creation, local content creation and investment in infrastructure. It presents reliable data to inform and shape future broadcasting policy and identifies gaps for ongoing industry research”. NAB chairperson, Philly Moilwa, is upbeat. As he says in the introduction to the report, “The democratisation of broadcasting has enabled the public to enjoy and engage with more services, channels and programmes, in more languages and more genres than ever before. Overall, the story of broadcasting in our democracy is a good one.” Still on the radar, as it has been since 2015, is South Africa’s switch to digital migration. The national analogue switch-off process, which was approved 11 years ago, was revised in 2018, with the deadline having recently been extended to July 2020. The State of the Broadcasting Industry Report is based on responses from NAB members: Five from television, 39 from radio and three from signal distributors. We have highlighted some key numbers in this story, but the entire report is available from the NAB. Television overview South Africa had three commercial subscription licensed television operators (StarSat, Deukom and MultiChoice), two free-to-air (FTA) operators (SABC and e.tv) and five community television broadcasters, (1 KZN TV, Cape Community Television, Soweto Community Television, Faith Broadcasting Terrestrial (former TBN) and Tshwane Community Television), who collectively offer 62 high definition channels and over 236 standard definition (SD) channels to an audience of 38.2 million people. Of the 14.4 million TV households in the country, 55% are analogue FTA viewers, with the remainder being satellite based. Radio overview Average daily listening time on radio averaged out at 3h36 in 2018. A weekly audience of almost 36 million people tune into radio via a variety of devices, listening to 24 commercial stations (21 private and three SABC public/commercial), 16 SABC public service broadcasting stations (including Channel Africa) and 264 community stations. Seventy-one percent listen on standalone radios, but this percentage is steadily declining as cellphones (33%), vehicle radio (24%), TV (13%) and computer streaming (2%) listening become more popular. Advertising revenue (TV) Revenue from TV advertising has grown from R6.6 billion in 2014 to R7.5 billion in 2018, reflecting a 3.3% compound annual growth rate CAGR in comparison to the 14.0% CAGR of the pre-2014 period. Historically, the report said, TV was the largest advertising segment by revenue, but this is being challenged by internet advertising, predicted to overtake television by 2022. Advertising revenue (radio) Radio’s advertising revenue grew from R3.9 billion in 2014 to R4.2 billion at a CAGR of 2.3%, in comparison to the 12.7% CAGR of the pre-2014 period. While radio’s greatest strength is its ability to reach a large-scale audience, the ability to deliver targeted content to more specific groups of people needs to be understood and developed, NAB recommended. Radio has shown “slightly slower growth over the past four years” but has been “aided by the rise of community stations to remain prominent, as music streaming and podcasts begin to enter the market”. This isn’t necessarily a bad thing, NAB says, as while streaming and podcasts do compete with radio “they also drive a culture of listening and the spoken word” and as such, contributed to radio’s continued relevance. TV revenue R2.32 billion: That’s how much in licence fees, levies and other contributions TV broadcasters brought in over the period 2015 – 2018. Subscriptions to pay-TV were the main drivers to overall growth in revenue, with an additional 1.5 million households expected to sign up between 2018 and 2022. However, the NAB warns, this is expected to slow “as the cultural shift towards on-demand, personalised content via streaming services gains traction”. FTA channels are still the mainstay of viewers, with the top five most-watched TV shows in 2018 all being on FTA channels. E.tv’s satellite broadcaster, Openview, which launched at the end of 2013, has shown significant growth over the last two years. “In the 12 months to September 2018, its customer base grew 42%, and in March 2019 reported 1.6 million active set-top boxes”. Radio revenue Total contributions from radio businesses over the period 2015 – 2018 in respect of licences, levies and other fiscal contributions amounted to R700 million, substantially higher than the R471 million over the period 2012- 2014. “This increase is primarily driven by Needletime Royalties following the Supreme Court of Appeal ruling in 2014 on the Needletime formula, which came into effect during the 2015 – 2018 period,” the NAB reported. Signal distributors have over the past four years contributed R568 million in the form of taxes and other fees and levies.
Now days many people are getting aware about what they eat, how much they eat, but, somewhere they are not aware about when to eat, they end up eating at a wrong time. They don’t realize when the stomach is really active and that’s the best time to eat, but they do mistake, so they don’t get the benefit, which they should get. Wrong timing leads to many stomach problems like indigestion, bloating, acidity, burning sensation, lots of gases and irritable bowel syndrome. Our eating habits, however are influenced by our busy schedule. Majority of people end up by taking their breakfast by 10 AM or some don’t take breakfast at all, and their lunch in and around 2 to 3 PM and the dinner sometime pass midnight, yes, that’s how majority of people follow the eating habits. Naturopathy talks about organ cycle or our body functions at its highest capacity at a specific time, this balance in this cycle is the root cause of majority of these problems. Today I am going to talk about 2 such timings, at which you should have your breakfast and lunch. The reason you should follow to eat food at this time, because at this time your metabolism is at highest peak. Best Time to Eat Breakfast Contents Breakfast time – Breakfast should be eaten at 8.00 am, because the stomach is most active at this time, and nutritious breakfast quick starts your metabolism in such a way that you are energetic throughout the day. Breakfast at 8.00 am improves concentration, helps in control of weight; it lowers the risk of Type 2 diabetes, and heart disease. Breakfast is usually after long fast, that is the whole sleep time, our body has automatically absorb the nutrients which you had a dinner. Therefore, we must eat breakfast at around 8 am, when your stomach is highly active and this would help in the better digestion and generation of energy, which you in your morning routine. Best Time to Eat Lunch Lunchtime should be 4 to 5 hours after breakfast, according to organ cycle lunch should be consumed by 12 o’clock, at this time circulation is optimal and heart is highly active. Our body, are programed to burn more fuel at the time of lunch, to be stored for the rest of the day. As we go on delaying our lunchtime, it becomes difficult for stomach to carry out the digestive process, so lunch should be taken by 12, so that the body has time to generate energy and then store the energy for the rest of the day. So you should eat wholesome meal, at these 2 specific times, later in a day then you should have small – small quantities of meal, as early as possible. Best Time to Eat Dinner You should try to have your dinner preferably by 7 PM, because melatonin level of our body rises to see that our body goes to quietude and rest, and that helps in the better sleep. When the day is ending and it is getting darker, it gets difficult for body to digest food, at the same rate, as it does in a day, when the melatonin levels are low, and also the body is energetic and active. An early dinner allows the body to digest the food efficiently. When we sleep, our body heals themselves, but if we eat late at night, the body doesn’t have sufficient time to digestive its food, so majority of the time the body is busy digesting the food and repair work does not take place at all. So remember, you have early and light dinner. So to follow these specific timings I would suggest you plan your meals systematical. Follow The Schedule Strictly A schedule can help you to follow proper meal time efficiently. Moreover to get the most nutrition and prevent all the health related problems, a person should remember that you eat food on a specific time. Your breakfast is must, person should have breakfast by 8 o’clock and person must have lunch by 12 to 1. And these two timings, if you really follow strictly you will notice, how your health is getting better and better. So follow this schedule, after all we are part and parcel of nature. Our day is from sunrise to sunset and so, be very-very clear that your last meal, has to be early and not later.
https://surelypure.in/time-when-your-stomach-is-most-active/
You name or describe a creature you are familiar with. As long as the creature is no more than 1,000 feet away from you, you will sense the creature’s position. If the creature is moving, you will also know the direction of its movement. Locate Creature 5e Level: 4th Classes: Cleric, Druid, Paladin, Ranger, Bard, Wizard Casting Time: 1 Action Range: Self Components: V, S, M Duration: Concentration, up to 1 hour The spell can locate a specific creature you know; or it can locate the closest individual of a specific type of creature (such as a human or a unicorn), but you need to have seen this type within 30 feet. Creature at least once. If the creature named or described is not in its original form (for example, it is being affected by the spell effect of a polymorph spell), the spell cannot locate the creature. If a stream of at least 10 feet wide between you and the targeted creature blocks the path between the two, the creature cannot be targeted by the spell.
https://etbye.com/locate-creature-5e/
Point and Shoot: Is It Legal to Take Pictures of Factory Farms? As authorities in Florida try to make taking photos of farms illegal, James Reeves traces the law's Red Scare roots and offers some legal tips. People get nervous when they don't know why you're taking a picture of something. Pointing a camera at the Statute of Liberty is understandable. Taking a photo of a barge or some pilings in the East River attracts authorities. This anxiety is not just a feature of cities. Speeding through Utah one evening, I saw the beautiful skeleton of a wrecked cement mixer on the horizon, backlit by the sun setting beneath the blank Salt Flats. I pulled onto the shoulder of the empty highway with my camera ready to flash. Two minutes later, a man in sunglasses in a black jeep with tinted windows was hollering at me, demanding my camera. I still don't know where that jeep came from, but I remember how angry I got. Standing in the middle of the desert, my mind flashed on the dozens of times I've been harassed by security guards, soldiers, and concerned citizens for taking pictures. I remember feeling like a criminal while driving around ports taking pictures of the colorful stacks of shipping containers, nearly having my film confiscated by a supermarket manager, and being shooed out of several federal installations. Why can't I take pictures of things funded by my tax dollars? Indignation fades to a darker concern: If our infrastructure is so precarious that snapping a photo from across the street compromises national security, we're in trouble. Cameras are everywhere these days. They're built into our computers and telephones, mounted on overhead poles and ATM machines, and we're always posing for satellites and Google. We expect to be recorded in the public realm, yet we're facing new laws that prohibit us from taking a photo on the subway platform or at the airport. This paranoia may feel like a relatively recent feature of modern life, a logical extension of enthusiastic TSA body scans and border patrol checkpoints, but America has always been anxious about photography. In 1950, for example, the government passed a law that allowed the military to shoot you for taking a picture. Drafted in the heat of the Cold War, the McCarran Internal Security Act authorized the "use of deadly force" if a camera or recording device was pointed at the fenceline of a military installation. Although portions of the McCarran Act were later repealed, its spirit lives on today, most notably in the recent crop of state statutes that make documenting a police officer a felony. A Chicago artist was recently busted for selling his paintings without a permit. He filmed the confrontation. The permit charge was dropped; today he faces five years in prison for recording the arresting officer. This logic is now being extended to our food. In Florida, a series of videos and photos recently captured the horrible things that corporate farms do to the animals we eat. Most of us are vaguely aware of the claustrophobia and brutality, the genetically deformed creatures tipped over in tiny cages; these videos simply illustrate the filth and slaughter of mechanized farming in detail. Senator Jim Norman responded to these upsetting images with a logical proposal: Ban photography on farms. Senate Bill 1246 would prohibit "entering onto a farm and making any audio record, photograph, or video record at the farm without the owner's written consent." Although it's true that employees at most private companies can't take pictures of the intellectual property of their employer, if any industry demands utter transparency, it ought to be the one that feeds us. And what is a farm? Where does it begin and end? S.R. 1246 defines "farm" as "any tract of land cultivated for the purpose of agricultural production, the raising and breeding of domestic animals, or the storage of a commodity." That's a lot of land. A couple of basic legal principles for all photographers: 1. You can photograph anything you like from public property, unless the subject has a reasonable expectation of privacy (i.e. no zoom lenses). 2. You can also shoot whatever you like when you're on private property; provided there is no expectation of privacy (e.g. you're on a driveway or in a field near the interstate). Trespassing and invasion of privacy are two separate legal issues (for more on this, you should consult Bert Krages's Legal Handbook for Photographers). I pointed this out to the man in black sunglasses, but he wasn't impressed. He kept yelling. I got back in my rental car and drove away, feeling like a criminal rather than a photographer drawn to industrial scenes. What was that man afraid of? Why can't we point our lenses at our public servants and the producers of our food? They should welcome our attention. When the McCarran Security Act was first introduced in 1949, Truman tried to kill it. "In a free country," he said, "we punish men for the crimes they commit, but never for the opinions they have. And the reason this is so fundamental to freedom is not, as many suppose, that it protects the few unorthodox from suppression by the majority. To permit freedom of expression is primarily for the benefit of the majority because it protects criticism, and criticism leads to progress." His veto failed. The bill passed and it destroyed countless lives until it was slowly dismantled over the years as America recovered from the Red Scare. Although frightening and wrongheaded, the authors of the McCarran Internal Security Act believed they were protecting us from a political threat and, under its most generous reading, from a nuclear war. What is the rationale for shielding farmers from public scrutiny? James A. Reeves is a writer, designer, teacher, and partner at Civic Center, whose first book, The Road to Somewhere: An American Memoir, will be published by W. W. Norton in July 2011. He goes to law school in New Orleans and worries about the American landscape on his blog, Big American Night. Photos: (1) courtesy the author; (2) via PETA.
https://www.good.is/articles/point-and-shoot-is-it-legal-to-take-pictures-of-factory-farms
Beyond any talk of quantum entanglements and the arguments over whether you have existed before your birth, can be in two places at once , and, then live on after you are dead in some other dimension, the practical argument is either you are you or you are not. We as humans experience the extremes which are birth and death. You are either defected and with medicine we are told we can be perfected – in the future we can be designed like a toy. Like it or not, the clichéd future has shocked us into this reality. A reality that we now fear is simulated and has been augmented to take our minds off the fact that our extinction can be avoided with genetic engineering. But we have to also consider that genetic engineering can also contribute to our demise as rogue scientists continue to throw out ethics in order to get a taste of what it is to be a god. In 1997, we started talking about the possibility that mankind was about to map the human genome. At the time we were all being subjected to a lot of predictive programming about the dangers and or obstacles that were already approximated to come with DNA or genetic sequencing. When launched in 1990, the Human Genome Project was heralded as a scientific endeavor that would provide answers to some of the most vexing questions about how genetic makeup influences human health. However, beyond the benefits of the project, there was always the slippery slope of knowing that in the future a technocratic dictatorship or a scientific authority would somehow get a hold of your DNA and misuse it for experimentation and for uses in creating biological weapons, vaccines, cloning procedures and other experimental procedures that are not yet foreseen. Some of the work on the Human Genome Project was being done at the Cold Spring Harbor Labs in New York. This was the Old Station for Experimental Evolution and the Eugenics records office and was endowed with funds from the Rockefeller and Harriman families in 1910. It was originally dedicated to the scientific research of racial differences. The Cold Spring Harbor Laboratory would hold secret meetings not unlike the Bilderberg Group, the Council on Foreign Relations, or the Trilateral Commission. Its Banbury Center meetings were about off the record discussions on molecular biology, and human genetics. There were many medical and scientific luminaries and technocrats that would dictate science policy at these meetings. Alongside the physical science of genetic engineering emerged the social science of bioethics – the discipline which decides what is ethical medical practice and research. UNESCO established an International Bioethics Committee in 1993. What used to be called genocide was masked as social engineering, which was carried out for political interests with pseudo-scientific ideas. In matters of life and death, the ruling elite still have the final word. In just a few short weeks, advanced genetics projects have been underway. While many of these projects have not taken a lead in the mainstream news, they are very relevant as they are stepping stones towards a future that will have to rely on DNA to define the living and identify the dead in some grandiose holocaust or catastrophe. First of all, there is the major news out of China. A Chinese scientist claims he helped create genetically-edited twins who are resistant to HIV. With this announcement comes the tsunami of dialogue about ethics and what this does to the overall gene pool of the human species. Dr. He Jiankui says that he is proud of his work using a tool known as CRISPR to remove a gene from the embryos of twin girls, altering their DNA to make them resistant to HIV. If it’s true, this is a violation of international agreements and ethical norms. Even the co-creator of this technology, Jennifer Doudna said that what he did was extremely inappropriate. Other scientists, are concerned that this kind of genetic editing could cause genetic defects that last generations or harm other genes. Some are saying that critics of the trial suffer from “Frankenstein hysteria” and that the discovery is great boon to science as genetic tinkering with human DNA can and will eventually prevent diseases and if the babies have resistance to HIV this will be a major breakthrough. The ability to edit human genes and, consequently, actually engineer a human being from birth, is something we’ve always thought of as Gattaca-style science fiction. Growing an edited embryo into a fully fledged adult human wouldn’t just remove a health problem — or, in the dystopian future model, create an augmented human. It would leave lasting changes that are passed on; something that many scientists say is desirable in the case of awful health problems, but much more questionable in the case of enhancements. In Aldous Huxley’s novel, Brave New World, society is rigidly split into five castes determined through embryonic modification. Much of the consternation surrounding the idea of “designer babies” is that germ line editing could make Huxley’s dystopian vision of the future a reality. “The fear is that germ-line engineering is a path toward a dystopia of super people and designer babies for those who can afford it,” Antonio Regalado wrote in Technology Review. “Why not design a highly intelligent group of people who could be tomorrow’s leaders and scientists?” At the moment, the prospect of a world populated by genetically modified humans is barely remaining only in the pages of science fiction. However the announcement from China about the genetically modified babies launches a debate into a nonfictional reality where artificial improvement will affect every living thing. Recently genetics and DNA analysis has also taken a macabre front row seat in determining who died in the recent California wildfires as charred bodies can no longer be identified by their teeth. Authorities doing the somber work of identifying the victims of California’s deadliest wildfire are drawing on leading-edge DNA technology. With the death toll from the Northern California blaze continues to rise and missing people are expected to rise, officials said they have been setting up a rapid DNA-analysis system, among other steps. Rapid DNA is a term for portable devices that can identify someone’s genetic material in hours, rather than days or weeks and more extensive equipment it can take to test samples in labs. A 2017 federal law provided a framework for police to use rapid DNA technology when booking suspects in criminal investigations, and some medical examiners have started using it to identify the dead or are weighing deploying it in disasters. The technology, and DNA itself, has limits. It is sometimes impossible to extract DNA from incinerated remains, and trying to identify remains through DNA requires having a sample from the person when alive or building a profile by sampling close relatives. There are still the old school ways of identifying the dead but rapid sampling and a DNA data base is being proposed for events that include megadeath scenarios where a calamity plague or a disaster kills a large number of human beings and disfigures them beyond recognition. MCI’s or Mass casualty incidents are becoming a grim reality in our world today. The environmental conditions of a mass disaster often result in severe fragmentation, decomposition and intermixing of the remains of victims. In such cases, traditional identification based on the anthropological and physical characteristics of the victims is frequently inconclusive. This is the reason why DNA profiling and DNA data bases will have to be set up and required for victim identification in mass-casualty incidents (MCIs) or any forensic cases where human remains are highly fragmented and/or degraded beyond recognition. Changes taking place in the modern world make the use of weapons of mass destruction; both biological and chemical, an increasingly likely cause of disaster in an armed conflict and a terrorist act. These two events, war and terrorism, are examples of intentional human actions; the other examples are civilization disasters which should be considered as the price which today’s society has to pay for what can be broadly defined as technological progress. The death and destruction from the California wildfires have sparked conspiracy theories over whether or not advanced directed energy weapons have been used and that this advanced technology is the reason the bodies and buildings have been fragmented into ash and that many of those examining the rubble have had to try and detect any human casualties on a molecular level. The very thought of this is probably more horrifying than finding and intact body part or skull for examination. Disaster victim identification can be performed in several traditional ways, like the physical identification of documents, jewelry and other belongings. More reliable methods are associated with the collection of fingerprints, hair and/or dental data. Until recently, in the vast majority of cases, traditional methods were used for disaster victim identification, while DNA-typing played a supporting role or was the last resort when other methods failed. Currently, disaster victim identification is based mainly on molecular methodology, which is considered to be the most effective approach in victim identification, both in small-scale disasters and in mass-casualty events. It is a terrifying thought of being in a major disaster where the identification of the casualties has to be conducted on a DNA or molecular level. Not since the 911 attacks have we had to resort to nontraditional methods of disaster victim identification—the California wildfires provided a reason for something known as the mandatory DNA database. The idea of the government having access to every citizen’s DNA might sound like an Orwellian nightmare, but recent events suggest we’re not far from this being the ground truth. The government is investigating the possibility of a universal genetic database that would contain only the limited genetic information; likely, a small subset of genetic markers with little medical relevance required for forensic identification. It is being sold that such a registry would remove the bias associated with current collection methods, they say, as well as preventing the exposure of sensitive genetic information not relevant to law enforcement. The government claims it can reduce well-documented reluctance to share useful genetic information among certain groups, particularly non-white ones already under-represented in biomedical research. And limiting the scope of genetic records accessible by the government should also help head off concerns about Gattaca-esque genetic discrimination. The truth is obvious – the government is eager for you to submit your DNA to them and they use scenarios such as the California wildfires as a reason that it is vital for your genetic identification. When I hear things like this, I wonder if there are more incidents where bodies will have to be identified on a molecular or DNA level in the future. The prevailing paranoia is that the elite are trying to kill the bottom feeders and they have many ways to do so. We have discussed Agenda 21 and also the Georgia guide stones and what is said to be the perfect agenda for population controls. According to the United Nations Agenda 21 is a comprehensive plan of action to be taken globally, nationally and locally by organizations of the United Nations System, Governments, and Major Groups in every area in which human impacts on the environment. Buried in the pages of the proposal are measures that can be taken to insure global sustainability, a world with less human resource depletion. Virtually all forms of human activity impact the environment. The United Nations plan is to take measures for sustainable development. One of the key elements of “sustainable development” is population control. The global elite are absolutely obsessed with population control. In fact, there is a growing consensus among those who support global sustainability that they need to get rid of 80 to 90 percent of us. The Georgia Guidestones tell us that we should strive to “Maintain humanity under 500,000,000 in perpetual balance with nature.” Mass death and destruction is a terrifying possibility and an intentional cull is the nightmare of Nazi like pogroms. Just because the authorities can probably already access our genetic information doesn’t mean we should make absolutely sure that they can. And just because the current system means they’re likely to identify certain populations in mass death scenarios more effectively doesn’t mean we should make everyone more vulnerable. The question isn’t whether our genetic data should be easily accessible; it seems it increasingly is. The question is whether it’s really sensible for control of it to be so centralized. Forensic DNA databases are now well established in many countries in the world. Rules on what data can be collected and stored and how it can be used differ greatly between different countries. As DNA sequencing technology advances and becomes cheaper, there are plans to set up new databases or expand existing databases in many countries. In some countries, databases that used to contain records only from people convicted of serious crimes are being expanded to include many innocent people who have been arrested but not convicted and people convicted or given police warnings or other sanctions for minor crimes. These people are treated as a ‘risky population’ who may commit future offenses. In other countries, a DNA database of the whole population is proposed. Data-sharing, involving the transfer of information across international borders is also on the increase. Anyone who can access an individual’s forensic DNA profile can use it to track the individual or their relatives. Access to a DNA sample can reveal more detailed information about a person’s health. DNA evidence is not foolproof and mistakes can be made in laboratories or in court. However, there are currently no international safeguards that would protect people’s privacy and rights and prevent miscarriages of justice. 23andMe and Ancestry.com are being investigated by the Federal Trade Commission over their policies for handling personal info and genetic data, and how they share that info with third parties. It was exposed that Ancestry and 23andMe can and frequently do sell your data to drug makers. The pharmaceutical giant GlaxoSmithKline announced it was acquiring a $300 million stake in 23andMe, making that connection much more explicit. With all of this in mind, do you think that we should have mandatory DNA data base? Do you find it a bit uncomfortable to think that there may be a disaster so great in the future that we will have to identify our dead on a molecular level? The gray areas on this topic are far reaching—and until a majority of Americans are affected, it will be long time before it becomes a mainstream concern. However, those of us who are still here should take notice.
https://www.groundzeromedia.org/11-29-18-dna-of-the-dead/
--- abstract: | We have designed and tested an automated simple setup for quickly measuring the profile and spot size of a Gaussian laser beam using three cost-affordable light sensors. Two profiling techniques were implemented: imaging for the CMOS 2D array (webcam) and scanning knife-edge-like using a single photodiode and an LDR. The methods and sensors were compared to determine their accuracy using lasers of two different wavelengths and technologies. We verify that it is possible to use a low-cost webcam to determine the profile of a laser with 1% uncertainty on the beam waist, 1.5% error on the waistline position, and less than 3% error in determining the minimum spot radius. The photodiode measurement is the most stable since it is not affected by the change in laser intensity. In addition, we show that it is possible to use an inexpensive LDR sensor to estimate the laser spot size with an 11% error. address: 'Sección Física, Departamento de Ciencias, Pontificia Universidad Católica del Perú, Av. Universitaria 1801, Lima 32, Perú' author: - 'M.  Bonnett Del Alamo' - 'C.  Soncco' - 'R.  Helaconde' - 'J.  Bazo' - 'A.M.  Gago' bibliography: - 'mybibfile.bib' title: 'Laser spot measurement using cost-affordable devices' --- Laser, Gaussian beam, CMOS sensor, photodiode, LDR Introduction ============ A precise characterization of the laser profile and the measurement of its spot size is needed for several scientific, industrial, medical, and instrumental applications [@atsumi1994medical; @dickey2014laser]. For example, this kind of characterization is important in Laser Induced Breakdown Spectroscopy (LIBS), an atomic emission spectroscopy where the laser focuses to form a plasma, which atomizes samples [@Laser_beam_LIBS] or in Laser Tissue Soldering (LTS), where a protein solution is thermally denatured and cross-linked to obtain a strong bond between tissues or tissue and a wound dressing [@Martin_Betz_LTS]. Another application is related to testing new silicon pixel sensor technology [@AglieriRinella:2017lym], where it is desired to activate individual pixels using a narrow and focused laser beam. The laser profile has to be known in advance to avoid clustering (i.e. illuminating several pixels at the same time). Several methods for measuring a Gaussian laser diameter have been developed, for a summary see [@NG20071098]. There are studies for this purpose that use a CMOS-based camera [@Purvis20191977; @Hossain20155156] and others based on a quadrant photodiode [@NG20071098; @LU20143519; @Hermosa:11], which is generally used for measuring the position of the beam. There are also alternative methods [@Mylonakis20189863; @Cherri2003; @Cherri2010; @araujo2009] for estimating the diameter of a Gaussian laser beam. The aim of this work is to offer cost-affordable, automated precise methods to measure, using a simple experimental setup, the spot profile of a Gaussian laser beam. This setup uses a Raspberry Pi (small single-board computer). We are also able to find the smallest spot size in the focal plane, known as beam waist. Three different light sensors (a CMOS webcam, a single photodiode and a LDR (Light Dependent Resistor) were used and compared to measure the radius of the laser beam. The performance of the methods and sensors were benchmarked against lasers of two different wavelengths and technologies. In addition, we will show that it is possible to use an LDR sensor, which is very cost-affordable, to roughly estimate the spot size. This paper is divided as follows: we first describe in Sec. \[sec:laser\_modelling\] the properties and parameters of a Gaussian laser beam. Then, in Sec. \[sec:expt\_setup\] we outline the general experimental setup and the specific used light sensors and lasers. In Sec. \[Laser beam radius measurement\] we give the results of the laser radius and waistline measurements, as well as the comparison/cross-check between different light sensors. Finally, in Sec. \[sec:discussion\] we discuss our findings and give our conclusions. Laser beam modelling {#sec:laser_modelling} ==================== There are several types of laser profiles including Gaussian, multi-mode, tilted, flat top and irregular beams [@dickey2014laser]. A laser with a Gaussian irradiance profile can be easily modeled with well-known mathematical expressions. Thus we select this type of beam for testing the performance of the different sensors. An ideal Gaussian laser beam has a symmetrical irradiation profile around its center, decreasing as the distance from the center increases. The waist of a Gaussian beam, $w$ [@Svelto:1338764], also called radius or spot size, is defined as half the distance across the center of the beam where the irradiance is $1/e^2$ ($\approx$ $13.5$%) of its maximum. This value is approximately $2\sigma$ of the Gaussian fit, see Fig. \[fig:waistbeam\]. ![Top: projection in the XZ plane of a Gaussian beam, which has a waist ($w$) of $2\sigma$. Bottom: 2D histogram of the Gaussian beam.[]{data-label="fig:waistbeam"}](pictures/gaussian-beam-propag.png){width="7cm"} The waist at a distance $z$ is given by: $$w(z) = w_0 \sqrt{ 1+ {\left( \frac{z-z_0}{z_{R}} \right)}^2 } \label{eq_beam_radius} \label{eq:w_z}$$ where $w_0$ is the radius of the minimum possible cross section (beam minimum waist), $z_0$ is the position of w$_0$ and $z_R$ is the Rayleigh range, which is defined as the distance from the beam waist to the point where said waist is multiplied by $\sqrt {2}$. A scheme of these parameters is shown in Fig. \[fig:beam\_profile\]. The Rayleigh range is determined by: $$z_{R}={\frac {\pi w_{0}^{2}n}{\lambda}}, \label{eq:z_R}$$ where $\lambda$ is the free-space wavelength and $n$ is the refractive index of the medium where the beam propagates through. ![Beam profile parameters. Evolution of the radius of the Gaussian beam along the beam $z$-axis as a function of the beam waist ($w_0$), the Rayleigh range ($z_R$) and the divergence angle ($\theta_{d}$). The lower part shows projections at three different distances of a Gaussian beam. The projection at $w_0$ has the narrowest waist.[]{data-label="fig:beam_profile"}](pictures/gauss_beams_f_w0z_horz.png){width="9cm"} At large distances ($z\gg z_{R}$), $w$ increases linearly with $z$, hence the [*beam divergence*]{} [@Svelto:1338764], $\theta_{d}$, as seen in Fig. \[fig:beam\_profile\], given in radians, can be define, due to diffraction, as: $${\theta_{d} =\lim _{z\rightarrow \infty }\arctan {\Big (}{\frac {w(z)}{z}}{\Big )}\simeq {\frac {\lambda }{\pi nw_{0}}} =\frac {w_0}{z_R}}. \label{eq:divrg}$$ For this study, the beam radius equation (Eq. \[eq\_beam\_radius\]) will be used to determine the beam profile. To achieve this, it is necessary to measure the values of the laser spot size as a function of the distance to the sensor, as it moves away from the laser. From these data, it is possible to determine the values of: $w_0$, which presents zero divergence, $z_R$ and $z_0$. Experimental setup {#sec:expt_setup} ================== To measure the laser beam spot we have designed the experimental setup shown in Fig. \[fig:assembly\] and tested, applying different methods, three light sensors and two lasers. ![Experimental setup to measure the laser spot. The laser remains fixed, while the sensor is moved in the $y$-axis and $z$-axis.[]{data-label="fig:assembly"}](pictures/assembly_laser.png){width="10cm"} At the bottom of the setup there is a micrometer that has a resolution of $0.001$ inches or $25.4$ $\mu$m connected to a stepper motor which allows a minimum horizontal displacement along the $y$-axis of $10.10 \pm 5.05$ $\mu$m according to the mechanical configuration of the assembly. On top of this micrometer, there is another one that moves the sensor along the $z$-axis, which is controlled manually and has a resolution of $10 \pm 5$ $\mu$m. Over the $z$-axis micrometer, each different light sensor (CMOS, photodiode and LDR) was placed. The sensor is partially isolated from ambient light using a dark chamber with a hole in the upper part, which lets the laser pass. Fitting this hole, there is an iris diaphragm [@datasheets_Iris_Diaphragms] to reduce beam aberrations. This iris only lets in the light that passes through the opening, which is regulated approximately to the spot size. An attenuator (i.e. rectangular step variable metallic neutral density filter, NDL-25S-4 [@datasheets_attenuation]) is placed between the laser and the sensor to decrease the intensity of the laser, preventing the saturation of the sensor and keeping the Gaussian profile, especially in the case of the CMOS sensor. The attenuator used has an *optical density* (OD) that varies from $0.1$ to $4$ with a tolerance of $\pm 5\%$, divided into $10$ steps or positions. The OD indicates the attenuation factor provided by an optical filter, i.e. how much it reduces the optical power of an incident beam. OD is related to the transmission, $T$, by $T= 10^{-OD}$. Therefore the transmission varies from 0.794 to 0.0001. In the upper part of the setup the laser is hold still using a retort stand. The distance between laser and sensor is determined for each measurement and explained in the next Section. The stepper motor and the sensors were connected to a Raspberry Pi 3b (i.e. a small, low-cost, single-board computer) [@datasheets_raspberry3B; @raspberry] to control the movement and capture of the sensor data. Python programs were also developed to process the data directly on the Raspberry and to obtain the average results. The scripts can be found in the supplementary material [@scripts_data]. Light sensors ------------- Three different light sensors (CMOS (webcam), photodiode and LDR) were used in this configuration. These sensors are cost-affordable. The webcam can cost circa US\$ 15, while the photodiode can be 5 times more expensive and the LDR less than US\$ 2. The first sensor was a 5MP webcam [@datasheets_rasp_camera; @rasp_camera; @git_rasp_camera] which uses CMOS technology. We removed the webcam lens to be able to measure the spot size directly, according to the size of the pixels illuminated by the laser, every time a shot was taken. The webcam was configured using the picamera package [@picamera] for the Raspberry Pi camera module for Python. The settings were: 16 $\mu$s shutter speed (i.e. exposure time) to reduce movement, 2592x1944 image resolution, analog and digital gain at 1 and ISO = 0 to maximally reduce the noise. The format used for image capture is YUV (Y: intensity, UV color code), which allows images to be captured without loss of detail and with full resolution (1-byte Y value for each pixel). The second sensor was a single PIN photodiode [@datasheets_photodiode]. In this case, to determine the beam radius, the photodiode must be moved step-by-step (e.g. similar to the Knife-Edge technique [@Wright1992]) perpendicular to the beam from a position where the whole beam hits the sensor until the beam is outside the sensitive area. This technique will return a Gaussian CDF curve. The third sensor was an LDR (light dependent resistor) or photo-resistance [@datasheets_LDR]. This electronic component decreases the resistance when the light intensity on the sensitive surface increases. Even if it is not a precision device, it is inexpensive. Here we apply the same technique used for the photodiode. The circuits for the photodiode and the LDR, consist of a variable resistance in series with the sensor. These circuits are connected to an analog-to-digital converter (i.e. ADS1115), which can be read by the Raspberry Pi, as shown in Fig. \[fig:Setup\_circuit\_all\]. ![CMOS, photodiode and LDR sensors setup.[]{data-label="fig:Setup_circuit_all"}](pictures/circuit_setup_all.png){width="10cm"} Lasers ------ Two different lasers were used for the measurements to benchmark the performance of the methods with different wavelengths and technologies. One was a generic 5 mW green semiconductor laser that gives a Gaussian spot according to the manufacturer. A model similar to this laser is found in [@datasheets_green_Laser]. The second one was a red He-Ne gas laser with power $<4$ mW [@datasheets_Helium-Neon_Laser]. The laser intensity can be controlled in two ways: for both lasers, attenuators are used, however, for the green laser it is also possible to tune the current to lower its intensity, which is not available for the red laser. In addition, the wavelength and power of each laser were measured in the laboratory. The green semiconductor laser had a 532 nm wavelength and a maximum power of 5.57 mW. Once the intensity was regulated with current and attenuators, the power was 2.83 $\mu$W. This laser was attenuated with the density filter reducing its intensity to $0.1$% of the incident beam power to avoid saturating the sensor. The red He-Ne gas laser had a 633 nm wavelength and a power of 0.67 mW. The green semiconductor laser was used to measure the laser profile and to find the beam minimum waist. Thus, a Gaussian profile was obtained. The red He-Ne gas laser was used to compare the beam radius measurement with the three light sensors. This laser has a very stable spot size with distance. Therefore the beam minimum waist was not searched for and only the beam radius was measured. In addition, it was necessary to locate the laser at a larger distance than the green laser to avoid saturating the CMOS sensor. Laser beam profile measurements =============================== As a benchmark, the radius and waistline of the green semiconductor laser beam were determined using the CMOS sensor. Next, the beam radius measurements using the red He-Ne gas laser obtained with the CMOS sensor were compared with those of the two other sensors: photodiode and LDR. Radius and waistline estimation {#Laser beam radius measurement} ------------------------------- The initial distance from the green semiconductor laser to the CMOS sensor was determined as follows. First, the distance between laser and sensor, where the area of the beam over the sensor is the smallest (beam waist), was visually searched by moving the laser on the $z$-axis. The distance from the CMOS sensor to the beam waist was measured with a vernier to be $161.94 \pm 0.01$ mm. The beam waist was scanned around this distance in a $\pm$ 5 mm range starting with the minimum distance ($156.94 \pm 0.01$ mm). Then, this minimum distance is considered as the initial position ($z=0$ mm). The CMOS sensor was moved away from the laser in $1$ mm steps, obtaining $11$ measurements. In each position, $10$ images or frames were captured and converted to ADC intensity matrices. From these data, the value of the radius in each position was calculated. To calculate the laser beam radius, the projection of the intensity profile in the $x$ and $y$ axes was made. For each frame, both projections were fitted using the following Gaussian function: $$g(x)=\frac{a}{\sigma\sqrt{2\pi}}.e^{\frac{-(x - \mu)^2}{2\sigma^2}} + b \label{eq:gauss_fit}$$ obtaining the parameters $a$ (normalization), $b$ (background off-set), $\mu$ (mean) and $\sigma$ (standard deviation). The beam radius for each axis is the 10-frame average of 2$\sigma$. The associated total error was estimated as $\Delta_{tot} = \sqrt {(\sum_{i} {\Delta_{i}}^{2})/N}$, where $N$ is the number of frames and $\Delta_{i}$ is the error for each frame, which is calculated by adding in quadrature the error from the Gaussian fit and the systematic error of 0.5 pixel. To give the results in units of distance, the number of pixels was multiplied by 1.4 $\mu$m, which is the size of each CMOS sensor pixel. In Fig. \[fig:plot\_spot\_green\], the first frame taken with the CMOS sensor at $z=6$ mm is shown, as an example. The projections of the $x$ and $y$ axes of the spot profile are given, as well as the results obtained from the Gaussian fit. The average spot radius $w_{xy}$ is calculated by: $$w_{xy}=\sqrt{\frac{w_x^2+w_y^2}{2}}=\sqrt{\frac{(2\sigma_x)^2+(2\sigma_y)^2}{2}} \label{eq:rxy}$$ where $\sigma_x$ and $\sigma_y$ are the average standard deviation of the Gaussian fit in the x and y axes, respectively. ![Beam radius measurement of the green laser with the CMOS sensor for one frame at 6 mm. Top left and Bottom right: ADC projections along the x-axis and y-axis (in pixels), respectively, of the spot profile captured with the CMOS. The red curves show the Gaussian fits. Top-right: Gaussian fit parameters for $x$ and $y$ projections (central beam positions $\mu$ and standard deviations $\sigma$ both in pixels, $\chi^{2}$ divided by the number of degrees of freedom ${ndf}$ of the fit), also the radius $w$ in each axis and average spot radius $w_{xy}$ are given in $\mu$m. Bottom left: spatial spot profile in pixels measured by the CMOS sensor, the coloured axis represents the ADC counts and the ellipse marks the spot size.[]{data-label="fig:plot_spot_green"}](pictures/Plot_Y_mean_prom__01_matriz_Y_green__6000.png){width="12cm"} To determine the laser profile parameters, the least-square fitting of the data at different distances along the beam line was made using Eq. \[eq:w\_z\]. The parameters obtained with the fit are $w_0$, the radius of the minimum possible cross-section, $z_0$, the position of $w_0$ and $z_R$, the Rayleigh range. Using these parameters, the laser wavelength can be determined from Eq. \[eq:z\_R\] and the divergence from Eq. \[eq:divrg\]. The results obtained at different distances from the CMOS sensor are shown in Fig. \[fig:plot\_spot\_green\_x\_and\_y\] and Fig. \[fig:plot\_spot\_green\_xy\], for the $x$-axis $w_{x}$, $y$-axis $w_{y}$ and average $w_{xy}$ radius, respectively. ![Beam average radius as a function of the distance between laser and sensor. The red curve represents the fit using Eq. \[eq:w\_z\].[]{data-label="fig:plot_spot_green_xy"}](pictures/Spot_fit_laser_green_xy.png){width="10cm"} Using the average radius (see Eq. \[eq:rxy\]), the beam waistline was $w_{0xy} = 22.2 \pm 0.6$ $\mu$m, Rayleigh’s range $z_{Rxy} = 2894.3 \pm 136.1$ $\mu$m, the divergence $\theta_d = \frac {w_0}{z_R} = 7.7 \pm 0.4$ mrad and the wavelength $\lambda = \frac{\pi w_{0}^{2}}{z_R} = 537.0 \pm 38.0$ nm. This estimation of wavelength is in good agreement with an independent measurement in the laboratory, which gave $532$ nm. Light sensors measurements comparison ------------------------------------- To compare the different sensors we used a red He-Ne gas laser for estimating the beam radius. In this case, the green laser, which has a smaller spot size (between 20 and 45 $\mu$m), was not used since the method applied for the photodiode and LDR has lower resolution than the CMOS sensor. In order to use the photodiode and LDR a step-wise procedure is used, which has a minimum horizontal displacement of 10.1 $\mu$m along the $y$-axis, while the pixel size of the CMOS is 1.4 $\mu$m. Thus, the red laser, which has a larger spot, size was used. For the comparison it is only necessary to measure the spot on one axis, in this case we chose the $y$-axis. The laser was located $467.15 \pm 0.05$ mm above the sensor for all three sensors to avoid saturation, since this laser’s intensity cannot be regulated. In addition, to prevent the saturation of the CMOS, different attenuations were tested. We found that the CMOS did not saturate for transmission of 1% and 0.1% of the initial laser intensity. For lower attenuations, the profile cannot be correctly fitted by a Gaussian. The LDR showed smaller variations in the spot size, also decreasing according to the attenuation. Contrarily, we found for the photodiode that the spot size is almost constant for the transmission range between 100% to 0.1%. All sensors measurements converge at the attenuator with 0.1% transmission. All sensors reach their threshold at the last attenuator position, where only 0.01% of the incident power is transmitted. At this position, the voltage output is compatible with the background. The laser spot was measured with the photodiode, using the method explained in Sec. \[sec:expt\_setup\], regulating the resistance of the circuit (see Fig. \[fig:Setup\_circuit\_all\]) to improve the sensitivity. Each set of voltage measurements began with the laser pointing inside the sensor. Then, the sensor was moved stepwise along the $y$-axis until the laser was outside the sensitive area of the sensor. In each step, 10 measurements were made. The resulting data was the average. The points obtained from these measurements follow a Gaussian CDF, as seen in Fig. \[fig:plot\_spot\_diode\_R2.2k\_red\_y\], since the profile of the laser is Gaussian. Thus, we fit these data using the corresponding following function: $$f(x)=\frac{a}{2} \left [1+\mathrm{erf} \left ( \frac{x-\mu}{\sigma\sqrt{2}} \right )\right ] + b \label{eq:gauss_fit_cdf}$$ where the parameters to fit are: $a$ the normalization, $\mu$, the Gaussian mean (position where half of the beam spot is inside the sensitive area of the detector), $\sigma$, the standard deviation ($w_y$=2$\sigma$) and $b$ the off-set from the background. Fig. \[fig:plot\_spot\_diode\_R2.2k\_red\_y\] shows an example of the Gaussian CDF fit and the obtained parameters using the photodiode data with an attenuator that allows a transmission of $1\%$ of the incident power and resistance of $2.2$ k$\Omega$. A different value of the resistance would not affect the spot size, it would only change the error since the amplitude is changed. ![Measured photodiode output voltage using a resistance of 2.2 k$\Omega$ and a transmission of $1\%$ of the incident power, as a function of distance from the initial position of the laser beam inside the sensitive area of the sensor and a horizontal displacement of 25.4 $\mu$m. The red line is the Gaussian CDF fit of the data from which the spot radius is obtained. The blue dashed line shows the position where half of the beam spot is inside the sensitive area of the sensor. The distance between the blue line and any of the black dashed lines represents the spot radius ($w_y=2\sigma$).[]{data-label="fig:plot_spot_diode_R2.2k_red_y"}](pictures/Plot_diode_Data_spot_red_0008_out.png){width="10cm"} In addition, the step distance was varied from 10 $\mu$m to 55 $\mu$m using a fixed attenuation. The beam radii obtained along the $y$-axis is stable, since the spot is large enough, it does not depend, in this distance range, on the precision of the steps. Then the LDR sensor was used to measure the laser spot with an 11.5 $\Omega$ resistance, following the same method that was used for the photodiode. Different measurements were performed varying the series resistance of the circuit. And it was observed that the results obtained with the LDR depend on the resistance of the circuit, varying the sensitivity of the sensor. This does not guarantee a reliable measurement of the spot. Only a rough estimate can be given. This is because the LDR does not have a continuous surface that measures the intensity of the beam, rather it has a zigzag of the light-sensitive semiconductor material with active and non-active areas. Also, the LDR own resistance can vary up to three orders of magnitude due to changes in the intensity of the laser. We estimate that these factors account for an approximately 10% error. Finally, the laser spot was measured using the CMOS sensor following the same method described in Sec. \[Laser beam radius measurement\]. To compare the three sensors results, the CMOS values are taken as the standard for comparison. The errors are calculated using Eqs. \[eq:err\_2\] and \[eq:n\_sigm\], where $\sigma$ is the combined error of $\Delta w_{sensor}$ the error in the beam radius estimation obtained for either photodiode or LDR and $\Delta w_{CMOS}$ the error of the CMOS. The difference between measurements of different sensors will be given in terms of the number of standard deviations, $n_\sigma$. $$\sigma =\sqrt{(\Delta w_{CMOS})^{2} + (\Delta w_{sensor})^{2} } \label{eq:err_2}$$ $$n_\sigma=\frac{\left | w_{CMOS} - w_{sensor} \right |}{\sigma} \label{eq:n_sigm}$$ The errors include the statistical and systematic uncertainties, which are for the CMOS half the pixel size, that is 0.7 $\mu$m, and for the photodiode and LDR the horizontal displacement of 5 $\mu$m. The systematic error for the LDR also adds the aforementioned factors by which the spot cannot be accurately measured, such as the variation of resistance due to the effects of intensity, resistance tolerance, hysteresis effects, etc.. These is estimated to be approximately 10% of measurement. Table \[table:Comp\_CMOS\_diode\_LDR\] summarizes the results of all three sensors at 0.1% transmission: CMOS, photodiode and LDR. Considering the uncertainties, the values obtained with the photodiode and LDR are compatible with that of the CMOS (webcam), less than 0.5 $\sigma$ difference. Fig \[fig:fit\_CMOS\_diode\_LDR\] shows the corresponding fits for all sensors. $r_{sensor} (\mu m)$ $n_\sigma$ -- ---------------------- ------------ 500.4 $\pm$ 5.5 480.8 $\pm$ 56.7 0.4 486.9 $\pm$ 54.1 0.3 : Comparison of the spot radius results obtained with the CMOS with those of the photodiode and LDR at 0.1% transmission.[]{data-label="table:Comp_CMOS_diode_LDR"} The measurement of the spot with the photodiode can be improved using less attenuation or the average of the measurements with the different attenuators, since it was observed that the spot size is almost constant for the transmission range between 100 % to 0.1 %. For example, if we use the 10% transmission attenuator, the spot value would be $506.4 \pm 5.3$ $\mu$m. ![Spot estimation with the different sensors for the attenuator with 0.1% transmission. Top left: spatial spot profile in pixels measured by the CMOS sensor (one frame), the colored axis represents the ADC counts and the ellipse marks the spot size. Top right: ADC projections along the y-axis (in pixels), of the spot profile captured with the CMOS (one frame). The red curve shows the Gaussian fits. Bottom left/right: photodiode/LDR output voltage as a function of distance (horizontal displacement of 25.4 $\mu$m). The red lines are the Gaussian CDF fit of the data from which the spot radii are obtained.[]{data-label="fig:fit_CMOS_diode_LDR"}](pictures/Plot_CMOS_axisY_frame__01_red_9000_out.png){width="12cm"} Discussion {#sec:discussion} ========== We have designed and tested the performance of an automatic setup for measuring the spot radius of laser beams using three different cost-affordable light sensors. Two common profiling techniques were implemented: imaging for the CMOS 2D array and scanning knife-edge-like for the single photodiode and LDR. The simplest and with the highest precision method for beam profiling was using the CMOS sensor. The error in determining the minimum spot radius is less than 3%, while the error on the waistline position is 1.5%. As a separate cross-check of the method, the wavelength of the laser could be determined with a 1% error. This shows that it is possible to use a low-cost webcam to determine the profile of a laser with good precision. Our results have smaller uncertainties than those obtained in [@Purvis20191977] where the error of the beam waist is 26% with a CMOS sensor compared to 1% in our case. For the method that uses a photodiode our errors are similar around 12% for the highest attenuation. However, for a different attenuation our error can improve to less than 2%. Nevertheless, this method has also some limitations. Due to the CMOS greater sensitivity, the sensor can be saturated and it can produce blooming with a high intensity laser, distorting its real profile. This problem can be overcome by using attenuators. The photodiode using the knife-edge-like technique is the most stable method. It is not affected by the change in laser intensity until the attenuation is very high. Its precision for the spot radius measurement is better than 2% under standard conditions. However, a setup with a stepper that moves the sensor along one axis is needed and the price of the photodiode is 5 times more expensive than the CMOS webcam. The LDR measurement has a strong dependence on the series resistance of the circuit. In addition, the LDR own resistance varies about three orders of magnitude depending on the light intensity. It has also a slow response and does not provide linearity with lighting. This limits its precision to accurately measuring the spot of a laser, having an estimated error of 11%. However, it has a high sensitivity and given its considerable low cost, it can be used to have a rough estimate of the spot value. A limitation for the smallest spot that can be measured with the knife-edge-like technique of the photodiode and LDR measurements is related to the mechanical system for horizontal displacement. Currently, the smallest step is 10.1 $\mu$m, while the CMOS grid has a pixel size of 1.4 $\mu$m. If the mechanical system is improved, smaller spots could be measured with the photodiode and LDR. Furthermore, the data collection system for spot determination can be improved by automating the movement in the $z$-axis. This would increase the speed and precision of the measurement. Acknowledgements {#acknowledgements .unnumbered} ================ The authors gratefully acknowledge the Dirección de Gestión de la Investigación (DGI-PUCP) for funding under Grant No. DGI-2019-3-0044. C.S. acknowledges support from the Peruvian National Council for Science, Technology and Technological Innovation scholarship under grant 236-2015-FONDECyT. We would also wish to thank R. Sanchez from the Applied Optics Group and the Quantum Optics Group for letting us use their lasers and equipment, as well as Y. Coello for the photodiode. We also thank J. A. Guerra for useful discussions and suggestions.
MAJORS IN CDAE If there was ever a hands-on major/minor, this is it. Community Entrepreneurship instills the foundations of successful enterprise development including strategic business planning, marketing techniques, and market analyses and projections. As entrepreneurship is a vital thread in the fabric of a community, students acquire entrepreneurial skills in the context of social responsibility and healthy community development. The Community and International Development major or minor offers students a structured opportunity to jump into the world and make a difference. Backed by rigorous coursework and experienced faculty oversight, students put ideas into action on the ground, both here in Vermont and all over the world. What they find is that real world issues are more complex than they usually seem. There are underlying social, economic, and cultural factors that can hinder development or be an asset to it. Public Communication (PCOM) is the practice of understanding, designing, implementing, and evaluating successful communication campaigns within a framework that serves the public interest. The PCOM program uses communication to inform and persuade, to build relationships, and to encourage open dialog in organizations and communities toward resilient solutions. This is accomplished by crafting successful messages through the application of research, theory, technical knowledge, and sound design principles. Students majoring in Public Communication use an integrated, hands-on approach to communication in the public interest to critically analyze situations, manage information, and craft messages that work in an increasingly global society.
https://www.uvm.edu/cals/cdae/undergraduate_programs
A selection of academic projects produced during ultimate years of studies at "Politecnico di Milano" University. "CHA" Central House of Artist Year: 2013 Course: Design Lab Location: Mosca, Russia Total building area: 23.000 sq.m. Total area of adjacent park: 23,46 sq.m. Thesis for Masters in Architecture degree at the "Politecnico di Milano": Redevelopment proposal for the CHA (Central House of Artist) in Moscow, Russia. The study in question is not a simple architectural project, but a complex research with a scope to develop a strategy that would solve current issues that prevent from fully exploiting architectural and therefore cultural potential of the complex. The CHA lacks a unified architectural environment, that would satisfy contemporary infrastructural and aesthetic criterias. The planning strategy illustrated in the proposal allows a gradual implementation according to actual financial state of the complex. Thus allowing to achieve the goal to transform CHA into a point of reference for activities related to contemporary art and cultural entertainment of the capital. "MOCA" Museum Of Contemporary Art Year: 2012 Course: Architectural Preservation Location: Milan, Italy Project total area: 1,750 sq.m. The aim of this project was to adapt the Modern Italian Architecture monument to a new function, while preserving its historical and artistic value. "The Marchiondi Spagliardi Institute" for difficult kids, was built in 1945-55. The project was developed by arch. Vittoriano Viganò. This complex is a materialization of a revolutionary approach to the architecture of juvenile correctional institutions. Instead of using a classical scheme for similar establishments, the architect designed a "school of life" without barriers; an environment that favours in students democratic socialisation and friendship amongst each other and existence in harmony with the building itself. An excellent example of Italian Brutalist architecture, this complex was able to transmit a strong vital energy through the reinforced concrete structure and the active implementation of bright colors such as red, blue and yellow. In 1982 the building was abandoned to itself. For a long time the complex has been abandoned to a slow deterioration and only recently its redevelopment plan was entrusted to the "Politecnico di Milano" University. During the architectural preservation workshop, students were required to apply the knowledge acquired during the course by development of a design proposal that would transform the Institute into a contemporary art museum. My design team has created a project with a clear intention of enhancing the spirit "Marchiondi Spagliardi". The proposal included a minimal amount of demolition and construction, whilst maintaining traces of dismantled elements and providing clear distinction between originals structures and new ones.
https://asfor.design/eng/portfolio/academic
Working from inspiration found in antique saddleblanket patterns, our skilled artisans give fresh life to centuries old geometric patterns, shapes and vivid color hues. In Southwest Saddleblanket Red Tapestry Throw, our weavers bring forth deep reds and hints of fiery orange, accented with deepest black, and rich turquoise. A bold, striking 100% cotton blanket perfect for adding a stroke of glorious color and Southwest flavor to your living space.
http://www.greymural.com/blankets-kds-1_6/saddleblanket-red-blanket-southwestern-blankets-by-fine-art-tapestries-msd-103.html
Investigators: Samet, Jonathan M. , Breysse, Patrick N. , Chillrud, Steven , Dominici, Francesca , Garcia, Joe , Ondov, John M. The Johns Hopkins PM Research Center brings together a multidisciplinary research team: biostatisticians, epidemiologists, exposure assessors, lung biologists and respiratory toxicologists, pulmonary clinicians, and atmospheric scientists to address the most critical gap in current understanding of health and particulate matter (PM) the physical and chemical characteristics that determine risk to human health. The Center's conceptual foundation lies in mapping health risks of PM across the US, based on analysis of national databases on air pollution, mortality, and hospitalization, and then using the maps to guide detailed monitoring and collection of PM samples for physical, chemical, and biological characterization in assays relevant to pulmonary and cardiovascular outcomes. The Center's three-phase agenda builds progressively from mapping the health risks in the first phase. During this first phase, we will also explore patterns of PM characteristics across the United States using existing data; we will develop protocols for detailed PM monitoring and collection of sufficient materials for bioassays; adapt existing in vitro and in vivo bioassays for assessing the comparative toxicity of the PM samples; and develop relevant microarray approaches. In the second phase, we will monitor and collect PM from 10 sites, selected from the higher and lower extremes of the effects of PM on human health; we will then assess the comparative toxicity of the PM samples in the bioassay battery. The third phase is likely to involve assessment of risks of more toxic particles in susceptible populations, source-related relative risk characterization, exposure assessment studies, and more focused studies of mechanisms of injury by these particles. The Center will have three discipline-based Research Projects and two scientific cores, the Data Base Core and the PM Collection, Sampling & Analysis Core. The Administrative Core will be the focal point for interdisciplinary interactions. The Center will map health risks of PM across the US, based on analysis of national databases on air pollution, mortality, and hospitalization, and then use the maps to guide detailed monitoring and collection of PM samples for physical, chemical, and biological characterization in assays relevant to pulmonary and cardiovascular outcomes.
https://cfpub.epa.gov/ncer_abstracts/index.cfm/fuseaction/display.abstractDetail/abstract/7738
In a historic first, Iraq announced the creation of its first national park, Mesopotamia Marshland National Park, in July 2013. The park designation process, which began in 2006, created the new protected area with the vision “Water, Reeds and People”, and three main objectives: restore, enhance and conserve the unique wildlife and natural beauty of the area, establish the long-term maintenance of its environmental features, including the conservation of cultural heritage and development of sustainable activities, and ensure the financial accountability of the area through ecotourism and additional means. The Mesopotamia Marshland National Park is a unique wetlands complex rich in wildlife. Located in southern Iraq, North of the Euphrates River and West of the Tigris and Glory Channel, the Park is considered to provide an ecological bridge between the Africa region (termed the Arabic region of the African plate) and the Eurasian region, and is therefore important as a resting and feeding site for millions of migratory birds. This unique confluence of water and land and the sheer size of the wetlands explains the richness of birds and other wildlife, as well as the high ecological value of the Lower Mesopotamia wetlands, both at a regional and international level. Endemic birds include the Basra Reed Warbler (Acrocephalus griseldis) and Iraq Babbler (Turdoides altirostris), the Iraqi subspecies of the Little Grebe (Tachybaptus ruficollis iraquensis) and the African Darter (Anhinga rufa chantrei). Mammals found in the Park include Smooth-coated Otter (Lutra perspicillata maxwelli) and Bunn’s Short-Tailed Bandicoot Rat (Erythronesokia bunnii).The Park also includes the endemic fish, Bunnei (Barbus sharpeyi). The marsh area around the National Park is also home to important tribes with rich cultures and traditions who still practice their customs today, and hand down their knowledge of use of traditional natural resources to new generations. This heritage is strongly supported by the new Park. However, due in part to draining of the marshes in the 1990’s, no villages are currently located in the Park. In addition, more than 60 archaeological sites have been documented throughout the area, but are still unexplored, adding to its historical importance and attraction for tourism. Despite this richness and diversity, the new Park still faces a number of challenges, including uncontrolled hunting and fishing, the use of dangerous chemicals in the area, introduction of exotic species, uncontrolled reed harvesting, buffalo breeding and development of settlements and infrastructure, and damage and looting of archaeological sites. The Park’s management plan addresses these issues, and moving forward sets out five main objectives: - to secure and maintain the habitat conditions necessary to protect significant species, groups of species, biotic communities or physical features of the environment where these require specific human manipulation for optimum management; - to facilitate scientific research and environmental monitoring as primary activities associated with sustainable resource management; - to develop limited areas for public education and appreciation of the characteristics of the habitats concerned and of the work of wildlife management; - to eliminate and thereafter prevent exploitation or occupation inimical to the purposes of designation; and - to deliver such benefits to people living within the designated area as are consistent with the other objectives of management. As preparations for the IUCN World Parks Congress 2014 develop, the new National Park stands out as a shining example of the Congress theme: Parks, People, Planet – Inspiring Solutions. A beautiful tapestry of water, reeds and wildlife, the Park represents a true coming together to restore and conserve an area of outstanding natural and cultural significance. Partners in the Park’s founding include the Iraq Ministry of Environment, Ministry of Municipalities and Public Works and Ministry of Water Resources, as well as Nature Iraq through the New Eden Project for Integrated Water Resources sponsored by the Italian Ministry of Environment Land and Sea, and the local communities surrounding the Park. After the draining of the marshes in the 1990’s, water, vegetation and wildlife are steadily starting to return. As it continues to address local and regional conservation and development challenges, Mesopotamia Marshland National Park not only represents history as Iraq’s first national protected area, but also serves as an inspiring solution for people and nature in an area once decimated by conflict and destructive policies.
https://www.iucn.org/zh-hant/node/14788
Sharks inspiring researchers to build more aerodynamic machines Turns out sharks and airplanes aren’t all that different. Both are designed to efficiently move through fluid (water and air), using the shape of their bodies to generate lift and decrease drag. The difference is, sharks have about a 400 million-year head start on the design process. That is why researchers are drawing inspiration from sharks in an effort to build more aerodynamic machines. Understanding the nuances of a shark could help improve the aerodynamic performance of planes, wind turbines, drones and cars, according to a team of evolutionary biologists and engineers at Harvard University, in collaboration with colleagues from the University of South Carolina. Their goal was to shed light on a decades-old mystery about sharkskin and, in the process, demonstrate a new, bioinspired structure. "The skin of sharks is covered by thousands and thousands of small scales, or denticles, which vary in shape and size around the body," said George Lauder, the Henry Bryant Bigelow Professor of Ichthyology and Professor of Biology in the Department of Organismic and Evolutionary Biology, and co-author of a research paper. "We know a lot about the structure of these denticles, which are very similar to human teeth, but the function has been debated." Most research has focused on the drag reducing properties of denticles but Lauder and his team wondered if there was more to it than that. "We asked, what if instead of mainly reducing drag, these particular shapes were actually better suited for increasing lift," said Mehdi Saadat, a postdoctoral fellow at Harvard and co-first author of the study. Saadat holds a joint appointment in Mechanical Engineering at the University of South Carolina. To help test that hypothesis, the researchers collaborated with a team of engineers from the Harvard John A. Paulson School of Engineering and Applied Sciences (SEAS). For inspiration, they turned to the shortfin mako, the fastest shark in the world. The mako’s denticles have three raised ridges, like a trident. Using micro-CT scanning, the team imaged and modeled the denticles in three dimensions. Next, they 3-D printed the shapes on the surface of a wing with a curved aerodynamic cross-section, known as an airfoil. "Airfoils are a primary component of all aerial devices," said August Domel, a Ph.D. student at Harvard and co-first author of the paper. "We wanted to test these structures on airfoils as a way of measuring their effect on lift and drag for applications in the design of various aerial devices such as drones, airplanes, and wind turbines." The researchers tested 20 different configurations of denticle sizes, rows and row positions on airfoils inside a water flow tank. They found in addition to reducing drag, the denticle-shaped structures significantly increased lift, acting as high-powered, low-profile vortex generators. Even if you don’t know what a vortex generator is, you’ve seen one in action. Cars and planes are equipped with these small, passive devices designed to alter the air flow over the surface of a moving object to make it more aerodynamic. Most vortex generators in the field today have a simple, blade-like design. "These shark-inspired vortex generators achieve lift-to-drag ratio improvements of up to 323 percent compared to an airfoil without vortex generators," said Domel. "With these proof of concept designs, we’ve demonstrated that these bio-inspired vortex generators have the potential to outperform traditional designs." "You can imagine these vortex generators being used on wind turbines or drones to increase the efficiency of the blades," said Katia Bertoldi, William and Ami Kuan Danoff professor of applied mechanics at SEAS and co-author of the study. "The results open new avenues for improved, bio-inspired aerodynamic designs." "This research not only outlines a novel shape for vortex generators but also provides insight into the role of complex and potentially multifunctional shark denticles," Lauder said. Gregory Hale is the editor and founder of Industrial Safety and Security Source (ISSSource.com), a news and information Website covering safety and security issues in the manufacturing automation sector. This content originally appeared on ISSSource.com. ISSSource is a CFE Media content partner. Edited by Chris Vavra, production editor, CFE Media, [email protected]. ONLINE extra See related stories from ISSSource linked below.
https://www.controleng.com/articles/sharks-inspiring-researchers-to-build-more-aerodynamic-machines/
How common is it for someone to have borderline personality disorder, bipolar disorder, and antisocial personality disorder? Statistics. Estimates regarding the prevalence of borderline personality disorder (bpd) in the general population have suggested a 1 – 2% rate of lifetime occurrence (apa, 2000). The nmih cites that the prevalence of bipolar in adults in the us is 2.6% and antisocial personality disorder to be at 1%. If you have concerns about any or all of these, seek help. Doctors are trained to help and not judge. Best. Complicated. There is high "comorbidity" (co-occurrence) of personality disorders (pds) so it is common for someone to get diagnosed with more than one pd. Bipolar is complicated... Many patients with borderline pd get misdiagnosed as "bipolar ii" by psychiatrists who do not really understand pds. On the other hand, if a person has bipolar disorder, they may be at increased risk of developing a pd as well. Diagnosis. This is quite unlikely. Also, any of these diagnoses should be made by a seasoned psychiatrist, as these diagnoses are incredibly serious and can have some overlap. Related Questions How common is it for someone to have borderline personality disorder, antisocial personality disorder, and bipolar disorder all together? Not very common. There can be instances of borderline personality disorder with bipolar disorder but the delineation of the episodes of bbipolar disorder can be masked by borderline personality disorder. Read more... Co-occurence common. The "comorbidity" (co-occurrence) of personality disorders is high, so if someone meets the diagnostic criteria for *any* personality disorder (pd), they are likely to meet the diagnostic criteria for as many as four to six pds. This reflects (in part) a limitation of dsm-iv/5 (the psychiatric diagnostic manual). Bipolar mood disorder is a different animal, but can co-exist with a pd. Read more... Could I have borderline personality disorder and antisocial personality disorder? Borderline-antisocia. Yes you can have both - typically there are very similar qualities in both disorders. The primary difference that with antisocial there is a disregard for others and social norms and often criminal behavior. Borderline fears abandonment, whereas antisocial does not typically have that characteristic. Read more... Personality disorder. There is that possibility. Best thing to do is have a consultation visit with a psychiatrist for more education and treatment options, if you wish to follow through with this. Read more... Can someone with borderline personality disorder also have antisocial personality disorder? Yes. These two personality disorders actually have some similarities and fall under the same group called cluster b personality disorders. Read more... Traits. You may not have a diagnosable personality disorder. You can, however, exhibit traits from one or more personality disorders even if full criteria is not met for a diagnosis. You may also have a concurrent mental illness and a personality disorder. Many possibilities, only your psychologist or psychiatrist can positively diagnose you. Read more... Is it possibly someone with antisocial personality disorder also suffer from borderline personality disorder? Not really. They are very different. Antisocial people don't really care for others, use people for their own means, do not have sincere emotions. In Borderline personality, people actually might care too much and don't know what to do with their feelings (so will react very extreme to a breakup or with friends). It might appear to overlap (both can have problems with anger), but they are different. Read more... How come some people confuse borderline personality disorder with antisocial personality disorder? Different things. They are different things, but it is possible to have both. Both personality disorders may be characterized by recklessness, impulsivity, and manipulativeness. The causes are different, but some behaviors may superficially look the same. Borderline personality can be treated. True psychopathic or sociopathic personality is unlikely to respond to treatment. Read more... I fit antisocial personality disorder almost to a t. What should I do? I'm in trouble at work and see doc, for bipolar already. I need help? See a counselor. If you are already seeing a psychiatrist for bipolar, that is a step in the right direction. You should also see a counselor to help you come up with strategies for getting along with people and in difficult situations. Good for you for looking for help. A lot of people in your shoes would just blame everyone else around them. Good luck. Read more... Empathy training. If you have antisocial traits, and i'm presuming you see a doctor for medication for bipolar disorder, you need therapy focusing on empathy and social perspective taking. Ask your doctor about the personality disorder diagnosis and find an expert in the field for therapy. Read more... What main symptoms would I be going through with severe psychosis, bipolar 1, and antisocial personality disorder? As above. Multiple symptoms , but the psychiatrist who has diagnosed u can answer u question. Read more... Rage and aggression. You answered your own question with the information in your previous question. Without treatment you will be considered violence prone, especially if you previously abused hallucinogens. Read more... Complex. You'd be prone to severe mood swings into mania with intense aggression and possible hallucinations. You'd also have episodes of depression with delusions & hallucinations too. You might be psychotic even outside mood episodes. You wouldn't care about harming others -- or you would think they deserved your abuse. You might also abuse alcohol and/or other substances, making everything worse. Read more... My med history antisocial personality disorder needs correcting -asked therapist for 10 yrs -for gad and bipolar- to write correction but she wrote axis II deferred -would u infer likely 'true'? I am not really. Sure what you are asking. But i normally put axis ii as deferred if a diagnosis of personality disorder is not made. This is not considered a negative to defer on axis ii. Read more... No. An axis ii deferred simply means the evaluator is not sure what or whether there is a personality disorder. Read more... Deferred on axis 2. The safest assumption that the c clinician did not have enough information to make a diagnosis on axis 2 the current condition of the diagnostic and statistical manual has recommended abandoning the axis one through five system. Read more... Please advise if it's common for bipolar disorder to be misdiagnosed as borderline personality disorder? Sometimes. Yes, on the surface. Some of the characteristics are similar such as the mood instability, impulsivity, sleep disorder especially the hypomanic states. Unlike the bipolar disorder which have distinct periods of mania and depression lasting at least a week, borderline personality disorder shows a pervasive pattern of instability with extremes of idealization and devaluation. Read more... Borderline. It can happen, unfortunately. Borderline personality disorder already IS a personality disorder, in fact, one of several. Intense fear of abandonment, being manipulative, a tendency to think of people and things in all good or all bad terms, self mutilating behaviors, drug and alcohol abuse, sexual impulsivity, a profoundly disturb sense of self, and extreme emotional volatility. Read more...
https://www.healthtap.com/user_questions/1180386-how-common-is-it-for-someone-to-have-borderline-personality-disorder-bipolar-disorder-and-antisoci
BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DETAILED DESCRIPTION 1. Field of the Invention This invention relates to computer system cooling and, more particularly, to fan cooling systems having redundant fan controllers and redundant fans. 2. Description of the Related Art Computer systems are typically available in a range of configurations which may afford a user varying degrees of reliability, availability and serviceability (RAS). In some systems, reliability may be paramount. Thus, a reliable system may include features designed to prevent failures. In other systems, availability may be important and so systems may be designed to have significant fail-over capabilities in the event of a failure. Either of these types of systems may include built-in redundancies of critical components. In addition, systems may be designed with serviceability in mind. Such systems may allow fast system recovery during system failures due to component accessibility. In critical systems, such as high-end servers and some multiple processor and distributed processing systems, a combination of the above features may produce the desired RAS level. Many systems provide redundant backup components. In a typical redundant cooling fan system, a redundant backup fan may be powered off and if the primary fan fails, the backup fan may be powered up to take over the cooling load. However in these types of systems, a primary fan controller and or a system controller must assume that the backup fan and associated control circuitry will be operational when needed. Various embodiments of a cooling system including redundant fan controllers are disclosed. In one embodiment, the cooling system includes a first fan controller coupled to control a first plurality of fans and a second fan controller coupled to control a second plurality of fans. During operation, the first plurality of fans and the second plurality of fans operate concurrently. The first fan controller and the second fan controller are each configured to monitor the first and the second plurality of fans and to detect a failure in any of the first and the second plurality of fans. Further, in response to detecting a failure of a fan of the first plurality of fans, the second fan controller is configured to increase an operating speed of a corresponding fan of the second plurality of fans. 1 FIG. 2 The illustrations shown in FIG. and depict one embodiment of a computer system including a fan cooling system. The fan cooling system includes several fan trays each having two layers of fans. The fans in each layer may be independently controlled by a respective fan controller. FIG. 1 10 20 30 30 20 20 10 70 60 60 Turning now to , a perspective view illustration of one embodiment of a computer system is shown. Computer system includes a plurality of system boards housed by a system cabinet . System cabinet may include removable panels as well as a frame structure (not shown) for holding system boards and other components. System boards may include processor boards, input/output (I/O) boards, memory boards and system controller boards. Computer system also includes various power supplies , a set of upper fan trays A and a set of lower fan trays B. 60 60 20 60 In the illustrated embodiment, there are four fan trays A above and four fan trays B below system boards . Each fan tray may include 12 fans. The twelve fans may be arranged in two layers of six fans each. The two layers are physically placed on top of each other such that each fan in a given layer is paired with a corresponding fan of the second layer. It is noted that although each set of fan trays A-B includes four fan trays as shown. It is noted that in alternative embodiments, other numbers of fan trays may be used and each fan tray may include other numbers of fans. 2 FIG. 4 As will described in greater detail below in conjunction with the descriptions of FIG. -, during operation, the air flows through both fans of a fan pair. The fans may have three speeds and may normally run at low speed. If the temperature of any sensed components in the system rises, all fans may be set to a high speed. Both fans of a fan pair may be running at the same time. If a single fan fails, the redundant fan in the corresponding layer of a given fan tray switches to super high-speed. This fan arrangement may provide N+1 fan redundancy, thereby allowing the system to continue to run with a failed fan or fans. In addition, if a fan controller fails, the remaining fan controller may continue to operate with its fans set to super high-speed. FIG. 2 FIG. 1 FIG. 1 FIG. 2 10 60 280 280 30 280 30 70 60 20 60 20 30 Referring to , a front view illustration of the computer system of is shown. Components corresponding to those shown in are numbered identically for simplicity and clarity. further illustrates the fan tray arrangement and the airflow through computer system . In the illustrated embodiment, lower fan trays B pull cool air in through air inlets A and B in the sides of system cabinet and also up through air inlet C in the bottom of system cabinet and through power supplies . Further, lower fan trays B may force air up and through system boards . Upper fan trays A may pull the air through system boards and exhaust the warmed air out through the top of system cabinet . FIG. 3 360 360 360 360 10 361 361 10 360 361 360 10 30 360 2 3 Turning to , a perspective view of one embodiment of a fan tray arrangement of a computer system is shown. As described above, each of fan trays A and B may include twelve fans arranged in two layers each having six fans. Fan trays A and B maybe coupled to computer system via fan backplane . In one embodiment, fan backplane is an interface to computer system and may provide a feed-through for power and control signals to fan trays A-B. It is noted that in alternative embodiments, fan backplane may be implemented as two independent backplane units. Each of fan trays A-B may be installed and removed from computer system as a unit by sliding the tray in and out of system cabinet . In one embodiment, each of the fan trays may be hot-swapped while the system is running. As used herein, the term “hot-swapping” refers to removing and replacing a component while the system continues to operate. It is noted that in one embodiment, fan trays A-B may be installed in a computer system such as the computer system of FIG. and FIG. . FIG. 4 FIG. 2 FIG. 3 400 10 1 400 450 440 440 450 450 465 400 450 440 440 465 465 465 450 450 450 450 451 451 451 451 450 460 1 Referring to , a block diagram of one embodiment of a fan cooling system is shown. Fan cooling system is an exemplary fan cooling system such as the fan cooling system shown in computer system of FIG. and , for example. Fan cooling system includes a fan controller A coupled to six fans designated A through F. Fan controller A is coupled to control fans A-F via a fan interconnect A. Fan cooling system also includes a fan controller B coupled to six fans designated G through L via a fan interconnect B. In one embodiment, fan interconnect A-B may be implemented using cables and connectors. In alternative embodiments, fan interconnect A-B may be implemented using circuit boards, connectors and cables. It is noted that although each of fan controllers A-B is connected to and controls six fans, other embodiments are contemplated in which other numbers of fans may be coupled to and controlled by each of fan controllers A-B. Fan controller A and fan controller B may be coupled to one or more system controller boards (not shown) via a communication link A and B, respectively. In one embodiment, communication links A and B may each be an I2C link, for example. In one embodiment, fan controllers A-B may be mounted within fan tray such as the fan trays illustrated in FIG. -, for example. 440 460 1 440 440 1 460 440 440 2 460 440 440 440 440 FIG. 3 FIG. 1 In the illustrated embodiment, fans A-L are included in a fan tray such as the fan trays illustrated in FIG. -, for example. However, it is contemplated that the fan trays may be any suitable enclosure for housing fans. Fans A-F are shown as layer of fan tray , while fans G-L are shown as layer of fan tray . As shown in , one of the fan layers is physically placed on top of the other fan layer creating six serial two-fan pairs. Accordingly, during operation, the airflow of a fan pair passes through both fans and both fans are in operation. For example, fans A and G may form fan pair A and fan B and H may form fan pair B, and so on. 450 440 450 440 450 450 440 440 440 400 Fan controller A is configured to primarily control fans A-F and fan controller B is configured to primarily control fans G-L. In addition, each of fan controllers A and B may monitor the operation of fans G-L. In one embodiment, each of fans A-L may be configured to provide a fan fail signal indicative of the fan's operational state. For example, the fan fail signal may be a logic level signal such as a logic one or a high level to indicate that the fan is operational, while a logic zero or low level may indicate that the fan is not operational. Although it is contemplated that in other embodiments, the logic levels may be reversed to indicate a fan failure. Further, each of fans A-L may be configured to provide a fan speed signal corresponding to the fan's speed. For example, in one embodiment, the speed signal may be indicative of the fan's revolutions per minute (RPM). In another embodiment, the speed signal may be a digital output and include several digitally encoded bits which correspond to the fan's speed. Accordingly, fan cooling system may provide a redundant cooling system with no single point of failure. 450 In one embodiment, a failing fan may be a fan with a fan fail signal indicating a failure or a failing fan may be a fan that did not reach a setpoint speed. Accordingly, each of fan controllers A-B may cause a given fan to operate at a particular speed (e.g., low, high and super-high speed) and may also detect whether the given fan actually attained the setpoint speed by detecting a difference between the setpoint speed and actual speed. 450 450 453 453 450 450 450 450 440 450 In one embodiment, fan controller A and fan controller B may each include fail-over logic A and B, respectively. Fan controller A and fan controller B may each also include an integrated circuit (not shown) such as a microcontroller, for example, which may serve as an interface to a system controller (not shown), for control and diagnostic functions. In another embodiment, fan controller A and fan controller B may each include other control logic (not shown) including status and control registers which may be used to control and monitor fans G-L. In addition, in one embodiment, each of fan controllers A-B may include a power converter unit (not shown) which may be configured to receive power from the computer system power supplies and to provide power to the fan controller board components. 440 400 10 400 In one embodiment, each of fans A-L may be configured to operate at three speeds: low speed, high speed, and super high-speed. It is contemplated that in other embodiments, the fans may include other numbers of fan speeds. During operation, fan cooling system may be configured to have both sets of six fans (i.e., all twelve fans) running at high speed to provide cooling air. This may be in contrast to a fan cooling system which may have backup fans that are powered off and may be free-wheeling. In one embodiment, a system controller (not shown) of computer system may monitor all system functions, including the operational state of fan cooling system . 451 451 In one embodiment, the system controller (not shown) may communicate with the one fan controller which it considers as the master via the appropriate communication link A or B. Thus, one fan controller is assumed to be the master fan controller and the second fan controller is a slave. 400 450 440 450 440 450 440 450 440 450 440 450 440 The operation of fan cooling system may be illustrated by way of an example. Assume that fan controller A is the master. As described above, fans G-L are all operating at high speed to provide cooling air. Fan controller A is actively controlling fans A-F and fan controller B is actively controlling fans G-L. In addition, fan controller A is monitoring the operation of fans A-L. In one embodiment, fan controller A may monitor the fan speed and the fan fail signals of each of fans A-L and may store information corresponding to the fan operation within status registers. Similarly, fan controller B may monitor the fan speed and the fan fail signals of each of fans A-L and may store information corresponding to the fan operation within status registers. 440 450 450 450 440 450 440 450 450 Assume, for example, that fan E fails. Fan controller A and fan controller B may both detect the failure. In response to detecting the failure, fan controller B may cause the second fan (e.g., fan K) of fan pair E to switch to super high-speed and fan controller A may power down fan E. In addition, in one embodiment, fan controller A may notify the system controller (not shown) of the failure. In an alternative embodiment, system software may cause the system controller to poll the status registers of the master fan controller (e.g., fan controller A) to detect failures. Further, in one embodiment, the system controller may notify maintenance personnel of the failure. 450 450 450 450 450 450 450 450 Each of fan controllers A and B may be interconnected and configured to detect a failure of the other fan controller. If a fan controller fails, the remaining fan controller may detect the failure and increase the speed of the fans it controls to super high-speed while the fans controlled by the failing fan controller may be powered down. For example, a power converter (not shown) on a given fan controller may fail causing the entire fan controller to malfunction. In one embodiment, each of fan controllers A and B may monitor the power converter voltage of the other fan controller. Thus, if the master fan controller (e.g., fan controller A) power converter fails, it may be detected by the slave fan controller (e.g., fan controller A) and in response to detecting the failure, the slave controller may increase the speed of all the fans it controls to super high-speed. If the slave fan controller power converter fails, the master fan controller may detect the failure and increase the speed of all the fans it controls to super high-speed. In another embodiment, a fan controller failure may be detected by the other fan controller since each fan fail signal of the failing controller may indicate a failure. In still another embodiment, each of fan controllers A and B may provide a heartbeat signal which may be monitored by each fan controller and by the system controller. The heartbeat signal may be indicative of the operational status of each fan controller. 453 As described above, if the master fan controller fails, the slave controller may increase the speed of all the fans it controls to super high-speed. In addition, fail-over logic A-B may automatically enable the slave fan controller to become the master controller. Further, in one embodiment, in response to detecting the failure, the system controller may isolate the failed master fan controller and begin communicating with the slave fan controller, which is now the master fan controller. Alternatively, if the slave fan controller fails first, the master fan controller may detect the failure as described above and may also notify the system controller of the failure as described above. 450 450 30 1 2 450 450 440 In addition to increasing fan speed in response to a fan failure, fan controller A and B may also increase fan speed in response to commands received from the system controller. For example, the system controller may monitor the temperature within system cabinet of FIG. and FIG. and may detect when the temperature rises beyond an acceptable limit. In response to a rise in temperature, the system controller may cause fan controllers A and B to increase the speed of fans A-L to high speed until the temperature is within an acceptable range. 450 450 450 450 440 450 450 450 450 440 As noted above, fan controllers A-B may include a microcontroller (not shown) which may be used to facilitate diagnostic functions. In one embodiment, the system controller may test the functionality of fan controllers A-B by sending fan control commands to each of fan controllers A-B and then monitoring whether the fan controllers responded correctly. For example, the system controller may send a command to fan controller A to set fans A-F to low, high and super high-speed. After each speed setting, the system controller may poll fan controller A to ensure that each fan was actually able to attain the correct speed. Further, the system controller may write a value to the microcontroller of fan controller A which may force a fan fail signal to indicate a fan fail condition. The system controller may then monitor the response of fan controller B to ensure that the corresponding fan of the fan pair including the failed fan has been set to super high-speed. Similarly, the system controller may perform diagnostic functions on fan controller B to check operation of fans G-L. Although the embodiments above have been described in considerable detail, numerous variations and modifications will become apparent to those skilled in the art once the above disclosure is fully appreciated. It is intended that the following claims be interpreted to embrace all such variations and modifications. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a perspective view illustration of a computer system. FIG. 2 1 is a front view illustration of one embodiment of the computer system of FIG. . FIG. 3 is a perspective view illustration of one embodiment of a fan tray. FIG. 4 is a block diagram of one embodiment of a fan cooling system. While the invention is susceptible to various modifications and alternative forms, specific embodiments thereof are shown by way of example in the drawings and will herein be described in detail. It should be understood, however, that the drawings and detailed description thereto are not intended to limit the invention to the particular form disclosed, but on the contrary, the intention is to cover all modifications, equivalents and alternatives falling within the spirit and scope of the present invention as defined by the appended claims.
Today's aerospace technologies are demanding higher performance in the materials used inside the engines, flight controls, and fluid controls. Traditional metals used in these systems often cannot withstand the extreme conditions. This is where advanced ceramic materials are needed. CoorsTek engineered technical ceramic components provide the mission-critical reliability needed for aerospace propulsion and control systems. Ceramic tubes & rods are used in investment casting to form vanes on aircraft turbine engines. Cerbec balls and other advanced ceramic components excel in the challenging mechanical and thermal conditions in critical flight control systems, such as ball screw linear actuators for wing flaps and slats. Aircraft valves, seals, and hydraulic components require the high-performance properties of engineered ceramics to meet the severe-service conditions of high-temperature gas turbine engines, rockets motors, and control systems. High-efficiency engines operate at high temperatures, where advanced ceramic materials deliver reliable, long-term performance as mission-critical components, thermal insulating tiles, and thermal barrier coatings (TBC).
https://www.coorstek.com/english/industries/aerospace-and-defense/aerospace/propulsion-controls/
This book provides an ideal introduction to the use of Feynman path integrals in the fields of quantum mechanics and statistical physics. It is written for graduate students and researchers in physics, mathematical physics, applied mathematics as well as chemistry. The material is presented in an accessible manner for readers with little knowledge of quantum mechanics and no prior exposure to path integrals. It begins with elementary concepts and a review of quantum mechanics that gradually builds the framework for the Feynman path integrals and how they are applied to problems in quantum mechanics and statistical physics. Problem sets throughout the book allow readers to test their understanding and reinforce the explanations of the theory in real situations. Features: •Comprehensive and rigorous yet, presents an easy-to-understand approach. •Applicable to a wide range of disciplines. •Accessible to those with little, or basic, mathematical understanding.
https://www.ketabdownload.com/feynman-path-integrals-in-quantum-mechanics-and-statistical-physics
Network threat detection Get news, tips and expert advice on network threat detection. This resource will cover the latest trends and technology around network threats and threat detection systems and services. Learn how to uncover, analyze and address network vulnerabilities to mitigate the risk of cyberattacks. Network threat detection News - December 13, 2017 13 Dec'17 SD-WAN a tool for combining networks, engineer says When your company acquires another, combining networks can be a chore. But SD-WAN could ease the pains associated with integrating disparate topologies. - March 31, 2010 31 Mar'10 Security information management systems in financial services Security information management systems can help financial-services firms meet regulatory compliance and other requirements. Network threat detection Get Started Bring yourself up to speed with our introductory content - port A port in computing has three main uses, each as a type of receptacle in networking, computer hardware and software. Continue Reading - Snort Snort is an open source network intrusion detection system (NIDS) created by Sourcefire founder and former CTO Martin Roesch. Continue Reading Evaluate Network threat detection Vendors & Products Weigh the pros and cons of technologies, products and projects you are considering. - Choosing ZTNA vendors amid zero-trust confusion In the era of cloud and COVID-19, analysts say ZTNA vendors offer a more secure remote access model than the legacy VPN. Here's how the technology works. Continue Reading - Network traffic pattern shifts reflect COVID-19 changes The novel coronavirus pandemic spurred initial changes in network traffic patterns, but other trends are playing important roles in perpetuating permanent traffic shifts. Continue Reading - How can network security analytics detect and thwart threats? Network security analytics gives organizations an additional level of protection against malicious attacks. It works closely with network analytics tools. Continue Reading Manage Network threat detection Learn to apply best practices and optimize your operations. - Network traffic analysis best practices: Assess and repeat Network traffic analysis best practices require network teams to work closely with security teams and constantly assess their tool sets, analysis processes and traffic patterns. Continue Reading - How to monitor network traffic in 7 steps Effective network monitoring is an ongoing process that requires constant vigilance by IT groups. This step-by-step plan can fine-tune network monitoring strategies. Continue Reading - How to improve network visibility and regain control Gaining visibility into the network has never been easy; technology like cloud and IoT makes it even tougher. Learn how to meet such challenges and keep network traffic flowing. Continue Reading Problem Solve Network threat detection Issues We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
https://www.techtarget.com/searchsecurity/resources/Network-threat-detection
Sector: - Job type: - Salary: £32000 - £35000 per annum - Consultant: Helen Dodds - Email: [email protected] - Reference: N56666_1653053758 - Published: 3 months ago - Expiry date: 2022-06-19 - Start date: ASAP - Consultant: ConsultantDrop Sellick Partnership are currently working with a large public sector organisation in the North East to recruit a Category Manager to support the Senior Category Manager in the effective management of the businesses contracts. The Category Manager will manage the whole life cycle of contracts from procurement to contract management and review ensuring that the organisation is obtaining value for money in all contracts in addition to compliance with relevant Public Contracts Regulations. Key responsibilities of the Category Manager: - Liaise closely with relevant Service Leads within their specific category and will be responsible for ensuring that advice and guidance is provided - Provide support to the Senior Category Manager, Procurement Manager, Senior and Executive Managers across the organization to ensure smooth operation of the procurement and contract management function - Analyse current contractual provisions of goods and services and make recommendations to consolidate and/or complete procurements of non-compliant contracts - Be open to and advise of new ideas and processes which may not have previously been used and have a positive role in developing relationships between procurement and other areas of the business - Need to develop and complete full business case for completing procurement exercises, including risk assessment, stakeholder mapping and establishing business requirements at the initiation stage - Be aware of procurement processes and procedures to ensure that relevant regulations and legislation is adhered to - Work with relevant service leads and stakeholders to provide support in specification development, contract management processes including annual performance reviews and contract variations - Managed the whole contract lifecycle through the in-tend e-tendering portal - Actively monitor supplier spend throughout the life of the contract to highlight any issues with contract values and liaise with the financial management team to ensure that any issues are discussed accordingly relating to budget provisions with the relevant stakeholders - Provided general advice and guidance to the stakeholders within the category area relating to procurement and contract management processes and procedures Essential Experience: - Qualified to or willing to work towards Level 5 or above in a procurement or business related qualification - Knowledge of PCR2015 regulations and how they impact on the organisation - Experience of administering contracts - Demonstrate a working knowledge of the law relating to contracting - Able to demonstrate an understanding of relevant laws and regulations, including EU procurement regulations, the Social Value Act and Data transparency - Experience of category management, dealing with contracts and contractors and working with internal and external audit - Experience of preparing formal reports and business cases We encourage interested applicants to apply immediately to be considered for short listing. Alternatively should you require further information or wish to discuss your suitability before applying please contact Helen Dodds in our Newcastle office for a confidential discussion. The closing date for applications is Friday 27th May. Do you know someone who is looking for a new job? Why not recommend them to Sellick Partnership and earn up to £1,000? For every friend or colleague you refer that is placed by us, we will give you £100 worth of vouchers. If you refer more than one candidate to us within a 12 month period we will increase your reward accordingly. T&Cs apply, please see our website for further details. Sellick Partnership is a market-leading professional services recruitment specialist operating across the UK. We are proud to be an equal opportunities employer and encourage applications from candidates of all backgrounds and circumstances, including underrepresented and disadvantaged groups and those with disabilities. Please note our advertisements use years' experience and salary levels purely as a guide. We are happy to consider applications from all candidates who are able to demonstrate the skills necessary to fulfil the role. If you do not hear from us within 48 hours please assume that your application has been unsuccessful on this occasion. For information on how your personal details may be used by Sellick Partnership, please review our data processing notice which can be found in the footer on our website.
https://www.sellickpartnership.co.uk/job/category-manager-25
When professional athletes are injured, the news travels far and wide. To be sure, this varies between sports, and athletes, and is dependent on factors like whether the player commands a cult of personality, or whether the events leading to the injury stood out in any way. But on the whole, injuries statistics are fairly well-kept and accessible for high profile leagues such as the National Hockey League and the National Football League. Prominent sports networks (ESPN, for example) give them column inches (or whatever the online equivalent is) and television time. And while these leagues often do little to remedy the high occurrence of injuries among their players, there is pressure for them to enact policies to protect athletes, largely based on these statistics. But for university-level athletes, even those playing in varsity sports, injury occurrences are not as widely reported, not as publicly visible, and therefore, not as frequently discussed or scrutinized. High-profile injuries in university-level athletics can also bring about policy changes. After Bishop’s University football player Jonathan Fortin suffered a neck injury on October 4, on Molson stadium’s artificial turf, CBC reported that McGill’s athletics director was reconsidering policy concerning keeping an ambulance on-site for future games. But many injuries at the university level go largely unnoticed by those outside of the team, and though student athletes don’t get the amount of media attention that professional athletes do, their injuries can still put them out for a season, and can impact their lives outside the sporting world as well. Kuzi Murwira, a McGill Rugby player between 2010-12 who experienced five concussions over a span of two years, has since stopped playing for McGill Rugby on the advice of his doctor and sister. “They weren’t major concussions, but because they happened over two years – that’s a relatively short time frame.” The accumulation of injuries can end athletic careers, as it did with Murwira, but a single injury can end a career as well. “I don’t think at first anybody realized what had happened,” said Steve Eldon Kerr of his partial shoulder dislocation in 2010. Eldon Kerr was a player on the then-varsity McGill Ultimate Frisbee team, and suffered his injury during practice on the Molson stadium field. After attempting to play through the pain for a little while longer, Eldon Kerr was told to leave practice to have his shoulder checked. As a player in a sport that lacked “the resources of, say, Football or Hockey,” Eldon Kerr dealt with his injury on his own through physiotherapy. Though he noted that “the attitude from coaches nowadays is pretty professional,” and that “[they] seem aware of the danger of playing with an injury,” Eldon Kerr still perceives the existence of a sports culture wherein players force themselves to play, and some fear the label of ‘injury-prone.’ This can lead to hiding injuries from coaches, and also poses potential physical dangers to the athlete, something Eldon Kerr has personal experience with. He noted that in high school, he often played through a knee injury, relying on painkillers. “A phrase that comes up in your mind is: ‘play through the pain.’” Murwira agreed that “people definitely do play with injuries,” but added that small injuries could add up, and so, “once the season starts, you never continue at 100 per cent.” The problem of individuals playing with injuries is somewhat mitigated, though, by the fact that each injured player seeking to get back in the game is required to obtain clearance from the team’s athletic therapist. Murwira said that though many “always want to push [themselves],” he had never personally felt pressured to play before achieving full recovery. Though student athletes have a range of experiences with recovery, just as they have a range of experiences with injury, both athletes noted the importance of providing information, as well as care. “I think people working with young athletes should be really serious about communicating the importance of a proper recovery,” said Eldon Kerr. Murwira noted that the athletic therapists he worked gave him good advice on how to deal with his injuries, leading him to be “grateful for the support structures that are there already.” Making information available to student athletes can happen at the physiotherapy clinic, or it can happen before an injury occurs – hopefully with the possibility of preventing that injury. In a move toward this goal, the McGill Athletics and Recreation has published articles entitled “Female Athletes and ACL Injuries” and “Female Athlete Triad,” – under the Sport Medicine section of their website – to educate female athletes about the types of injuries they might try to either prevent or handle. Though these offerings do address important sports medicine topics, they fall woefully short, in that they leave a range of situations unexplained. Education is key, not only for athletes look to prevent and treat ‘visible’ or ‘obvious’ injuries such as joint dislocations, sprains, and broken bones, but it also seems to be a factor in controlling head injuries and concussions. Dr. Scott Delaney, a team physician for the Montreal Alouettes who also practices at McGill, told the Niagara Falls Review that in a ten-year period at McGill, there were a total of 226 reported concussions from the hockey, soccer, and football teams. However, 80 per cent of male athletes in his study reported possibly having a concussion but never seeking treatment, citing reasons such as not wanting to be pulled from play, echoing the words of both Murwira and Edon Kerr.
https://www.mcgilldaily.com/2013/10/play-through-the-pain/
Alfredo Cramerotti will give a presentation of MOSTYN’s artistic programme approach for / as social change, and of other relevant curatorial projects. Examples include co-curating the Maldives Pavilion at the 55th Venice Biennial, 2015 (centred on climate change, sustainable development and the anthropocene concept applied to everyday life), and co-curating Manifesta 8 the European contemporary art biennial, Region of Murcia, Spain, 2010 (centred on artistic production through mass media outlets i.e. TV, radio, Internet, newspapers, in order to facilitate a ‘perception shift’ of what and how art can occupy different types of space and effect social impact / change). Alfredo Cramerotti will give a presentation of MOSTYN’s institutional approach for curating at the International Curatorial Workshop “Curating and Social Change” organised by the University of Zurich in partnership with Connecting Space Hong Kong, Bootes Ltd, and the Postgraduate Programme in Curating, Center of Further Education, Zurich University of the Arts. The talk will focus on the work done in MOSTYN for the audience development initiative – the History Series. The starting point was an exploration of the connections between contemporary art and the history of the building and of the town of Llandudno; turning the usual curatorial process of creating exhibitions on its head, MOSTYN invited its audience to actively provide their stories behind the former uses of the building and its changing status over the course of the 20th Century. The aim of the project was not to come out with exhibitions and educational programmes that were “good for them” but to actually listen to the local environment and then create exhibitions and learning activities with in-built social relevance through the work of contemporary artists. – Evaluation, Measurement and Impact role when making arts and / or sustain social change / impact , both in the UK and in Hong Kong.
https://alcramer.me/2017/03/25/curating-and-social-change-talks-and-workshops-by-alfredo-cramerotti-at-british-council-hong-kong-and-connecting-spaces-university-of-zurich-hong-kong/
The module consists of theory lessons creativity and theory of the history of games and animation and film. Next to that, you will get hands-on sessions during the creativity week, with several workshops where you can try out new media, with inspiring guest speakers and challenging projects. During that whole week, we will put your creative potential to the test! So can you learn to be creative? A big question many have tried to solve with complex theories, tests or systems. But do we need to make it so difficult? Isn't creativity simply a matter of innate problem-solving skills? Making (unusual) connections? Why is it that creative people have a great sense of humour and people with a sense of humour are often very creative? Is it not it just a matter of experimenting by trying something out in a different way? Thinking outside of the box - or using new techniques? Where do all these creatives get their inspiration from? How do you brainstorm efficiently? What is a mindmap or a moodboard? Why do we need a concept before we start with any project? To make great games or VFX productions, you first need to learn about their history. Knowing what has been done before in games and related products can inspire and challenge you. That is why creativity goes together with a broad knowledge in game, animation or film history. In these theory lessons we will show you a wide array of inspiring projects and realisations thoughout history. This way we develop a new taste for great movies, new animations and styles, in order to look past the AAA titles of video games and understand more about how they are made and what different styles exists.
https://digitalartsandentertainment.be/page/26/History+%26+Creativity
Configuration and Design of Electromagnets for Rapid and Precise Manipulation of Magnetic Beads in Biosensing Applications. Rapid and precise manipulation of magnetic beads on the nano and micro scales is essential in many biosensing applications, such as separating target molecules from background molecules and detecting specific proteins and DNA sequences in plasma. Accurately moving magnetic beads back and forth requires at least two adjustable magnetic field gradients. Unlike permanent magnets, electromagnets are easy to design and can produce strong and adjustable magnetic field gradients without mechanical motion, making them desirable for use in robust and safe medical devices. However, using multiple magnetic field sources to manipulate magnetic beads presents several challenges, including overlapping magnetic fields, added bulk, increased cost, and reduced durability. Here, we provide a thorough analysis, including analytical calculations, numerical simulations, and experimental measurements, of using two electromagnets to manipulate magnetic beads inside a miniature glass cell. We analyze and experimentally demonstrate different aspects of the electromagnets' design, such as their mutual influence, the advantages and disadvantages of different pole tip geometries, and the correlation between the electromagnets' positions and the beads' aggregation during movement. Finally, we have devised a protocol to maximize the magnetic forces acting on magnetic beads in a two-electromagnet setup while minimizing the electromagnets' size. We used two such electromagnets in a small footprint magnetic modulation biosensing system and detected as little as 13 ng/L of recombinant Zika virus antibodies, which enables detection of Zika IgM antibodies as early as 5 days and as late as 180 days post symptoms onset, significantly extending the number of days that the antibodies are detectable.
Laboratoria CI is an artistic organization which seeks to cultural production and research for understanding the contemporary socio-cultural processes. We consider art as a critical discipline linking research and artistic gesture, theory and practice, in which the transition from an object to an event, a process, study, immersion is important. Our activity is aimed at broadcasting of art practices with a critical view of the society in which it is produced and of the art itself. - Research exhibitions and exhibitions of contemporary art, film screenings, presentations and other discussion events. - Artistic and social research, documentary projects. - Periodical samizdat magazines and small publications. Collective: - Diana Ukhina, director - Almaz Isakov, curator - Joshik Murzakhmetov, curator - Karina Tolmacheva, coordinator - Maya Abdyldaeva, SMM-manager Contacts: +996 555 214 949; +996 700 915 935 [email protected], facebook, instagram Bokonbaev Str. 191, Bishkek, Kyrgyzstan OUR ACTIVITIES: 2018 June, 2018 – Contemporary art exhibition “Red pill” in Kyrgyz National Museum of Fine Arts named after G. Aitiev Within the framework of the exhibition “Red pill”, we initiated a conversation about memory and identity. This topic may be relevant in different historical periods and in different contexts, however, we were interested in it as a certain perspective on the social “matrix” that influences the formation of our identity and is based on memory. Within the framework of this exhibition, we suggested to artists to perform a certain deconstruction of ourselves, to find different practices of interpretation of identity and memory, to understand how the overlap of many factors shapes our understanding of others and ourselves. The works were presented at the exhibition in different mediums – installations, video, photos, graphics, documentation by artists from Kyrgyzstan, Kazakhstan and Russia. Within the framework of the program of the exhibition “Red pill” there also were events: - Collective practice with artists Ekaterina Yushkevich (Russia). Focus of collective practice was memory, personal stories, exploring the city, performative activities in an urban environment. Participants made their small investigation on the topic memory and history. - Issue of the artistic research magazine “Monuments of Bishkek”. Within the framework of the presentation of the issue the soviet film “Bow down to the fire” (1971, created by Tolomush Okeyev) was shown. - Magazine Monuments of Bishkek includes articles: Kurmanjan Datka monument, to the Revolution Fighters monumets, the architectural and monumental complex Manas, Aykol Manas monument, the monument El Kutu (National wealth). - Research exposition “Monuments of Bishkek”. There was a presentation of working materials used in the preparation of the magazine Monuments of Bishkek: archive photos, articles from newspapers, and video footage from the movie The Sculptor (1985). May, 2018 – Film screening “Fang”. Film screening was accompanied by author commentaries from the curator of Laboratorris CI – Joshik Murzakhmetov. February, 2018 – Film screening “AND THE CINEMA-2017” (И ТО КИНО-2017) “AND THE CINEMA” is an annual final film screening of kyrgyz short films initiated by Laboratoria CI in 2018. This film screening is an opportunity to get acquainted with the author’s films with articulated position presented at the Bishkek film festivals over the past year (in 2018 we showed films of 2017). Film screening is conducted with the participation of film authors and a commentary from the Laboratoria CI. “AND THE CINEMA-2017”: 1) “Chingilik-2” by Mirbek Kadraliev was presented at the film festival “Olgon-Horkhon 2017”; 2) “Hermit” by Aizada Aliyeva was presented in the film festival “Kyrgyzstan is the country of short films”; 3) “Peregon” by Erlan Omurbekov was presented in the film forum “Hope” (Үмүт – Надежда) 2017 November, 2017 (Bishkek) – exhibition of contemporary art “In search for the city” as a result of the eponymous educational artistic research Program. Catalog of the exhibition of contemporary art “In search for the city” August – November, 2017 (Bishkek) – educational artistic research Program “In search for the city” May, 2017 (Almaty, Kazakhstan) – Laboratory of urban research April, 2017 (Osh, Kyrgyzstan) – Laboratory of urban research The programs in Almaty and Osh cities were attended by active citizens, students and specialists from different spheres. The Laboratory included an educational part within which participants learned artistic approaches to investigate urban environment and practical realisation of research. The results of the programs were published in the magazine “City: made by …” in Russian, Kyrgyz, English. The magazine can be downloaded here. 2016 March, 2016 – Exhibition and Discussion Program “For tomorrow: sketches of your (and) my history” (in collaboration with local feminist and gender initiatives). 2015 July – December, 2015 (Bishkek) – Educational program “Photodrift as practice of urban research” The main goal of the project was fostering of platform for critical awareness of urban spaces by young people through artistic research and theoretical approach. We spoke about city as a representation of political, cultural and economic processes in society and reflection of social inequality and discuss the city as a representation of the political, economical and social order and it’s transformation with the system’s transformation. February – May, 2015 (Bishkek) – Research exhibition “Art and emancipation: O. Manuilova and her contemporaries” Exhibition raised questions on women’s position in today’s society through works of soviet female artists and archive documents (historical artifacts, archive photography, copies of newspapers and official documents from the Soviet period) on emancipation in Central Asia in 1920-30s. Addressing the period of women’s emancipation in the Soviet Kyrgyzia, the exhibition explored the perception of women as actors and creators in their professional and public work; represent women as actors and agents of social, political activity. The project is financed by the Government of Switzerland through the Swiss Agency for Development and Cooperation (SDC).
http://laboratoriaci.org/en/about-us/
Background: Oral and Maxillofacial (OMF) injuries constitute a multifaceted public health threat in Sri Lanka. Surveillance of OMF injuries has become crucial for planning and monitoring of preventive and control strategies. A pilot project was undertaken aiming at strengthening the OMF injury surveillance system at National Dental Hospital (Teaching) Sri Lanka (NDHTSL). Methods: The current interventional study with pre- and post-evaluation was conducted from March 1, 2020 to May 31, 2020 at NDHTSL. Pre-intervention assessment was performed to identify the deficiencies in the injury surveillance system. Subsequently, a novel OMF injury surveillance system was introduced and implemented at NDHTSL. The interventions were conducted over a period of 3 months, following which a post-intervention assessment was performed to assess the success of the interventions. Results: The previous injury surveillance system had many deficiencies, such as lack of comprehensiveness, not specific to dental trauma, lack of data flow and high respondent burden, etc. Interventions included development of a novel OMF injury surveillance form, circulating comprehensive guidelines on the new system and awareness program for relevant staff. Quality indicators of injury surveillance demonstrated improvements from pre-intervention stage to post-intervention stage, such as coverage from 2.7% to 72.2%, completeness from 95% to 100%, and accuracy from 66% to 100%. The perceptions and satisfaction of the dental surgeons on OMF injury surveillance system was significantly improved by the intervention (p≤0.001). Conclusion: The strengthened OMF injury surveillance system was deemed efficient and effective. Further studies are warranted at different service levels prior to island wide expansion of the present system by incorporation and integration of it into the existing National Injury Surveillance System. Introduction Oral and Maxillofacial (OMF) injuries constitute a multifaceted public health threat in Sri Lanka. The victims of this tragedy are more often children, adolescents and young males who are in economically productive age group (1–3). Hence, OMF injuries impact the economic productivity of the country while increasing the public health expenditure. Furthermore, road traffic accidents are on the rise which result in an enormous burden of OMF injuries (3–6). “Oral and Maxillofacial injuries” is a composite term which includes injury to the oral and facial region, teeth and related structures (7); prevalence, causes and factors related to OMF injuries across the globe have been described by many published researches (8–11). Surveillance is defined as ongoing systematic collection, analysis, interpretation and dissemination of health-related data for evidence-based decision making (12–14). Injuries are acute non-communicable diseases which should be prevented and controlled, based on the surveillance data (15). Therefore, developing the capacity of global injury systems has attracted attention as one of the most significant opportunities in global public health (16). Hence, a strengthened OMF injury surveillance system would be a prerequisite for the development of policies, strategies, guidelines as well as for expedition of the current OMF injury prevention activities (17). Injuries are the leading cause of hospitalization over the last two decades, accounting for about 1 million hospitalizations each year which underpins the importance of a complete, accurate and timely injury surveillance system (17). Furthermore, a study published in 2004 revealed that OMF trauma was the leading cause of dental inpatient service utilization (18). Dental trauma is the most common cause of dental emergencies (19). Moreover, dental trauma is recognized as a major dental public health problem across the globe which requires regular updates of knowledge in dental traumatology for preventive and control measures (20). One of the important prerequisites for development and evaluation of such prevention strategies at local level would be the establishment of a specially designed injury surveillance system which provides accurate, complete, and timely data (21). However, lack of timely, complete and accurate data on OMF injury surveillance has become a global issue that hampers timely action and research (22). Surveillance systems for Oral and Maxillofacial Injuries have been designed by other countries with some strengths. A study conducted in Victoria, Australia, emphasized that oro-dental trauma data can be combined with injury surveillance data that are routinely collected to improve service planning and the design of oro-dental injury prevention interventions (23). Even though epidemiological data are required for service planning related to dental and oral trauma, it is evident that epidemiological data are limited and have deficiencies in coverage, comprehensiveness, and timeliness in the field of oral and dental injuries (15). The present injury surveillance system at NDHTSL is not efficient and the collected data are not being analyzed and utilized for decision making and planning at the central level. Therefore, health staff is demotivated and does not participate in the surveillance system (24). Moreover, the current injury surveillance system is not comprehensive with regard to collection of data pertaining to OMF injuries which could be considered as a huge deficiency in this system. Against this backdrop, a strengthened OMF injury surveillance system consisting of complete, accurate, and timely collection, analysis, interpretation, dissemination, and utilization of data for decision making has become a timely need. NDHTSL is the premier tertiary care public dental hospital in the country where patients with OMF injuries are admitted, referred, and managed, with the mission to be the center of excellence in patient centered care, education, research, and innovation. However, all such endeavors should be evidence-based for optimal outcomes. Therefore, this project aims to strengthen the OMF injury surveillance system at NDHTSL by addressing aforementioned weaknesses of injury surveillance systems.
https://jhsss.sums.ac.ir/article_47676.html
What Are The 5 Stages of Grief? The 5 stages of grief is an emotional gauge used by those in the mental health industry. The proven method of using five progressive stages to represent the grieving process was created to help people further understand their own, personal trauma, as well as help them empathize with the emotional pain of others. Recognizing and understanding the psychological processes of grief is the first step to coping with any traumatic experience. While everyone is unique and will grieve in their own individual way, the following stages of grief provide a general outline for how a person typically experiences grief. Moreover, these five stages are useful for one to use as a starting point for understanding their own experience with trauma. The 5 Stages Of Grief The stages of grief are made up of 5 progressive levels of emotions that people usually transition through in response to grief. • Denial and Isolation The first reaction is to try to deny the reality of the situation. Denial is a psychological defense mechanism that protects a person from the overwhelming emotions associated with the initial shock. Denial is a brief response that helps to carry people through the first sense of emotional pain. • Anger As the masking effect of denial and isolation begins to wear off, the reality of the emotional pain emerges. The intensity of the pain is reflected outward at people or objects, perhaps even the person that they have recently lost. This anger is a natural response to things that hurt someone, though in the case of grief it is usually misplaced, which can make this stage especially confusing on an emotional level. • Bargaining Bargaining is an attempt to regain control in response to the vulnerability and helplessness that people feel after a major loss. People attempt to avoid the reality of the situation by creating a false belief that they can somehow change it. •Depression There are two types of depression associated with mourning. The first is the practical reaction to the implications of the loss. Regret and sadness dominate this type of depression. The other type of depression is a more reserved and private emotional preparation to fully accept the loss. • Acceptance Acceptance is marked by a sense of calm and withdrawal. While acceptance is still a long way from complete recovery, which may never be possible, it still represents a significant departure from the emotional turmoil of the previous four stages.
https://www.turningwinds.com/FeedItem/The-Five-Stages-of-Grief/
Q: Compute cosine similarities between documents in semantic space, using R-lsa package I'm trying to cluster similar documents using the R language. As a first step, I compute the term-document matrix for my set of documents. Then I create the latent semantic space for the term-document matrix previously created. I decided to use use LSA in my expriment because the results of clustering using just the term-document matrix were awful . Is possible to build a dissimilarity matrix (with cosine measure) using the the LSA space created? I need to do this because the clustering algorithm that I'm using requires a dissimilarity matrix as input. Here is my code: require(cluster); require (lsa); myMatrix = textmatrix("/home/user/DocmentsDirectory"); myLSAspace = lsa(myMatrix, dims=dimcalc_share()); I need to build a dissimilarity matrix (using cosine measure) from LSA space, so I can call the cluster algorithm as follows: clusters = pam(dissimilartiyMatrix,10,diss=TRUE); Any suggestions? Thanks in advance! A: To compare two documents in the LSA-space, you can take the cross product of the $sk and $dk matrices that lsa() returns to get all the documents in the lower dimensional LSA-space. Here's what I did: lsaSpace <- lsa(termDocMatrix) # lsaMatrix now is a k x (num doc) matrix, in k-dimensional LSA space lsaMatrix <- diag(lsaSpace$sk) %*% t(lsaSpace$dk) # Use the `cosine` function in `lsa` package to get cosine similarities matrix # (subtract from 1 to get dissimilarity matrix) distMatrix <- 1 - cosine(lsaMatrix) See http://en.wikipedia.org/wiki/Latent_semantic_analysis, where it says you can now use LSA results to "see how related documents j and q are in the low dimensional space by comparing the vectors sk*d_j and sk*d_q (typically by cosine similarity)."
The streets and open spaces within North East Cambridge will be the most enduring elements of the new city district. They will provide the structure for the area's layout, encouraging walking and cycling, and creating a vibrant, safe and healthy environment that nurtures community life. This policy ensures that new streets are designed as inclusive, public, welcoming and active routes, and which prioritise pedestrians, cyclists and other non-motorised users, and that form a legible and functional movement network. - There was overwhelming support for the creation of a well-designed place that promotes healthy and active lifestyles. A number of respondents raised the need to undertake a Health Impact and Needs Assessment to inform future provision in the district. The Health, Community & Wellbeing Topic Paper evidences how such concerns have been taken into account in plan making for North East Cambridge. Whilst this aspect is important, the question was more aimed at the Healthy Town design principles which advocate the creation of compact, walkable places that are inclusive and promote healthy active lifestyles. Whilst most respondents were not supportive of the healthy town principles, further review of the comments reveals there to be support for the approach that they advocate. - There was overwhelming support for the connectivity options identified in the Issues and Options 2019 document, with options to make the area more permeable to pedestrians, cycles and public transport welcomed. Multiuser accessible routes were highlighted as important for equestrian users. Caution was raised about needing to provide adequate infrastructure to support intended users and functions both in and around the North East Cambridge area as well as connections beyond. In the case of cycle routes, these need to be of a scale to accommodate the likely flows. HGV movements need to be taken away from schools. - Reducing the dominance of roads to encourage walking and cycling was welcomed as part of a comprehensive approach to re-planning and reallocating road space. Lessons from the past need to be learned and tunnels, subways etc. have the potential to be dark and dangerous places if poorly designed. How your comments and options have been taken into account - Following the comments from the Issues and Options 2019 consultation, the proposed policy identifies the key attributes that the new streets and spaces that form part of North East Cambridge will be expected to deliver. The radically different approach to managing motor vehicles is recognised in the proposed movement grid to serve development with pedestrian and cycle priority provided through a low speed street network as well as through dedicated routes that connect into other strategic pedestrian, cycle and public transport projects including a pedestrian/cycle link across to the River Cam to the east of the development area. Trees - You told us to highlight the importance of trees/woodlands and their multi-functional role for local communities such as providing and expanding tree canopy cover and mitigation of heat islands as well as providing habitat and biodiversity benefits. - Comments noted the lower cost implications of managing trees over other forms of urban green space. It was highlighted that there is the need for extensive tree planting at North East Cambridge and a possibility of introducing a native community tree nursery on-site, as well as ensuring important and well used corridors such as Milton Road is sufficiently lined with trees. - There were comments on the role trees play in forming and enhancing the existing edges of the site and in providing new landscape features both within and on the edges of the site. - Great importance was placed on the protection and retention of existing mature and semi mature trees with specific reference to the Silver Birch woodland adjacent to the First Public Drain and Chesterton Sidings but also included other deciduous trees/scrubs within the area. How your comments have been taken into account - The policy emphases the role of trees and seeks to protect trees of value as well as enhance tree canopy cover across the Area Action Plan area. The policy stipulates that tree protection and planting will be managed across the site and references the existing Tree Strategy produced by Cambridge Council covering the period 2016-2026. Policy 7: Legible streets and spaces The key streets and spaces must conform to the strategic layout for key pedestrian and cycle routes described in Policy 16: Sustainable Connectivity, the street hierarchy described in Policy 21: Street hierarchy, and the principles shown in Figures 16, 17 and 18, to provide a walkable district, with high quality and well-connected pedestrian, cycle and public transport routes that support healthy, active lifestyles whilst effectively allowing servicing and deliveries and managing access by private motor vehicles. All development proposals within North East Cambridge should contribute towards the creation of high quality, inclusive and attractive streets and spaces that will: - Be designed with active routes with good natural surveillance, incorporating Secured by Design principles as an integral part of new development proposals and coordinated with adjacent sites and phases; - Ensure the design of streets prioritises pedestrian and cycle movements and relates to the character and intended function of spaces and surrounding buildings (see supporting diagrams within Policy 10a-e); - Create high quality connections to seamlessly link North East Cambridge into existing established areas as shown on the Spatial Framework and described in Policy 17: Connecting to the wider network; - Understand microclimate and other environmental considerations and ensure that these are factored into design proposals so that public spaces receive good sunlight throughout the year and have good air quality; - Undertake a coordinated approach to the design and siting of street furniture, boundary treatments, lighting, signage and public art; - Incorporate trees and other planting which is appropriate to the scale of adjacent buildings and public realm to ensure that adequate space is provided for them to mature and flourish; - Integrate Sustainable Drainage Systems (SuDS) as part of a comprehensive site-wide approach; and - Ensure that design is inclusive and considers the needs of all users through engagement with the Cambridge City Council Disability Panel. Trees and landscaping Development proposals should demonstrate how landscaping and planting have been considered as an integral part of the development proposal. Landscaping proposals should relate to the wider setting of the area, including the Fen countryside beyond the city. The design should provide sufficient space for trees and planting to mature and to support biodiversity; achieve a suitable visual setting for building(s) having regard to both internal and external views of the area. Development will be supported where proposals preserve and protect existing trees of value and enhance canopy cover with appropriate new planting providing adequate space, above and below ground for trees of suitable species and size to mature. Native trees should be considered in the first instance. Development proposals will be required to assist in achieving the City of Cambridge's canopy cover target of 19% coverage by 2030. Development proposals that minimises impact on a tree or, if the proposals result in the loss of a tree that can be suitably replaced will be supported. A comprehensive planting, maintenance and management plan for the Area Action Plan area will be requested and required for development proposals that have a cross administration boundary impact. All new planting should consider water resource requirements and be climate resilient. Development proposals within North East Cambridge will need to adhere to policies contained in the Cambridge City Tree Strategy 2016-2026. Figure 17: Illustration of proposed design features for secondary streets in high density areas Figure 18: Illustration of proposed design features for secondary streets in medium density areas Relevant objectives: 1, 2, 4, 5 The NPPF (2019) states 'patterns of movement, streets, parking and other transport considerations are integral to the design of schemes and contribute to making high quality places.' Manual for Streets (2007) establishes the 'principles of inclusive design' and identifies that streets have a significant 'place' function and that the design of streets should assume that place should be subservient to movement. It also identifies the recommended user hierarchy to inform the design of development proposals. This hierarchy places pedestrians at the top followed by cyclists, public transport users, specialist service vehicles (emergency, services, waste etc.) with other motor traffic coming last, including car sharing and electric vehicles. The Health, Community & Wellbeing Topic Paper identifies the importance of embedding health and wellbeing into decision making about the planning of new development. NHS guidance 'Putting Health into Place: Principles 4-8 Design, Deliver and Manage' identifies principles that should be used to inform the design of new places. Compact walkable forms that are well connected with multifunctional green spaces should influence the form of new places. The proposed compact and connected form of development at North East Cambridge maximises active travel options for people living and working in new places with multifunctional spaces enabling community activities and events that the whole community can engage in. Cambridge, like many historic cities, is characterised by a compact form that allows easy movement as a pedestrian or cyclist. This inherent character underpins the approach to creating a new kind of city district at North East Cambridge centred around walking and cycling to create a 'walkable neighbourhood' and capitalising on high quality public transport options underpinned by a comprehensive open and green space network creating a healthy and inclusive place. Beyond the immediacy of North East Cambridge, the connections formed physically and socially with the surrounding existing neighbourhoods, and at a city and wider level, are crucial. The quality of streets and spaces links with other policies in the Area Action Plan, which together combine to clearly set out expectations for the quality of future development. An integrated approach to design is needed to help make the best use of the land available and to effectively respond to the challenges of creating a high-density new city district. The Council will lead on the production of a site wide design code to support the North East Cambridge Area Action Plan that will require input from the various landowners and their design teams to help ensure co-ordination and consistency of the public realm. The Design Code will be adopted as a Supplementary Planning Document (SPD) to guide and co-ordinate future development. In order to secure the best possible network of routes to meet the needs of a variety of different users, it is important that the key connections within North East Cambridge are identified. Along with the Area Action Plan Spatial Framework, Policy 16: Sustainable Connectivity identifies the network of key routes, their hierarchy and the particular areas within the district that they will need to connect. Landscaping and trees Landscape proposals will usually be required for most developments, ranging from housing, retail, commercial, industrial and mixed-use schemes. High quality landscape design can create usable spaces for occupier amenity as well as being functional - in respect of sustainable drainage systems (SuDS), microclimate and providing an attractive setting for buildings. Landscaping also plays a significant role in establishing an area's character and integration of a development into that character. Landscaping proposals will be especially important within prominent locations, such as along street frontages, transport interchanges, and other public spaces. While the details required for a landscape scheme will vary according to the type and location of a development, landscaping should be included as an integral part of the development proposal at an early stage. Careful consideration should be given to the existing character of a site, and how any features, such as surface treatments, furniture, lighting, boundary treatments and other structures, are to be appropriately used, and how planting and trees may mature over time. Poorly laid out landscaping can compromise its amenity and environmental value and use, while leaving insufficient space for trees to grow can lead to the blocking of natural sunlight, issues of overhanging, subsidence and damage to foundations, resulting in subsequent applications for tree removal. The tree population of Greater Cambridge contributes enormously to the city's character and appearance and trees are fundamental to the management of temperatures and storm water and the provision of cleaner air. They provide an essential habitat for wildlife and promote wellbeing, providing opportunities for relaxation, exercise and meditation. Management and protection of trees is a constant challenge. As North East Cambridge falls within two administrative areas with differing approaches to management and protection of trees, the aim of this policy is to provide a consistent approach across the Area Action Plan area. Deciduous trees provide shade to buildings, helping to manage solar gain when needed in summer months. These landscape features also contribute to reducing 'heat islands' whereby the temperatures of built up areas are significantly higher than areas outside them. Trees add biodiversity value to areas and as such provide habitats for many species. This policy will contribute towards achieving on-site biodiversity net gain as required by Policy 5. The North East Cambridge area has relatively low tree canopy coverage when compared with surrounding areas, making it essential to ensure any new development retains trees of value and makes provision from the outset for the planting of new trees of appropriate species and size so as to ensure a sustainable increase in overall canopy cover. There are some localised areas of extensive tree coverage which will require further site investigation including along the First Public Drain and around Chesterton Sidings. In the absence of a South Cambridgeshire strategy for the protection and retention of trees, the City Council's Tree Strategy will apply across the North East Cambridge area. The Council will seek to make provision for the protection of trees of value by serving Tree Protection Orders on existing trees and those to be planted as part of new development. - North East Cambridge Landscape Character & Visual Assessment (2020) - North East Cambridge Transport Assessment (2019) - Cultural Placemaking Strategy (2020) - Innovation District Paper (2019) - Typologies and Development Capacity Assessment (2020) - Community Safety Topic Paper (2020) - North East Cambridge Stakeholder Design Workshops 1-6 – event records (2019-2020) - 'Towards an Urban Renaissance' (1999) by The Urban Task Force - National Planning Policy Framework (2019) - Manual for Streets (2007) - NHS (2019) 'Putting Health into Place: Principles 4-8 Design, Deliver and Manage' - Health Facilities and Wellbeing Topic Paper (2020) - Anti-poverty and Inequality Topic Paper (2020) - Public Health England (2018) Healthy High Streets: good place making in an urban setting - MHCLG (2019) National Design Guide, Planning practice guidance for beautiful, enduring and successful places - Making Space for People Supplementary Planning Document (Draft 2019) - Cambridge City Wide Tree Strategy 2016-2026 - Trees and development sites SPD (2009) - Climate Change, Energy and Sustainable Design and Construction Topic Paper (2020) - Number of awards (shortlisted, finalist, winner) received - Positive recommendations made to Planning Committee - Modal share for pedestrian, cycle, public transport users - Policy 15: Cambridge Northern Fringe East and new railway Station Area of major Change - Policy 35: Protection of human health and quality of life from noise and vibration - Policy 36: Air quality, odour and dust - Policy 37: Cambridge Airport Public Safety Zone and Air Safeguarding Zones - Policy 40: Development and expansion of business space - Policy 50: Residential space standards - Policy 51: Accessible homes - Policy 55: Responding to context - Policy 56: Creating successful places - Policy 57: Designing new buildings - Policy 59: Designing landscape and the public realm - Policy 60: Tall buildings and the skyline of Cambridge - Appendix F: Tall Buildings and the Skyline - Policy 65: Visual pollution - Policy 67: Protection of open space - Policy 68: Open space and recreation provision through new development - Appendix I: Open Spaces and Recreation Standards - Policy 69: Protection of sites of biodiversity and geodiversity importance - Policy 70: Protection of priority species and habitats - Policy 71: Trees - Policy 80: Supporting sustainable access to development South Cambridgeshire Local Plan 2018 - SS/4: Cambridge Northern Fringe East and Cambridge North railway station - HQ/1: Design Principles - NH/2: Protecting and Enhancing Landscape Character - NH/4: Biodiversity - NH/5: Sites of Biodiversity or Geological Importance - NH/6: Green Infrastructure - NH/7: Ancient Woodlands and Veteran Trees,
https://consultations.greatercambridgeplanning.org/document/213/38260
IOOF former chair concerns over potential ASIC action The barrister for IOOF's former chairman, George Venardos, has raised concerns that providing documents in response to the banking regulator's lawsuit raises the risk of handing over material that could be used in separate regulatory action. The Australian Prudential Regulation Authority (APRA) took a rare step last year when it sought to have Mr Venardos, former IOOF chief executive Chris Kelaher and others from the wealth manager banned from working in the superannuation sector. Hearings in the case are due to start in July. APRA's case against former IOOF chief Chris Kelaher, former chair George Vernardos and others is scheduled for July.Credit:Darrian Traynor In a Federal Court procedural hearing on Monday, barristers debated how to deal with the possibility that some of the materials APRA is seeking from Mr Vernados could end up being used by the Australian Securities and Investments Commission (ASIC) in any potential separate action. ASIC has not launched legal action against IOOF or its directors. However, there has been speculation the board could face potential enforcement action from the watchdog, which has vowed to become more aggressive in the courts. Advertisement The barrister acting for Mr Venardos, Steven Finch, SC, told the court there was an "appreciable risk" that providing some of the material sought by APRA could end up being used by ASIC. Justice Jayne Jagot, responding to Mr Finch's arguments, said the risks he had identified were "non-trivial". There was also discussion of whether the defendants could delay giving over documents until after the case against them had been made. Loading The parties were working towards an arrangement that would allow Mr Vernados to avoid giving evidence that could be used against him in any separate legal case. In its case against five people including Mr Vernados and Mr Kelaher, APRA is alleging they failed to properly acknowledge and address the regulator's concerns about conflicts of interest. APRA, which was criticised by the Hayne royal commission for failing to take legal action in the superannuation sector, is seeking to have the individuals disqualified from being a "responsible person" or a trustee of a superannuation fund. Mr Kelaher stepped down from the company by mutual agreement in April, while Mr Vernados has stepped aside during the APRA case. APRA's case against IOOF comes after ASIC has previously made it clear it will take a more aggressive stance towards enforcement in the wake of the Hayne royal commission, by asking itself the question "why not litigate?"
Aims: Psychotherapy is a widely used treatment for mental disorders, but whether it also improves employment and other labour market outcomes remains inconclusive. This study examined the effectiveness of a nationwide subsidized psychotherapy programme using extensive register-based data. Methods: The sample consisted of individuals who applied for rehabilitative psychotherapy in Finland in 2009–2012 (n = 35,083). Prior to 2011, some applications were rejected due to the limited budget that the central government provided for the programme. From 2011, all eligible applicants were granted rehabilitation. We used propensity score matching to create balanced samples of those who received a negative decision in 2009–2010 (n = 2047) and those who were granted rehabilitative psychotherapy in 2011–2012 (n = 12,046) in terms of their sociodemographic background characteristics, prior labour market attachment and health status. Results: We found that compared to the applicants who were not accepted to the programme, the granted applicants with similar background characteristics had, on average, a six-percentage-point higher employment rate, €2100 higher annual earnings and a six-percentage-point lower probability of becoming a disability benefit recipient five years after their first application. Further sensitivity analyses confirmed that these results were not biased, for example, by differences in macroeconomic conditions during the follow-up. Conclusions: Quasi-experimental research design showed that rehabilitative psychotherapy was significantly associated with better labour market outcomes. Although several relevant background factors were included in the matching analysis, it is possible that some unobserved factors explain both access to psychotherapy and subsequent labour market outcomes. ... PublisherSAGE Publications ISSN Search the Publication Forum1403-4948 Keywords Publication in research information system https://converis.jyu.fi/converis/portal/detail/Publication/104167786 MetadataShow full item record Collections - Kauppakorkeakoulu Additional information about fundingThis study was funded by the Finnish Work Environment Fund (180048 to LP and TR) and the Yrjö Jahnsson Foundation (20187100 to LP and 20187103 to TR]. AV was also supported by KELA (18/26/2020). License Related items Showing items with similar title or keywords. - Employment Status and Personal Income Before and After Onset of a Severe Mental Disorder : A Case-Control Study Hakulinen, Christian; Elovainio, Marko; Arffman, Martti; Lumme, Sonja; Suokas, Kimmo; Pirkola, Sami; Keskimäki, Ilmo; Manderbacka, Kristiina; Böckerman, Petri (American Psychiatric Association, 2020)Objective: Individuals with severe mental disorders have an impaired ability to work and are likely to receive income transfer payments as their main source of income. However, the magnitude of this phenomenon remains ... - Mental disorders and long-term labour market outcomes : nationwide cohort study of 2 055 720 individuals Hakulinen, Christian; Elovainio, Marko; Arffman, Martti; Lumme, Sonja; Pirkola, Sami; Keskimäki, Ilmo; Manderbacka, Kristiina; Böckerman, Petri (Wiley-Blackwell, 2019)Objective: To examine the associations between an onset of serious mental disorders before the age of 25 with subsequent employment, income, and education outcomes. Methods: Nationwide cohort study including individuals ... - Prescription opioid use and employment : a nationwide Finnish register study Böckerman, Petri; Haapanen, Mika; Hakulinen, Christian; Vainiomäki, Jari (Elsevier, 2021)Background The secular decline in labor market participation and the concurrent increase in opioid use in many developed countries have sparked a policy debate on the possible connection between these two trends. We ... - NGOs and the implementation of active labour market policies : the case of Finland and Sweden Sama, Thomas Babila (University of Jyväskylä, 2012) - Employment trajectories until midlife associate with early social role investments and current work-related well-being Ek, Ellen; Ala-Mursula, Leena; Velázquez, Regina García; Tolvanen, Asko; Salmela-Aro, Katariina (Elsevier, 2021)Applying social investment theory (SIT), we examined whether employment trajectories until midlife, with differential investments in education and employment, are associated with social investments during early life and ...
https://jyx.jyu.fi/handle/123456789/79714
Lack of sleep is not just a nuisance – it is dangerous and even potentially fatal. If you are one of the millions who have trouble sleeping, you are not alone. Insomnia is considered to be the most common sleep disorder. Over 30% of adults report short-term bouts of this disorder, while 10% complain of chronic insomnia. These numbers are increasing every year, with the effects of sleep deprivation becoming more understood with each new scientific study. It is evident that not being able to sleep soundly effects more than just that night of rest. What Does it Mean to Sleep Soundly? When you fall asleep, you actually go through five stages of sleep that can happen anywhere from immediately after you close your eyes to hours later. If any of these stages are interrupted, it can affect your overall wellness. The sleep soundness definition just means that you are going through the stages of your sleep cycle naturally. In light sleep, you are drifting in and out of sleep. You probably notice little noises in the background but are not paying attention to them. You can easily be awakened in this stage. If you have ever had a sudden “jerk” movement waking you up or felt like you were falling, you were likely in this stage of sleep. It is at this stage that your eyes are moving slowly and your muscle activity is slowing down, preparing you for stage two. This is the preparation stage, where your body is getting ready to go under for some deep, sound sleep. Your eye movements stop, your brain waves become calmer and steadier, your heart rate slows, and your body temperature starts to drop. Stage 3 is your deep sleep, where your slow brain waves, or delta waves, are mixed with smaller but faster waves. This deep sleep stage is where people are at when they talk in their sleep, sleepwalk, or have other “parasomnia” experiences. This is a continuation of the deep sleep state, but your brain is producing mainly delta waves. It is during this time that if you are woken up, you probably feel groggy and disoriented. Stage 5, or REM (rapid eye movement) sleep, your brain waves are acting like they do when you are awake. Your eyes are moving side-to-side, and you are experiencing deep dreaming and brain activity. REM sleep is important to your overall rest and a good night sleep. This is where your brain and body are restored. If you need help to fall asleep and get the rest you need, follow these quick tips. If you lay awake thinking, “I want to sleep, I’m so tired,” but you just can’t seem to go to sleep, try a few of these tips for better sleeping and overall wellness. 1. Set a schedule. When you go to bed and wake up at the same time each day, you are eventually training your brain to expect to be asleep and awake at a certain hour. You’ve heard those early-risers say they wake up at 5:30 every morning without an alarm clock? You know you roll your eyes at them. But you can do it, too. It just takes consistency. 2. Exercise daily. This releases built up stress and creates endorphins that will help your brain relax later. Be sure you don’t exercise right before bed, though. Your brain needs at least an hour to decompress. 3. Limit the use of any caffeinated beverages or nicotine products to before mid-afternoon. The caffeine and nicotine can stay in your body for over eight hours before the effects wear off, keeping you wide awake at night. 4. Create an inviting sleep atmosphere. Remove any bright lights or television and computers. Play quiet, peaceful music like deep sleep music or ocean sleep music, and set the temperature of the room to a comfortable setting. 5. Try natural sleep supplements to take your poor sleep and turn it into deep sleep. Cognitive supplements like Momental Mend improve mental function in healthy individuals and support restless minds and bodies to get better sleep. Shop Mend with natural sleep herbals here. When nights of no sleep have you stressed throughout the day, there is hope! Natural sleep remedies are becoming more popular as people turn to them over prescription medication every day. 1. Valerian (Valeriana officinalis): Valerian is a natural sedative that gives you the rest you need without the grogginess of a prescription pill. It’s recommended that you take breaks after a few weeks of using valerian because your body does get used to it, so it will take more to have the same effect. Instead, use another herb for a couple of weeks and then go back to the valerian. 2. California Poppy (Eschscholzia californica): This herb is good for insomnia and anxiety. It’s also safe for children. You can take it to relax throughout the day and before bedtime partnered with valerian for sound sleep. 3. Passion Flower (Passiflora incarnata): If you are a frequent waker, tossing and turning all night, passion flower is a great herb for you. This herb can be taken frequently all day and before bedtime and is safe for children. 4. Hops (Humulus lupulus): Considered a natural sedative, hops is used to reduce anxiety and stress, and even aids in digestion. It does contain natural steroids, so pregnant women and young children should not use it, but otherwise, it is safe to use as directed. 5. Magnolia Bark (Magnolia officinalis): Magnolia bark is used to lower cortisol levels and relax your body and calm your mind. If you are looking for a quick brain shut off, this is the herb to go to. Pregnant and nursing women are cautioned against using this herb, however. 6. Ashwagandha (Withania somnifera): Ashwagandha is used as a natural stress reliever. It can also be taken if you wake up and need to go back to sleep because it delays the release of cortisol, which spikes anxiety. 7. Seriphos (Phosphatidyl Serine): Also known as Phosphoserine, Seriphos helps lower and regulate cortisol and relaxes your brain and body. The makers of the brand recommend avoiding it if you are using alkaloid stimulants or are on adrenergic agonists. Also, avoid this herb during pregnancy or if you have reduced kidney function or failure. It can be harsh on the body, so if you get nauseous easily, take it with food. 8 – 10. Chamomile (Anthemis nobilis), Catnip (Nepeta cataria), or Kava Kava (Piper methysticum) tea: The three of these herbs fall in the same category as great treatments for anxiety and hyper-excitement. They are great to use in tea and can help you relax and fall asleep quickly. 11. Nutmeg – Add a little nutmeg to a glass of milk or tea before bed to help you get that drowsy feeling. Use 1/8 to 1/4 teaspoon only – large doses of nutmeg are toxic at best and deadly at worst. 12. Wild Lettuce (Lactuca virosa): Wild lettuce is used to treat restlessness and insomnia. It is a mild sedative found in homeopathic recipes everywhere, even in children’s treatment. 13. St. John’s Wort (Hypericum perforatum): This herb is recognized best by its yellow flowers. It is found in Europe but is used in many herbal remedies to relieve insomnia and depression. It is best used at night or when you are not going out into the sun as it can increase your skin’s sensitivity to sunlight.sant aroma and lovely purple flowers. Although this herb is native to mountainous areas of the Mediterranean, it is now grown all over the world including the United States, Australia, and southern Europe. 14. Lavender: Used in teas and natural candles everywhere, lavender has relaxing therapeutic qualities that work to alleviate anxiety, stress, depression, and insomnia. 15. Linden flower/ lime flower: For those who experience sleep paralysis and violent, vivid dreams, linden flower has a calming effect on the mind and heart. It is often used in children to prevent nightmares. Whether you use the tips provided to create a regular environment that promotes sleeping soundly or you need a little extra help through the use of natural herbs and supplements, it is important to your overall health to get the right kind of sleep. If you are looking to improve your body and mind’s wellness through quality, sound sleep, try Momental Mend, natural nutrition to help your body and mind relax.
https://www.myeboga.com/nutrition/15-herbs-that-actually-help-you-sleep-soundly-2
1830s in Western fashion 1830s fashion in European and European-influenced clothing is characterized by an emphasis on breadth, initially at the shoulder and later in the hips, in contrast to the narrower silhouettes that had predominated between 1800-1820. Women's costume featured larger sleeves than were worn in any period before or since, which were accompanied by elaborate hairstyles and large hats. The final months of the 1830s saw the proliferation of a revolutionary new technology—photography. Hence, the infant industry of photographic portraiture preserved for history a few rare, but invaluable, first images of human beings—and therefore also preserved our earliest, live peek into "fashion in action"—and its impact on everyday life and society as a whole. Contents - 1 General trends - 2 Women's fashions - 3 Men's fashion - 4 Children's fashion - 5 See also - 6 Notes - 7 References - 8 External links General trends The prevalent trend of Romanticism from the 1820s through the mid-1840s, with its emphasis on strong emotion as a source of aesthetic experience and its recognition of the picturesque, was reflected in fashion as in other arts. Items of historical dress including neck ruffs, ferronieres (jeweled headbands worn across the forehead), and sleeves based on styles of earlier periods were popular. Innovations in roller printing on textiles introduced new dress fabrics. Rich colors such as the Turkey red of the 1820s were still found, but delicate floral prints on light backgrounds were increasingly popular. More precise printing eliminated the need for dark outlines on printed designs, and new green dyes appeared in patterns of grasses, ferns, and unusual florals. Combinations of florals and stripes were fashionable. Overall, both men's and women's fashion showed width at the shoulder above a tiny waist. Men's coats were padded in the shoulders and across the chest, while women's shoulders sloped to huge sleeves. Women's fashions Overview In the 1830s, fashionable women's clothing styles had distinctive large "leg of mutton" or "gigot" sleeves, above large full conical skirts, ideally with a narrow, low waist between (achieved through corseting). The bulkiness of women's garments both above and below the waist was intended to make the waist look smaller than it was — this was the final repudiation of any last lingering aesthetic influences of the Empire silhouette of ca. 1795–1825. Heavy stiff fabrics such as brocades came back into style, and many 18th-century gowns were brought down from attics and cut up into new garments. The combination of sloping shoulders and sleeves which were very large over most of the arm (but narrowing to a small cuff at the wrist) is quite distinctive to the day dresses of the 1830s. Pelerines, or lace coverings draped over the shoulders, were popular (one of several devices, along with full upper-arm sleeves and wide necklines, to emphasize the shoulders and their width). Gowns The fashionable feminine figure, with its sloping shoulders, rounded bust, narrow waist and full hips, was emphasized in various ways with the cut and trim of gowns. To about 1835, the small waist was accentuated with a wide belt (a fashion continuing from the 1820s). Later the waist and midriff were unbelted but cut close to the body, and the bodice began to taper to a small point at the front waist. The fashionable corset now had gores to individually cup the breasts, and the bodice was styled to emphasize this shape. Evening gowns had very wide necklines and short, puffed sleeves reaching to the elbow from a dropped shoulder, and were worn with mid-length gloves. The width at the shoulder was often emphasized by gathered or pleated panels of fabric arranged horizontally over the bust and around the shoulders. Morning dresses generally had high necklines, and shoulder width was emphasized with tippets or wide collars that rested on the gigot sleeves. Summer afternoon dresses might have wide, low necklines similar to evening gowns, but with long sleeves. Skirts were pleated into the waistband of the bodice, and held out with starched petticoats of linen or cotton. Around 1835, the fashionable skirt-length for middle- and upper-class women's clothes dropped from ankle-length to floor-length. Hairstyles and Headgear Early 1830s hair was parted in the center and dressed in elaborate curls, loops and knots extending out to both sides and up from the crown of the head. Braids were fashionable, and were likewise looped over either ear and gathered into a topknot. Bonnets with wide semicircular brims framed the face for street wear, and were heavily decorated with trim, ribbons, and feathers. Married women wore a linen or cotton cap for daywear, trimmed with lace, ribbon, and frills, and tied under the chin. The cap was worn alone indoors and under the bonnet for street wear. For evening wear, hair ornaments including combs, ribbons, flowers, and jewels were worn; other options included berets and turbans. Undergarments Women's undergarments consisted of a knee-length linen chemise with straight, elbow length sleeves. Corsets compressed the waist and skirts were held in shape by layers of starched petticoats, stiffened with tucks and cording. The full sleeves were supported by down-filled sleeve plumpers. Outerwear Riding habits consisted of a high-necked, tight-waisted jacket with the fashionable dropped shoulder and huge gigot sleeves, worn over a tall-collared shirt or chemisette, with a long matching petticoat or skirt. Tall top hats with veils were worn. Shawls were worn with short-sleeved evening gowns early in the decade, but they were not suited to the wide gigot sleeves of the mid-1830s. Full-length mantles were worn to about 1836, when mantles became shorter. A mantlet or shawl-mantlet was a shaped garment like a cross between a shawl and a mantle, with points hanging down in front. The burnous was a three-quarter length mantle with a hood, named after the similar garment of Arabia. The paletot was knee-length, with three cape-collars and slits for the arms, and the pardessus was half or three-quarter length coat with a defined waist and sleeves. For evening, voluminous mantles of velvet or satin, with fur trim or fur linings in cold climates, were worn with the evening gown. Footwear Low, square-toed slippers were made of fabric or leather for daytime and of satin for evening wear. Low boots with elastic insets appeared in this decade. Style gallery 1830–1835 - Fashion plate from Mercure des Salons - Sophie Guillemette, Grand Duchess of Baden wears a white evening gown that just skims her ankles and a tawny-colored shawl. Her flat shoes have ribbon laces and square toes. 1831. - Therese von Schenk wears long sheer oversleeves over short puffed sleeves and an elaborate fabric-covered hat with plumes, 1831. - Sarah Josepha Hale with curls and a center part in her hair. She wears a low-cut black dress with plain sleeves and a snowy white chemise. 1831. - Mrs. Edward Kellogg wears the frilled indoor day cap of a married woman with a wide ribbon bow tied under her chin. Her simple dark gown has gigot sleeves and a modestly broad neckline, filled in with a ruffed chemisette. - Fashion plate from Wiener Moden, in which anatomical accuracy gives way to the desire to present a trendy fashion silhouette. The day dress has a wide, low neckline and long sleeves. - German fashion of 1834 with echoes of the Renaissance: a wide-necked black gown features a tight belt at the raised waistline. Hair is worn in elaborate curls and knots. - Caroline, Countess of Holnstein wears her hair severely parted in the center front and across the top of her head. Her long hair is braided, and the braids are looped over either ear and wound into a knot at the crown of her head. She wears a white gown with a wide belt and gathers at the front to emphasise the bust under a pink satin coat with a fur collar and fur trim. German, 1834. - Fashion plate from Wiener Zeitschrift shows the fashion for fabrics printed with combinations of stripes and floral designs. Style gallery 1835–1839 - 1830s Riding habits have fashionable full sleeves. - Marie Lafont-Porcher's hair is styled in a high knot with wide side-curls; her gauzy gown has a neck ruff and a wide collar, and she wears a fur piece similar to that in the Gazette des Salons fashion plate above, 1835. - Conservative, middle-class fashion: Eliza Clarke Cory Clench wears a white cap with a large striped ribbon bow that contrasts with her bright green dress. Canada, 1834–36. - Portrait of Ada Lovelace in British court dress. She wears a red train over a white satin evening gown. Note her square-toed satin slippers, 1836. - Viennese fashion plate for February 1837 shows front and back views of the newly fashionable dangling clusters of curls on the sides worn with an ornate knot of hair at the crown. A headband is worn for evening. The waist is still defined by a wide belt, but it sits lower on the body. - By 1837, fullness was dropping from just off the shoulder to the middle of the arm. The bonnet is smaller than those worn earlier in the decade, and black lace mitts (fingerless gloves) are worn with the white day dress. Hair is worn in wide clusters of short sausage curls. French. - Mathilde, Gräfin Lynar wears a brown velvet gown with snug shoulders and lower sleeves, and fullness at the middle of the arm. The waist is darted to fit and comes to a small point in front. Hair is smoothed above the ears and wound into a braided crown. German, 1837. - Adélaide d'Orléans wears a heavily decorated straw bonnet over a frilled cap, 1838. Caricature gallery - "Waist and Extravagance", ca. 1830 fashion satire Men's fashion Overview In this period, men's fashion plates continue to show an ideal silhouette with broad shoulders, and a narrow, tightly cinched waist. Coats and waistcoats Frock coats (in French redingotes) increasingly replaced tail coats for informal day wear. They were calf length, and might be double-breasted. Shoulder emphasis fell lower on the arm; shoulders were sloped and puffed sleeve heads gradually shrank and then disappeared. Waistcoats or vests were single- or double-breasted, with rolled shawl or (later) notched collars, and extremely tight through the waist. Waistcoats were sometimes worn two at time, in contrasting colors. Corsets or corset-like garments were worn by many men to draw in the waistline. The most fashionable coats had padded shoulders and chests, a feature that disappeared after about 1837. Trousers Full-length trousers began to have the modern fly-front closure, replacing the earlier fall-front. Breeches remained a requirement for formal functions at the British court (as they would be throughout the century). Breeches continued to be worn for horseback riding and other country pursuits, especially in Britain, with tall fitted boots. Outerwear Cloaks were worn with evening wear. Overcoats with wide sleeves were worn with day wear; these were often called greatcoats. Hats and hairstyles The crowns of tall hats were less curvy than in the previous period. Hair was generally parted to one side. Curled hair and sideburns remained fashionable, along with moustaches. Style gallery - 1830s fashion plate shows the small, high waist that was the ideal of French fashion in the 1830s. Frock coat (left) and morning coat (right). - Frederik Hansen Sødring wears a brocade waistcoat with a high black velvet shawl collar. The front flap of his fall-front trousers can be seen clearly in this 1832 portrait. Note the taper of the waistcoat toward the tight waist. - Antoine Julien Meffre-Rouzan of New Orleans painted in Paris, 1833, in evening wear. The puffs at the shoulder of his coat are smaller than those worn in the 1820s, and his waistcoat has a slight point at the front waist. - 1834 portrait of Davy Crockett shows the fashionable dark cravat worn with a wide turn-over collar. - Portrait of John C. Calhoun in a sheer white formal cravat, dark coat, and fur-collared or lined overcoat, 1834. - Portrait of Hans Christian Andersen shows the depth and breadth of fashionable coat collars, 1836. - A gentleman of the Wilkes Family, 1838–40, wears a dark cravat. His tall coat collar is notched and spreads onto his shoulders. The sleeve has just a hint of fullness at the sleeve head. - Zoo proprietor Edward Cross wears a red and black patterned waistcoat with brown trousers and a black tailcoat, cravat, and top hat, 1838. Children's fashion In this period, small boys wore sashed tunics over trousers, sometimes with a round-collared shirt underneath. (In Sketches by Boz, 1836, Charles Dickens described the earlier skeleton suit as "...one of those straight blue cloth cases in which small boys used to be confined, before belts and tunics had come in...." [emphasis added]). Older boys wore short jackets and trousers with round-collared shirts. Girls wore simplified versions of women's fashion. See also Notes |Wikimedia Commons has media related to 1830s fashion.| - ^ "America's First Look into the Camera: Daguerreotype Portraits and Views, 1839-1862". Archived from the original on 2009-05-04. Retrieved 2009-03-26.
https://webarchive.linc.tas.gov.au/20131212045031/http:/en.wikipedia.org/wiki/1830s_in_Western_fashion
Baltimore, MD (June 21, 2012) – Attorney General Douglas F. Gansler and Maryland Department of the Environment Secretary Robert M. Summers today announced a settlement with Toll Brothers, Inc., one of the nation’s largest homebuilders, who will pay a civil penalty of $741,000, including $22,000 to Maryland, to resolve alleged Clean Water Act violations at its construction sites. The settlement involves alleged violations of the storm water management and permitting requirements at Toll Brothers Inc. construction sites, including locations within the Chesapeake Bay Watershed. “Stormwater management regulations are in place to protect the health and vitality of every Maryland waterway and the Chesapeake Bay,” said Attorney General Gansler. “This agreement addresses systemic failures and a disregard for Maryland’s environment and the health of the Chesapeake Bay Watershed. We are telling the major national homebuilders that they must follow the same rules as everybody else.” "Clean water is the foundation of our economic and public health. It is absolutely critical that we reduce pollution from stormwater runoff to protect our streams, rivers and Chesapeake Bay," said Maryland Department of the Environment Secretary Robert M. Summers. "The steps that this homebuilder must take under this settlement will advance the cause of restoring local waterways and serve as an example to others who might not be paying proper attention to environmental regulations." Toll Brothers Inc. construction sites involved with this settlement include individual residential home locations in Anne Arundel, Baltimore, Harford, Howard, Montgomery, Prince George’s and Worcester counties. Reducing polluted stormwater runoff is a key element of Maryland’s Watershed Implementation Plan, the detailed strategy to restore local waterways and the Chesapeake Bay and meet the requirements of EPA’s “pollution diet.” Maryland’s recent actions to reduce stormwater pollution include: the Stormwater Management Act of 2007, which requires nonstructural best management practices and environmental site design techniques be implemented to the maximum extent practicable in development and redevelopment projects; a revised general permit to control stormwater discharge during construction; and new municipal stormwater permits being issued for Maryland’s 10 largest counties. These controls are estimated to reduce urban stormwater pollution by 20 to 30 percent when fully implemented. Under the settlement, Toll Brothers will invest in a company-wide stormwater compliance program to improve employee training and increase management oversight at all current and future residential construction sites in 23 states across the nation. The company is required to inspect its current and future construction sites routinely to minimize stormwater runoff from sites. EPA estimates the settlement will prevent millions of pounds of sediment from entering U.S. waterways every year, including sediment that would otherwise enter the Chesapeake Bay, North America’s largest and most biologically diverse estuary. The bay and its tidal tributaries are threatened by pollution from a variety of sources and are overburdened with nitrogen, phosphorus and sediment that can be carried by stormwater. Polluted stormwater runoff and sediment from construction sites can flow directly into the nearest waterway, affecting drinking water quality and damaging valuable aquatic habitats. The government complaint, filed simultaneously with the settlement agreement in the U.S. District Court for the Eastern District of Pennsylvania, alleges over 600 stormwater violations that were discovered through site inspections and by reviewing documentation submitted by Toll Brothers. The majority of the alleged violations involve Toll Brothers’ repeated failures to comply with permit requirements at its construction sites, including requirements to install and maintain adequate stormwater pollution controls. The Clean Water Act requires permits for the discharge of stormwater runoff. In general, Toll Brothers’ permits require that construction sites have controls in place to prevent pollution from being discharged with stormwater into nearby waterways. These controls include common-sense safeguards such as silt fences, phased site grading and sediment basins to prevent construction contaminants from entering the nation’s waterways. The settlement requires Toll Brothers to obtain all required permits; develop site-specific pollution prevention plans for each construction site; conduct additional site inspections beyond those required by stormwater regulations; and document and promptly correct any problems. The company must properly train construction managers and contractors on stormwater requirements and designate trained staff for each site. Toll Brothers must also submit national compliance summary reports to EPA based on management oversight inspections and reviews. The settlement also includes Toll Brothers sites in Arizona, California, Colorado, Connecticut, Delaware, Florida, Georgia, Illinois, Massachusetts, Michigan, Minnesota, New Jersey, New York, North Carolina, Nevada, Ohio, Pennsylvania, Rhode Island, South Carolina, Texas, Virginia and West Virginia. The consent decree, lodged in the U.S. District Court for the Eastern District of Pennsylvania, is subject to a 30-day public comment period and approval by the federal court. Once notice is published in the Federal Register, a copy of the consent decree will be available on the Justice Department website at www.justice.gov/enrd/Consent_Decrees.html. More information on Maryland's Stormwater Management Program:http://www.mde.state.md.us/programs/Water/StormwaterManagementProgram/SedimentandStormwaterHome/Pages/Programs/WaterPrograms/sedimentandstormwater/home/index.aspx More information on EPA stormwater enforcement at: www.epa.gov/oecaerth/data/planning/priorities/cwastorm.html # # # We're available on the following channels.
https://mde.maryland.gov/programs/pressroom/Pages/06_21_12_NR_Toll_Brothers_Inc._CWAviolation.aspx
Australian Social, Economic & Cultural Exchange Pty Ltd (ASECE) is an Australia-based company that specialises in educational and cultural exchanges between Australia and China. Operating since 2003, ASECE has successfully organized numerous cultural and educational exchange programs over the years. A variety of activities involving both Chinese and Australian participants in the fields of cultural communications, educational, social, arts, and sports exchanges have significantly contributed to the understanding of different cultures and traditions and have had a great influence on the communities locally and abroad. ASECE is a proud representative agent registered with the New South Wales (NSW) Department of Education who coordinates. Our Study Tours program offers students and international educators, principals, teachers, and government officers a unique educational experience that includes visiting schools, participating in classes, excursions, school activities, and special events conducted in the school or local community. For years, ASECE has made utmost efforts to bring the bilateral social, educational, and cultural relations closer. We are now endeavoring for further achievements with support from the governments and our broad range of partnership networks.
https://gpsedu.org/?page_id=38
Singer and composer Boruch Sholom Blesofsky releases a exciting new single titled “Chai Hashem.” BSB announced that this song was recorded with no pitch correction or auto-tune in the vocals, a first in Jewish music in the last 20+ years. He wanted to keep the vocal very rough. The lyrics from Megillas Ruth talk about the person that passes the big test of promiscuity, will merit great riches of the world.
https://www.thejenetwork.com/2021/10/21/boruch-sholom-releases-new-single-chai-hashem/
Q: Clear data inside all files in C++ Hi guys I am programming on C++. I wish to clear all the data inside of all files in the current directory. Can someone tell me the command to get all files? That is what I am trying but it doesn't work: ofs.open("*.*", ios::out | ios::trunc); The problem is: open("*.*", A: fstream can't open all files of a directory, instead, you can iterate each file. This example only works on C++17 #include <string> #include <iostream> #include <filesystem> #include <fstream> //namespace fs = std::experimental::filesystem; //for visual studio namespace fs = std:::filesystem; int main() { std::string path = "path_to_directory"; for (auto & p : fs::directory_iterator(path)) { if (fs::is_regular_file(p)){ std::fstream fstr; fstr.open(p.path().c_str(), std::ios::out | std::ios::trunc); //do something fstr.close() } } } Older compilers(Windows): #include <Windows.h> #include <string> #include <fstream> std::wstring path = L"path_to_directory"; path += L"\\*"; WIN32_FIND_DATA data; HANDLE hFind; if ((hFind = FindFirstFile(path.c_str(), &data)) != INVALID_HANDLE_VALUE) { do { if (data.dwFileAttributes & FILE_ATTRIBUTE_ARCHIVE) { std::fstream fstr; fstr.open(data.cFileName, std::ios::out | std::ios::trunc); //do something fstr.close(); } } while (FindNextFile(hFind, &data) != 0); FindClose(hFind); }
I was never really too into Valentines day. I guess because I never wanted to be disappointed or get hurt. Looking back it seems as though I wasn’t able or willing to communicate with my partner enough to not be disappointed. I wasn’t able or willing to even risk/love enough to really get hurt. Communication is so important. In order to effectively communicate with our partners, first we must communicate with ourselves. In order to communicate with ourselves we need to have a level of self-awareness. Awareness of our own needs and desires. Awareness of our judgements and expectations of ourselves. Then we must have self-love and self acceptance of this. Learn to balance our self criticisms with self-love and compassion. We communicate in the way we have been taught through life. Usually change only occurs when what we are doing is no longer getting us what we want. Most of the time this realization manifests in a form of miscommunication resulting in us or someone else getting disappointed or hurt. So we either learn something new to get what we want or keep doing what we have been doing and getting what we have gotten. The choice is ours. theses are patterns we run. grow or die Interestingly those patterns we run keep us safe and hinder our growth. It is more challenging to step beyond our comfort zone of what we know and jump into the unknown and unfamiliar. The holy jumping off point. Well, I am a jumper! I wanna grow! That is where the risk is…if I love will I get love back? If I respect you do I get the same in return? If I share with you are you really listening? Are you hearing what I am really saying? only if we are communicating in a way we both understand or are least willing to try Over time I have learned more effective communication skills and decided to take more ‘risks’ with my heart and just love. The part of this that is huge for me was the acknowledging and validating my own feelings. Before I would hardly acknowledge my feelings in the first place let alone validate them. Its like these body sensations (feelings) are telling me something, they get my mind going. If I am aware I work through them and then I move on. If not I keep running the same circle over and over again, no thanks. I enjoy variety, new experiences and learning new things. There for I am willing listen as well be heard. The journey along the way is what makes life interesting, those moments of realization, transformation, comfort and joy. So Valentines Day should be every day, we should not save only one day a year to love and be loved, by ourselves or another. There is so much to explore!
http://sexcessfulljourney.com/2012/02/valentines-day-thoughts-on-communication-skills/
"At night, light throws the body's biological clock—the circadian rhythm—out of whack. Sleep suffers. Worse, research shows that it may contribute to the causation of cancer, diabetes, heart disease, and obesity." - Harvard Medical The sun is our oldest light source and one of the most universal cues that we use to tell time. The changing quality and position of the sun in the sky guides our daily transitions from sleeping to waking and from daytime to nighttime activities. The sun also fine tunes our biological clock to synchronize with the daily cycle of lightness and darkness outside. That's why Sunn was created, to improve the human condition by offering a way for indoor lighting to put people back in touch with the daily rhythm of the sun, the same sun we as humans have evolved with and for.
https://sunnlight.com/
OPINION | Covid-19 economic impact: Private sector and industry must work together While government should contribute to economic growth, the private sector, business, and industry are the components that will generate real growth in the wake of the impact of Covid-19 on the economy, writes Francis Petersen. It is a well-known fact that the South African economy was in deep trouble before the Covid-19 pandemic, with unsustainable levels of debt, a growing budget deficit, and an 8% projected contraction of the economy post the pandemic. There is a clear realisation that the economy needs a recovery plan, with the significant expansion of productive employment opportunities for South Africans. In fact, the Social Partners’ Economic Recovery Plan, coordinated by Nedlac, was developed to increase investor, consumer, and public confidence, and to turn the economy around in the short and medium term. The plan provides specific interventions, and although the actions as specified are not new, it argues for "significant convergence among the Nedlac partners on what needs to be done to set our economy on a new accelerated, inclusive, and transformative growth trajectory". President Cyril Ramaphosa will present the plan to Parliament this week. The private sector, industry, and business are key components of the economy, primarily driven by manufacturing, financial services, transport, mining, agriculture, and tourism. Although I believe that government can and should contribute to economic growth, the private sector, business, and industry are the components that will generate real growth in the economy. Business for South Africa (B4SA) has pledged their commitment to work with the social partners to implement these action steps – and it needs to be emphasised that these interventions are not new! However, the dilemma lies in the implementation of these actions in terms of inaction, urgency, and effectiveness. Whether it is to address the energy crisis (more specifically, the security of energy supply), local manufacturing, supporting the recovery and growth of tourism, investment in the mining, agriculture, and infrastructure sectors, adversarial relationships, egos and political rhetoric needs to be replaced by collaboration, co-creation, and action. Lack of action threatens livelihoods It is clear that the political, business, and societal spheres do not need more workshops, conversations, policies or plans – these are all available and known. We need to build a capable state (which includes the architecture of the SOEs), introduce appropriate labour reform, corruption across all spheres of government, business, and social partners is unacceptable and need to be decisively addressed, policy and regulatory certainty and proper fiscal reform are required. Why is it then so difficult to implement these if all stakeholders are in agreement, even if everyone is aware that lives and livelihoods are threatened every minute when these actions are not implemented? Is it the lack of political will or lack of political leadership? Although B4SA also places emphasis on the implementation of these actions, I find the individual voices of industry, private sector, and business leaders absent. In my engagement with some of these leaders, they have stated that although their responsibilities are to their boards and shareholders, two sets of principles drive their business agenda: doing more with less (effectiveness and efficiency), and doing good while doing business (community upliftment through social performance), underpinned by a green focus. Although international leaders in the mining industry, such as Mark Cutifani (Anglo American), Mark Bristow (Barrick), Mick Davis (ex-Xstrata), and many other business and industry leaders argue for foreign investment in South Africa, certainty in the country’s regulatory framework is required for this to materialise. A strong economy is also important for graduates It is obvious why the South African economy needs to recover, and that the existence of a strong private sector, industry, and business is critical in achieving this recovery. From a higher education perspective, a powerful and effective educational experience is developed when academia and a strong private sector and industry work side by side. Such a collaborative and co-created model results in breakthroughs and overall advancement of higher education institutions, business, and industry, and importantly – the students. The continuous contraction of the South African economy further lends itself to the unemployment crisis, where the weak economic performance is not sufficient to create jobs in line with the population growth, which in itself presents a massive challenge for university graduates. A strong focus on employability as part of the core business of a university, and the ability to equip graduates with the necessary skills to navigate the future world of work will remain crucial factors – not only now, but also in the coming years, and a relationship with a strong industry, private sector, and business is pivotal in driving this. The financial model used in a South African (residential) university consists of three main income sources: (i) the state or government through a subsidy (the so-called ‘block grant’), (ii) tuition fees, and (iii) third-stream income (which is mainly a cost-recovery component from contract research, donations, and interest on university investments) The National Student Financial Aid Scheme (NSFAS) contributes to the tuition fees through a Department of Higher Education, Science and Innovation Bursary Scheme, providing fully subsidised free higher education and training to poor and working class South Africans (recipients will typically be students from households with a combined income of less than R350k per annum). Negative impact of Covid-19 The negative impact of Covid-19 on the income drivers of the university can be severe. The subsidy from the state or government has already been cut, with potential further cuts in both the subsidy and specific earmarked funds. The pressure on income derived from tuition fees (that component which is not funded through NSFAS) will increase, as households would have been affected by the nationwide lockdown and the economy in deep recession, and a significant number of jobs would have been lost. The economic downturn, due to both Covid-19 and a sovereign downgrade by all rating agencies, has already negatively impacted local financial markets as well as the global economy. The multiplier effect of this would be that the value of investments and endowments would decrease, and philanthropic organisations and foundations would most probably reduce or even terminate ‘givings’ to universities. Although industry, private sector, and business will reassess their funding to universities, whether for research or bursary support, it is also an opportunity for such a strong sector to at least assist universities to "fill this financial gap" in the short and medium term. Although, it is not expected that business and industry will just "fill this financial gap" – institutions of higher learning need to argue and demonstrate a value proposition to these sectors. Covid-19 has clearly demonstrated the focus of collaboration and co-creation among different stakeholders – these should be explored more concretely. Should vice-chancellors (a representative of this group) not be part of BUSA or Business Leadership SA as a first step to bring higher education institutions and the different leaders of the economy closer? Although Covid-19 has negatively impacted the financial position of the industry and business sectors, my assessment is that these sectors would recover faster than anticipated, but the effective and urgent implementation of a ‘state economic recovery plan’ is essential – every day that this implementation is stalled, it is affecting the country and its people severely. Public-private partnerships key to economic growth Government and the industry and business sector need to work together to foster economic growth – now more than ever. The plans to achieve this are available – the implementation thereof, however, is lacking. A strong industry and business sector have major benefits for the country, among others, for the higher education sector. Let us not delay this further, political leadership needs to be decisive and the industry and business sector must continue to speak out – this sector is too important to be neglected. - Professor Francis Petersen is Rector and Vice-Chancellor of the University of the Free State and former executive of Anglo American Platinum We live in a world where facts and fiction get blurred In times of uncertainty you need journalism you can trust. For only R75 per month, you have access to a world of in-depth analyses, investigative journalism, top opinions and a range of features. Journalism strengthens democracy. Invest in the future today.
Growing up we ate your typical American food. When my dad wasn’t eating dinner at the Fire Station my mom would cook steak, pork chops, ribs… you know, typical American family food. When my dad wasn’t around for dinner it was grilled cheese, hot dogs, spaghetti-O’s, etc. Simple stuff my mom could make for us kids who she knew wouldn’t appreciate the steaks and such. Come to think of it, maybe that’s the reason why I’m such a picky eater. But clearly I’m a little more open these days as my wife took me to dinner this week at an Afghan restaurant in Skokie called The Kabul House, and I actually enjoyed it. Kabul House: Afghan Food Kabul House is located on Oakton Street in Skokie, which is around the corner from my wife’s parents condo. Her mom was in town helping out with baby Adam (nephew, not our child) and wanted to go grab dinner somewhere on Wednesday night. When my wife told me where we they were going I almost declined; opting instead to make grilled cheese at home, but I’m glad I went. Kabul House is authentic Afghan cooking, but even if it wasn’t “authentic” I wouldn’t be able to tell since I’ve never had Afghan food. I’ve been to places like Reza’s and things like that, and Celeste said this would be similar. She was pretty much right. We ordered the Aushak appetizer, which is “Afghan-ravioli type dumplings filled with scallions & leeks. Topped with a yogurt-mint sauce and a tomato based meat sauce.” If there was one thing I didn’t care for during the meal it was this. I’m not a fan of dumplings in general. The weird texture of them doesn’t work for me, so top that with yogurt-mint sauce and leeks and I had to pass, but I did try it, just wasn’t feeling it. Celeste also got a soup before dinner, I believe it was the Aush-Rishta soup, which was much better than the Aushak appetizer. I probably wouldn’t eat a whole bowl on my own, but the few sips I had weren’t too bad. As far as entrees go, there are plenty to choose from, but I went with one that seemed pretty safe; Murgh. I don’t even know how to pronounce that, but it’s just charbroiled boneless pieces of marinated chicken. I tried to order just one skewer, but the waiter convinced me that 5 pieces of chicken wouldn’t be enough and I should double it to 2 skewers. Needless to say I only ate 1 skewer worth and took the rest home, but that’s not because it wasn’t delicious. The chicken was actually quite good and probably the tenderest chicken I’ve ever had in my life. It literally melted in your mouth as if you were eating ice cream. The marinade was also quite delicious. It gave the chicken a little bit of heat, but not too much. I’m not a fan of super spicy foods and I did just fine with this. I also opted for the Afghan rice as opposed to white or dill, and was very happy with my choice. I would definitely go back here and try something else now that I know how delicious the entrees are. Not to mention the service was outstanding. Our waiter was very attentive and super polite. I’m usually the one saying thank you to the servers with every visit, but this guy said thank you and you’re welcome, more times than I did. So with delicious Afghan food and extremely friendly/attentive service, do yourself a favor and give the Kabul House a try. If I was willing to give it a try, and actually said it was good, then you should probably run over and try it for yourself.
https://www.antifoodie.com/kabul-house-afghan-food-in-skokie/
LAGER (Litter Action Group Ealing Residents) visit the park frequently, either as a group or as individuals. Here is one such visitor’s report. Thanks Ian! For a day-off after 2 days of grotty undergrowth we took a wander round Perivale Park this afternoon. (Apart from the benches) it all looked pretty clean, until we got to the new footbridge & the golf tee beside it. 2 overflowing bags later we started the long hunt for a bin. After pausing at 2 of the benches along the (seriously overgrown) path between Ruislip Rd East & the Brent we had another 2 bags, & a long walk to find a bin at a bus-stop. Bins may attract litter, but secluded benches without nearby bins seem to attract a heck of a lot more!! After that it was a gentle stroll past the new lakes & back to the car park. Such a lovely change from the last time we saw the area between Gurnell & the railway at the start of lockdown, when the lakes were just abandoned holes in the ground & the paths were strips of mud & rubble. 4 bags, 1 unbaggable & a flytip reported Ian mentions the flytip reporting. I might just mention that a very easy way to report not only flytipping but other antisocial behaviours such as abandoned (hire) bikes, graffiti etc is to use the LoveCleanStreets app on a phone. It takes just a minute or so and keeps tabs of your reports. Certainly Ealing Parks recommend its use. And in case you are wondering, yes I used it to report the defacing of the Nicky Hopkins seat in the park.
https://www.perivalepark.london/archives/22120
The El Niño phenomenon poses a global threat to the agricultural livelihoods of millions of people. In Southern Africa, the impacts of El Niño have been felt across all sectors — food security, nutrition, agriculture, water and sanitation, energy, health and education — which leads to the suffering of vulnerable populations and to economic contraction. The poor 2015/16 agricultural season, compounded by last year’s poor harvest that left only two countries with surplus food to export, has greatly affected the food and nutrition security of millions of people. The lean season is expected to continue through April 2017, which will have a cumulative eroding effect on the production capacities of farmers in the 2016/17 agricultural season. With 70 percent of the population in the region depending on agriculture for their livelihood, these same people not only produce food for themselves, but for the entire subregion. Supporting these farmers will be crucial to avoiding protracted relief operations and increased vulnerability, which can lead to migration as income and labour opportunities cease to exist. In 2015, the Food and Agriculture Organization of the United Nations (FAO) established a Global Task Team on El Niño, which focuses on coordinating FAO’s response to the impacts on agriculture, food and nutrition security and the livelihoods of affected populations. In December 2015, FAO’s Global Information and Early Warning System issued a special alert on the effects of El Niño in the region. Based on this information, the Southern Africa El Niño Response Plan 2016 was drafted and further benefited from the Southern African Development Community (SADC) El Niño meeting held in Johannesburg on 25–26 February 2016. The recommended response actions from the SADC meeting are supported by this Plan. Given the magnitude of the crisis across multiple countries, timely and coordinated support is required to assist vulnerable families to restore agricultural production, regain their livelihoods and better withstand future climatic shocks. FAO is committed to complementing and supporting governments’ efforts in the region to effectively respond to the immediate stress effects of El Niño on vulnerable farmers’ assets and livelihoods, as well as pursuing policy and investment options to build their resilience. The evolving climatic patterns characterized by cyclic drought, floods and cyclones have become more frequent in Southern Africa. Their scale and complexities demand that all partners on the ground work together to help communities become more resilient to these threats. With agriculture regarded as a key driver in the economic growth of countries in the region, the adoption of policies, technologies and practices that build the resilience of agriculture-based livelihoods to potential threats is crucial.
http://www.fao.org/emergencies/ressources/documents/ressources-detail/fr/c/429120/
LANSING, Mich. — After a deadly and divisive year, the Delta Tau Omega Chapter of the Alpha Kappa Alpha Sorority is honoring Martin Luther King Jr.’s memory with a special gift to Sparrow patients and their families. “It is our honor and privilege to be of assistance to the Sparrow hospital in helping patients stay in contact with their families in this time of COVID,” said Sharon Rodgers, president of the Delta Tau Omega chapter, addressing the media at a ceremony commemorating the sorority’s gift in part of its Martin Luther King Day of Service. The Alpha Kappa Alpha Sorority’s program Pearls of Excellence donated iPads, cases and a docking station for patients who haven’t been able to have many visitors due to COVID-19 restrictions. “The gift of connectivity, connection and human touch in so many ways has been lost," said Nettavia Curry, president of the Peals of Excellence program. "So this gift allows those patients who might be suffering in isolation to have connection with family, friends, and other loved ones.” U.S. Rep. Elissa Slotkin was outside of Sparrow to thank the sorority and ask the Lansing community to honor King with their own commitment to service. “Reinvest in your community. Go do some community service. Get out of your house. Even during COVID, you can do this safely,” Slotkin said. The Dr. Martin Luther King Commission of Mid-Michigan hopes the community will continue to serve in King’s spirit beyond Monday’s holiday. “Many individuals look at today as a day of service. Our mission and our focus is to center people so they can spend the entire year looking at ways they can serve their community and their fellow man,” commission Chairperson Elaine Hardy said. Hardy hopes the holiday can bring back a sense of optimism to America. “That’s where my optimism is because we have been here before and I know that as we look forward to being a community of brothers, looking at people not by the color of their skin or by who they worship or who they love or where they lived but by looking at our shared humanity, I know we can get there. I believe it in my heart,” Hardy said. To stay up to date on celebrations of Dr. Martin Luther King throughout mid-Michigan you can visit: www.mlkmidmichigan.com/events If you would like to donate to the Pearls of Excellence program here in Lansing, you can contact them at [email protected] King was a member of the Alpha Phi Alpha Fraternity, the brother fraternity to the AKAs, and in just two days the U.S. will swear in the first Alpha Kappa Alpha as the vice president of the United States, Kamala Harris. Want to see more local news ? Visit the FOX47News Website. Stay in touch with us anytime, anywhere. Sign up for newsletters emailed to your inbox. Select from these options: Breaking News, Severe Weather, School Closings, Daily Headlines and Daily Forecasts.
https://www.fox47news.com/news/local-news/lansing-alpha-kappa-alpha-chapter-gives-the-gift-of-connection-honoring-dr-king
The long-term changes in the average climate of a place, which range from several decades to hundreds of millions of years, are called climate change. At present, climate change refers to the natural changes that result from the ongoing human activities of the world. Climate change leads to rapid increase and decrease in the temperature of the Earth. The climate is rapidly changing due to greenhouse gas presently. For which we humans are responsible. Bangladesh is the most affected due to climate change. This year, due to climate change, there is a massive natural calamity due to climate change. People in haor areas are affected due to uneven rainfall. Due to extreme rainfall, floods have occurred in haor areas. This flood caused by rain caused thousands of acres of Boro paddy. Bangladesh is in the first place at the risk of flood and river erosion as a result of climate change. Various types of plants and plants of nature are being damaged in different areas of Bangladesh due to floods caused by floods. Due to these erosion, the amount of grazing back was less than the land which was submerged in riverbed. Generally earthquakes are caused by carbon cycles. But the earthquake is now increasingly growing. Researchers are frequent earthquake climate paribartanerai more of an impact. At present, climate change is affected by the changing nature of the estates of people in the region. Timely rain was not going to fill a large part of haorera. Rain breaches reduce the breeding of fish. Currently, only 133 species of fish are found in 250 species of fish in Bangladesh. In light of climate change, Bangladesh has started experiencing huge losses. There are various fields of livelihood. We know that the government is taking steps to deal with the situation. Therefore, to protect civilians from the effects of natural disasters as well as to increase awareness of the government to be aware optimistic.
http://teenagersbd.com/climate-change-and-natural-disasters/
Learning is a natural process and in the age of digital technology, gaining knowledge can take place outside of the structured classroom setting. Generally, informal learning happens when an individual chooses when, what and how to learn without being restricted to lessons from the classroom. For students, it can complement their formal learning and help develop their ability to acquire knowledge and skills, whether during their time in school or even upon graduation as part of their lifelong learning. Informal learning comes in various activities, such as self-studying, watching educational videos, reading articles, participating in online learning communities, joining coaching sessions, and playing games. Here are some skills that students can gain from informal learning: Effective time management Unlike other forms of learning, informal learning is spontaneous and occurs without any set methodology. This means that students are able to be more effective in managing their own time because informal learning allows them to learn at their own convenience or independent of their lecturers or professors. Persistence and independence One of the advantages of informal learning is the independence it provides to students in setting their own learning goals and objectives. Through such learning process, students are more willing to seek help when needed, work on their lessons daily and deal with any challenges they face throughout their studies. In other words, informal learning helps build their persistence, internal motivation, responsibility, and a certain level of maturity that will become beneficial when they leave school. Continuous exploration When students are put into a formal learning environment such as a classroom, they don’t typically develop an affinity to learn something new. Informal learning, on the other hand, lets students learn at their own pace and gain more control on what they are discovering, thus enabling them to have more focus and fun in their studies. It allows students to satisfy their curiosity and, in the process, helps them to gain more knowledge, pick up new techniques, or hone existing skills more effectively. Furthermore, with so much information available online, students can take advantage of such access to continuously acquire new learning experiences. Improved knowledge retention When concepts are learned over time through repetition and perseverant activities, they are more likely to result in mastery, and this can be achieved more successfully through informal learning. Without the pressure of having to clear a test, get a decent score, and perform academically well, informal learning allows for continuous, natural learning to occur among students, thus resulting in higher levels of knowledge retention in the long run. Photo by Julia M Cameron from Pexels.
http://blog.sarawakyes.com/informal-learning-in-the-digital-era/