content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
Friends and family are often key to encouraging loved ones with eating and/or body image issues to seek help. Whether they are unaware that there is a problem, they are afraid or ashamed to seek help, or they are ambivalent about giving up their concerning behaviors, many sufferers find it difficult to seek help. Family and friends can play an important role in identifying worrying symptoms to the sufferer and encouraging them to seek help. If you are concerned about the eating habits, weight, or body image of someone you care about, we understand that this may be a very difficult and scary time for you. It’s not always easy to discuss eating concerns, especially with someone you are close to. However, you are doing a great thing by looking for more information; many individuals now in recovery from an eating disorder say the support of family and friends was crucial to them getting well. How to Talk to a Loved One About Eating Concerns - Learn as much as you can about eating disorders. Read books, articles, and brochures. Know the difference between facts and myths about weight, nutrition, and exercise. Knowing the facts will help you reason with your friend about any inaccurate ideas that may be fueling their disordered eating patterns. - Rehearse what you want to say. This may help reduce your anxiety and clarify exactly what you want to say. Other people have found writing out their main points helpful. - Set a private time and place to talk. No one wants to have personal issues dissected in front of a crowd, so make sure you find a time and place where you will have time to discuss your concerns without being rushed or in front of a crowd. - Be honest. Talk openly and honestly about your concerns with the person who is struggling with eating or body image problems. Avoiding it or ignoring it won’t help! - Use “I” statements. Focus on behaviors that you have personally observed, such as “I have noticed that you aren’t eating dinner with us anymore,” or “I am worried about how frequently you are going to the gym.” It’s easy to sound accusatory (“You’re not eating! You’re exercising too much!”), which can cause a person to feel defensive. Instead, stick to pointing out what you’ve observed. If you can, also point out behaviors not related to eating and weight, which may be easier for the person to see and accept. - Stick to the facts. Raising concerns about a potential eating disorder can bring up lots of emotions, and it’s important not to let those run the show. Instead, talk about behaviors and changes you have observed and calmly point out why you are concerned (“I have seen you run to the bathroom after meals and feel worried you might be making yourself throw up.”). - Be caring, but be firm. Caring about your friend does not mean being manipulated by them. Your friend must be responsible for their actions and the consequences of those actions. Avoid making rules, promises, or expectations that you cannot or will not uphold. For example, “I promise not to tell anyone.” Or, “If you do this one more time, I’ll never talk to you again.” - Remove potential stigma. Remind your loved one that there’s no shame in admitting you struggle with an eating disorder or other mental health issue. Many people will be diagnosed with these issues during their lifetimes, and many will recover. - Avoid overly simplistic solutions. Being told “Just stop” or “Just eat” isn’t helpful. It can leave the sufferer feeling frustrated, defensive, and misunderstood. - Be prepared for negative reactions. Some eating disorder sufferers are glad that someone has noticed they are struggling. Others respond differently. Some may become angry and hostile, insisting that you are the one with the problem. Others may brush off your concerns or minimize potential dangers. Both of these responses are normal. Reiterate your concerns, let them know you care, and leave the conversation open. - Encourage them to seek professional help. Many eating disorder sufferers require professional help in order to get better. Offer to help the sufferer find a physician or therapist if they don’t have one, or attend an appointment where the eating disorder is discussed. Getting timely, effective treatment dramatically increases a person’s chances for recovery. If your loved one is ready to seek treatment or you want to explore options, the NEDA Helpline is a great place to start. Contact the Helpline > - Tell someone. It may seem difficult to know when, if at all, to tell someone else about your concerns. Addressing body image or eating problems in their beginning stages offers your friend the best chance for working through these issues and becoming healthy again. Don’t wait until the situation is so severe that your friend’s life is in danger. Your friend needs a great deal of support and understanding. Even if you don’t feel the discussion was well-received or that you got through to your loved one, don’t despair. You shared your concern and let them know that you care and you are there for them. You may also have planted a seed that they should seek help. The seed may not take root immediately, but over time, the concern of friends and family can help move an individual towards recovery. Note: If you suspect a medical or psychiatric emergency, such as threats of suicide or medical complications from eating disorder behaviors (such as fainting, heart arrhythmias, or seizures), seek medical attention or call 911 immediately. Parent Toolkit Another useful educational resource is NEDA’s Parent Toolkit. This comprehensive guide is for anyone who wants to understand more about how to support a family member or friend affected by an eating disorder. You will find answers to your insurance questions; signs, symptoms and medical consequences; information about treatment and levels of care; and questions to ask when choosing a treatment provider. Download the Parent Toolkit Now TIPS FOR ENCOURAGING A LOVED ONE TO SEEK PROFESSIONAL HELP Recovery from an eating disorder requires professional help, and chances of recovery are improved the sooner a person begins treatment. It can be frustrating to watch a loved one suffer and refuse to seek help. Parents of children under 18 can often require that their child’s eating disorder be treated, even if the child doesn’t buy in to the idea that treatment is necessary. For parents of older sufferers, and other loved ones of sufferers of any age, encouraging a reluctant eating disorder patient to seek help can be a delicate task. It’s crucial to their future well-being, however, to seek recovery, and encouraging proper treatment of their eating disorder can help them move towards that goal. Although every discussion with an eating disorder sufferer will be slightly different, here are a few basic points to keep in mind: - Taking the first step towards recovery is scary and challenging. Although the act of seeking help might seem straightforward to you, it can be very stressful and confusing. Keeping that in mind will help you empathize with what the other person is going through. - Ask if they want help making the first call or appointment. Some individuals may find it less anxiety-provoking if someone else sets up the appointment or goes with them to discuss a potential eating disorder. - Don’t buy the eating disorder’s excuses. It’s easy enough to promise to see a doctor or a therapist, but the sufferer needs to follow through with making the appointment and seeing a professional on a regular basis. Yes, everyone’s busy, treatment can be expensive, and the eating disorder might not seem like a big deal. Don’t making eating disorder treatment the only thing you talk about with your loved one, but follow up on their promise to see someone. - If the first professional isn’t a good match, encourage them to keep looking. Finding the right therapist isn’t easy, and someone may have to interview several potential candidates before finding one that works. Sometimes it takes several tries before a person identifies the right clinician. - Make sure they get a medical check-up. Eating disorders cause a wide range of medical issues, and sufferers need to see a physician regularly to make sure their health isn’t at immediate risk. Remember that lab work may remain stable even if someone is close to death, so don’t rely on blood tests alone. - Ally with the part of them that wants to get well. Often, eating disorder sufferers are hesitant to change their behaviors. Some people have found it easier to focus on some of the side effects of the eating disorder that the sufferer may be more willing to acknowledge and tackle, such as depression, social isolation, anxiety, insomnia, fatigue, or feeling cold. This can help get them in the door, where the eating disorder can begin to be addressed. - Remind the person of why they want to get well. What types of goals does your loved one have? Do they want to travel? Have children? Go to college? Start a new career? Helping them reconnect with their values and who they want to be can help them stay focused on long-term recovery and not the short-term benefits of the eating disorder. - Find a middle ground between forcing the issue and ignoring it. If you become overly insistent and combative about your loved one seeking help, they may start to avoid you. On the other hand, you don’t want to ignore a potentially deadly illness. It’s not easy to find a middle ground between these two extremes, but regularly checking in with your loved one about how they’re doing and if they are willing to seek treatment can help nudge them in the right direction.
https://www.nationaleatingdisorders.org/learn/help/caregivers
Write a function that accepts a string as an argument and returns true if the string is a palindrome (the string is the same forward and backward), or false if it is not. A string is still considered a palindrome despite letter capitalization, spaces, or punctuation. E.g.:
https://coursework.vschool.io/palindrome-finder/
Be the first to rate! 2 HRS 15 MINS Time to Cook 6 Servings 17 Ingredients Ingredients Preparation - Step 1 Combine flour, salt and pepper. Reserve 1 tablespoon flour mixture. Lightly coat beef Chuck Shoulder Roast pieces with remaining flour mixture. - Step 2Heat 2 teaspoons oil in stockpot over medium heat until hot. Brown half of beef; remove from stockpot. Repeat with remaining 2 teaspoons oil and remaining beef. Remove beef from stockpot. - Step 3Add onion and garlic to stockpot; cook and stir 3 to 5 minutes or until onions are tender. Add wine; increase heat to medium-high. Cook and stir 1 to 2 minutes or until browned bits attached to stockpot are dissolved. Stir in broth, tomatoes, herbs de Provence and reserved flour mixture. Return beef to stockpot; bring to a boil. Reduce heat; cover tightly and simmer 1-1/2 hours or until beef is fork-tender. Cooking Tip: Herbs de Provence is a dried herb blend used in the cooking of southern France. Often sold in small clay crocks in supermarkets, it’s commonly a blend of basil, fennel seed, lavender, marjoram, rosemary, sage, summer savory and thyme. - Step 4Add potatoes, zucchini and yellow squash to stockpot; continue simmering, covered, 15 minutes or until potatoes are tender. Add olives and basil; cook, uncovered, 2 to 3 minutes or until olives are heated through. Serve with cheese, if desired. Recipe adapted from the Healthy Beef Cookbook, published by Houghton Mifflin Harcourt Cooking Tip: Niçoise olives are from the Provence region of France. Small, oval and purplish-brown in color, they are packed in olive oil and have a nutty, mellow flavor. Greek Kalamata olives may be substituted for niçoise olives. Nutrition Information Nutrition information per serving: 358 Calories; 99 Calories from fat; 11g Total Fat (3 g Saturated Fat; 6 g Monounsaturated Fat;) 80 mg Cholesterol; 1179 mg Sodium; 31 g Total Carbohydrate; 4.1 g Dietary Fiber; 30 g Protein; 6 mg Iron; 4.4 mg NE Niacin; 0.6 mg Vitamin B6; 2.5 mcg Vitamin B12; 7.3 mg Zinc; 28.9 mcg Selenium. Nutrition Tip This recipe is an excellent source of Protein, Iron, Niacin, Vitamin B6, Vitamin B12, Zinc, and Selenium; and a good source of Dietary Fiber. Filed Under:Soups, Stews & Chili Add a Rating and Review You must login to comment.
https://beeflovingtexans.com/recipe/provencal-beef-stew/
Heat 1 tablespoon oil in a large skillet over medium-high heat. Add half the chicken and cook until well browned, 2 to 3 minutes per side; transfer to a 5- to 6-quart slow cooker. Reduce heat to medium and repeat with another 1 tablespoon oil and the remaining chicken. Arrange the chicken in an even layer in the slow cooker. - Add the remaining 1 tablespoon oil to the skillet. Add mushrooms and cook, stirring often, for 2 minutes. Sprinkle the remaining 1/3 cup flour over the mushrooms and cook, stirring constantly, for 1 minute more. Add broth and use a wooden spoon to scrape up any browned bits from the bottom of the pan. Cook, stirring, until hot and bubbling, about 2 minutes. Pour the mixture over the chicken in the slow cooker. Stir in carrots and onion. - Cover and cook until the chicken is falling-apart tender, 4 hours on High or 7 to 8 hours on Low. - Meanwhile, bake biscuits according to package directions. - When the chicken is ready, stir in peas. Cover and cook until the peas are heated through, 5 to 10 minutes more. Season with the remaining 1/2 teaspoon salt and pepper. Halve the biscuits and top each serving with half a biscuit. (Save the remaining biscuit halves for another use.) Tips To make ahead: Prepare through Step 4 and refrigerate for up to 2 days. Reheat and continue with recipe.
http://www.eatingwell.com/recipe/268038/slow-cooker-chicken-pot-pie/
Jammu, Nov 15: Lieutenant Governor Manoj Sinha Tuesday addressed a Janjatiya Samagam on the launch of week-long festivities on Janjatiya Gaurav Divas, at the Convention Centre. Paying tributes to iconic freedom fighter Bhagwan Birsa Munda on his Janm-Jayanti, the Lt Governor remembered the immense contribution of the tribal freedom fighters & brave heroes in freedom struggle and nation building. “The nation will forever be indebted to the bravery, courage & supreme sacrifice of Bhagwan Birsa Munda and other tribal icons”, said the Lt Governor. Hon’ble Prime Minister Narendra Modi is working tirelessly to fulfil dreams of tribals. I urge people not to fall for those instigating people on reservation. Hon’ble HM has assured Gujjars & other community’s interests will be protected & there will be no decrease in their quota even by one per cent, observed the Lt Governor. “I urge those undertaking Padyatra to return home. Some people with vested interest are spreading rumours on reservation. They are the same people who do not want peace and progress in the region”, the Lt Governor said. We recognize the critical role and contribution of tribal community in the development of J&K UT. They are prime mover of the progress. Tribal community is our moral compass and taught us the values of co-existence, oneness, harmony and sustainable living, the Lt Governor said. The Lt Governor further added that after decades of wait, Hon’ble Prime Minister has transformed the dream of social equity and justice into reality. It has brought fast and radical change in the lives of tribal community and paved the path for socio-economic growth. On the occasion, the Lt Governor shared various initiatives and resolutions taken by the UT government for the welfare of the tribal community and tribal youth. We are making dedicated efforts to harness the potential and channelize the productive energy of tribal youth and women so that new generation can transform the economic fortunes of their families and contribute to cultural and social vitality, said the Lt Governor. Special emphasis is being laid on beneficiary-oriented schemes and welfare infrastructure with priority to road connectivity, power supply, drinking water, modern tribal villages, self-employment, healthcare, skill development, scholarships and education, he further added. The Lt Governor underscored that the Livelihood generation for tribals by harnessing the wealth of ‘Van Dhan’ aims to tap into traditional knowledge and skill sets of tribals by adding technology & IT to upgrade the Pradhan Mantri Van Dhan Vikas Yojna at each stage and convert tribal wisdom into a viable economic activity. We are promoting a culture of excellence in our schools in tribal-populated areas through smart classrooms. These schools will act as a vital source of new knowledge and innovative thinking, and as providers of highly skilled students, the Lt Governor said. Enumerating the steps taken to give impetus to the socio-economic development of the tribal community, the Lt Governor said, apart from Forest Rights Act, several infrastructures like transit accommodation, boys & girls hostels, Eklavya model residential schools, mini Sheep farms, new dairy units, smart card and trucks for migratory population, Pradhanmantri Aadi Aadarsh Gram Yojna, Coaching programmes for NEET/JEE, UPSC, Technology Enabled Education Scheme, Tribal Research Centre have been created. “I am confident the Janjatiya Gaurav Saptah will not only celebrate the rich contribution of tribal community in Indian freedom but instill a sense of pride in the tribal tradition and cultural values”, the Lt Governor asserted. Janjatiya Gaurav Saptah will act as a fillip to the efforts for preservation of tribal arts and culture in this hyper connected and internet driven world, to encourage upcoming artists and students of tribal literature, he added. Earlier, the Lt Governor launched web portal for Tribal Awards which will Streamline and bring transparency in nomination process. Rajeev Rai Bhatnagar, Advisor to Lt Governor, speaking on the occasion extended his wishes and greetings to the tribal community for the Janjatiya Diwas and highlighted the reforms introduced by the government for the empowerment of tribal population of J&K. He lauded the contribution of tribal community in the progress of the UT. Dr Shahid Iqbal Choudhary, Secretary to Government, Tribal Affairs Department, in his welcome address highlighted the landmark initiatives for the welfare of tribal community. Impressive performances by the artists showcased the tribal culture and heritage of Jammu Kashmir. As a part of the celebrations of Janjatiya Diwas, procession of tribal artists, sports activities, Swachhta Drive, career counseling and other such programmes are lined up, it was informed. Ramesh Kumar, Divisional Commissioner Jammu; Avny Lavasa, DC Jammu; Director, Tribal Affairs Department; senior officials, PRI members, prominent tribal personalities and large number of youth from tribal community were present. JK govt unveils social media conduct code for employees Sajid Raina Srinagar, Mar 24: The administration of Jammu & Kashmir on Friday unveiled guidelines regarding the use of social...
https://lakecitytimes.com/2022/11/16/pm-transformed-dream-of-social-equity-justice-into-reality-lt-governor/
The goal of this book is to provide a complete foundation, with detailed proofs, for the Seiberg-Witten or monopole Floer homology. The book explains Floer homology theory of 3-dimensional manifolds based on the Seiberg-Witten equations (monopole equations) instead of Floer’s construction, which uses the anti-self-dual Yang-Mills equations (instanton equations). The first half of the book is devoted to a detailed study of moduli space (as a Hilbert manifold) and to a definition of monopole Floer homology as Morse theory of the Chern-Simons-Dirac functional. The authors develop analytic properties of the Seiberg–Witten equations. The Floer groups are defined here for any compact, connected, oriented 3-manifold, which is remarkable in a theory known for requiring special conditions to achieve applicability. The next chapter is dedicated to cobordism/topological invariance, exploring implications of the circle-valued Morse theory. Two final chapters are devoted to a calculation of Floer groups and to applications of the theory in topology. The book will be more understandable to readers with experience of gauge theory, Hilbert manifolds and slice theorems. It should be of interest to any mathematician faced with an infinite-dimensional moduli space of some sort.
https://euro-math-soc.eu/review/monopoles-and-three-manifolds
Congratulations to Diego Yanez, a seventh grader at St. |Diego Yanez| This year’s question was “Should U.S. senators and representatives have term limits?” Diego wrote that there should be term limits. Diego was invited to read his essay at the Robert E. Coulter Jr. Post 1941 in La Grange. His essay won over essays from students in junior high school and high school. Congratulations, Diego! It is our privilege to share his essay below: By Diego Yanez Our country is based off of change. Ever since the time of our Founding Fathers, we have always strived to change for the better. So why not apply this principle to Congress? As senators and representatives, it their job to make sure our government knows the needs of its people. If we have senators or representatives who are not very dedicated, our country will not prosper. Therefore, I propose that senators and representatives have term limits. First of all, U.S. senators and representatives who have been running for many terms are more likely to overlook new problems brought up by changing times, whereas new candidates who have grown up in this time can propose innovations that will better help the people. They can also revolutionize old ideas to better suit our new generation. Some senators and representatives are not as prompt in getting the citizens what they need. According to cato.org, “Americans believe that career legislators and professional politicians have created a gaping chasm between themselves and their government.” By having term limits, it would obligate senators and representatives to be more attentive to the citizens. Another reason is that if a senator or a representative is constantly re-elected, they lose their sense of competition. They know that there is a large possibility they will be elected again, so they do not work as hard to be able to maintain the vote of the people. When this happens, less work gets done, and things stay the same. If new senators and representatives get elected, they will work continuously to gain the confidence of the voters. New candidates running for the same position will strive to do better than the previous officials. This competition would help to make sure senators and representatives do not lose focus and remain motivated. My final reason is that term limits would help regulate government administration. By having new officials voted in, it would prevent long-term senators and representatives from feeling entitled and more powerful in their position. By eliminating this perception of false authority, it would help our government function mire efficiently. Progress will start to show, attracting more voters and possibly future candidates. This would help maintain the integrity of our senators and representatives. Frequent changes of officials in office will help return the confidence of the citizens in their government. To conclude, term limits can bring new perspectives to Congress. By having different views of the same matter, it can help work out what will benefit the citizens. These diverse views can help our government undergo evolutionary change. Term limits will help bring in new senators and representatives who are more enthusiastic and ready to make a difference for our nation. By eliminating the “business as usual” attitude, our government can fully unite and lead our country to greatness.
http://www.swchicagopost.com/2016/05/st-joseph-student-wins-1st-place-in.html
With over 20 years of experience in the cultural sector, Julian has worked as a historic interpreter, naturalist, teacher, program leader and senior manager. Educated at Queen’s University (B.Sc.) and at OISE – the University of Toronto (B.Ed.), Julian has spent his entire career honing his skills in historic centres, cultural centres, and major museums. His most current previous position was that of Assistant Vice President, Education and Programs at the Royal Ontario Museum. As a teacher, Julian is familiar with Ontario curriculum mandates and has implemented innovative plans for school groups from elementary, secondary and post-secondary levels. He is an expert programmer and is experienced developing offerings and activities for audiences of all ages. Julian has extensive experience with both free and fee-based programs and has worked with scientists, authors, celebrities, cultural agencies, school boards, community centres, and private sector supporters to produce high-level, professional programs. Additionally, Julian is a strong supporter of utilizing newly evolving technology for educational purposes, and while at the ROM, was a leader in the development of the Digital Gallery, a ground-breaking Interactive learning environment. Julian was among the most dependable and responsive individuals, he understood the need for new strategies, and was able to manage through changing times. Julian possesses a suite of knowledge and experience in cultural and educational programming unique to the Canadian experience. I recommend him with confidence to any organization.
https://culturalthinkers.ca/julian-kingston/
These visually striking metropolis time-lapse videos provide a stunning view of some of the world's best known cities. The beauty to these artistic creations is that they showcase fantastic views of each beloved city as if you were there yourself. The laborious process that it takes to create these videos of urbane settings should be appreciated as they truly bring realistic visuals that capture the charm of each respective location. The most prominent subject in this compiled list of stop motion videos is the famed city of lights: Paris. These sped-up photographic depictions attempt to capture the historic architecture and spirit of the French capital. With the booming genre of metropolis time-lapse videos, it seems possible to visually visit a city and feel the nostalgia of its beauty from miles away.
https://www.trendhunter.com/slideshow/metropolis-timelapse-videos
In order to share in your project, you need to copy the link and paste it into a blog, forum or another website: The calculator is intended for carrying out laboratory work for obtaining some of the parameters and graphs of dependence of magnetic permeability of ferromagnetic materials on the magnetic field. Another important parameter calculated in this calculator, — potentially attainable growth rate of the efficiency of the second kind — Kη2, the theory of which is fully reflected in these studies. This ratio is calculated for the parametric change of inductance with back EMF in the coil, which can be done on the basis of this laboratory work. Also, you can determine the current settings of the generator, which will output this coil on the working mode to a real device. An example of an actual measured performance of the ferrite ring is here. The scheme of the stand for laboratory work is shown below. Generator of sinusoidal signals G1 through a resistance R1, energizes the toroidal winding L1 of the transformer T1. The entire transformer contains two coils that are wound on a ferromagnetic core with its different sides. On the second winding (L2) measured voltage U2. Actually, the laboratory work consists in feeding gradually increasing the amplitude of the signal of the generator G1, and record the readings of the voltages U1 and U2 in the table. The program calculator will automatically convert them to values of induction and magnetic field strength, to plot and find the value of Kη2. The more obtained values (dots), the more accurate will the result. Program for automatic calculation is very important that the voltages U1 increased with time (svehu and down according to the table). If you want to add another point between the already previously created — just tap (+) between the desired table rows.To delete the same row in a table just by clicking on (—). But the program starts its calculations, you must first enter data on the frequency of the generator G1 and constructive parameters of the transformer core T1. These data are entered once at the beginning and do not change throughout the laboratory work. And, if the frequency of the generator resistance R1 and winding L1 data-L2 all clear, the "Length of the midline core, and cross-sectional Area of the core", there may be questions. Depending on the core construction, these parameters can be calculated in different ways. For example, for a toroidal core mean line length is: lm = (D + d)*π/2, and the cross-sectional area, as follows: Sc = (D - d)*h/2 where: D — external diameter of the ring torroid, d — inner diameter, π is the number PI, h is the height of the ring. The stand shows the toroidal transformer, but its design may be different: square, s-shaped, armor, etc. For the calculator will suit any — it is important to set the parameters length and area of the core.In more detail, and other structures of the cores, the calculation of these parameters can be found here. Please note that all length and area are considered to be in millimeters. What initial settings should I choose? The oscillator frequency is selected within the range of operating frequencies of the ferromagnetic core. If there are several studies, then first select the lowest frequency, for example 50Hz. The number of turns of the windings L1 and L2, for greater accuracy, you need to do as much as possible, but not less than 50. The resistance R1 should be selected in area 10..30 Ohm. How to measure? To measure the voltage U1-U2 can be like two multimeters and a dual beam oscilloscope. The first method is suitable for small frequencies: usually the multimeters is designed for the frequency range 50..1000 Hz. The second method allows you to ascend to a higher frequency. In this case, the oscilloscope, you should select the measurement mode of voltage — RMS. Generally speaking, for a full study of the ferromagnetic core need few laboratory works, each at its operating frequency. For example, 100, 1000 and 10,000 Hz.Learn more about the stand and the measurements in this calculator read here. What is output? As a result of constructing the table, we get a graph of the dependence μ(H) and one M(I), which may be needed for these calculations and finding the optimal mode current in a real device. Also, displays some key values of magnetic permeability (μ0 is the initial permeability, μmin is the minimum for the whole chart is the permeability, μmax — maximum) and coefficient Kη2. The value of this coefficient can be recalculated for a different range of values, it is enough to click on schedule to be recalculated Kη2 in the selected range. The range will be highlighted in green. It may be useful to adjust the work area is current in a real device. We must remember that the range reduces the number of measurement points, and hence the accuracy of the calculation. Can the calculator calculate only the initial permeability? Yes. If the core feature is not needed, simply enter the basic data and to bring at least one dimension in the table. It must be carried out at the smallest input voltage, but such that the accuracy of the measurements U1 and U2, were sufficient. Will be lost if the table data if you close the browser window? Data is stored in the local storage of the browser and when opening the window, they regenerate. How much data is stored in the browser? The data is stored until you open a new project the link. Such a reference can be obtained if you click on the "Share" button. In this case, the data is overwritten with the new project. You can also click on the button "Clear table" then local memory is cleared along with the table. It may be convenient to start a new laboratory work. As it is more reliable to store data? Click on the "Share" button and copy the link to your computer. By the way, this link can be shared with friends and teachers to show their laboratory work (your project). To remove Two fields must contain numeric values! The field can contain only numbers and a point! Not filled in some basic fields. Are you sure you want to clear the table and local memory?
https://gorchilin.com/calculator/permeability?lang=en
Characteristics and parameters of lithium cobaltate (LiCoO 2) battery We often talk about ternary lithium batteries or iron-lithium batteries, which are named after the positive active material. Six common lithium battery types and their main performance parameters, the same technical route of the battery, the specific parameters are not exactly the same, this article shows the general level of the current parameters. The six lithium batteries specifically include: lithium cobalt oxide (LiCoO2), lithium manganate (LiMn2O4), lithium nickel cobalt manganese oxide (LiNiMnCoO2 or NMC), lithium cobalt aluminum aluminate (LiNiCoAlO2 or NCA), lithium iron phosphate (LiFePO4) , lithium titanate (Li4Ti5O12). Let us first look at the performance and parameters of lithium cobalt oxide (LiCoO2) batteries. Lithium cobaltate (LiCoO 2) battery Its high specific energy makes lithium cobalt oxide a popular choice for mobile phones, notebooks and digital cameras. The battery consists of a cobalt oxide cathode and a graphite carbon anode. The cathode has a layered structure in which lithium ions move from the anode to the cathode during discharge, and the charging process flows in the opposite direction. The structure is shown in the figure below. Lithium cobaltate structure The cathode has a layered structure. During discharge, lithium ions move from the anode to the cathode; during charging, the flow flows from the cathode to the anode. Lithium cobalt oxide has the disadvantage of relatively short life, low thermal stability and limited load capacity (specific power). Like other cobalt-mixed lithium-ion batteries, lithium cobalt oxide uses a graphite anode, and its cycle life is mainly limited by the solid electrolyte interface (SEI), which is mainly manifested by the gradual thickening of the SEI film, and the anodic plating of the fast charging or low-temperature charging process. Lithium problem. Newer material systems add nickel, manganese and/or aluminum to increase life, load capacity and reduce costs. Lithium cobaltate should not be charged and discharged at a current higher than the capacity. This means that an 18650 battery with 2,400 mAh can only be charged and discharged at 2,400 mA or less. Forcing rapid charging or applying a load higher than 2400 mA can cause overheating and overload stress. For the best fast charging, the manufacturer recommends a charge rate of 0.8C or about 2,000mA. The battery protection circuit limits the charging and discharging rate of the energy unit to a safe level of about 1C. The hexagonal spider map (Figure 2) summarizes the performance of lithium cobalt oxide in terms of specific energy or capacity associated with operation; specific power or ability to provide large currents; safety; performance in high and low temperature environments; lifetime including calendar life and cycle Life; cost characteristics. Other important features not shown in the spider map include toxicity, fast charging capability, self-discharge, and shelf life. Due to the high cost of cobalt and the significant performance improvements brought about by mixing materials with other active cathode materials, lithium cobalt oxide is being gradually replaced by lithium manganate, especially NMC and NCA. Spider map of the average lithium cobalt oxide battery Lithium cobaltate excels in high specific energy, but only provides general performance in terms of power characteristics, safety and cycle life.
http://www.uneveganensante.com/news/shownews.php?id=130
Bonding with a friend of a friend is something most humans gravitate toward naturally—hence Facebook’s ongoing prompts of people for you to “friend.” If animals could use Facebook, the spotted hyena would be a natural. A new study from UT’s National Institute for Mathematical and Biological Synthesis (NIMBioS) shows that the four-legged predator seems to instinctively know the benefits of this type of social bonding. The study, which looks at the social network structure of the spotted hyena, appears today in the journal Ecology Letters. It is available online. Hyenas, which can live up to twenty-two years, typically live in large, stable groups known as clans, which can include more than 100 individuals. Socially sophisticated animals, hyenas can discriminate maternal and paternal kin from unrelated hyenas. They are selective in their social choices and tend not to form bonds with every hyena in the clan, but rather prefer the friends of their friends, the study found. Researchers collected more than 55,000 observations of social interactions of spotted hyenas over a twenty-year period in Kenya, making this one of the largest studies of social network dynamics of any nonhuman species. They found that cohesive clustering where an individual bonds with friends of friends—something scientists call “triadic closure”—was the most consistent factor influencing the long-term dynamics of the social structure of spotted hyenas. Individual traits, such as sex and social rank, and environmental effects, such as the amount of rainfall and the abundance of prey, also matter in social structure, but the ability of individuals to form and maintain social bonds in triads was key, according to the study. “Cohesive clusters can facilitate efficient cooperation and hence maximize fitness, and so our study shows that hyenas exploit this advantage,” said lead author Amiyaal Ilany, who conducted the research as a NIMBioS postdoctoral fellow. He is now at the University of Pennsylvania. “Interestingly, clustering is something done in human societies, from hunter-gatherers to Facebook users.” The study found that hyenas follow a complex set of rules when making social decisions. Males follow rigid rules in forming bonds, whereas females tend to change their preferences over time. For example, a female might care about social rank at one time, but then later choose based on rainfall amounts. Knowing why and how these animals form lasting relationships can help scientists better understand cooperation patterns and the consequences of sociality in other species. The researchers used a new, more comprehensive method than those used in earlier studies, a type of mathematical modeling typically found in sociology, to arrive at their findings about the spotted hyena. This more dynamic approach represents a major advancement over past study methods, allowing researchers to evaluate the simultaneous effects of multiple factors—environmental, individual, genetic, and structural—on network dynamics. It also gave the researchers a peek into how or why the social structure changes over time and allowed them to isolate the factors that shape the structure. NIMBioS is a National Science Foundation–supported center that brings together researchers from around the world to collaborate across disciplinary boundaries to investigate solutions to basic and applied problems in the life sciences. To learn more about NIMBioS, visit the website. — CONTACT:
https://news.utk.edu/2015/05/15/nimbios-study-friends-friendsjust-spotted-hyena/
We have all heard of the traditional Korean dishes. But, what we do not usually think about is the ingredient, the meat. There are some recipes that call for using a variety of meats. Almost all of the Asian recipes will call for a combination of meats. There are other recipes where one type of meat is used. So, what is the difference between the four varieties of meats that are commonly used in Korea? Mouth-Watering Traditional Korean Foods That Everyone Should Taste At Least Once In the West, when we use the term ‘meat’ we usually mean beef, lamb, chicken, or pork. But in Korea, the term is quite different. They use more words to describe common ingredients that we use but they really mean a number of different things. Yam: The yam, which is a perennial herbaceous plant, is used in almost all of the dishes that are traditionally prepared. When we talk about a variety of meat, this is what they mean. When you cook with yams, you know that the meat will be grilled or steamed. The small white pods are dried and ground up so that the meat can be turned into a dry crisp paste. Crab Meat: Another great alternative to beef is crab meat. The crab meat is boiled, then mixed with vegetables and other ingredients. When cooked, it has a delicious nutty flavor and will also give your meals a nice spicy kick. It’s a good thing that crab meat is considered a luxury in the United States since many restaurants offer crabs on the menu! Chicken: While we all know, chicken is the main ingredient in most Korean dishes. They use it in a variety of ways. Sometimes, it is simply combined with vegetables like onions and green peppers. Other times, it is added to stir-fries. Most Korean dishes call for either chicken or beef and often both. While the common use of chicken in Western dishes is to be able to use less fat, some versions of Korean recipes actually add fat to the mixture. More Ingredients Flank Steak: This is an interesting option and is actually a fancy name for the short-grain rib-eye steak. The flank steak is leaner than the conventional steak and because of its leanness, it is very flavorful. It usually has high fat and sodium content. The flank steak is primarily used in stir-fries and stir-casseroles, not in most Korean dishes. Tofu: In Korean dishes, the tofu is made from either ground white beans or soybeans. The soybeans are the more popular choice as they are often available in stores in the United States and are known for being better for your health. The noodles make up the bulk of the tofu and they are typically mixed with various spices, like ginger, garlic, and fish sauce. Grated Pork: The term ‘grated pork’ is often used to describe the minced beef that is served in South Korea. While many other countries commonly use minced beef, the Koreans like to use beef and put it through a grinder. Korean Food Stands Out From Other Cuisines With The Many Side Dishes Although the above ingredients can all be used, these are the main ones that are usually used in traditional Korean cuisine. It can be grilled, baked, fried, stir-fried, slow-cooked, etc. Ingredients should always be fresh and natural, especially meat products. If possible, if there is a specific meal preparation that requires a particular kind of meat or ingredient, always use this type of meat. However, another important aspect of food is the level of spice and acidity. Even though this sounds simple, some of the dishes are relatively bland, while others are packed with so much flavor that they can overwhelm the palate. So, always be sure to incorporate many fresh herbs, spices, and ingredients in your cooking to ensure that the dish has a delicious and lively flavor. Conclusion These are just a few examples of the different flavors that you will find when cooking at home in Korea. With many different influences coming into the country. There are many exciting dishes to try out, that are sure to satisfy your taste buds.
https://bestwokcuisine.com/different-flavor-of-korean-dishes/
Derrick Henry ("Dick") Lehmer was an American mathematician active mainly in the field of number theory. Most famous for designing the Lucas-Lehmer Test for determining the primality of Mersenne numbers. The son of Derrick Norman Lehmer, and married to Emma Lehmer, née Trotskaia. Factorised Jevons' number. One of the victims of the McCarthy witch-hunt. Nationality American History - Born: February 23, 1905 - Died: May 22, 1991 Theorems and Definitions - Lucas-Lehmer Test (with Édouard Lucas) - Lehmer-Schur Algorithm (with Issai Schur) Results named for Derrick Henry Lehmer can be found here. Definitions of concepts named for Derrick Henry Lehmer can be found here. Publications - 1930: An Extended Theory of Lucas' Functions (PhD thesis) - 1941: On the first case of Fermat's Last Theorem (with Emma Lehmer) - Jul. 1947: Recent Mathematical Tables (Mathematical Tables and Other Aids to Computation Vol. 2, no. 19: 297 – 311) www.jstor.org/stable/2002589 - 1983: Factorization of $b^n \pm 1, b = 2, 3, 5, 6, 7, 10, 11, 12$ up to high powers (Contemporary Mathematics Vol. 12 (with John Brillhart, Samuel S. Wagstaff Jr., John L. Selfridge and Bryant Tuckerman) Notable Quotes - General rules for programming have been discovered. Most of them have been used in the Kansas City freight yards for a long time.
https://proofwiki.org/wiki/Mathematician:Derrick_Henry_Lehmer
What causes a transmission to go bad? Low automatic transmission fluid, one of the most common causes of a slipping transmission, reduces the hydraulic pressure necessary to properly shift. If there’s not enough fluid or it is starting to lose its effectiveness in lubricating and cooling, the transmission will perform poorly or stop working altogether. Can you damage an automatic transmission? Automatic transmissions are tough, but they can be damaged. Even though they are made of metal, wrapped in metal, and capable of moving tons of metal, they can be damaged if mistreated. Cars with automatic transmissions in particular are susceptible to damage in some ways you might not have thought. How do you reset your transmission? Steps to Resetting Transmission Control Module - Step 1: Turning Key Position. - Step 2: Press gas pedal. - Step 3: Keep Waiting. - Step 4: Turning the Key Off. - Step 5: Releasing Gas Pedal. - Step 6: Wait Again. - Step 7: Ready. - Identification. What are early signs of transmission failure? Transmission Trouble: 10 Warning Signs You Need Repair - Refusal to Switch Gears. If your vehicle refuses or struggles to change gears, you’re more than likely facing a problem with your transmission system. … - Burning Smell. … - Neutral Noises. … - Slipping Gears. … - Dragging Clutch. … - Leaking Fluid. … - Check Engine Light. … - Grinding or Shaking. How do you know if you blew your transmission? 6 Signs Of A Blown Transmission - Strange Noises. If you hear clunking, grinding, or whining sounds every time you shift gears, visit a mechanic for car repairs right away. … - Strange Smells. … - Shifting Issues. … - Slippage. … - Overheating. … - Extreme Heat from Inside Your Car. Why does my car jerk when shifting gears with an automatic transmission? Automatic transmissions that shift hard, jerk or shake during a shift change may mean your transmission fluid needs changed or fluid level is low. In manual transmission vehicles, abnormal gear shifts could indicate damaged gear synchros, worn clutches or other, more severe issues. Can a transmission Be Fixed? Automotive transmission problems can run the gamut in severity and in repair cost. It can be as easy as replacing fluids or it can be a more than $5000 reconstruction. Minor transmission repairs involve replacing defective solenoids, re-sealing for leaks, replacing parts, and throttle cable adjustment. Will disconnecting battery reset transmission? Will disconnecting the battery reset TCM? Simply disconnecting the battery would not return the TCM to its default settings, you would need to use a transmission scan method to do so. Disconnecting the battery terminals will not complete the phase or solve any gear shift issue. How long will a transmission last after it starts slipping? Without service and maintenance, some transmissions can fail in as little as 100,000 miles. If you drive around 10-15,000 miles a year, your transmission could be down for the count in seven years! With care and service, transmissions can last 300,000 miles or more. Is it worth fixing a transmission? Rebuilding a transmission can save you a lot of money over the short-term, while keeping car payments out of your monthly budget. For many, rebuilding their transmission is worth the initial cost. Rebuilding a transmission may cost you twenty-five hundred dollars or more, which is a significant chunk of change. Will check engine light come on for bad transmission? Transmission problems can cause the check engine light to come on as well, however it’s not always as apparent as other components within the vehicle. If there is a lack of response from your transmission, usually it is difficult for the vehicle owner to determine where the problem originated.
https://barsleaks.net/autoservice/you-asked-what-can-ruin-your-transmission.html
After the Spring Equinox on March 20 and Easter Sunday this past weekend, it’s pretty much official that spring has sprung! As shelves at your local shops fill up with florals and foliage, we sat down with Bill Finch, former Executive Director of Mobile Botanical Gardens and current Executive Director of Paint Rock Forest Research Center to answer some of our questions about gardening in Alabama. Understanding the weather When gardening in South Alabama, Finch says the most important thing to understand is the coastal climate—which actually has six distinct seasons, rather than the four we’re taught in school. “The problem is, we all still think–and garden–like we live in England. It’s not more complicated, it’s just a different climate.Bill Finch, Executive Director of Paint Rock Forest Research Center So what are these six seasons? The rainfall in coastal areas of Alabama causes winter and summer to split into distinct wet and dry phases. Finch gave us his full seasonal breakdown: - Early Spring: around February 15 – around April 15 - Lots of rainfall, rapid greening, soil begins to warm up - Spring: around April 15 – around June 15 - Dry season, hot days, cool nights. - Gulf Summer: around June 15 – August 15 - Raining almost daily, high humidity keeps temperatures the same at night - Hurricane Summer: around August 15 – October 15 - High winds, unpredictable weather - Gulf Fall: around October 15 – December 15 - Cool and dry, low humidity during this time - Wet Winter: around December 15 – around February 15 - Very cold, very humid See? Though the six-season-model of Southern weather seems daunting at first, it makes a lot of sense to anyone who’s lived in this area. Understanding what the weather is going to throw at you helps to anticipate your plants’ needs. For example, in about ten days, it is going to dry up a bit and start warming up, so remember to water your plants more than you might’ve in the first half of April. So I understand the weather, can I buy plants now? Almost! The next step, actually, is deciding if you want a patio garden or an in-ground garden. There’s some pros and cons of each, so we laid them out for you! - Patio Garden – Pros - Great for rentals because they aren’t permanent - Can move pots to get better lighting if necessary - Easier to start off with - Patio Garden – Cons - Hard to water all the way through the plant - Needs fertilizer because there is no access to soil micro biome - Needs pots with tons of drainage holes and local-made soil - In-Ground Garden – Pros - Nutrients come from the soil – no fertilizer necessary - Bit more self-sufficient - Easier to water - In-Ground Garden – Cons - Weeds - Must be relatively established – you can’t pick it up and take it with you anywhere - Possibility of more pests because they have access through the soil There is no wrong choice for a garden. Just make sure that whatever planting method you choose informs how you take care of your plants. Now can I go buy some plants? Absolutely. For this particular season, we asked Finch to give us some hard-to-kill plants to start your garden. Here’s what he recommended: - Veggies - Okra – very heat-tolerant, grows easily in Lower Alabama - Basil – specifically the “Obsession” type - Eggplants – heat tolerant, can survive being forgotten - Southern Peas – black-eyed peas - Flowers - Mexican Sunflower Tithonia – gorgeous, relatively unknown (per Finch) flower - Zinnias – awesome flower to plant for pollinators - Coleus – great for a floral appearance without the fragility of flowers with its colorful leaves - Herbs - Ginger – hundreds of varieties, some for flowers, others for foliage, all useful - Tumeric – fantastic for you, grows great this time of year - Lemongrass – tons of medicinal properties, relatively hard to kill This is just a short list to get your spring garden started. Finch recommends heading to a local nursery if you need some garden tips. Large chain hardware stores often are not region-specific and sell the same merchandise in Alabama that they do in Maryland. So, there may be variety in plants, but not all will survive in our climate. A local nursery will have experienced staff who know the climate and can help you make the best decision possible. Some final tips before you go Don’t get discouraged with your first dead plant. Plants die, it’s a part of the gardening process. The trick is figuring out why and avoiding your mistakes with future plants. “You won’t be a good gardener until you kill hundreds of plants”Bill Finch, Executive Director of Paint Rock Forest Research Center The number one killer of plants, per Finch, is improper watering. Especially if those plants are in pots. Even plants that dry out and perish can be the victim of poor watering technique. Proper watering, Finch says, depends on allowing the water to sink all the way through the plant. If it doesn’t, the roots on top will rot, killing the plant. There’s a few ways to up your watering game. Finch’s suggestion is bottom-watering, in which you place your plant (with its well-draining pot) into a saucer of water and you let the plant soak up the water from the bottom. Alternatively, you can water your plants three times per watering. Water once and come back in about 5 minutes after the water has soaked through the plant. Finch says he’s never had an issue with a plant he waters three times like this. If you still have plant questions, tune in to 106.5 FM Talk on Sundays from 9-11 am. Bill Finch runs a radio segment in which he answers all of your plant questions live on air. Please read this to learn more about watering.
https://thebamabuzz.com/easy-tips-to-help-you-start-your-garden-in-south-alabama/
Looking through the inspirational posts on social media I noticed that there were two types of posts. One that advocated trying hard and lots of effort and the other that was about finding inspiration and flow. This got me pondering which was the right way to approach life and this is what I have realised. The world we currently live in isn't a motivation or an inspiration world, but it's actually a combination. And that just observing life in the last 40 odd years I can see that it's starting to shift. The mindset used to be focused much more on motivation. Life was about what you had to do, should do, and must do. However things are shifting and I love this so much. People hire professionals to help them find their purpose and businesses are starting to realise that aligning with values that matter to everyone leads to a happier and more productive work place. Mediation is now not a strange thing that hippies do, mindfulness and yoga are mainstream. This is meaningful in the context that I am talking about today because these activities are not Doing activities they are Being activities. These activities encourage people to get out of their busy minds and be present, they create space in lives that are otherwise very, very full of things to occupy the mind. Whilst inspiration is more valued than it used to be we still live in a world where there are some things that we need to motivate ourselves to do. I find that the more I learn how to allow inspiration the more I want to live from this space. I love the feeling of inspiration, when I get an inspired thought I just can’t contain myself and I have to go off and do something that follows that thread of that inspiration. Nearly all of these blogs originate from inspired thought. I will have a thought and then I am filled with a kind of excitement and a feeling of - Oh I've got to share this! Or I will have a question that niggles me and I just have to follow a little thread of curiosity till the answer comes to me. I do however recognised that there are still things in my life that require motivation. - For instance I do not particularly enjoy accounts. I have learnt to do accounts and I can do accounts quite well but it is not something that ignites me and makes me excited, but I know they do need to be done. So this does require motivation from me. I now have a process where I do them once a month on a certain day every month. I have learnt to reduce the resistance to it by doing it every month rather than leaving it to the end of the year but even this doe snot negate the need for motivation. The need to sit myself down and make myself do them. - Something else that I have realised I need motivation for is when I’m starting something new. For example if I have been off kilter for a little bit and have got out of the habit of exercising then I need to use motivation to get back into it as there is resistance from me to doing it. Once I am back into the rhythm of doing the exercise then there's no motivation needed, then I love the feeling of my body getting stronger and I love the feeling of being out there and doing whatever it is that I'm doing, but I do adit that initially I do need motivation to get me started. In pondering this topic I realised that inspiration is Source creating through you. Allowing inspiration into your life (I did a blog specifically on how to allow space for inspiration - Allowing Inspiration) means that you allow the creative power of Source to flow through you and this is where original ideas and innovation come from. As Einstein said - “You cannot solve todays problems with yesterdays thinking” if you want to solve todays problems you will need to learn how to let inspiring ideas into your life. Something else that you might not realise about living your life through inspiration is that when you follow an inspired idea the usual laws of time and space do not always apply. Normally when you want to achieve something you create a plan and you know that if you do this and then that you will get there. There is an understanding of how long the process will take you and the steps you need to take to get there. However when you are inspired there is very rarely a straight line from the idea to the result and you can get results much more quickly than you ever thought possible. For instance when I was moving to Bath in the UK I was inspired to tell people about it to try to make connections before I moved there. At the time I only knew one person who lived in Bath. This caused me to speak to someone I knew in Hong Kong and during this conversation he said that he knew the director of Bridge (an international organisation) and that he lived in Bath. He very kindly introduced me to him and it was through tis contact that I ended up working for Bath Bridge. It would have taken me years and a lot of networking to make this contact the normal way. Inspiration is like a wormhole or a time wormhole or a loophole or something life that. It can magically bring you to your destination or to something greater than you ever anticipated. It is like magic and if you follow the inspired thoughts they will bring you to a space way beyond what you could ever comprehend in your head in an amount of time that is so much quicker and shorter than you could have ever thought possible. The other thing about motivation and inspiration is that motivation requires you to use your own energy. Continually motivating yourself is exhausting and leads to burnout. This is why I think we need to balance motivation and inspiration whilst trying to live more and more from a space of inspiration. If your life is predominantly powered by motivation, if you live your life by making yourself do things and feeling you have to, you should, or you must then you might find you become drained, exhausted, stressed and even depressed. Inspiration comes with its own energy package, it ignites energy in you and gives you the resources to be able to follow it through. You can feel this as excitement or anticipation. It is a little bit like falling in love. When you fall in love with someone you have so much energy that you can survive on a few hours sleep a night and still wake up feeling like you just can’t sit still. I think this is because you only receive inspiration when you are open and when you are open Source can flow through you. And that is what inspiration is. It is a spark of Source. A spark of collective consciousness that you allow into you and it brings in its own energy from Source into you which makes every part of you tingle and fizz and bubble. If you are new to living from inspiration you should be aware that your subconscious programming and your old beliefs might come in and make you either - doubt yourself. You might think that you’re not able to do what ever it is that you have been inspired to do. - Feel self-conscious. You think that you are being silly and that you are not being practical or realistic. All of these thoughts come in from your old patterns and you old thinking and it's your subconscious and your egos way of trying to keep you safe in what you've always done. So especially initially when you start following inspiration you need to have a little bit of courage. Courage to follow that beautiful wonderful golden thread through life. Courage to trust yourself and to build self trust and self belief. (I have also written about this - Building Self Belief) If you are able to find courage and follow your intuition that is where you will find the magic in life. It is where the beauty and excitement and expansion is and you know that you truly are a creative being. In conclusion I do think that there's still a place for motivation in this world that it’s still important. You might find that your life consists of more motivation than inspiration but realising this means that you can now start to consciously make space for inspiration and to start to follow the golden thread of inspired thought to your own adventures and start to create your own magic. Because when you become inspired when you follow an inspired thought when it bubbles up or comes down or however it comes into you and it creates it’s energy in you so that you can't prevent yourself from getting excited and wanting to follow where that inspiration goes it is the most beautiful feeling. The more you bring this into your life the more synchronicities, serendipities, magic and beauty you will experience in your life. I hope you have enjoyed this blog. I have lots of resources on my website(I will pop it in the first comments below) I am also a coach and if you want to work with me I am happy to have a free chemistry call with you, just contact me through the contact page on my website. I would also like to thank all the people who commented on my social media post last year where I asked them what they thought about motivation v’s inspiration. Your comments really made me think and I am blessed to be connected to so many fabulous people who are living lives focused on inspiration. I have tagged you all in this post to say thank you for all of your in put it was greatly appreciated and I wouldn't have been able to write this blog - The Importance Of Motivation and Inspiration with out you. So much love from me to you Leave a Reply.
http://www.britttanya.com/blog/the-importance-of-motivation-inspiration
Other sites Solving mastermind with R [This article was first published on R snippets, and kindly contributed to R-bloggers]. (You can report issue about the content on this page here) Want to share your content on R-bloggers? click here if you have a blog, or here if you don't. In my last post I have shown a solution to classical sorting problem in R. So I thought that this time it would be nice to generate a strategy for playing Mastermind using R.It was shown by D.E. Knuth that Mastermind code can be broken in at most five guesses. The algorithm is to always choose guess that minimizes the maximum number of remaining possibilities. Here is the R code that implements it. The game is played using six colors and codes have length four. First part of the code prepares the data for calculations: # vector with possible peg colors set letters[1:6] # matrix all possible codes full as.matrix(expand.grid(set, set, set, set)) # compare guess to hidden code # black – hit with correct position # white – hit with incorrect position guessFit function(hidden, guess){ count function(pattern){ sapply(set, function(x){sum(x == pattern)}) } black sum(full[hidden,]== full[guess,]) white sum(pmin(count(full[hidden,]), count(full[guess,])))– black paste(black, white, sep=“;”) } # prepare matrix with all possible # guess-hidden combinations evaluation # this is slow: 5 minutes all.fit mapply(guessFit, rep(1:nrow(full), nrow(full)), rep(1:nrow(full), each =nrow(full))) dim(all.fit)c(nrow(full), nrow(full)) We want to prepare matrix all.fit of all possible guess-hidden code combinations in advance in order to avoid calling guessFit in the main algorithm (WARNING: it takes ~5 minutes on my laptop). Having generated it we can reference codes using their position (row number) in full matrix. Now let us move on to the main function: # apply mini-max rule minimax function(possible, indent =1){ # if there is only one possibility we are done if(length(possible)==1){ if(indent > worst){ worst < indent } cat(full[possible,], “| *\n”) return(1) } if(indent ==1){ cat(“1: “) } # for each possible guess find worst case size of set splits sapply(1:nrow(full), function(guess){ max(table(all.fit[guess, possible]))}) # choose guess that minimizes maximal size of set best.guess which.min(splits) out.split split(possible, sapply(possible, guessFit, guess =which.min(splits))) cat(full[best.guess,], “|”, length(possible), “\n”) # recursively construct the decision tree for(i in1:length(out.split)){ # ask additional questions if an exact hit was not obtained if(names(out.split)[i]!=paste(ncol(full), 0, sep =“;”)){ cat(indent +1,“:”, rep(” “, indent), names(out.split)[i], “|”, sep=“”) minimax(out.split[[i]], indent +1) } } } It recursively constructs the decision tree solving the game and outputs it using cat. At each level of the tree first number of the question asked is printed, next the chosen guess and finally either number of remaining options or a star * indicating a hit. Additionally in variable worst we keep the number of questions that have to be asked in the worst case. Finally we run the prepared code: sink(“rules.txt”)# save output to a file worst 0 minimax(1:nrow(full))# this is slow: 2 minutes cat(“\nQuestions in worst case:”, worst, “\n”) sink() I redirect output to a file because the resulting tree is quite big (1710 lines) and we can actually see that the game can be solved in five questions in a worst case. Finally – the code was prepared to make it easy to experiment with the code by changing number of colors and pegs only by changing variables set and full.
Responsible for developing scientific decision-making tools with the aim to maximize Nissan’s competitiveness and profitability. - Promoted from Analyst to Assistant Manager level with increased responsibilities in March 2015. - Coordinate the implementation of Marketing Mix Model and Multi-Source Attribution tools to measure marketing ROI and contribution to sales. - Lead analysis and strategy to increase efficiency and effectiveness of marketing investments in terms of overall brand opinion or sales. - Provide a web-based simulation platform to help regional marketing teams plan and optimize their budget expenditures: FMI: VME ratio, media allocation, flighting strategy, etc. - Contribute to the Renault-Nissan Alliance by helping Renault to implement the Marketing Mix Model tool already developed by Nissan. - Negotiate contracts of customer satisfaction surveys for Nissan globally: mainly SSI and CSI surveys that aim at providing complete perspective on sales and aftersales processes. - Support Global Sales members for analyzing customers’ satisfaction in details and across regions. Click here to access the Nissan Motor Company global website.
https://kevinbraidy.com/nml/
The first project in 2017 is a smaller project, but important nontheless. We used to have a lot of plastic food bowls, but during the months more and more bowls got broken and chewed up by the dogs. They needed to eat from the floor. Normally a dog can eat from the floor, but with many dogs walking around the floor is not clean enough and they will get sick. We do not have enough staff to clean all the floors 2 or more times a day either. So this mini project is all about finding about 70 stainless steel food bowls for the dogs. That was a picture of the food bowls and also a find the puppy challenge. Total estimated costs for this project: estimated costs for a bowl is 50 Baht (we have to confirm), 70×50=3500 Baht, which is about 100 Euro and in USD a 10% more. Update 15 January 2017: We received donations, which should cover the costs for this project! We love you all for your help! Update 17 January 2017: Thanks to a very generous donation we were able to buy all 70 bowls immediately! We are so very happy with these and so are the dogs!
http://www.houseoftails.org/projects/food-bowls-for-the-dogs/
We dug into our data to understand the impact on COVID-19 and corresponding quarantine orders on content powered through SocialFlow. Although we have publisher clients across the globe, the highest concentration of our users are in the US—so you’ll see the timing of the upticks we saw correspond mostly with when the pandemic hit stateside. We looked at clicks on SocialFlow content from February 1, 2020, through April 12, 2020. Looking at the chart, you can see that clicks started to pick up the week of 3/9 (for this analysis, we used a Monday-Sunday week). The purple dotted line represents the average number of weekly clicks pre-COVID. So, you can from the week of 3/2 to the week of 3/9, clicks went from below average then jumped way up. To give you some context, here were some of the top stories the week of 3/9: - Fauci Says “Avoid Crowds” - Italy Extends Restrictions to Entire Country - New York Limited “Containment Area” - Trump Suspends EU Travel - Trump Declares State of Emergency As evidence by these numbers, this is when things in the US were starting to heat up. The next week (3/16-3/22), interest in publisher content hit its peak. March 18-20 (Wed/Thurs/Fri) were the highest data points in this set—the days with the most interest in publisher content. During these days, the big stories were: - US stock market plummeting - US Stimulus Bill, with the Senate approving the Stimulus Package on 3/21. The week of 3/16 was +44% over the pre-COVID weekly average and the peak day that week was +59% above the pre-COVID daily average. But, as the pandemic lingers on, clicks and subscription numbers are beginning to wane from those peak levels as readers start to again consume your standard content. The numbers are still above average but are headed back down. Increasing consumption of ALL of your content will be critical to retaining new readers that engaged primarily for COVID content.
https://www.socialflow.com/covid-19-impact-publishers-data/
Cyber attacks that target the supply chain have been grabbing the headlines in recent months because of the widespread and severe damage they have caused organisations, from government agencies to food processing plants. Though they are still relatively rare compared to other forms of attacks that require less sophistication, they are a big problem because they abuse an existing trust, according to FireEye Mandiant. The cyber security company, a trusted supplier itself, suffered a data breach in late 2020, after its security tools used to test the client defences were stolen. However, it redeemed its reputation somewhat by finding the source of the breach – a supply chain attack on a network software company called SolarWinds, which subsequently led to discoveries of widespread breaches across the United States and other countries. Such a sophisticated attack is not easy to prevent, says Steve Ledzian, the chief technology officer for Asia Pacific at FireEye Mandiant. However, it also means that IT teams are now more vigilant not just in checking the software they get from suppliers but also the reputation of the suppliers themselves, he argues. How often do these suppliers conduct a penetration test, for example, he asks, in this month’s Q&A. NOTE: Responses have been edited for brevity and style. Q: In a world where software runs everything, from routers to smart buildings, do you see deeper problems arising from supply chain attacks? A: FireEye has been calling out supply chain risk for years now. It’s mentioned in our 2018, 2019 and 2020 security predictions reports. As business and organisations continue to digitally transform and as the attack surface continues to grow, supply chain attacks will continue to grow along with them. One important consideration is that supply chain compromise in and of itself is not a complete end-to-end attack, but rather just one component an attacker users to build out a complete attack chain. This can be seen on the MITRE ATT&CK Framework. When an attacker breaks into a network, supply chain compromise is one technique that the attacker can use to accomplish the tactic of initial compromise. There are many other ways to achieve initial compromise, and after achieving initial compromise, there are many other post-exploitation stages of the attack that must be complete before the full attack is successful. The point here is that while supply chain compromise is difficult to detect, it is just one of many opportunities to break the chain of the attack, and prevent impact to the organisation. Q: FireEye managed to find what caused its data breach late last year but how well protected is the digital supply chain in general today? A: Supply chain attacks are comparatively rare compared to other types of cyber attacks, but as they expose multiple victims simultaneously, their impact can be quite high. A lot of thought and effort have gone into improving security across the supply chain, but as it’s an attack that abuses a pre-existing trust, it’s a challenging problem to solve. Governments are paying attention to the risk the supply chain poses. The Cyber Security Agency’s (CSA’s) recent Singapore Cyber Landscape 2020 Report highlights supply chain risk a number of times Meanwhile, the United States Department Of Defense is leveraging the Cybersecurity Maturity Model Certification (CMMC) to address supply chain risk in the defence industrial base. Q: Do you see criminal gangs, some originating from jurisdictions where they enjoy relative immunity from prosecution, continue to be the main threat actors in supply chain attacks? Or will state actors be involved at some point? A: Supply chain attacks can be leveraged by threat actors with both financial motivations as well as espionage motivations. Often, when we think about supply chain attacks, it’s the nation state threat actors that first come to mind as the culprits most likely to able to have the sophistication required to pull off such an attack. Nation state threat actors have been doing this for some time now. Cyber criminals have been known to use supply chain attacks as well, but more commonly cyber criminals often don’t need to resort to a level of sophistication that requires a supply chain attack. Cyber criminals have plenty of success in achieving initial access in other less sophisticated ways such as phishing, exploiting public facing applications, or leveraging compromised valid accounts. Q: Supply chain attacks target the trust between businesses. How do you build trust when even a digital signature and encrypted data can be compromised at source? A: It’s not an easy problem. Even if IT teams tightly scrutinise the software they deploy, organisations still need to worry about the software and utilities that employees download and use for themselves. For example, while IT teams might deploy the latest version of stock browsers, users might add their own browser plug-ins or extensions which might silently perform malicious actions. Technology controls are part of the solution but organisations are augmenting those in other creative ways. For example, before choosing a vendor, business sometimes will consider that vendor’s financials. “Is this vendor financially viable” or “Will this vendor still be around to support our purchase next year or the year after?” Procurement teams are now asking potential vendors about their security practices. “Do you do background checks on employees?” or “How often does your organisation do a penetration test or a red team assessment?” We’ve long heard of how strong cyber security can be a differentiator, and now customers are starting to ask vendors to demonstrate that they take cyber security seriously.
https://www.techgoondu.com/2021/08/11/qa-supply-chain-attacks-still-rare-but-pose-tough-problem-says-fireeye-mandiant/
6/14 Jr. Church Review What is your age? Were you able to say the memory verse to someone else? No, I didn't want to I repeated it after someone I needed a little help I needed lots of help I said it completely on my own What town was Joshua and the Israelites trying to defeat in today's Bible story? Ai Jerusaelm Samaria Thessalonica The first time Joshua sent soldiers to Ai, how many did he send? 1,000 3,000 5,000 10,000 Who stole from God by keeping some of the devoted things from the Battle of Jericho? Aaron Achan Caleb David Select one of the items Achan kept from Jericho and buried under his tent. 10 pounds of Bronze 1-1/4 pounds of Gold 3 pounds of Gold 5 pounds of Silver 25 pounds of Silver A robe from Babyalon Sandals from Italy A tunic from Egypt The second time Joshua and the Israelites attacked Ai, how many soldiers fought in the Israelite army? 10,000 15,000 30,000 50,000 What did Joshua hold up as the signal for the ambush to attack?
https://www.quiz-maker.com/QC3MJ8G6
MINNESOTA, USA — When it gets this cold, James Joos of Green Isle will find a way to do what he loves. "The ice. The fish," said Joos as he heads out onto Seton Lake near Mound. "Usually freezes over first a lot on the bays." Just to make sure, he double checks the ice thickness. "About 8 inches here," said Joos. Despite James' confidence to venture out, the Hennepin County Sheriff's Office isn't as convinced. "When you look at the ice you think it's initially safe once you start walking on it. That can change very rapidly and change in just a matter of feet," said Lt. Shane Magnuson with the Hennepin County Sheriff's Office. He says he would not recommend people go out on the ice. Especially after recent reports of people and equipment falling through. "Certainly shouldn't be putting ice houses or four wheelers or snowmobiles," said Magnuson. He says the ice isn't consistent right now. He says if you do go out on the ice, make sure to have a pick, rope, and somebody with you. James was alone Tuesday, but he says he has all tools to keep himself safe. "Always want to go home to my family at night," said Joos. The DNR says if you do go out on the ice check ice thickness every 150 feet. RELATED: Winterize Your Life: Car RELATED: 11 things to know about the sub-zero cold Here are some more winter safety tips!
http://www.darvinjones.com/article/news/local/law-enforcement-still-recommend-people-stay-off-lake-ice/89-74d8d416-adc3-4e96-a4f7-d81cd585ad23
Imaginary friends: good, bad, gone? Some kids have imaginary friends, others don’t. Either way is OK. Peeno Ceeno (pronounced pee-no, see-no) was my imaginary friend. She lived in the wooded wetland behind my house. I was expecting my boys to have imaginary friends too. But so far, neither five-year old Bubba nor three-year old Peter has mentioned any imaginary pals. As a parent, I’m not concerned, but I find it curious. Perhaps having an imaginary friend means you’re creative. (In which case, my boys are duds.) Or maybe having an imaginary friend is an indication of being lonely. I made some calls last month to find out. “Imaginary friends serve a whole variety of purposes for kids who have them,” said Dr. Henry Gault, a psychiatrist with a practice in Deerfield, Ill.. He came recommended by the American Academy of Child and Adolescent Psychiatry. On the most basic level, imaginary friends give children a companion. These friends also allow kids to play the role of parent. Thus, children tend to be bossy when dealing with an imaginary friend, Gault said. Children also commonly pretend their imaginary friend does things they know are forbidden. For example, an imaginary friend might watch a movie or television show that the child isn’t allowed to watch. This enables the child to live out a fantasy while doling out the blame on their imaginary accomplice. “As we understand it, there’s a lot of depth for what an imaginary friend means,” Gault said, adding most kids have imaginary friends between the ages of three and five years old. However, not having an imaginary friend doesn’t mean a child is any more or less imaginative. Nor is it an indicator of loneliness. It’s just one of those things some kids have and some kids don’t, said Dr. Julie Rinaldi, a clinical psychologist at Children’s Memorial Hospital in Chicago. “I don’t think there is anything negative about having an imaginary friend,” Rinaldi said. She also noted that she’s never seen a child use an imaginary friend as a way to deflect trauma. In other words, abused kids don’t typically use imaginary friends as an outlet or coping mechanism. I floated my own theory on imaginary friends to both doctors Gault and Rinaldi. I think kids might be less likely to have imaginary friends nowadays. Modern children have so many other things to occupy their time. A lot of kids are overscheduled with things like soccer, music lessons or even learning a foreign language. When kids are bored, they turn to television, movies and video games. This leaves less time and opportunity to get acquainted with an imaginary friend. “I think that’s a reasonable theory,” Gault said. Rinaldi agreed. Though both said they haven’t seen any research to back up my bit of amateur psychiatry. All I can offer is my own experience. And around my seventh birthday, Nintendo’s NES video game system debuted. That was about the same time I lost contact with Peeno Ceeno. My name is Tommy Riles, father of two great kids, and creator of a website, called Life of Dad. Anyway, because of my connection to the dad community I was asked to help cast a show about SAHDs, particularly in Chicago.
https://thefatherlife.com/mag/2011/12/01/imaginary-friends-good-bad-gone/
Q: Reaching the double exponential upper bound in Fourier-Motzkin elimination One round of Fourier-Motzkin elimination may yield $n^2/4$ inequalities where $n$ is the original number of linear inequalities, whence an upper bound of $n^{2^d}/2^{2^{d+1}-2}$ for $d$ rounds of elimination without removal of redundant constraints. I'm wondering whether it is possible to meet this upper bound. (Note: this is a distinct question from that of counting the number of true faces in a projection, that is, after removal of redundant constraints, for which McMullen's upper bound provides a tighter bound.) A: I think this upper bound is tight. As an example, consider the following system \begin{align*} +x_0 & +\frac{1}{2} x_1 +\frac{1}{4} x_2 \le 0 \\ -x_0 & -\frac{3}{2} x_1 +\frac{1}{4} x_2 \le 0 \\ -x_0 & -\frac{3}{2} x_1 -\frac{7}{4} x_2 \le 0 \\ \end{align*} It has 8 inequalities. Though some of them are identical, it is not a problem since we do not remove redundant constraints. One can also add dummy variables to make them different. Reducing $x_0$, we obtain system with 16 inequalities. Then, reducing $x_1$, we obtain system with $64$ inequalities. More generally, let $S_{n}^k$ denote the following system of inequalities over $x_0, x_1, \ldots, x_{k - 1}$. Here we assume that $k \le n, n\ge 2$. There will be $2^n$ inequalities in $S_{n}^ k$. Take any $m \in\{1, 2, \ldots, 2^n\}$. Let $m^{th}$ inequality of $S_{n}^ k$ be $$\alpha^m_0 x_0 + \ldots + \alpha^m_{k - 1} x_{k - 1} \le 0,$$ where $$\alpha^m_i = \begin{cases} 2^{-i} & \mbox{if $m \le 2^n - 2^{n - i - 1}$}, \\ -2 + 2^{-i} & \mbox{otherwise.} \end{cases}$$ Here we use a restriction mentioned above : provided $k\le n$, we have that $2^{n - i - 1}$ is an integer. For example, system above is $S_{3}^3$. It is easy to verify that if we eliminate $x_0$ from $S_{n} ^k$, we obtain $S_{2n - 2} ^{k - 1}$. Indeed, when we eliminate $x_0$, we add up all the inequalities from the first half with all the inequalities from the second half. Thus we get $2^{n - 1} \cdot 2^{n - 1} = 2^{2n - 2}$ inequalities. What happens with $x_i$ for $i > 0$? In the first $$2^{n - 1} \cdot (2^{n - 1} - 2^{n - i - 1}) = 2^{2n - 2} - 2^{2n - 2 - i} = 2^{2n - 2} - 2^{(2n - 2) - (i - 1) - 1}$$ inequalities a coefficient before $x_i$ will be $2^{-i} + 2^{-i} = 2^{-(i - 1)}$. In the last $2^{-i} + (-2 + 2^{-i}) = 2^{(2n - 2) - (i - 1) - 1}$ inequalities a coefficient before $x_i$ will be $2^{-i} + (-2 + 2^{-i}) = -2 + 2^{-(i - 1)}$. This is $S_{2n - 2}^{k - 1}$, but over variables $x_1, \ldots, x_{k - 1}$. Since, $2n - 2 \ge n - 1 \ge k - 1$, a restriction on the number of variables is also preserved. Further, if we eliminate $x_1$, we obtain $S_{4n - 6}^{k - 2}$, and so on. After $d$ steps we will have $S^{k - d}_{2^d n - (2^{d + 1} - 2)}$. The latter has exactly $$2^{2^d n - (2^{d + 1} - 2)} = N^{2^d}/ 2^{2^{d + 1} - 2}$$ inequalities, where $N = 2^n$ is the number of inequalities of the initial system.
blender. Add the Béchamel sauce. Divide the mixture into greased and floured moulds. Bake at 170° for 25 minutes. Buy strips or thick slices of bacon of half a centimetre thick. Cover a baking dish with greaseproof paper, lay bacon slices on top and then cover them with another piece of greaseproof paper. Put some weights on top of the baking dish – you can also use a casserole dish as a weight – and then put the baking dish into preheated oven. When crispy remove it from the oven and uncover it to prevent the fat that has accumulated from softening it. Remember that the flans, although they are not soufflés, will deflate after a while (if they do not, this means that you have used too much flour) so try to serve them quite quickly after removing them from the oven. Arrange them on a plate and put the bacon crisps on top with the pieces of primo sale around the sides.
https://iloveitalianfood.it/en/fresh-broad-beans-flan-with-crispy-bacon-and-primo-sale-en/
Glossary Of Terms Academic Advisor A faculty or staff member appointed to assist a student in planning his or her academic career. Advising Report (AR) A degree progress report that indicates requirements completed as well as those that need to be completed. This document matches a student’s academic history against their declared academic program requirements. Class Number A unique four-digit number assigned to each course/section listed in the schedule of classes. It is the number used in the registration system for the purpose of adding, dropping, or changing the grade basis. Class Schedule A listing of the courses being taken by an individual student each term. Corequisite (Coreq) A course that must be completed prior to, or during the same term as, another course. For example, Biology 120 has a coreq of Math 141. Course A particular topic being studied. A course is comprised of a Subject and a Catalog number. For example, Biology 120 is a course. Curriculum Those classes prescribed or outlined by an institution for completion of a program of study. Developmental Studies Courses designed to help students improve basic skills in the areas of reading, writing, and study skills. Consult an advisor or the Developmental Studies office for further information. Department An academic unit of the University which offers instruction in a particular branch of knowledge, such as the Department of Music. Elective A course which students may select from a list within their academic program or from the course catalog as a whole (as opposed to a required course, which must be taken). Emphasis An approved set of courses within a major that define a specialty area or specific field of study. For example, Advertising is an emphasis within the Journalism major. Equivalent Courses Courses whose content overlaps with one another. For example, if a student takes Sociology 270, credit cannot also be earned for African American Studies 270 because the course material is similar. Extracurricular Activities Activities which are part of student life but not part of a student’s academic program are extracurricular activities. Participation in Athletics, Student Government, and other campus organizations are examples of this. Fee A charge the University requires for certain services. Good Academic Standing In order to remain in good academic standing at UW-Whitewater, a student must have a cumulative GPA of 2.00 or above. Some colleges and/or programs may require a GPA above 2.00 in order to remain in their programs. Hold Holds can be placed on a student’s account by various departments on campus. Holds may consist of academic advising restrictions, financial obligations, or other specified requirements. A registration hold is any restriction that prevents registration. Many students will have an academic advising hold placed on their records; this hold is released only after completing an advising appointment. Failure to follow the advising process may result in the inability to register at the assigned enrollment start date and time. These holds can also prevent the release of official transcripts. ID Card The University provides students with a HawkCard (University ID Card). The HawkCard contains the name of the University, the student’s name and photo, and a bar code and electronic encoding of the student’s ID number. The HawkCard will be used during the entire time students are enrolled at UW-Whitewater. It can be used for proof of enrollment, if required, which entitles a student to a number of special privileges and services. A fee is assessed for all replacement cards. For more information about the HawkCard policies and available services, visit the UW-Whitewater HawkCard web page. Major The subject or field of study in which a student specializes. For example, students planning to specialize in mathematics will major in that field. Students choosing to specialize in two subjects will have a double major. Minor A field of secondary emphasis. The total number of units required in the minor field is typically less than that required for the major. Prerequisite (Prereq) A requirement or set of requirements that must be met before taking a particular course. For example, English 101 is a prereq of English 102. Not all prerequisites are courses; prerequisites can consist of other obligations and conditions. Registration The act of enrolling in classes. Registration involves selecting classes with the help of an advisor and submitting the enrollment requests via the WINS system. Required Courses Courses designated by the University as necessary for completion of a program. Schedule of Classes A list of all the courses to be offered by the University during a specific term. Section Number A number used to distinguish one class from another. A course may offer several classes or sections at various times throughout the day or week. Sections that include the letter ‘X’ or ‘H’ are reserved sections for select populations of students, such as those in Learning Communities or the Honors Program, and are not available to all students. (Example: English 101 section 6.) Subject A subject is a particular area of study in which the University offers courses, such as English, French, Mathematics, or Geology. Term Hour A term hour is generally a 50-minute period of instruction per week for a term. A three-term hour course would meet for three 50-minute periods each week for a term. Laboratory or activity periods are counted differently in the total hours for a course. Undergraduate A student seeking a bachelor’s degree or who has been admitted as an undergraduate for the purpose of taking classes for enrichment. Unit Load The total number of units for which a student is registered in a term. Units The terms ‘units’ and ‘credits’ can be used interchangeably to describe recognition by a college or university that a course of studies has been successfully completed. Unrequisite (unreq) A course for which credit cannot be earned because the content overlaps with the specified course. See Equivalent Courses. For example, HISTRY 355 has an unreq of RELIGST 355. Waiver A waiver indicates that a student does not need to take a specified course. A waiver does not result in the awarding of credit. WINS (Whitewater Information Network for Students) UW-Whitewater’s student computer system that is available for students to register for classes, check financial records, view Advising Reports, and access the schedule of classes.
PURPOSE: To reduce a reception frequency setting time as a frequency division ratio by adding data in MHz digit for an intermediate frequency and a setting frequency stored through calculation in advance to data resulting from data in kHz or below in the setting frequency for each calculation. CONSTITUTION: A mixer 3 converts a reception frequency (fr) by using a frequency fr+IF outputted from a VCO 6 under the control of a PLL IC5 to provide an output of IF 4. Furthermore, a CPU 8 controls the IC 5 via a data output section 9 and applies each arithmetic operation to the data fr in kHz digit or below on each occasion. That is, the data fr are divided into data in MHxz digit and kHz digit (H and L), only the data frL are stored as data X and a quotient Y of X/M and a residue X' by using a frequency division value M of a prescaler are obtained through repetitive subtraction. Succeedingly a quotient (y) and a residue (x) of the data IF and frH calculated and stored in advance based on the Y, X' and in the case of A'>M (N' and A' are tentative setting values obtained thereat), correct setting values N, A are outputted from (N'+1) and (A'-M). Thus, number of arithmetic operations of the CPU 8 is considerably reduced and the setting time for the data fr is reduced to improve the scanning efficiency. COPYRIGHT: (C)1995,JPO
Drawing of Saturn by Galileo in 1610 through a 20 power telescope. He saw it as three planets orbiting together. The first observations of the rings of Saturn were made by Galileo in 1610. He didn't know what the two blobs that he saw on either side of Saturn were. He was also surprised when they vanished two years later. When viewed from the side the rings are so thin they cannot be seen. One early observer said that Saturn appeared to have ears. In 1655 Christian Huygens thought that the rings of Saturn were actually solid planar disks. In 1659 Maxwell figured out that the disks were made of numerous small bodies. The rings are in the plane of Saturn's equator. Most of the moons of Saturn orbit in the same plane, so the view of the rings from most moons presents a single line through Saturn, --O--. Only the moons Iapetus and Phoebe move above and below the rings far enough to give a good view of the rings. The equatorial bulge of the rotating planet stabilizes the rings. Go to equatorial bulge. Demo Spin a Koosh, If you spin a Kooshball as you throw it into the air it will assume a shape with an equatorial bulge similar to the equatorial bulge of a rotating planet. The rings and Saturn's equator are tipped 25 degrees from Saturn's orbital plane around the sun. So from the earth we can usually see the rings except occasionally, every 15 years or so, we see the rings edge-on and they appear to vanish. Demo Model the rings of Saturn. I used a large, 73 cm, or 32 inch, diameter fabric disk called a Beamo tm . The Beamo has a hole in the center big enough for a 12 inch diameter beach ball. I taped the beach ball into the hole. The ratio of the diameter of the beachball to the flying disk was the same as the ratio of the diameter of Saturn to the outer diameter of the bright rings, i.e. the outer edge of the A-ring. The outer edge of the A-ring is 2.3 times larger in diameter than the radius of Saturn. If this fabric ring were made to scale it would be a millionth of a meter thick, a micrometer thick, one hundred times thinner than a human hair. A 1.2 inch diameter ball is the size of the earth at this scale. Saturn's Rings are large but very thin, they are over 280,000 km in diameter yet only tens of meters thick. Some ring particles are larger in diameter than the thickness of the rings. The rings are a million times thinner than their diameter. Demo To appreciate the thinness of the rings picture a football field covered with tissue paper. Tip the Beachball/frisbee model to show how the rings appear edge on as Saturn orbits the sun. Demo The rings are made of particles that orbit Saturn in nearly circular orbits that obey Kepler's laws. A museum exhibit known as a "Gravity Well" can be used to illustrate the orbits of ring particles. Particles near the center of the well, near Saturn, orbit faster than those further from the center. The astronomer Cassini, for whom the spacecraft is named, noted a dark band in the rings, now known as the Cassini division, which separates the outer A-ring from the inner B-ring. The rings are given letters in the order of their discovery. Orbital Resonance The edge of the B-ring corresponds to an orbit with a 2/1 resonance with Mimas. A ring particle at that distance orbits twice every time Mimas orbits once. The orbital disturbance grows each time as a result of resonance. Just like pushing a swing. Eventually particles are removed from the resonant gap. Demo The gravity well can be used to show an inner orbit of a rolling marble that goes around twice for every single orbit of a rolling marble that is further from the center. Math Root Kepler discovered that the period of an orbit, T, is related to its radius, R. By the relation T2 = c R3 where c is a constant. Two orbits with period in a ratio of T1/T2 = 2/1 have a ratio of orbital radii of R1/R2 = (T1/T2 )2/3 = 22/3 = 1.6. So in the Gravity Well model the outer particle should orbit 1.6 times further from the center than the inner one. The rings are richly detailed. The passage of small moons excites density waves in the rings. These are similar to spiral arms found in galaxies. The A-ring is the home of the density waves. Moons of Saturn pull on ring particles and cause them to "bunch up" and create regions of higher and lower density. These regions get wound-up into spiral waves around Saturn. There may also be small "moons" inside the rings creating the delicate ring textures. Demo Show a record with its spiral groove to model the finely detailed structure of Saturn's rings. Note that the record is much thicker than the rings. Sprinkle sweet-and-lo sweetener on the record to model the rings which are made of individual particles. (The record is black and becomes invisible.) Run a finger around the record to clear a path of particles and create the Cassini division. (Demo by Eric Wegryn) The gravitational pull of orbiting moons can also pull the particles that make-up the rings to the side making bending waves, like the corrugations in cardboard. In the following image of the A ring the waves in the lower left are density waves while the ones in the upper right are bending waves. In addition to creating waves in rings, moons can also control the positions of the edges of the rings, such moons are called shepherd moons. The thin and braided F-ring has two shepherd moons, one inside and one outside of the ring Shepherd moons Shepherd moons flank the F-ring. The Cassini spacecraft found that the bright rings are made of water ice, few impurities were noted. The particles range from 1 cm to 10 m in diameter, in addition, there are some larger particles up to kilometers in size and also some dust. The Cassini spacecraft did find particles in the Cassini division these darker particles were made of silicates, i.e. rock. The rings are made of almost pure ice, 99% pure, but there is "dirt" in the Cassini division. A liquid particle will be torn apart if it within the Roche limit distance from Saturn any moon over about 100 Km in diameter behaves like a fluid, and will be torn apart within the Roche limit. Small solid particles can survive. The Roche limit for Saturn is about 2.5 times the radius of Saturn, Rs. (actually 2.456*Rs ds/dr)1/3 where ds is the density of Saturn and dr the density of the satellite. ) The bright rings are closer to Saturn than the Roche limit. There are 3 theories of ring formation the rings are made of particles that came from: Scientists don't know which theory is correct, if any. Demo Tidal Forces can be modeled on the "Gravity Well" exhibit. Start two marbles touching each other near the rim of the "Gravity Well." Align the marbles along a radial line. Release them. The marbles will separate as they roll down into the well. The inner marble is closer to the center and so a stronger gravity force accelerates it toward the center. It moves toward the center faster than the outer marble leaving the outer marble behind. If the two marbles represent two rocks in space they will be pulled apart by the difference in the gravity force. This difference in the gravity force is called the tidal force. If a moon gets too close to any planet it will be pulled apart by tidal forces. Spokes in the Rings There are spokes in the rings which are near the synchronous orbit distance and may be due to electrostatic levitation of small particles. In reflected light the spokes are dark, in transmitted light (the right image) they are bright. This means that they are made of small particles which scatter light in the forward direction. These particles become electrically charged as they move from Saturn's shadow on the rings into daylight. Then they repel each other away from the ring plane making the spokes. They rotate at the same rate as the magnetic field of Saturn, which is a different rotation rate from that of the rings, so magnetic forces shape their motion as well as electric forces. Demo (Flying Hydra activity) Electrostatic levitation can be done on earth too. Rub a PVC rod with wool and it becomes negatively charged. The rod can then be used to levitate a fuzzy piece of nylon which has also been charged by rubbing it with wool making it negative. An animation showing the spokes.
http://www.exo.net/~pauld/Saturn/ringsofsaturn.htm
The 4 Math Strategies Everyone Must Master, part 2 Last time, we talked about the first 2 of 4 quant strategies that everyone must master: Test Cases and Choose Smart Numbers. Today, we’re going to cover the 3rd and 4th strategies. First up, we have Work Backwards. Let’s try a problem first: open up your Official Guide, 13th edition (OG13), and try problem solving #15 on page 192. (Give yourself about 2 minutes.) I found this one by popping open my copy of OG13 and looking for a certain characteristic that meant I knew I could use the Work Backwards technique. Can you figure out how I knew, with just a quick glance, that this problem qualified for the Work Backwards strategy? (I’ll tell you at the end of the solution.) For copyright reasons, I can’t reproduce the entire problem, but here’s a summary: John spends 1/2 his money on fruits and vegetables, 1/3 on meat, and 1/10 on treats from the bakery. He also spends $6 on candy. By the time he’s done, he’s spent all his money. The problem asks how much money he started out with in the first place. Here are the answer choices: “(A) $60 “(B) $80 “(C) $90 “(D) $120 “(E) $180” Work Backwards literally means to start with the answers and do all of the math in the reverse order described in the problem. You’re essentially plugging the answers into the problem to see which one works. This strategy is very closely tied to the first two we discussed last time—except, in this instance, you’re not picking your own numbers. Instead, you’re using the numbers given in the answers. In general, when using this technique, start with answer (B) or (D), your choice. If one looks like an easier number, start there. If (C) looks a lot easier than (B) or (D), start with (C) instead. This time, the numbers are all equally “hard,” so start with answer (B). Here’s what you’re going to do: (B) $80 | | | | F + V (1/2) | | M (1/3) | | B (1/10) | | C $6 | | Add? |(B) $80|| | $40 | | …? | | $6 Set up a table to calculate each piece. If John starts with $80, then he spends $40 on fruits and vegetables. He spends… wait a second! $80 doesn’t go into 1/3 in a way that would give a dollar-and-cents amount. It would be $26.66666 repeating forever. This can’t be the right answer! Interesting. Cross off answer (B), and glance at the other answers. They’re all divisible by 3, so we can’t cross off any others for this same reason. Try answer (D) next. | | | | F + V (1/2) | | M (1/3) | | B (1/10) | | C $6 | | Add to? |(B) $80|| | $40 | | …? | | $6 | | ? |(D) $120|| | $60 | | $40 | | $12 | | $6 | | $118 In order for (D) to be the correct answer, the individual calculations would have to add back up to $120, but they don’t. They add up to $118. Okay, so (D) isn’t the correct answer either. Now what? Think about what you know so far. Answer (D) didn’t work, but the calculations also fell short—$118 wasn’t large enough to reach the starting point. As a result, try a smaller starting point next. | | | | F + V (1/2) | | M (1/3) | | B (1/10) | | C $6 | | Add? |(B) $80|| | $40 | | …? | | $6 | | ? |(D) $120|| | $60 | | $40 | | $12 | | $6 | | $118 |(C) $90|| | $45 | | $30 | | $9 | | $6 | | $90 It’s a match! The correct answer is (C). Now, why would you want to do the problem this way, instead of the “straightforward,” normal math way? The textbook math solution on this one involves finding common denominators for three fractions—somewhat annoying but not horribly so. If you dislike manipulating fractions, or know that you’re more likely to make mistakes with that kind of math, then you may prefer to work backwards. Note, though, that the above problem is a lower-numbered problem. On harder problems, this Work Backwards technique can become far easier than the textbook math. Try PS #203 in OG13. I would far rather Work Backwards on this problem than do the textbook math! So, have you figured out how to tell, at a glance, that a problem might qualify for this strategy? It has to do with the form of the answer choices. First, they need to be numeric. Second, the numbers should be what we consider “easy” numbers. These could be integers similar to the ones we saw in the above two problems. They could also be smaller “easy” fractions, such as 1/2, 1/3, 3/2, and so on. Further, the question should ask about a single variable or unknown. If it asks for x, or for the amount of money that John had to start, then Work Backwards may be a great solution technique. If, on the other hand, the problem asks for x – y, or some other combination of unknowns, then the technique may not work as well. (Drumroll, please) We’re now up to our fourth, and final, Quant Strategy that Everyone Must Master. Any guesses as to what it is? Try this GMATPrep© problem. “In the figure above, the radius of the circle with center O is 1 and BC = 1. What is the area of triangular region ABC? If the radius is 1, then the bottom line (the hypotenuse) of the triangle is 2. If you drop a line from point B to that bottom line, or base, you’ll have a height and can calculate the area of the triangle, since A = (1/2)bh. You don’t know what that height is, yet, but you do know that it’s smaller than the length of BC. If BC were the height of the triangle, then the area would be A = (1/2)(2)(1) = 1. Because the height is smaller than BC, the area has to be smaller than 1. Eliminate answers (C), (D), and (E). Now, decide whether you want to go through the effort of figuring out that height, so that you can calculate the precise area, or whether you’re fine with guessing between 2 answer choices. (Remember, unless you’re going for a top score on quant, you only have to answer about 60% of the questions correctly, so a 50/50 guess with about 30 seconds’ worth of work may be your best strategic move at this point on the test!) The technique we just used to narrow down the answers is one I’m sure you’ve used before: Estimation. Everybody already knows to estimate when the problem asks you for an approximate answer. When else can (and should) you estimate? Glance at the answers. Notice anything? They can be divided into 3 “categories” of numbers: less than 1, 1, and greater than 1. Whenever you have a division like this (greater or less than 1, positive or negative, really big vs. really small), then you can estimate to get rid of some answers. In many cases, you can get rid of 3 and sometimes even all 4 wrong answers. Given the annoyingly complicated math that sometimes needs to take place in order to get to the final answer, your best decision just might be to narrow down to 2 answers quickly and then guess. Want to know how to get to the actual answer for this problem, which is (B)? Take a look at the full solution here. The 4 Quant Strategies Everyone Must Master Here’s a summary of our four strategies. (1) Test Cases. – Especially useful on Data Sufficiency with variables / unknowns. Pick numbers that fit the constraints given and test the statement. That will give you a particular answer, either a value (on Value DS) or a yes or no (on Yes/No DS). Then test another case, choosing numbers that differ from the first set in a mathematically appropriate way (e.g., positive vs. negative, odd vs. even, integer vs. fraction). If you get an “always” answer (you keep getting the same value or you get always yes or always no), then the statement is sufficient. If you find a different answer (a different value, or a yes plus a no), then that statement is not sufficient. – Also useful on “theory” Problem Solving questions, particularly ones that ask what must be true or could be true. Test the answers using your own real numbers and cross off any answers that don’t work with the given constraints. Keep testing, using different sets of numbers, till you have only one answer left (or you think you’ve spent too much time). (2) Choose Smart Numbers. – Used on Problem Solving questions that don’t require you to find something that must or could be true. In this case, you need to select just one set of numbers to work through the math in the problem, then pick the one answer that works. – Look for variable expressions (no equals or inequalities signs) in the answer choices. Will also work with fraction or percent answers. (3) Work Backwards. – Used on Problem Solving questions with numerical answers. Most useful when the answers are “easy”—small integers, easy fractions, and so on—and the problem asks for a single variable. Instead of selecting your own numbers to try in the problem, use the given answer choices. – Start with answer (B) or (D). If a choice doesn’t work, cross it off but examine the math to see whether you should try a larger or smaller choice next. (4) Estimate. – You’re likely already doing this whenever the problem actually asks you to find an approximate answer, but look for more opportunities to save yourself time and mental energy. When the answers are numerical and either very far apart or split across a “divide” (e.g., greater or less than 0, greater or less than 1), you can often estimate to get rid of 2 or 3 answers, sometimes even all 4 wrong answers. The biggest takeaway here is very simple: these strategies are just as valid as any textbook math strategies you know, and they also require just as much practice as those textbook strategies. Make these techniques a part of your practice: master how and when to use them, and you will be well on your way to mastering the Quant portion of the GMAT! Read The 4 Math Strategies Everyone Must Master, Part 1. - Hi Stacy, This is a great, insightful article as your other brilliant ones. The only thing I somehow don’t understand is why are such techniques not recommended and elaborated upon in the strategy guides itself? I mean I have gone through all of the guides and also through OG questions multiple times but still struggle between 45-48 score on Quant with 40% wrong answers and unable to hit the 50 points mark. Upon reviewing my tests what I found out was that either it was time management (not letting go) or it was lack of proper pre-thinking to first resolve to the optimal approach that has been a major contributor for my questions gone wrong. Thanks.
https://www.manhattanprep.com/gmat/blog/2013/12/30/the-4-math-strategies-everyone-must-master-part-2/
After the earth is threatened by alien invasion William Mandella is drafted as part of the world’s first elite corp of soldiers and sent into battle light years across space. A story as old as science fiction, perhaps, but what happens to William when he returns to an earth where decades have gone by during the months he spent travelling at nine-tenths light speed makes Joe Haldeman’s novel The Forever War both a story of alien combat and of multiple utopian and dystopian futures. It’s a mind-bending ride. The Forever War is one of the defining examples of hard science fiction in that everything in the future Mr. Haldeman constructs is based on serious scientific knowledge. Interstellar and intergalactic space travel is based on the use of collapsed stars, the alien race is based on real world, or real space, biology, and most importantly, the effects of relative time are a key part of the novel. Private Mandella participates in several battles, each involving a different trip to locations farther away from earth, taking him a few decades, then a few centuries into the future since his time, spent travelling at near the speed of light, passes much more slowly relative to time back on earth. This allows Mr. Haldeman to create a race of technologically advanced aliens along with several sets of futures for the earth, one just a few decades ahead of his own time, one 30 years past that and then two more much farther into the future. Private Mandella is not only a soldier, he is a time traveler in a hard science fiction novel that recognizes time travel goes only one way, into the future, and that there is no going back. While the worlds around Private Mandella change throughout the novel along with the cast of characters, his character remains the heart of The Forever War giving it a human touch many people who don’t read it think hard science fiction lacks. Private Mandella is forced to give up not just everything he owns but everything he knows when he is drafted into the elite force. He returns when his two year tour of duty is over to find that 29 years have passed on earth leaving a world so different from the one he left that he no longer has a place in it. Even his own mother has changed so much he can no longer find a connection with her. After his second tour of duty he finds the human race so changed he has trouble seeing himself as part of it any longer. Each time he leaves for the battle field he knows that decades of relative time will pass before he reaches the front making each attack an invasion from the past as far as the enemy is concerned and leaving the elite corps always at a disadvantage. How can they fight an enemy who is always years ahead of them? Should they even attempt to attack when the war may have been won or lost in the time it took them to get to the battlefield? When Mr. Haldeman wrote The Forever War the greatest threat to humanity, at least in the popular imagination of the time, was overpopulation. When Private Mandella returns to earth for the first time, he finds a society that has begun to encourage homosexuality as a way to deal with overpopulation. He finds his mother is in a relationship with a woman. His second return to humanity finds a strictly homosexual race, bred in laboratories, engineered to be gay as a means of population control. Private, now Colonel, Mandella must adjust to an army where he is the only straight person–the soldiers in Mr. Haldeman’s elite corp are equally men and women from the start of the novel. I’ve no idea just how seriously this idea would have been taken as a cure for overpopulation when The Forever War was first published in 1974 nor if it would have been received as pro or anti gay rights. Mandella is not bothered by it much, though he rejects the surgery that would make him homosexual in spite of how lonely his position in an all gay society makes him. In retrospect, overpopulation has not turned out to be the world ending problem we once feared it would become, so it’s difficult to judge its possible cures and consequences as presented in the science fiction of of the period. Could Mr. Haldeman’s future have happened? Today, genetic science is determined to find a DNA combination for every human characteristic. When they do, if they do, they’re bound to try turning this sequence off, that one on. Who knows. But this story idea begs a more literary question. How many science fiction novels have you read that imagined a world where something other than strict heterosexuality was the norm? How many of those were written by someone other than Ursula K. Le Guin or Samuel R. Delany? It’s been a couple of years since I read The Forever War for my old blog, Ready When You Are, C.B. but science fiction and fantasy still remain largely heterosexual genres.
https://jamesreadsbooks.com/2017/03/04/the-forever-war-by-joe-haldeman/
Having received a report that the Satomi force had captured Konodai Castle, Hojo Ujiyasu summoned his retainers and ordered the advance to Konodai. Although the Hojo army was more than double the strength of Satomi Yoshihiro's army, many men were lost in the initial fight as they attempted to cross the Ichikawa. But soon, by the sheer weight of numbers, the Hojo army was able to cross and gained the enemy flank. During the Satomi withdrawal Ota Sukemasa was wounded twice. The first day's action had gone somewhat well for the Hojo army. The stage is set, the battle lines are drawn, and you are in command. Can you change history? Note: There are varying accounts for this battle. Basically, the other version is that a Hojo advance force crossed the river, pursued the retreating Satomi troops into an ambush and retreated back across the river with loss. We chose to pursue a more evenly matched version for this scenario. |6||7||10||4| Satomi Samurai Army (Red) Move First |4||2||1||1||1||2||1| Hojo Samurai Army (Blue) Command Cards 6 Dragon Cards 2 Honour 6 |6||2||1||2||2||2||1||2||2| Victory 5 Banners * 1 Victory Banner for each unit or leader eliminated. * The Hojo player will gain 1 Victory Banner at the start of each Hojo player's turn, when there are no Satomi units in a section of the battlefield. Hexes with a dotted line in this case are considered center section hexes. Special Rules * The entire Ichikawa River is fordable. Tags: Hojo, Satomi, GMT Base Game Judd and I got back into CCS while he was working on some updates to other modules we were playing. We jumped in here because he had played G17 with someone else. But we will come back to it at some point. This was an interesting and thrilling game. The rule about one unit in each section did not get broken. I thought going in (it is my first time on this scenario) that it would be a big deal, but it was’t. The bigger issue is that Blue has 17 units to Red’s 10, though Red does have some mountains for protection. I had some good dragon cards though, and tried to play a good defensive game. But I made some mistakes. On the first turn I pulled my men on my right into a defensive line on the mountains. I was going to stay there if I could and use the bowmen to attack if possible any units stuck in the river. However, Judd pulled a Blue Dragon card on my early in the game. We laugh about this card all the time, because for most scenarios it is useless. But this time, the river brought out the dragon. Judd got a hit on one of my troops. Soon after I played Shogun and we had to reshuffle the cards. On the next turn I pulled Blue Dragon. This was amazing because we both got to use this hard-to-play card. Judd was in the midst of his big push across the river and I got 3 hits out of about 9 rolls which was good. Judd Had all this ducks in a row and kept his horse general behind his troops to gain the extra die roll if he wanted it. His was a huge advantage to him because I sent my horse general on a Mounted Charge and he was separated from his troops thus not able to help. Judd got a three banner advantage, and I really thought he would skunk me. However, did have a personal challenge card and used it to have a 9-6 advantage in the roll off. I only rolled one sword. I knew I was dead. But then Judd rolled no swords. Out of 15 dice rolled, only one sword. But it was enough. I got a leader, and his hand dropped to 5 to match mine. Judd’s mounted troops had really cut me up, but I trapped one of his against my back line and played Cowards on him. Flag would be kills but I got him anyway. But Judd’s leader ran the gauntlet and lived. I just could not kill those leaders!
https://www.commandsandcolors.net/samuraibattles/index.php?option=com_content&view=article&id=269
Whales and dolphins (Dolphins and Whales) are warm-blooded animals, breastfeeding, breathing with lungs, and having a constant body temperature most of the time. Whales and dolphins live in the open sea. There is a cross-border migration within the country or between countries. Migration may concurrence to the food source, season, propagation reason. Thai waters are an area with high temperatures at all the time. The different of temperatures between each season is very small. Therefore, Thai water is an appropriate area for breeding and feeding. According to the Wildlife Preservation and Protection Act, B.E. 1995, whales/dolphins are classified as a legal protected wildlife that haunting for, trading, possessing and breeding are all prohibited that the enforcement extends to include eggs and carcasses as well as the parts of them. Whales/dolphins are also listed on the list of the Convention on International Trade in Endangered Species of Flora and Fauna (CITES), especially for the Irrawaddy dolphin that it is in a critical to extinction. So, it is listed in Appendix I. For dolphins, other whales and whale sharks are listed on CITES Appendix II. There are 27 species of dolphins and whales found in Thailand, categorized into localize near shore species and remotely migratory offshore species. There is a study on the status and distribution of six nearshore populations of dolphins and whales including (Indo-Pacific Bottlenose dolphin, Tursiops aduncus ) (Finless porpoise, Neophocaena phocaenoides ) (Indo-Pacific Humpback dolphin, Sousa chinensis ) (Irrawaddy dolphin, Orcaella brevirostris ) (Bryde’s whale, Balaenoptera edeni ) (Omura’s whale, Balaenoptera omurai ). Dolphin and Bryde’s whale Status of whales and dolphins in Thai waters 1. In the Gulf of Thailand: 19 species of whales and dolphins out of 27 species are found. In the lower Gulf of Thailand, coastal areas of Nakhon Si Thammarat Province to Narathiwat Province, mostly found humpback dolphins and Irrawaddy dolphins. In central Gulf of Thailand, coastal area from Prachuap Khiri Khan Province to Surat Thani Province, mostly found schools of humpback dolphins and bald-headed dolphins, smooth back. In the upper Gulf of Thailand, coastal areas of Phetchaburi Province to Samut Prakan Province, found a school of Irrawaddy dolphins and porpoises, and Bryde’s whale, and in the eastern Gulf of Thailand, from the coast of Chonburi Province to Trat Province, found schools of Irrawaddy dolphins. 2. In the Andaman Sea: found up to 23 species of whales and dolphins that the predominant are bottlenose dolphins, humpback dolphins and jumping dolphins, toothed dolphins and speckled dolphins. Causes of stranding of whale/dolphin are firstly due to the natural illness for approximately 63 percent which the most common is respiratory tract infections. Secondly, due to the impact of fishing tools, fishing activity and marine debris which dramatically increase from year to year. The average of 3% dolphins swallow marine debris and accumulated in their gastrointestinal tract. Reference http://marinegiscenter.dmcr.go.th/kiosk/km_inner.php บทความล่าสุด March 17, 2022 Seahorses are not related to horses. March 14, 2022 How to identify blue swimming crab sex? March 10, 2022 Sea cucumbers are not blood suckers.
https://phuketaquarium.org/en/knowleadge/whale-dolphin/
Tackling the challenge of feeding the world, while solving environmental problems and preventing further global warming is not an easy task. The latter implies curbing and reducing the intensification of agriculture. Half of the world’s GDP is tied to nature, be it food production or water supplies. The United Nations estimates that 840 million people will be affected by hunger by 2030. How can we feed the 7.9 billion people without exceeding the limits of our planet? Climate change is just as evident. The intensification of agriculture, which has resulted in high nitrogen emissions, exacerbates the problem. It accounts for nearly 11% of the greenhouse gas emissions in the world. Particularly concerning are nitrous oxide emissions from over-fertilization of land, which is 300 times more potent than carbon dioxide, causing global warming. Tackling the challenge of feeding the world, while solving environmental problems and preventing further global warming is not an easy task. The latter implies curbing and reducing the intensification of agriculture. Curbing agriculture may lead to a reduction of land used for agricultural purposes, less protection of crops, and, as a result, less crop production. At the same time, this spurs outside-the-box thinking to find a compromise that could solve the dilemma. New ways of more efficient agriculture, producing healthier pesticide-free products in smaller areas well protected from production risks (pests, diseases, natural disasters, etc.) could be the solution. Preserving nature The EU Green Deal developed in 2020 is a roadmap to more sustainable economies. It sets new targets for achieving greener agriculture over the next ten years by: New technologies for global problems The development of digital technologies, precision farming and the use of artificial intelligence can help humankind to some extent to produce sufficient food while conserving natural resources. For example, artificial intelligence and nanotechnology can improve crop and soil yields while maintaining soil health and protecting the quality of the environment. New risks in the transformation of the food and agriculture sector How can we help farmers cope with crises while still providing a fair and reliable income base? How does the food industry adapt production and distribution processes to meet challenges of both climate change and government efforts aiming at making agriculture more environmentally friendly? Without a doubt, the food and agriculture sector is subject to changes and transformations. However, these very same changes also bring about new risks. The time has come to think ahead, identify risks, and prevent and reduce potential losses. Management more exposed to claims under new rules Increasingly, management decisions are guided by compliance with new rules, primarily related to preserving the environment and maintaining public health, i.e. in line with the EU Green Deal. As a result, the insurance industry will have to deal with potential new claims made against directors, government officers, shareholders and other stakeholders. More cyber risks in the food and agriculture sector More reliance on digitization means increased cyber threats. Modern and fully automated IT farms, for example, may suffer from business interruption and losses caused by cyber-attacks, software failures or human error. Supply chain sustainability Climate change creates new challenges for farmers and the food industry and may result in catastrophic losses. It is prudent to plan and consider alternative resources, increased costs due to additional transport requirements or even a limited supply. In addition, one should not lose sight of the new risks of a pandemic. These can be substantial, as the COVID-19 crisis has shown since 2019. Various business sectors registered a serious shift in the structure of demand and experienced restricted labour mobility. Personnel in the health sector were hard hit, timely availability of basic resources was a challenge for farmers and the food sector, and different channel infrastructure was built to ensure food delivery. New biosafety requirements were set up, delays and disruptions in transport and logistics services became the order of the day, and the costs of international freight transport surged. Many of these consequences continue to affect businesses and human lives. Business interruption coverage in the spotlight The insurance industry is set to increasingly focus on business interruption products. Nowadays, livestock insurers opt for gross profit loss insurance rather than animal value insurance. At the same time, every hectare of land will have a higher value. Because they are subject to risks associated with reductions in inland areas, there is an increase in the industry capital intensity and its digitization. Moving from conventional to organic farming despite higher production risks The sustainable yield performance of organic farming is still questionable. Historically, conventional agriculture provided better-guaranteed protection of yields against adverse perils. The rapid transformation of many areas from conventional to organic farming entails additional yield production risks. These should be taken into account and handled accordingly. Modification of agricultural resources and new farming methods leads to new liability risks New crop varieties, chemicals and fertilizers will be created because of the increasing need to fight hunger and save the planet. Any modifications involve unknown risk factors for property damage and personal injury and, therefore, may lead to additional claims and costs of product recalls. As an example, there are specific concerns and doubts about the effects of genetically modified organisms (GMOs) on humans. Several incidents cast a shadow on the safety of GMOs and, importantly, on the ability to control the spread of these organisms in food production and distribution networks, not to mention the environment in general. Increased risks due to a lack of water Water, the world’s most precious resource, also plays a crucial role in solving agricultural problems. Water is one of the crucial factors in irrigation facilities deployment as more rainfed lands need to be irrigated due to desertification, resulting from global warming. Unfortunately, many natural water sources have also become unreliable, more polluted, or both. PPP in agricultural insurance will gain in importance Stepping up public-private partnerships by introducing new agricultural insurance products to better protect farmers against catastrophic risks, such as drought and epizootic diseases, will help improve the agricultural sector’s financial sustainability. Governments will be challenged to find ways to encourage farmers to buy more agricultural insurance. They may have to introduce compulsory baseline production insurance, tie prerequisite insurance policies to other government support, develop other measures to prevent the risk of crop and animal loss, and help farmers to define effective mechanisms to reduce losses. Insurance specialization will intensify The insurance sector is undergoing a significant change. Already, we are experiencing increasing digitization, ready-made basic solutions and artificial intelligence, which will ultimately automate the communication between the client and the insurer. However, the food and agriculture sector will continue to require highly professional advice from insurance experts who understand the industry, speak a common language, and can develop and tailor the right solutions. In response to the increasing impact of climate change, the spread of epizootic diseases and the new impact of pandemic risks to humans, GrECo Holding has begun to offer new risk management programmes for clients active in food and agriculture sector. This article is a part of our Foodprint publication focusing on issues and risks facing the Food & Agriculture industry. Read the publication and learn more about insurance solutions and the growing importance of risk management and alternative solutions like parametric insurance. Related Insights Pillar of Our Strategy Is Specialisation – Interview With Georg Winter Georg Winter offers some insights into his vision for GrECo. Interview was originally published in Lockton Global Partners Magazine. Building the GrECo Health & Benefits Business: A Catch-up With Adam Riley In July, Adam was recruited in a newly created executive leadership role, to run, build and develop GrECo’s specialist Health & Benefits business across its 17 countries.
https://greco.services/how-to-feed-the-world-and-save-the-planet/
Three-quarters of the world consists of water, but growing populations, higher living standards, and global climate change have more than a few analysts worried that there still may not be enough to go around. In fact, water shortages are erupting around the world, from San Diego to Riyadh. Hundreds of farm workers and locals from all parts of California took to the streets last Thursday as part of a four-day march to protest federal cutbacks in water supplies. “This is ground zero,” Mario Santoyo, an adviser to the California Latino Water Coalition, told the New York Times. “There’s a human tragedy going on here, and we need water.” The state of California projected in March that, because of a drought in the state’s Central Valley, as many as 23,700 full-time workers would lose their jobs, and farmers would lose up to $477 million in revenue, The Times reported. California Governor Arnold Schwarzenegger has declared the drought a state of emergency and – not for the first time – threatened statewide water rationing. Yet, the scene in California is just a small glimpse of the kind of dissatisfaction and unrest that many experts believe will become frequent occurrences if the world’s evolving thirst isn’t quenched. Today, 2.8 billion people, or 44% of the world’s population, live in areas of high water stress, according to the Organization for Economic Co-operation and Development. This will rise to almost four billion by 2030 based on present trends. The livelihoods of one in three people on the planet will be threatened by water scarcity within 15 years. And the situation is showing signs of spiraling out of control as populations around the world continue to grow. The world’s population has more than doubled in the past 50 years, soaring to about 6.5 billion from 3 billion (The combined population of China and India is about 2.5 billion). In that time the use of water has tripled, according a recent article in The Economist. Analysts anticipate that the world’s population will increase by about 2 billion by 2025 and 3 billion by 2050. And it’s not just the volume of people that has analysts worried. It’s where those people will be living and what they’ll be eating. The vast majority of masses joining the world’s population in the coming decades will be city-dwellers, who consume more water than their rural counterparts. That’s largely because urban populations, particularly populations with higher standards of living – such as those blossoming in developing countries like China and India – consume more meat, and therefore more water. According to The Economist’s article, it takes about 1,000 liters (264 gallons) of water to produce one kilogram (2.2lbs) of wheat. But it takes as much as 15,000 liters (3,963 gallons) to produce a kilo of beef. The meatier diets of Americans and Europeans requires about 5,000 liters (1,321 gallons) of water a day versus the 2,000 liters (528 gallons) of water needed to sustain the vegetarian diets of Africa and Asia. The world will need as much as 60% more water just for agriculture for the 2 billion people expected to join the urbanite ranks over the next decade and a half, according to the Food and Agriculture Organization. And it’s not just developing countries that need to worry. A report by the World Wildlife Federation, entitled “Rich Countries, Poor Water,” pointed out that water crises are increasingly affecting many wealthy nations, due to climate change, drought and water resource "mismanagement." “In Europe, countries on the Atlantic are suffering recurring droughts,” the report notes, “While water-intensive tourism and irrigated agriculture are endangering water resources in the Mediterranean.” The Murray-Darling basin, an area of southeast Australia as large as France and Spain combined, recorded its lowest level of inflows in 117 years during the first three months of 2009. Farmers have been restricted to as little as 16% of their annual water allocation. Authorities warn that water supplies for the two million Australians who live in the basin cannot be guaranteed beyond next year. United Nations Secretary-General Ban Ki-Moon has warned that "time is running out," as estimates suggest that almost a third of the world’s population will be living in regions facing severe water scarcity by 2025. Money Down the Drain The United States and other countries around the world are already being forced to confront their water supply shortages. And they’re having to do it with cash. California will receive $260 million in federal economic stimulus funds to fix dams, restore fisheries and habitat and help the state cope with drought conditions, Interior Secretary Ken Salazar said last week. In addition to that, the state is likely to qualify for much of the $135 million in federal grants set aside for water reuse and recycling projects. “I think a new reality is forming here … that water is scarce and we are going to have to change the way we use water,” Frank Royer, general manager of the Camrosa Water District in Camarillo, told the Ventura County Star. Saudi Arabia – a desert country that is swimming in oil but desperately lacking fresh water – is putting $800 million into a new public company that will invest in overseas agricultural products, the Financial Times reported. The reason: The Saudi government is discontinuing domestic wheat production to conserve its water resources. The country has been producing about 2.5 million tons of wheat each year since it began its wheat program in the late 1970s. China is another country hoping it can spend its way out of a water dilemma. About 15.3 million hectares, or 13%, of Chinese farmland are lost to droughts every year, according to a recent article in BusinessWeek. Roughly 300 million people living in rural areas still don’t have access to drinking water. And of China’s 600 cities 400 are facing water shortages. That’s because, on top of water scarcity, China has horrible pollution, which has rendered much of the nation’s fresh water undrinkable. More than 200,000 people in Yancheng, Jiangsu were recently cut off from clean water for three days when a chemical factory dumped carbolic acid into a river, BusinessWeek reported. A similar incident occurred in November 2005 when a chemical plant in Jilin spilled massive amounts of toxic benzene into the Yangtze and Songhua rivers. About 1 billion tons of untreated sewage is dumped into the Yangtze River each year. And half of China’s population – 600 million to 700 million people – drinks water contaminated by human and animal waste. As of September 2008, China had poured $7.46 billion into 2,712 water treatment projects, according to the nation’s Ministry of Environmental Protection. Beijing also has launched a multibillion-dollar effort to transport water from southern regions. But that project has been delayed because of environmental concerns and resistance from the estimated 300,000 farmers who would have to be relocated to accommodate water pumping and cleaning stations as well a canal., BusinessWeek reported. The Asia Society argues that water – not oil – will evolve into the key regional security in the 21st century, and Asia in particular is desperately lacking. “This is a fundamental resource that we need to survive,” Suzanne DiMaggio, director of the Asia Society’s Social Issues Program told TIME magazine. “The emerging picture is very worrisome.” News and Related Story Links: - New York Times: Hundreds Protest Cuts in Water in California - The Economist: Sin aqua non - BusinessWeek: China Faces a Water Crisis - Ventura County Star: Less water, higher rates inevitable, SoCal manager says - TIME:
https://moneymorning.com/2009/04/20/water-shortages/
Q: How to bend a curve around a TikZ figure? MWE: \documentclass{scrartcl} \usepackage{tikz} \usetikzlibrary{positioning} \tikzset{ signal/.style = coordinate, sum/.style = { draw, circle, minimum size = 2mm }, block/.style = { draw, rectangle, minimum height = 2em, minimum width = 4em }, branch/.style = { sum, minimum size = 1mm, fill = black } } \begin{document} \begin{tikzpicture}[auto] %placing the nodes \node[signal] (input) {}; \node[sum, right = of input] (left sum) {}; \node[block, right = of left sum] (controller) {$G_R$}; \node[block, right = of controller] (system) {$G_S$}; %connecting the controller and system to get the coordinates of u, its needed for the placement of the measurement block \draw [->] (controller) -- node[name = u] {$U$} (system); \node[block, above = of system] (dynamic of disturbances) {$G_D$}; \node[signal, left = of dynamic of disturbances] (disturbances) {}; \node[sum, right = of system] (right sum) {}; \node[branch, right = of right sum] (branch) {}; \node[signal, right = of branch] (output) {}; \node[sum, below = of branch] (lower sum) {}; \node[signal, right = of lower sum] (measurement noise) {}; \node[block] (measurement) at (u |- lower sum) {$G_M$}; %connecting the nodes \draw [->] (input) -- node {$W$} (left sum); \draw [->] (left sum) -- node {$E$} (controller); \draw [->] (system) -- (right sum); \draw [->] (disturbances) -- node {$Z$} (dynamic of disturbances); \draw [->] (dynamic of disturbances) -| (right sum); \draw (right sum) -- (branch); \draw [->] (branch) -- node {$Y$} (output); \draw [->] (branch) -- (lower sum); \draw [->] (measurement noise) -- node[above] {$M$} (lower sum); \draw [->] (lower sum) -- (measurement); \draw [->] (measurement) -| node[pos = .95] {$-$} (left sum); %path from Z to Y \node[above of = dynamic of disturbances] (above G_D) {}; \node[right of = above G_D] (corner above right sum) {}; \node[above of = branch] (above branch) {}; \node[above of = output] (above output) {}; \draw [->] (above G_D) .. controls (corner above right sum) and (above branch) .. (above output); \end{tikzpicture} \[G_Z=\ldots\] %connecting the controller and system, see above %path from M to Y \node[below of = measurement noise] (below M) {}; \node[below of = input] (below W) {}; \node[above of = input] (above W) {}; \node[above of = output] (above output) {}; \draw [->] (current bounding box.south east) .. controls (current bounding box.south west) and (current bounding box.north west) .. (above output); \end{tikzpicture} \[G_M=\ldots\] \end{document} Result: I wish that the curves following the figures, without getting the code to complicated, example: Also see my releated question, which continues this one. Thank you for your help and effort in advance! A: Here's a method using the calc library, which is loaded at the beginning with \usetikzlibrary{calc}. Change the first arrow to: \coordinate (a) at (above G_D); \coordinate (b) at (above output); \draw [->] (a) .. controls +(0:2) and +(90:1) .. ($(a)!.5!(b)$) .. controls +(270:1) and +(180:2) .. (b); And change the second arrow to: \coordinate (c) at (current bounding box.south east); \coordinate (d) at (above output); \draw [->] (c) .. controls +(180:8) and +(270:2) .. ($($(c)!.5!(d)$)+(180:8.3)$) .. controls +(90:2) and +(180:8) .. (d); I renamed the coordinates so the code remains readable. This is the result: You can change the strength / direction of the in / out parts of the arrow with the +(direction:strength) method as I've done. The (a)!.5!(b) indicates the coordinate exactly halfway between the coordinates (a) and (b). EDIT: This is more of a long comment to describe what is going on. Both arrows are paths through 3 points, but the middle point is described in two different ways. I cheated a little bit for the first one, so let me describe the second one first. Second arrow: You gave an arrow going out of (current bounding box.south east) and going into (above output); these are the green circles. Renaming them as (c) and (d), respectively, the coordinate ($(c)!.5!(d)$) is exactly halfway between (c) and (d); this is the blue circle. Then, the coordinate ($($(c)!.5!(d)$)+(180:8.3)$) is 8.3 units (centimeters, I think) in the 180 direction out of ($(c)!.5!(d)$); this is the large red circle. Below, I've overlaid my suggested arrow with slight adjustments in the 8.3 parameter to show you how this part works. % Suggested arrow \coordinate (c) at (current bounding box.south east); \coordinate (d) at (above output); \draw[->] (c) .. controls +(180:8) and +(270:2) .. ($($(c)!.5!(d)$)+(180:8.3)$) .. controls +(90:2) and +(180:8) .. (d); % Large colored circles \fill[green] (c) circle (.1); \fill[green] (d) circle (.1); \fill[blue] ($(c)!.5!(d)$) circle (.1); \fill[red] ($($(c)!.5!(d)$)+(180:8.3)$) circle (.1); % Shifted arrows \foreach \pos in {7.7,8,8.3,8.6,8.9}{ \draw[->,opacity=.3] (c) .. controls +(180:8) and +(270:2) .. ($($(c)!.5!(d)$)+(180:\pos)$) .. controls +(90:2) and +(180:8) .. (d); \fill[red,opacity=.3] ($($(c)!.5!(d)$)+(180:\pos)$) circle (.05); \draw[->,red,opacity=.3] ($($(c)!.5!(d)$)+(180:\pos)$) -- +(90:2); \draw[->,red,opacity=.3] ($($(c)!.5!(d)$)+(180:\pos)$) -- +(270:2); } In my suggested arrow, there are four occurrences of +(angle:factor). The first one is out of the bottom green node, the second one is into the big red node, the third one is out of the big red node, the fourth one is into the top green node. This follows by using the code (node1) .. controls +(angle1:factor1) and +(angle2:factor2) .. (node2), which can be used as many times in sequence as desired, similar to the usual (node1) -- (node2) -- (node3), and so on. First arrow: I should have done the same method as in the second arrow here, but I realized there is no need to define the middle coordinate of the arrow path in two steps. So I just defined the middle coordinate (the large red circle) as being exactly halfway between the start and end coordinates (the two green circles). The "halfway" notion is given by the .5 parameter, and below I've overlaid my suggested arrow with slights changes to this parameter. % Suggested arrow \coordinate (a) at (above G_D); \coordinate (b) at (above output); \draw[->] (a) .. controls +(0:2) and +(90:1) .. ($(a)!.5!(b)$) .. controls +(270:1) and +(180:2) .. (b); % Large colored circles \fill[green] (a) circle (.1); \fill[green] (b) circle (.1); \fill[red] ($(a)!.5!(b)$) circle (.1); % Shifted arrows \foreach \pos in {.3,.4,.5,.6,.7}{ \draw[->,opacity=.3] (a) .. controls +(0:2) and +(90:1) .. ($(a)!\pos!(b)$) .. controls +(270:1) and +(180:2) .. (b); \fill[red,opacity=.3] ($(a)!\pos!(b)$) circle (.05); \draw[->,red,opacity=.3] ($(a)!\pos!(b)$) -- +(90:1); \draw[->,red,opacity=.3] ($(a)!\pos!(b)$) -- +(270:1); } If this works for you, then great. But if you need to adjust the position of the middle (red) coordinate, in my method you can't adjust the horizontal position, which is why it may be better to use a 2-step process as in the second arrow above. A: Here is yet another option using the in and out keys. The first curve can be drawn with \draw[->] (above G_D) to[out=0,in=180,looseness=2] (above output); and the second one with \draw[->] (current bounding box.south east) -- (controller|-current bounding box.south) to[out=180,in=180,looseness=1.5] (controller|-above output) -- (above output); where we built in the horizontal position of controller to make sure the path wraps around that node. \documentclass{scrartcl} \usepackage{tikz} \usetikzlibrary{ arrows.meta, bending, positioning } \tikzset{ > = Latex, arrows = {[bend]}, }, }, } } [->] (above G_D) to[out=0,in=180,looseness=2] (above output); [->] (current bounding box.south east) -- (controller|-current bounding box.south) to[out=180,in=180,looseness=1.5] (controller|-above output) -- (above output); \end{tikzpicture} \[G_M=\ldots\] \end{document}
Q9, a content-balancing accuracy index to evaluate algorithms of protein secondary structure prediction. A content-balancing accuracy index, called Q(9), has been proposed to evaluate algorithms of protein secondary structure prediction. Here the content-balancing means that the evaluation is independent of the contents of helix, strand and coil in the protein being predicted. It is shown that Q(9) is much superior to the widely used index Q(3). Therefore, algorithms are more objectively evaluated by Q(9) than Q(3). Based on 396 non-homologous proteins, five algorithms of secondary structure prediction were evaluated and compared by the new index Q(9). Of the five algorithms, PHD turned out to be the unique algorithm with an average Q(9) better than 60%. Based on the new index, it is shown that the performance of the consensus method based on a jury-decision from several algorithms is even worse than that of the best individual method. Rather than Q(3), we believe that Q(9) should be used to evaluate algorithms of protein secondary structure prediction in future studies in order to improve prediction quality.
Q: What does "Swedish parents are entitled to 480 paid parental leave days for each child" mean? Swedish parents are entitled to 480 paid parental leave days for each child What does this mean? A: Sweden encourages parents to take a lot of time off when they have a baby. I googled this sentence and the context indicates that this is a pooled amount of days: i.e. both parents could take an equal 240 days off (adding up to 480), or it could be unequal (one parent taking 60 and another 420). However, each parent is entitled to 60 days that can't be taken away from them by the other parent (unless they are a single parent).
A Square Day is a day in which the month and date are equal and when multiplied together equal the year. So a date like 09/09/81 (9*9=81) or 10/10/00 (10*10=00) or 02/02/04 (2*2=4). Log in or register to write something here or to contact authors.
https://everything2.com/title/Square+Day
Undefined Null Boolean Number String Object 1. Undefined The undefined type has only one value, which is the special value undefined. When a variable is declared using var or let but not initialized, It is assigned the value of undefined. var a; let b; console.log(a); // undefined console.log(b); // undefined 2. Null The Null type is the second data type that has only one value: the special value null. Logically, a null value is an empty object pointer, which is why typeof returns “object” when it ’s passed a null value var x = null; console.log(typeof x); //object 3. Boolean The Boolean type is one of the most frequently used types in ECMAScript and has only two literal values: true and false These values are distinct from numeric values, so true is not necessarily equal to 1, and false is not necessarily equal to 0. var x = true; var y = false; Note that the Boolean literals true and false are case-sensitive, so True and False (and other mixings of uppercase and lowercase) are valid as identifiers but not as Boolean values. 4. Number
https://www.webnza.com/tutorials/data-types-used-in-javascript
South Africa, like the rest of the world, is currently facing a shortage of nurses, says private hospital group Life Healthcare. Health Minister Joe Phaahla this week warned South Africa faces a severe shortage of health workers, pointing to a doctor-patient ratio of 1 doctor for every 3,198 people. Phaahla described it as a “shocking state of affairs”. South African Medical Association President Dr Mvuyisi Mzukwa, meanwhile, said the figure lays bare South Africa’s health problems, namely that the sector is understaffed, overworked, and the money set aside. equipment or patient care is channeled elsewhere. Phaahla acknowledged the need for more health workers in his budget speech and said at least R7.5 billion was earmarked for the hiring and training of community health workers and medical interns over the next two financial years. It said 2,429 medical interns and community service personnel – including doctors, nurses and pharmacists – were employed during the current exercise and progress is being made regarding stability in the employment of more than 47,000 community health workers . R2.1 billion was allocated over the next two financial years for medical trainees and R5.4 billion was allocated in the next financial year to support various aspects of health professions training in the provinces, including additional staff where needed, he said. Nursing in focus Data published by the South African Nursing Council in 2021 shows that the country has a nursing staff contingent of around 280,000 nurses, equivalent to one for every 213 people. At the end of December 2020, there were over 21,000 nurses in training. Life Healthcare said that in 2022, however, the country needs an additional 26,000 nurses to meet the growing demand. “Nurses have been at the forefront of efforts to combat Covid-19 for over two years. They are understandably exhausted and require our support as they continue to provide quality care to our patients, ”the group said. “Our nurses are very tired. The waves they have experienced since 2019 have really had an impact on them. But despite that, they still show up, come to work, take care of our patients. So only with them doing it, is there hope. “ Life Healthcare Group said it has undertaken an extensive training program to meet demand and aims to increase the number of nurses it is training to 3,000 per year. “It is up to the government and healthcare stakeholders to address the shortage faced in South Africa. This means accelerating new educational requirements and processes that allow the private sector to make a significant contribution to the nursing profession, ”the group said. “Although the public and private sectors offer nursing education programs, they need to be accelerated to meet demand. We are currently limited with the number of students we can register in our programs due to the introduction of the new qualifications, “she said. What nurses get paid in South Africa payroll tracking websites Wage scale, Indeed Other Talent.com place the average salary for a nurse in South Africa in a wide range of R250,000 to R360,000 per year. At the low-end, in an entry-level position, salaries are R150,000 for a year, while the high-end salaries for specialist nurses can go as high as R600,000. More official monitoring of nursing salary data can be found through the salaries of public service nurses Like many other public service workers, nurses in South Africa have not benefited from massive wage increases in the past two years, with the third year of negotiated wage agreements (2021) between unions and the government having fallen due to an incremental increase in wage. salary. As of July 2021, public service employees have seen only a 1.5% increase in salaries, with a small cash bonus offered to those in lower pay brackets. Among nurses, nursing assistants remain the lowest wages between R134,514 and R233,763 per year – or R11,200 to R19,500 per month. The top earners, meanwhile, are nursing executives and executive educators, who can earn up to R1.08 million per year (R90,300 per month). The table below outlines some of the main nursing roles and their pay.
https://europeanfootballweekends.co.uk/news/20001/huge-shortage-of-nurses-in-south-africa-thats-how-much-they-get-paid/
If you’ve been following these writings for a while, you know that I sometimes post about top curators in the art world. That’s all well and good, but just knowing about these people isn’t going to get you very far. So how do you go about actually connecting with a curator? How do you go from reading their name in an article to standing in front of them and—who knows—maybe working with them one day? Here I will break down some practical steps you can take to connect with curators who hold the potential to advance your career as an artist. The first and best way to begin moving closer to any given curator is to do a little research. Find out what museums and galleries they are working with and where they are going to be next, and what they look like. Locate an opening that you can get to and clear your calendar. If you’re new to the art events circuit, refresh your courage by reading through our post about how to fake it ‘til you make it in the art world. Remember, it’s all about confidence and how you present yourself. You are, in essence, a brilliant artist. Own it. Be proud of it. Before you even locate your curatorial quarry in the room, take in the exhibition. Get to know the art on the walls (or on the floor, or on the screen…whatever applies) and pick out some aspects that speak to you. We’ll explain why in just a moment. Once you feel you are nicely familiar with what’s going on in the exhibition, then and only then can you start scanning the crowd for the face you’re hoping to find. You’ve spotted him or her, and you’re plucking up your courage to go say hello. So here’s the thing. At the opening of an event, the curator is going to be one of the most sought after people in the room. There’s no getting around this. That means you will have to keep a keen eye out for the right moment to approach. When the opportunity arises, make your way over and be prepared to flatter, in a genuine way. Remember the time you spent taking in the art before approaching the curator responsible? One of the best ways to stand out among the throngs of people who will want to have their moment chatting with the evening’s curator is to compliment what they have accomplished. Flattery will get you everywhere as they say, especially if it is sincere and accurate. If nothing else, it will very likely get you remembered. Don’t go over the top, but it can’t hurt to approach with a loosely rehearsed bit of praise up your sleeve. Don’t be afraid to ask questions and above all, listen to the answers. Be curious about the person you are talking to. After all, this is someone you have identified as an important figure. Ask more questions than you give answers. Remember that everyone likes talking about themselves and their work. Use this to your advantage. It isn’t critical that you bring up your own work during this first meeting. In fact, it may be critical that you don’t. Use this face to face opportunity as a simple first impression. Work on developing a rapport. Don’t take up too much time, recognize that you are only one of many in the room who surely want a piece of the curator’s attention. Paying attention to a detail like this and not allowing yourself to monopolize someone else’s time shows respect. It shows that you understand it isn’t just about you and your needs. You’ve done it. You’ve attended and introduced yourself. So…..now what? Time for a follow up. There are a few ways to approach this. If you can find an email address, this is very likely the best way to reach out for a follow up. If you don’t know the specific email address for the curator you’re trying to reach but you do know that they are on staff at one or more locations, it is possible to use this to your advantage. Every major institution has formatted email addresses. For example, at The Whitney Museum, email addresses follow this format [email protected] so as long as you have the correct information to fill in here, (a name) you can email anyone at Whitney. This will be the case in most institutions, just locate the email fomat, and you can usually contact anyone in house. What if you can’t locate an email address no matter how hard you try? Not to worry. Before the advent of electronic messages, the letter was king. In fact, some may argue that these days there is a certain charm and merit to sending a letter rather than an email. If you can’t locate an email address, find a paper and pen and start writing, or type it up on a computer and print it out. Send a nice note to your new curatorial chum, care of the gallery or museum where the show was curated. It’s less precise than an email, but the results could surprise you. Just be sure to include your contact information including email address and phone number. Ultimately, the important thing is to put yourself out there. Someone once said, it’s just as easy to make friends of consequence as it is to make friends of no consequence. Sure you may be wondering how on earth you’ll ever say hello to a curator, but at the end of the day they’re all just creative people looking for feedback.
https://blog.praxiscenterforaesthetics.com/%E2%80%8Bhow-to-connect-with-a-curator/
How does the Ripple recovery key work? How do you use ripple secret key? You can use the secret key to import a wallet to another account. To find your wallet’s secret key: - Go to “WALLET” (to see how to switch between the wallets please see article Wallet type and switching between wallets). - Click “Advanced”. - Under “XRPL Settings” click on the “SECRET KEY” field. How do I recover my ripple wallet? How do I recover my wallet using my recovery phrase? Go to change passphrase in the settings menu. Enter your recovery phrase where it says ‘current passphrase’ then reset your passphrase as normal. If this doesn’t work make sure you’ve updated to the latest version of XRP Wallet. What is my XRP private key? The private key is the value that is used to create a digital signature. Most XRP Ledger software does not explicitly show the private key, and derives the private key from the seed value when necessary. Can I empty XRP wallet? The XRP ledger network now has the ability to delete wallets, thanks to a community vote. XRP users can now delete their wallets on the XRP network if they so desire — an update put in place after the community majority voted in favor of the change. How do I enable master key for XRP? ⚠️ Warning ⚠️: You will not be able to access the XRP account using your master key hereafter. - Step 1: Generate a key pair. … - Step 2: Assign key pair to account as a regular key pair. … - Step 3: Verify the Regular Key Pair. How do I get a private key for my wallet? Open your browser and go to the Mnemonic Code Converter site. Head to the “BIP39 Mnemonic” section and paste the recovery phrase in the slot provided. Select your wallet’s coin from the list displayed. Navigate to “Derived Addresses” and copy the first private key on the list. Why do I have to keep 20 XRP? Similar to the minimum balance requirements of traditional banks, Ripple requires you to deposit and maintain a balance greater than 20 XRP at all times to use the ledger. So once you fund you Ripple wallet address with 20 XRP or more, your account will be active and usable. How do I recover XRP sent to wrong address? Due to the irreversible nature of cryptocurrency protocols, transactions can’t be cancelled or reversed once initiated. If you sent funds to the wrong address, you’ll need to contact the receiving party and ask for their cooperation in returning the funds. How can I get free XRP? XRP is the crypto coin of Ripple. - 5 Ways to Earn Free Ripple. Here are five easy ways to earn free Ripple. - Crypto Faucets. These are websites that give out small amounts of crypto coins at regular intervals of time. … - Pay-to-click Sites. … - Affiliate marketing. … - Complete surveys. … - Ripple airdrops. How much XRP does the average person have? Most participants that replied, hold something between 10,000 and 50,000 XRP. If we calculate that every holder holds the minimum amount within the range stated, then the average comes to 53,337 XRP per participant. How many XRP do you need to open a wallet? 20 XRPs Like many other XRP-dedicated wallets, it requires you to keep a minimum of 20 XRPs to keep it active. How much is 10 Ripple worth? 3.545 USD The conversion value for 10 XRP to 3.545 USD. BeInCrypto is currently using the following exchange rate 0.3545. How long does it take to mine 1 Ripple? The first part of the transaction takes just 2-3 seconds and the conversion of XRP through digital asset exchanges and/or local payment processors, the entire transaction takes about 2 minutes in total. Is it possible to mine XRP? There are no two ways to get Ripple XRP, which is to invest in them by purchasing them from trading platforms that provide you with a lot of quantities. Their mining and obtaining it from the vacuum is a big illusion here, and can be used by the quorum to attract those who wish to obtain it free of charge. What is the most profitable coin to mine in 2022? As of , the best cryptocurrency to mine for most modern graphics cards is Ethereum (ETH). However, for some graphics cards, such as the Nvidia GeForce RTX 3060 and 3070, the most profitable cryptocurrency to mine is Ergo (ERG). How do I use XRP toolkit? Accessing your Ledger XRP account(s) through XRP Toolkit - Connect your Ledger device and open the XRP app on your device. - Go to the XRP Toolkit website and click Get Started. - Click Connect Wallet >Ledger Device > Connect Ledger. … - Select your device and click Connect. … - Select your account and click Confirm. How is XRP doing today? The live XRP price today is $0.393037 USD with a 24-hour trading volume of $1,403,432,909 USD. What is the highest price XRP can reach? According to the technical analysis of XRP prices expected in 2022, the minimum cost of XRP will be $0.47. The maximum level that the XRP price can reach is $0.56. How many XRP are left? How Many XRP Coins Are There In Circulation? XRP currently has 45,404 billion tokens in circulation, while its total supply counts 100 billion XRP tokens. How big can XRP get? 100,000,000,000 XRP The digital asset is capped at 100,000,000,000 XRP. At its all-time high, Ripple reached over three dollars, at the height of the 2017 crypto bubble. Can XRP hit 100 dollars? The short answer is YES, XRP can reach $100. And it can go as high as $870. Is XRP the next Bitcoin? A scant handful of experts predict that XRP can reach $10 in the near future — if ever. If the bear market reverses, XRP is likely to follow the trend of bitcoin and begin to rise again. CoinQuora sees the currency breaking $ if crypto reverses course to become a bull market again. Will ripple XRP reach $1000? No, it is extremely unlikely Ripple XRP will reach $1,000. This is because its total circulation is less than 100 billion, which means it would need to have a market cap of $100 trillion for XRP to hit a price of $1,000. How much XRP do I need to become a millionaire? So I’m sticking to my guns and saying that 2832 XRPs are all you need to become a millionaire in this day and age. Can XRP go to $10? But at its current price, in order for XRP to reach $10, it needs to gain 1,000%. Looking at its growth in the past, the alt coin has been rising at an average rate of 60% per month. And if XRP maintains that level of growth, it’s possible for the token to reach $10 within five months. Can XRP make me rich? In this instance, purchasing 400,000 to 500,000 XRPs can set you on the path to becoming a millionaire if the crypto asset doubles in its trading price in the range of $0.86 to $1. If XRP crosses a price milestone of $5 in the future, you need 200,000 XRPs. At $10, all you need is 100,000 XRPs. Will XRP win court case? Ripple, the developer of the XRP blockchain of which XRP is the native token, secured a big win this week in its ongoing lawsuit with the US Securities and Exchange Commission (SEC). Will XRP be the next big thing? One company that has made a lot of partnerships and gained a lot of attention recently is Ripple. According to reports, a number of industry experts predict that Ripple’s XRP could be the next big thing as large gains from a sub-dollar asset would be far more likely than one that is already trading at $10K per coin.
https://aicrypto.blog/how-does-the-ripple-recovery-key-work/
BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DETAILED DESCRIPTION 1. Field of the Invention The present invention relates to a discharging module, and more particularly, to a discharging module applied in a switched-mode power supply. 2. Description of the Prior Art A switched-mode power supply has an input port for receiving alternating current (AC) input power. The input port of the switched-mode power supply requires an X capacitor for suppressing noise generated due to electromagnetic interference (EMl). A discharging resistor corresponding to the X capacitor is required for avoiding the user getting an electric shock when connection between the input port and the AC input power is broken (for example, when a plug is removed from a socket). However, when the AC input power supplies power normally, the discharging resistor continuously wastes energy, causing unnecessary power consumption. The present invention provides a discharging module applied in a switched-mode power supply. The switched-mode power supply has an input port and a rectifier. The input port is coupled to an AC input power. The rectifier is coupled to the input port for rectifying the AC input power so as to provide a rectified input power to the switched-mode power supply. The discharging module comprises a detecting circuit and a discharging circuit. The detecting circuit is coupled to the input port. The detecting circuit is utilized for determining if the input port is supplied power according to the AC input power. The discharging circuit is controlled by the detecting circuit. The discharging circuit provides a discharging path for discharging the input port when the detecting circuit determines that the input port is not supplied power. The present invention further provides a discharging method applied to a switched-mode power supply. The switched-mode power supply has an input port and a rectifier. The input port is coupled to an AC input power. The rectifier is coupled to the input port for rectifying the AC input power so as to provide a rectified input power to the switched-mode power supply. The discharging method comprises providing a detecting circuit for determining if the input port is supplied power according to the AC input power, and providing a discharging path for discharging the input port when the detecting circuit determines that the input port is not supplied power. These and other objectives of the present invention will no doubt become obvious to those of ordinary skill in the art after reading the following detailed description of the preferred embodiment that is illustrated in the various figures and drawings. FIG. 1 100 100 101 101 1011 1012 1011 1011 1012 1011 101 1012 100 110 120 110 1011 1011 1012 110 110 1011 120 110 1011 110 120 1011 110 120 ST 1 2 ACIN 1 2 X 1 2 X ACIN DCIN ST DCIN 1 2 ACIN ACIN 1 2 X is a diagram illustrating discharging module according to a first embodiment of the present invention. Discharging module is applied in switched-mode power supply . Switched-mode power supply includes input port , rectifier , stabilizing capacitor C, and diodes Dand D. Input port is coupled to AC input power V. Input port includes inductors Land L, and X capacitor C. Inductors Land L, and X capacitor Care utilized for suppressing noise generated due to electromagnetic interference (EMI). Rectifier is coupled to input port for rectifying AC input power Vso as to provide rectified input power Vto switched-mode power supply . Stabilizing capacitor Cis utilized for stabilizing voltage provided by rectified input power V. Diodes Dand Dfurther form a full-wave rectifying circuit with two diodes of rectifier . Discharging module includes detecting circuit , and discharging circuit . Detecting circuit is coupled to input port for determining if input port is supplied power according to AC input power V. More particularly, AC input power Vis rectified by full-wave rectifying circuit formed by diodes Dand D, and two diodes of rectifier , and then rectified voltage is provided to detecting circuit for detecting circuit to determine if input port is supplied power. The discharging circuit is controlled by detecting circuit . When input port is determined not to be supplied power (for example, the plug is removed from the socket), detecting circuit controls discharging circuit to provide a discharging path for discharging X capacitor Cof input port . Structures and operational principles of detecting circuit and discharging circuit are further illustrated in the following description. 110 111 112 111 111 111 112 120 1 2 3 120 1 2 3 112 120 1 2 3 112 1 3 3 1011 112 120 1011 2 3 112 1 2 112 1 110 1011 112 100 110 120 120 1011 1 100 1011 120 100 1 3 100 100 1011 101 100 101 1 2 3 ACIN PEAK 1 2 1 X PEAK 1 1 1 1 1 1 2 3 PEAK 1 3 PEAK 1 3 PEAK 1 PEAK 1 1 PEAK 1 2 PEAK 1 3 PEAK X ACIN PEAK PEAK 1 X PEAK X X x FIG. 2 FIG. 1 FIG. 2 Detecting circuit includes peak-voltage detector , comparators CMP, CMP, and CMP, and logic-controlling circuit . Peak-voltage detector detects peak voltage of AC input power Vrectified by full-wave rectifying circuit, and accordingly generates peak-voltage signal S. Peak-voltage detector includes voltage-dividing circuit (formed by resistors Rand R), and a capacitor C. The operational principle of peak-voltage detector is well known to those skilled in the art, and will be omitted for brevity. Logic-controlling circuit controls discharging circuit to provide a discharging path for discharging X capacitor Caccording to the result of comparing peak-voltage signal Swith predetermined values LEVEL, LEVEL, and LEVEL. Discharging circuit includes current source ICS, and switch SW. Current source ICSis utilized for providing a discharging current. Switch SWis coupled between current source ICSand ground. More particularly, comparators CMP, CMP, and CMPcompare peak-voltage signal Swith predetermined values LEVEL, LEVEL, and LEVEL, respectively. Logic-controlling circuit controls magnitude of discharging current provided by discharging circuit according to signal outputted by comparators CMP˜CMP. For instance, please refer to . It is assumed that LEVEL<LEVEL<LEVEL. Logic-controlling circuit obtains relationship between peak-voltage signal Sand predetermined values LEVEL˜LEVEL according to signal outputted by comparators CMP˜CMP. When peak-voltage signal Sis greater than predetermined value LEVEL, this represents that input port is supplied power normally. Therefore, logic-controlling circuit controls switch SWto turn off, so that discharging circuit does not discharge input port . When peak-voltage signal Sis between predetermined values LEVEL and LEVEL, logic-controlling circuit controls switch SWto operate with duty cycle DUTY. When peak-voltage signal Sis between predetermined values LEVEL and LEVEL, logic-controlling circuit controls switch SWto operate with duty cycle DUTY. When peak-voltage signal Sis less than predetermined value LEVEL, detecting circuit determines that input port is not supplied power normally. As a result, logic-controlling circuit controls switch SWto operate with duty cycle DUTY. According to the discharging method of discharging module illustrated in and , when peak voltage represented by peak-voltage signal Sgoes down, detecting circuit increases period of discharging circuit for discharging X capacitor C. That is, discharging speed of a discharging path provided by discharging circuit is related to peak voltage of AC input power V. More specifically, when input port is not supplied power normally, peak voltage recorded by peak-voltage signal Sgradually goes down. When peak-voltage signal Sis less than predetermined value LEVEL, discharging module determines input port is not supplied power, so that switch SWis controlled for discharging circuit to discharge the X capacitor Cwith the longest duty cycle. However, discharging module may discharge in advance according to relationship between peak-voltage signal Sand predetermined values LEVEL˜LEVEL. In this way, discharging module increases speed of discharging module discharging X capacitor Cwhen input port is not supplied power (for instance, the plug is removed from the socket), so that voltage level of voltage across X capacitor Cfalls more quickly into a safe range defined by a safety standard. Switched-mode power supply utilizing discharging module does not require an additional discharging resistor for discharging X capacitor C. In this way, power consumption by the discharging resistor is avoided when switched-mode power supply is not loaded. FIG. 2 FIG. 3 FIG. 3 120 100 112 1 3 112 120 1011 1 112 120 100 1011 100 100 112 100 100 100 1011 1 1 2 3 PEAK PEAK X PEAK X X X X X shows that discharging speed can be adjusted by adjusting discharging period of discharging circuit . However, discharging speed can also be adjusted by changing magnitude of discharging current. is a diagram illustrating discharging module adjusting discharging speed by controlling magnitude of discharging current. As shown in , logic-controlling circuit sets magnitude of current of current source ICSas I, I, or Iaccording to relationship between peak-voltage signal Sand predetermined values LEVEL˜LEVEL. When decrease in peak-voltage signal Sis detected, logic-controlling circuit controls discharging circuit to discharge X capacitor Cin advance by current with low magnitude. When input port is determined not to be supplied power (that is, peak-voltage signal Sis less than predetermined value LEVEL), logic-controlling circuit controls discharging circuit to discharge X capacitor Cby current with higher magnitude. In this way, speed of discharging module discharging X capacitor Cof input port is accelerated, so that voltage level of voltage across X capacitor Cfalls more quickly into the safe range defined by the safety standard. In addition, discharging module is not limited to having exactly three comparators. Number of comparators is determined according to user requirements. It is possible that discharging module has only one comparator and logic-controlling circuit is omitted in discharging module . In this way, although discharging module can not discharge X capacitor Cin advance, discharging module still can discharge X capacitor Cwhen input port is determined not to be supplied power. FIG. 4 FIG. 5 FIG. 5 500 500 510 520 100 500 510 1011 520 120 510 511 512 511 511 1011 1012 512 5121 5121 1011 5121 1011 5121 520 1011 3 4 BNO ACIN 1 2 4 4 BNO PRE BNO PRE ACIN 4 ZCD ACIN AC AC 4 ZCD AC ZCD DELAY ZCD 1 X Please refer to and , which are diagrams illustrating discharging module according to a second embodiment of the present invention. Discharging module includes detecting circuit and discharging circuit . The difference between discharging modules and is method of detecting circuit determining if input port is supplied power. Operational principle and structure of discharging circuit are similar to those of discharging circuit , and are omitted for brevity. Detecting circuit includes voltage-dividing circuit , and AC detector . Voltage-dividing circuit includes resistors Rand R. Voltage-dividing circuit generates detecting voltage Vaccording to voltage provided by AC input power Vfrom input port through full-wave rectifying circuit formed by diodes Dand D, and two diodes of rectifier . AC detector includes comparator CMPand counter . Comparator CMPis utilized for comparing detecting voltage Vand predetermined voltage V. When detecting voltage Vis lower than predetermined voltage V, voltage level of AC input power Vis determined to enter a zero crossing zone, and comparator CMPaccordingly generates zero crossing signal S. As shown in , voltage level of AC input power Venters a zero crossing zone every half AC cycle T(for instance, length of an AC cycle is 1/60 second, and length of a half AC cycle Tis 1/120 second), so that comparator CMPgenerates zero crossing signal Severy half AC cycle T. Therefore, counter can determine if input port is supplied power by means of detecting if zero crossing signal Sis continuously generated. If in predetermined period T, no zero crossing signal Sis generated, counter determines that input port is not supplied power. Hence, counter controls switch SWto turn on so that discharging circuit can provide a discharging path for discharging X capacitor Cof input port . FIG. 6 FIG. 7 FIG. 8 FIG. 7 FIG. 7 FIG. 8 FIG. 8 FIG. 7 FIG. 8 700 500 700 711 1012 1011 711 711 1011 1011 1011 1011 7121 710 1011 720 ACIN BNO 5 ACIN BNO PRE ZCD ACIN BNO PRE ZCD 5 ACIN BNO PRE ZCD 5 ZCD DELAY ZCD DELAY Please refer to , , and , which are diagrams illustrating discharging module according to a third embodiment of the present invention. The difference between discharging modules and is that voltage-dividing circuit and two diodes of rectifier form a half-wave rectifying circuit coupled to input port . After voltage-dividing circuit receives voltage of AC input power Vrectified by half-wave rectifying circuit, voltage-dividing circuit accordingly generates detecting voltage V. Comparator CMPdetermines if voltage level of AC input power Venters a zero crossing zone by means of comparing detecting voltage Vwith predetermined voltage V, and accordingly generates zero crossing signal S. is a diagram illustrating connection between input port and AC input power Vbeing broken when detecting voltage Vis higher than predetermined voltage V. As shown in , when input port is not supplied power (AC OFF), zero crossing signal Sgenerated by comparator CMPremains at low voltage level. is a diagram illustrating connection between input port and AC input power Vbeing broken when detecting voltage Vis lower than predetermined voltage V. As shown in , when input port is not supplied power (AC OFF), zero crossing signal Sgenerated by comparator CMPremains at high voltage level. Hence, from and , if logic level of zero crossing signal Sreceived by counter does not change for predetermined period T(that is, voltage level of zero crossing signal Sremains at low or high voltage level for predetermined period T), detecting circuit can determine input port is not supplied power and accordingly control discharging circuit to provide the discharge path. FIG. 9 FIG. 6 FIG. 9 FIG. 9 700 700 900 700 900 910 900 900 900 900 PRI AUX PW AUX VCC 3 PW VCC VCC CC WPW HV VCC HV PW VCC AUX is a diagram illustrating another embodiment according to discharging module of . Discharging module can be integrated into power controller having a high voltage start-up device. In , Lrepresents the primary winding; Lrepresents the auxiliary winding; and Qrepresents the power switch. Auxiliary winding Lis coupled to operational power capacitor Cthrough an auxiliary winding rectifier (such as diode Dshown in ). In addition to discharging module , power controller further includes power switch controlling circuit for controlling power switch Q. Power controller is coupled to operational power capacitor Cthrough operational power end P. When power controller is just turned on and operational voltage Vis not stable yet, by means of turning on power-supplying switch S, high rectified voltage of input power can be utilized for providing a high voltage start-up charging current through high voltage start-up voltage end Pin a boot period. The high voltage start-up charging current charges operational power capacitor Cso that internal power at a lower voltage level can be generated to provide operating voltage of internal circuitry of power controller . When power controller is in steady state, end Pis caused to stop providing high voltage start-up charging current by means of turning off power-supplying switch SW. Therefore, power consumption is reduced. In addition, operational power capacitor Cis changed to be charged by auxiliary winding L. 1 1 PW PW 1 VCC PW VCC 1 700 710 930 900 900 720 In the present embodiment, current source ICSof discharging module is current provided by high voltage start-up device. Detecting circuit can simultaneously control turning on or off of switch SWand power-supplying switch SWthrough logic controller . When power controller is just turned on, power-supplying switch SWis turned on and switch SWis turned off. High voltage of the input power charges operational power capacitor Cthrough end HV. When power controller is in steady state, power-supplying switch SWis turned off for stopping current provided by high voltage start-up device from charging operational power capacitor C. In this way, current provided by high voltage start-up device is only utilized as the current source in discharging circuit , and the discharging path is formed based on if switch SWis turned on. 100 500 100 500 900 FIG. 9 Similarly, power controllers utilizing discharging modules and are provided according to the embodiment shown in . Operational principle and structure of power controller utilizing discharging module (or ) are similar to those of power controller , and are omitted for brevity. In conclusion, discharging modules applied in switched-mode power supplies are provided. The discharging module includes a detecting circuit, and a discharging circuit. The detecting circuit is coupled to the input port of the switched-mode power supply. The detecting circuit determines if the input port is supplied power according to the AC input power. When the detecting circuit determines the input port is not supplied power, the detecting circuit controls the discharging circuit to provide a discharging path for discharging the input port (the X capacitor). In this way, the switched-mode power supply utilizing the discharging module does not require an additional discharging resistor. Consequently, when the switched-mode power supply is not loaded, the power consumption caused by the discharging resistor is avoided. Those skilled in the art will readily observe that numerous modifications and alterations of the device and method may be made while retaining the teachings of the invention. BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 FIG. 2 FIG. 3 , , and are diagrams illustrating a discharging module according to a first embodiment of the present invention. FIG. 4 FIG. 5 and are diagrams illustrating a discharging module according to a second embodiment of the present invention. FIG. 6 FIG. 7 FIG. 8 , , and are diagrams illustrating a discharging module according to a third embodiment of the present invention. FIG. 9 FIG. 6 is a diagram illustrating a power controller utilizing the discharging module shown in .
It looks like you're new here. If you want to get involved, click one of these buttons! Dear Matthias, I sometimes have identical polygons that will trigger (false-positive) overlap with the "merged()" method. Is there a way to first remove identical polygons? Xaveer Hi Xaveer, but delivering the overlap between two shapes even if they are identical is a part of the feature. So suppressing overlap just in that case seems like an arbitrary restriction to me. If you look for "layout normalization": removing duplicate shapes is a side effect of OASIS saving (with compression). Maybe this helps. Regards, Matthias Hi Matthias, Indeed, I understand that this will limit the function of the overlap check, but for now that would still be preferred. How to specify compression on the OASIS saving? I now use target() in the DRC runset, but it is not clear to me how to pass any options. Thanks, Xaveer Hi Matthias, Compression is the default, so it works without other options. Thanks a lot! Xaveer Yes exactly, compression is the default :-) You can switch it off by setting the compression level to 0. But unless there is a specific reason you wouldn't do that. Matthias Although not needed now, how should I set the compression level? Thanks, Xaveer It's set in the "Writer Options" and is called "compaction level" there (sorry, naming consistency isn't my strength …). 0 is "no compression", 1 … enable compression with a increasingly deeper search for repetitions. On level 1 upwards, redundant shapes are removed as they comprise a kind of "null repetition".
https://www.klayout.de/forum/discussion/comment/5771
Welcome to Birds of the World! You are currently viewing one of the free accounts available in our complimentary tour of Birds of the World. In this courtesy review, you can access all the life history articles and the multimedia galleries associated with this account. For complete access to all accounts, a subscription is required. Introduction A revision of systematics of this species is greatly needed, with reconsideration and re-description of subspecies. Subspecies descriptions based on color should account for variation among individuals and fading or other changes in color that occur over the course of the year. Subspecies boundaries need to be mapped and interactions between subspecies should be studied where ranges come into contact. Behavioral differences between subspecies should also be investigated (for example, which subspecies flock during nonbreeding periods? What is the nature of song differences between subspecies, and do songs differ more between subspecies, than among individuals of the same subspecies? In studies of cardinal ornamentation, colors should be described using a standardized modern system of color notation, and efforts to convert Munsell and Methuen color scores to usable avian color space data are needed for all species. Sensitivities of cone populations (see Other: Physiology: Vision) may be species-specific and in at least one case even subspecies-specific (403). Future work should assess a broader number of populations using easily comparable methodologies for plumage color measures and measures of quality and standardized conditions under which color data are collected. When composite measures of color are used, it would be useful to also separately report the standard color space measures of hue, saturation, and brightness (as a measure of gray scale value/luminance). This will help to determine whether these measures vary between populations. In studies of cardinals engaged in prolonged territorial disputes endocrine mediators of aggressive behavior in different life history stages and different contexts (e.g., intrasexual versus intersexual conflict) should also be examined. Aggression during the nonbreeding period needs to be more strongly addressed in multiple populations to determine the extent of this behavior and underlying physiological factors influencing it. Such studies may also help address questions about why both sexes of cardinals have substantial levels of testosterone outside of the breeding period (31). Finally, studies of hormone receptor distribution and seasonal variation in expression or activation of hormone receptors are needed to determine how prolonged testosterone production does not interfere with some aspects of steroid-sensitive behaviors. Research examining stress hormones and stress response in cardinals has yielded conflicting results. Studies comparing multiple populations throughout the species' range could help to determine whether stress responses reflect local selective pressures. Further, investigations examining relationships between stress hormones and aspects of immunity could provide more information about how cardinals allocate energy resources between energetically costly, and often simultaneously occurring, physiological processes. Extra-pair copulations also need more study in cardinals: Does mate-guarding vary with plumage color of the guarding or guarded individual? With whom do females copulate, and how does the coloration and “quality” of these males compare to that of their social mates? Are extra-pair copulations timed to lead to maximal probability of fertilization? Do females engage in compensatory copulations with their social mate to avoid suspicion, and how are copulations with the social mate timed? What are the conditions that lead to females laying eggs in the nests of other females? Do these females also have nests of their own, with the same or a different male? Males captured during the breeding period should be checked for bare, edematous areas on the belly, to determine whether males are capable of assisting in incubation. Fledgling survival rates need to be determined, as do the movements of fledged young after they leave the territories of their parents. There is much to be learned about cardinal vocalizations. Sound spectrograms have not yet been published for some calls, and meaningful variation may exist within the category of chip calls. Do details of song repertoire use modify the messages being conveyed? For example, what is the significance of variations in successive renditions of the same song type (e.g., variation in total song length, and in numbers of repetitions of the component syllable types)? Do low-amplitude song elements serve a particular communicative function? Cardinals are promising subjects for studies of a bird's ability to sing songs that appear to be physically challenging to produce. Are such songs used selectively in contexts in which a display of physical fitness would be adaptive? To what extent do individuals vary in their ability to produce physically challenging songs? Is the ability to produce physically challenging songs favored by sexual selection? Do the abilities to produce different kinds of physically challenging sounds covary (e.g., does the ability to produce long chirr syllables correlate with the ability to produce smooth transitions between frequencies produced by the left and right sides of the syrinx)? Is syllable repetition rate within a song limited by the frequency bandwidth of the repeated syllables? When syllable repetition rate increases as a song progresses, does syllable frequency bandwidth narrow, or is filtering of harmonic frequencies less effective? Do responses of female cardinals to song playbacks reflect their mate preferences? Do female cardinals prefer mates whose song repertoires they share, and/or discriminate against males from different geographic areas? Do song repertoires change over decades in the same continuously-occupied location, when human land use has remained constant? Despite the apparent potential of cardinal song to display an individual's fitness, some predicted correlations have not been found. Males with shorter and simpler songs had territories of higher quality and fledged more offspring in a rural east Texas population (50); males with shorter and slower songs were larger and lived in territories with greater shrub density, but had no greater reproductive success, in rural Ohio, while song was not correlated with male size or territory quality of urban cardinals in Ohio (20). Suggested explanations remain to be tested, as does the generality of these correlations. Cardinals may respond more strongly to very local dialects than to songs from more distant locations (250, 212, 107; JMJ, MSD, and R. Anderson, personal communication), but current data are inadequate to evaluate this claim. Because cardinals sing differently in different contexts, it is challenging to construct and to interpret playback experiments, and significant care should be taken in these experiments to present song sequences typical of those sung in the context to be tested. To test responses to local vs. distant songs, songs should be recorded from local birds with which the focal bird has not interacted regularly, rather than from neighbors or the focal bird itself. In locations with denser cardinal populations, it is more likely that multiple cardinals will respond to playbacks, and that playbacks at randomly chosen locations will fall within a cardinal territory, increasing response levels over those in less dense populations. The strongest comparisons can be made with reciprocal tests using the same playback recordings. When multiple response measures are combined, it is difficult to interpret the biological significance of tests in which responses to playbacks vary qualitatively, e.g., with closer approach to the playback speaker in one population, but more song in another population. If responses do not differ significantly, they cannot be assumed to be the same without power analyses to quantify the probability of detecting differences; high variability in responses of small sample sizes of tested individuals can obscure actual differences. Last, how are changes in climate affecting cardinal distribution and the rates of northward and westward range expansion? How is urbanization affecting movements, reproductive success, singing behavior, and plumage coloration? Cardinals adapt readily to urban environments, but more research is needed to better understand how individuals might change once established in urban environments, and/or if urban environments select for certain behavioral, physical, or physiological phenotypes. Which behavioral or physiological attributes allow the species to adapt so readily to urban environments?
https://birdsoftheworld.org/bow/species/norcar/2.0/priorities
In the Rapid Review series, I briefly review the key points of a clinical review paper. (Once again, this time it is a combination of 2 papers). The topic: Periodic fever, aphthous stomatitis, pharyngitis, and cervical adenitis (PFAPA) syndrome. The papers: Batu ED. Periodic fever, aphthous stomatitis, pharyngitis, and cervical adenitis (PFAPA) syndrome: main features and an algorithm for clinical practice. Rheumatol Int. 2019;39(6):957-970. doi:10.1007/s00296-019-04257-0 PMID: 30798384 Gaggiano C, Rigante D, Sota J, Grosso S, Cantarini L. Treatment options for periodic fever, aphthous stomatitis, pharyngitis, and cervical adenitis (PFAPA) syndrome in children and adults: a narrative review. Clin Rheumatol. 2019;38(1):11-17. doi:10.1007/s10067-018-4361-2 PMID: 30488366 What is PFAPA? PFAPA is one of the few medical conditions with a name that appropriately describes the condition, rather than being named after some old white dude. It is a disease of unknown etiology that is characterized by clock-work regular episodes of fever, aphthous stomatitis, pharyngitis, and cervical adenitis. It is primarily a disease of early childhood (less than 5 years), but an adult onset version has recently been recognized. How does it present? As the name suggests, the disease presents as periodic episodes fever, aphthous stomatitis, pharyngitis, and cervical adenitis. The flares usually last around 4-5 days and recur every 3-6 weeks. The rate of occurrence does not change with the seasons, although some patients skip episodes in the summer. Patients are asymptomatic between attacks. Fever is often high and resistant to anti-pyretics, but patients look relatively well. Erythematous or exudative pharyngitis is present in more than 90% of patients. Cervical adenitis is present in around 75% of patients. Half of patients will get oral aphthous ulcers, which are typically shallow, round ulcers less than 1 cm in size, with well demarcated erythematous margins, presenting on the non-masticatory surfaces of the mouth. Patients can also have other symptoms, such as headache, myalgias, abdominal pain, rashes, vomiting, and diarrhea. How common is it? It is the most common periodic fever syndrome in children, but is still pretty rare with an incidence of about 2 per 10,000. How is it diagnosed? It is a clinical diagnosis. Proposed diagnostic criteria are: - Regularly recurring fevers with an early age of onset (less than 5 years) occurring in the absence of upper respiratory tract infections. - At least one of the following: - Aphthous stomatitis - Cervical lymphadenitis - Pharyngitis - Exclusion of cyclical neutropenia. - Asymptomatic between episodes. - Normal growth and development. There are a few other clues, often listed alongside the diagnostic criteria: - Abrupt cessation of symptoms after 1 or 2 doses of corticosteroids. - A family history of recurrent pharyngitis or tonsillectomy. - Lack of infection among family members during disease attacks. There is also an adult onset (over 16 years old) variant, with slightly different diagnostic criteria: - Recurrent fever accompanied by erythematous pharyngitis and/or cervical lymphadenitis. - Increased inflammatory markers during febrile attacks. - Presence of symptom-free intervals. (The incidence in adults isn’t clear to me from these papers, but these diagnostic criteria make me think that we have all missed this diagnosis at least a couple times.) What is the differential diagnosis? Most patients with multiple visits for pharyngitis will just have recurrent infections. PFAPA should occur with more regularity, will not have other URTI symptoms such as coryza, and will not affect other family members at the same time. Cyclic neutropenia also causes recurrent fever and oral ulcers, but should be easily distinguished by the presence of neutropenia on blood work. The most difficult conditions to distinguish are the monogenic autoimmune disorders, such as familial Mediterranean fever, but from an emergency perspective I think it is enough to recognize that this is something other than recurrent infections and get a referral. What is the cause? We aren’t 100% sure. There is a genetic component, with familial clustering and a possible autosomal dominant pattern of inheritance. There is no known predilection for particular ethnic groups. The most likely explanation seems to be a genetically predisposed dysregulation of the immune system. The tonsils seem to be involved in pathogenesis, as the febrile episodes generally stop after tonsillectomy. How is it treated? A single dose of corticosteroids – usually prednisone at 1-2 mg/kg – will rapidly resolve the PFAPA symptoms in about 90% of patients. NSAIDs are also frequently used. Although these patients are frequently given antibiotics, they are obviously ineffective. Once the diagnosis has been made, there are a few options to prevent recurrence. Colchicine has been used prophylactically to reduce the number of attacks, and cimetidine has also been used, but the evidence is much weaker. Tonsillectomy may be the most effective treatment option, although there does seem to be some controversy about its role, especially seeing as the disease generally resolves spontaneously after a few years. What is the prognosis? The prognosis is excellent. The syndrome does not induce any long term sequelae and is not associated with comorbidities. It generally resolves spontaneously 3-5 years after symptoms onset.
https://first10em.com/pfapa-periodic-fever-aphthous-stomatitis-pharyngitis-and-cervical-adenitis-syndrome/
The Field Museum will reopen to the public later this month, admitting members beginning July 17 and the public on July 24, the museum announced Thursday. Chicago’s home for dinosaurs, research and natural history has been closed for four months by the COVID-19 pandemic. Already open on the lakefront Museum Campus is the Shedd Aquarium, which opened July 3, and still closed is the Adler Planetarium. In the announcement, the Field in particular promoted its new “Apsáalooke Women and Warriors” exhibition, which opened a day before the museum’s closure in March. Described as the Field’s first major exhibition curated by a Native scholar, it focuses on “the history, values, and beliefs of the Apsáalooke people of the Northern Plains, also known as the Crow.” Inside the museum, which can seem vast indeed to a visitor, there’s ample space to spread out, and most exhibits are staying open, said chief marketing officer Ray DeThorne Thursday. That includes the popular Inside Ancient Egypt, the Grainger Hall of Gems and the Griffin Halls of Evolving Planet, the dramatic, new second-floor gallery housing Sue the T. rex. But there will be small modifications everywhere. “For example, there’s a way you can have Sue breathe on you, you could smell the dinosaur’s breath,” DeThorne said. But due to its high interactivity, that feature will stay off for now, as will touch screens and other interactive tools. Foot traffic will be controlled in some areas, with specific routes to follow, marked entry and exit points and reduced capacities. There will be extra social distancing in the Grainger Hall of Gems; people tend to like to get right up close to the gemstones, he said. The Pawnee Earth Lodge will be closed; because it’s made of natural materials, it would be impossible to keep cleaned and sanitized. The Crown Family PlayLab will also remain closed. The announcement further spelled out the Field Museum’s protocols and precautions for visitors, opening under the State of Illinois Phase 4 guidelines for museums: - The Field Museum at 1400 S. Lake Shore Drive will be open five days a week, 9 a.m. to 5 p.m. Thursday through Monday, with plans to eventually reopen seven days a week. Total attendance will be limited to 25% capacity. For now, DeThorne said, the museum has eliminated its two least-attended days, historically. - Tickets went on sale Thursday; visitors are advised to buy tickets in advance at www.fieldmuseum.org (or call 312-922-9410 for more information). Tickets also will be available on a limited basis at the door. Posted ticket prices are $17-$40. All-access passes purchased online will be $3 off; memberships are discounted 15%. For July 24-Aug. 9, Illinois health-care workers, teachers, and first responders will receive free admission, and their families will receive Chicago admission prices. According to the Field website, there are no Illinois free admission days for the remainder of 2020. - Timed entries will be on the half-hour, with total capacity limited to 3,750 per day, from a previous 15,000-person maximum. Groups will be limited to 10 or fewer. - Masks will be required for staff and for all visitors over age 2. Once inside, floor markers and other signs will ensure social distancing, and some traffic areas and exhibits will be marked as one-way paths. Hand-sanitizing stations are available throughout. - The Field says it is following CDC guidelines for extra and frequent cleaning and sanitizing, both during the day and overnight. - Visitors can only enter through the low, marble East entrance, the furthest away from Lake Shore Drive. Exit through the East, North, or South exits. - The Field’s 3-D movies will continue, with three screenings a day, sanitizing between shows and 135 tickets sold for a theater that seats 700. The Field Museum was the third best-attended indoor Chicago museum in 2019, with about 1.5 million visitors, behind the Shedd and the Art Institute, which remains closed. The Chicago History Museum announced Wednesday it will reopen Friday. Having undergone layoffs in early June, the Field’s staffing is at a minimum, and the hope is, even with reduced capacity, the ticket sales will allow the museum to break even financially, DeThorne said. The Field has been taking lessons from the Shedd since it opened, he said. Two initial findings: Visitors are coming earlier in the day and are using the on-site restaurants a lot less. But still: They’ve been coming. “We’re encouraged by the numbers,” DeThorne said.
https://www.chicagotribune.com/entertainment/museums/ct-ent-field-museum-reopens-chicago-20200709-7w3b3pgqorhrrkbuwjcommtf6y-story.html
If you pay additional or extra payments regularly , you can reduce the number of years off your mortgage period and save huge sum of money in interest. This is therefore a good planning to pay more than your regularly scheduled amount. Fill out this mortgage calculator simple input fields, including the additional amount , calculation results will show how quicker your loan will be paid off. Mortgage Calculator with Extra Have you checked mortgage calculator with tax?
https://www.irstaxapp.com/mortgage-calculator-with-extra-payments/
|Crew members examine helicopters to prepare for the search of the missing Malaysia Airlines Flight MH370 on Chinese icebreaker Xuelong, March 24, 2014. Chinese icebreaker Xuelong has changed its course towards the latest sighting of some suspicious objects spotted by the crew aboard a Chinese IL-76 plane. Xuelong is expected to reach the area in the southern Indian Ocean in the early hours of Tuesday. (Xinhua/Zhang Jiansong) | BEIJING, March 24 -- China's icebreaker for Antarctic research Xuelong and Merchant ship Zhonghaishaohua are expected to arrive on Tuesday in waters where debris possibly linked to the missing Malaysia Airlines Flight MH370 was spotted. More vessels are heading for the waters, Foreign Ministry spokesman Hong Lei told a daily news briefing on Monday. Haixun 01 and Nanhaijiu 101 are approaching the southern Indian Ocean and three Chinese naval ships, including an amphibious transport dock (Kunlunshan), supply ship Qiandaohu and missile destroyer Haikou, are also heading for the waters, according to Hong. Meanwhile, China Maritime Search and Rescue Center has coordinated merchant ships owned by Chinese shipping company COSCO and China Shipping Company to change their original courses and head for the waters, he said. China Maritime Search and Rescue Center has coordinated merchant ships to search an area of 40,000 square kilometers, covering the Bay of Bengal and waters off Indonesia and Australia, Hong said. China's Ministry of Agriculture has coordinated 20 fishing boats to assist in the search, he added. China has repeatedly urged Malaysia and Australia to coordinate international efforts to conduct an all-out search in the waters and has maintained close contact with the two sides, Hong said. Two Chinese IL-76 planes searching for MH370 off Australia returned to Perth airport on Monday. During the mission, the crew spotted some floating objects and reported the sighting to the Australian Maritime Safety Authority, which then asked other aircraft to visit the area for further examination. China also informed Malaysia and Australia soon after a Chinese satellite spotted a large object possibly related to the missing airplane. The focus of the multinational search shifted to the southern Indian Ocean after Australia said on Thursday that satellite imagery identified debris in waters some 2,400 km from Perth. Flight MH370, a Boeing 777-200ER, went missing on its way to Beijing on March 8, shortly after taking off from Kuala Lumpur. The plane was carrying 12 crew and 227 passengers, including 154 Chinese. The search for the missing passenger jet is in its third week.
http://en.people.cn/90883/8577028.html
If you were faced with an emergency such as a natural disaster, would you and your dog be prepared? Many people believe they could easily manage in an emergency, but when faced with the actual event they often panic. Some first responders will tell you to provide sufficient food and water for your dog and leave him behind. But remember – if it’s not safe for you, it’s not safe for your dog. Groups such as the Canadian Disaster Animal Response Team (CDART) have been founded to assist pet owners faced with large-scale emergencies, but the primary responsibility for your dog’s care always rests with you. Make a plan Disasters come in all shapes and sizes, from major events like floods and wildfires, to smaller ones such as house fires, car accidents and medical emergencies. Making a proper plan for your dog, and practising that plan, is good preparation. The first step in being prepared for your dog is being prepared for yourself and your human family (for information on personal preparedness, visit getprepared. gc.ca/index-eng.aspx). Depending on the emergency, you may be required to evacuate, or you might have to shelter in place. Different preparations and supplies are needed for each situation. Regardless of the type of emergency, be sure to have identification for your dog with an out-of-town contact name and number so he can be reunited with you if he gets lost. As soon as you become aware of a disaster in your area, make sure your dog is indoors and easily accessible, and that you have emergency supplies and “grab and go” kits at hand (see page 100). In the event of evacuation, you will only have moments to leave, so everyone, including each dog in the household, needs a grab and go kit. Evacuate or stay home? People who have been evacuated from their homes are sent to reception centres where they register and obtain assistance with food, lodging, clothing, etc., if needed. Normally, reception centres only allow assistance animals; however, some communities organize separate pet reception centres to provide for evacuated animals. Check with your local government to learn what their planned response is for pets. To shelter in place, you need sufficient supplies for your family and pets to last a minimum of 72 hours, but preferably for one to two weeks. Depending on the extent of the situation, you may not get assistance for days. What to pack Storage: A large airtight, weatherproof container(s) on wheels in which to store supplies Basic necessities: Water, food, can opener, bowls, etc. Containment: Collars/leashes/harnesses, muzzles, crates/cages Sanitation: Poop bags, airtight containers for waste, cleaning supplies (paper towels/garbage bags/bleach) Medical: Pet first aid kit, medications, copy of veterinary records Comfort: Towels, bedding, grooming supplies, toys, Rescue Remedy, tarp Identification: Photos of dog alone, and of you with your dog (to prove ownership should your dog become lost), list of ID numbers (e.g., licenses, rabies, microchip, tattoos) Practice makes perfect Regardless of whether you evacuate or shelter in place, you need to practice your preparedness plan. Enact a mock disaster. Pick a time and disaster type, and run through your plan first as if everyone were home, then as if some family members are away. If you have more than one dog, someone in the family must be responsible for each one. Develop a check list to ensure everyone is accounted for and all necessary steps are completed. It is a good idea to do this mock drill exercise and test your procedures at least annually. What if you’re not home when an emergency occurs? Organize a buddy system with your neighbours so they will be able to get into your residence and rescue your dog. Give them a key and ensure they know where the grab and go kits are located and where your dog is likely to hide. Make a grab-and-go kit You may need to grab your kit quickly and it may be dark so store it in a central location, like a hall closet. Use easy to carry packs (a suitcase with wheels or a backpack) in case you need to evacuate your home. Here’s what to include: – Water – Two litres of water per person per day (Include small bottles that can be carried easily in case of an evacuation order) – Food – That won’t spoil, such as canned food, energy bars and dried foods (remember to replace the food and water once a year) -Manual can opener – Flashlight and batteries -Battery-powered or wind-up radio – Extra batteries – First aid kit – Special needs items – Prescription medications, infant formula or equipment for people with disabilities – Extra keys for your car and house -Cash – Include smaller bills, such as $10 bills (travellers cheques are also useful) and change for pay phones -Emergency plan – Include a copy of it and ensure it contains in-town and out-of-town contact information -Collar/harness and leash, or crate/cage (whatever is needed to safely evacuate the dog) – Basic necessities for 24 hours – Medications, a copy of veterinary records, and a bottle of Bach Rescue Remedy – Ziploc bag with small cloths or old clothing with your scent on it – A bio of your dog with his name, health/behaviour issues, likes/dislikes and personality traits in case he has to stay at a temporary emergency shelter without you – List of ID numbers (licenses, rabies, microchip, tattoos) – Photos of the dog alone, and with you Cheryl Rogers is one of the founders of CDART and is currently the National Coordinator, Mobile Support Coordinator and is one of their animal disaster response trainers. Resident in New Westminster, BC, Cheryl leads that city's emergency pet services team and chairs the Lower Mainland Emergency Pet Services working group. She has presented at Emergency Preparedness conferences and has sat on various government consultation panels. She has responded to disasters in Canada and the United States since 1999.
https://canadiandogs.com/emergency-prep-dog/
Our Ocean County Parks & Playgrounds series continues with a review of the William L. Butler Park known as Beach Haven Playground in Beach Haven, New Jersey. Pictures and details from Stanley H Tip Seaman County Park in Tuckerton as part of our series on Ocean County Parks & Playgrounds. Pictures and details from Cattus Island Park in Toms River as part of our series on Ocean County Parks & Playgrounds. Our series on Ocean County Parks & Playgrounds continues with a review of Jackson Jungle in Jackson, New Jersey. Pictures and details from Veteran’s Park in Bayville as part of our series on Ocean County parks and playgrounds. Details and pictures from Toms River Veterans Recreation Complex part of our series on Ocean County Parks & Playgrounds. Jersey Family Fun reviews Community Park, next in our series on Ocean County Parks & Playgrounds. Jersey Family Fun’s review of Koradigo Cove Pirate Park as part of our series on Ocean County Parks & Playgrounds. Jersey Family Fun reviews Windward Beach Park, next in our series on Ocean County Parks & Playgrounds. A review of Oak Avenue Park in our series on Ocean County Parks & Playgrounds.
https://www.jerseyfamilyfun.com/tag/ocean-county-playgrounds/
Below you will find a list of the florists in Upland, CA. These 71 florists are organized by their distance from Upland. The closest businesses to Upland are Suzann's Flowers on E. Arrow Hwy (Upland) and Tootsie Rose Flowers on E. Foothill Blvd (Upland) in the category Florist Retail and Upland Euclid Avenue Florist on N. Euclid Ave (Upland), Rosedale's Flowers & Gardens on E. Foothill Blvd (Upland) and Tutta Bella Florist on E. Foothill Blvd (Upland) in the category Florists. 1. california shops, shopping malls and districtsColonies Crossroads, Foothill (I-210) Freeway Ext. & Campus Ave, Upland CA Concord Park & Shop Center, Willow Pass Rd. & Market St., Concord CA ... Things to do in Upland CA Upland Hotels Upland Attractions Upland Shopping Upland Restaurants Upland Events Book Hotels in Upland CA Ontario Montclair Rancho Cucamonga Alta Loma San Antonio Heights Antique Stores Arts & Crafts Battery Stores Beer, Wine, & Liquor Bike Stores Boat Stores Bookstores Car Dealers Clothing Stores Collectibles Computer Stores Costume Shops Department Stores & Malls Discount & Used Stores Electronics Equipment Electronics Stores Gift Shops Groceries Hardware Health Food & Diet Hobby Stores Home Entertainment Home Stores Jewelry Motorcycles & Motorsports Music Stores Musical Instruments Nurseries & Garden Centers Pet Stores & Services Pharmacies Printing & Copying Shoe Stores Sporting Goods Toy & Game Stores Variety Stores Video Stores Beach Travel Planning Resources:
https://www.beachcalifornia.com/shca/florists/upland/
--- abstract: 'We give a computational complexity argument against the feasibility of quantum computers. We identify a very low complexity class of probability distributions described by noisy intermediate-scale quantum computers, and explain why it will allow neither good-quality quantum error-correction nor a demonstration of “quantum supremacy.” Some general principles governing the behavior of noisy quantum systems are derived. Our work supports the “physical Church thesis” studied by Pitowsky (1990) and follows his vision of using abstract ideas about computation to study the performance of actual physical computers.' author: - | [Gil Kalai]{}\ [The Hebrew University of Jerusalem and IDC, Herzliya]{}\ title: The Argument against Quantum Computers --- [*Dedicated to the memory of Itamar Pitowsky*]{} > My purpose in this paper is to examine, in a general way, the relations between abstract ideas about computation and the performance of actual physical computers. Itamar Pitowsky – [*The physical Church thesis and physical computational complexity*]{} 1990 Introduction ============ My purpose in this paper is to give an argument against the feasibility of quantum computers. In a nutshell, our argument is based on the following statement: > Noisy quantum systems will not allow building quantum error-correcting codes needed for quantum computation. To support this statement we study the relations between abstract ideas about computation and the performance of actual physical computers, which are referred to as noisy intermediate-scale quantum computers or NISQ computers for short. We need to explain why it is the case that quantum error-correcting codes are needed to gain the computational advantage of quantum computing, and we also need to explain why quantum error-correcting codes are out of reach. The crux of the matter lies in a parameter referred to as the rate of noise. We will explain why reducing the rate of noise to the level needed for good quantum error-correction will already enable NISQ computers to demonstrate “quantum supremacy.” We will also explain why NISQ computers represent a very low level computational complexity class which cannot support quantum supremacy. This provides a good, in-principle, argument for the infeasibility of both good quantum error-correcting codes and quantum supremacy. We will show where the argument breaks down for classical computation. Rudimentary classical error-correcting codes [*are supported*]{} by the low-level computational complexity class that describes NISQ computers. Pitowsky (1990) formulates and studies a strong form of the “physical” Church–Turing thesis (referred to later as the extended Church–Turing thesis (ECTT)) [^1], namely, > “whether we can invoke physical laws to reduce a computational problem that is manifestly or presumably of exponential complexity, and actually complete it in polynomial time.” and considers the then recently discovered model of quantum computers[^2] as a possible counterexample to this newly formulated physical Church–Turing thesis. Very strong support for “quantum supremacy” – the ability of quantum computers to perform certain tasks that classical computers cannot perform, – came four years after Pitowsky’s paper, with Peter Shor’s discovery (Shor 1994) that quantum computers can factor integers efficiently. Our argument, which is in agreement with quantum mechanics, supports the validity of the extended Church–Turing thesis but does not rely on this thesis. Our argument is based on computational complexity considerations and thus manifests the vision of Pitowsky of using abstract ideas about computation to draw conclusions on the performance of actual physical computers, and of integrating computational complexity into theories of nature. Our computational complexity considerations refer to very low-level computational classes and rely on definite mathematical theorems; they do not depend on the unproven conjectures underlying our view of the computational complexity world, such as the ${\bf P} \ne {\bf NP}$ conjecture. The novelty as well as a certain weakness of my argument is that it uses asymptotic insights (with unspecified constants) to draw conclusions on the behavior of small- and intermediate-scale systems and, in particular, on the value of constants that naively appear to reflect just engineering capabilities. The argument against quantum computers leads to various predictions on near-term experiments, and to general principles governing the behavior of noisy quantum systems. It may shed light on a variety of questions about quantum systems and computation. We emphasize that the argument predicts the failure of near-term experimental goals of many groups around the world to demonstrate on NISQ computers quantum supremacy and good-quality quantum error-correcting codes. In Section 2 we will consider basic models of computation and basic insights about computational complexity. Our argument against quantum computers is presented and discussed in Section 3, along with concrete predictions on near-term experimental efforts. The argument crucially relies on the study by Kalai and Kindler (2014) of noise stability and sensitivity for systems of non-interacting bosons. This study is built on the theory of noise stability and noise sensitivity of Boolean functions developed by Benjamini, Kalai, and Schramm (1999). Section 4 discusses underlying principles behind the failure of quantum computers and some consequences. Section 5 concludes and Section 6 is about Itamar. This paper complements, updates, and presents in nontechnical language some of my earlier works on the topic of quantum computers; see Kalai (2016, 2016b, 2018), and earlier papers cited there. Basic models of computation =========================== Pitowsky (1990) described three types of computers where each type is more restrictive than the previous one: “the Platonist computer,” “the constructivist computer,” and “the finitist computer.” We will consider versions of the last two types. Our definitions rely on the notion of Boolean circuits.[^3] Pitowsky’s “constructivist computer,” Boolean functions, and Boolean circuits ----------------------------------------------------------------------------- > The “constructivist computer” is just a (deterministic) Turing machine, and associated with this notion is the class of all Turing machine computable, i.e., recursive functions. Can a physical machine compute a non-recursive function? Itamar Pitowsky (1990) [**Model 1 – Computers (circuits):**]{} A computer (or circuit) has $n$ bits, and it can perform certain logical operations on them. The NOT gate, acting on a single bit, and the AND gate, acting on two bits, suffice for the full power of classical computing. The outcome of the computation is the value of certain $k$ output bits. When $k=1$ the circuit computes a [*Boolean function*]{}, namely, a function $f(x_1,x_2,\dots,x_n)$ of $n$ Boolean variables ($x_i=1$ or $x_i=0$) so that the value of $f$ is also $0$ or $1$. Easy and hard problems and Pitowsky’s “finitist computer” --------------------------------------------------------- > The “finitist computer,” is a deterministic, polynomial-time Turing machine (with a fixed finite number of tapes). Associated with this notion is the class of all functions which are computable in a number of steps bounded by a polynomial in the size of the input. As is well known, many important computational problems seem to lie outside the class [**P**]{}, typically the so-called [**NP**]{}-hard problem. Itamar Pitowsky (1990) While general circuits can compute arbitrary Boolean functions, matters change when we require that the size of the circuit be at most a polynomial in the number of input variables. Here the size of the circuits is the total number of gates. [**Model 2 – Polynomial size circuit:**]{} A circuit with $n$ input bits of size at most $A n^c$. Here $A$ and $c$ are positive constants. The complexity class [**P**]{} refers to problems that can be solved using a polynomial number of steps in the size of the input. The complexity class [**NP**]{} refers to problems whose solution can be verified in a polynomial number of steps. Our understanding of the computational complexity world depends on a whole array of conjectures: [**NP $\ne$ P**]{} is the most famous one. Many natural computational tasks are [**NP**]{}-complete. (A task in [**NP**]{} is [**NP**]{}-complete if a computer equipped with a subroutine for solving this task can solve, in a polynomial number of steps, [*every*]{} problem in [**NP**]{}.) Let me mention two fundamental examples of computational “easiness” and “hardness.” The first example is: multiplication is easy, factoring is hard![^4] Multiplying two $n$-digit numbers requires a simple algorithm with a number of steps that is quadratic in $n$. On the other hand, the best-known algorithm for factoring an $n$-digit number to its prime factors is (we think) exponential in $n^{1/3}$. ![The (conjectured) view of some main computational complexity classes. The red ellipse represents efficient quantum algorithms. Note the position of three important computational tasks: factoring, computing permanents, and boson sampling](fig0n) The second fundamental example of complexity theory is that “determinants are easy but permanents are hard.” Recall that the permanent of an $n$-by-$n$ matrix $M$ has a similar (but simpler) formula compared to the more famous determinant. The difference is that the signs are eliminated, and this difference accounts for a huge computational difference. Gaussian elimination gives a polynomial-time algorithm to compute determinants. By contrast, computing permanents is harder than solving [**NP**]{}-complete problems.[^5] Classical circuits equipped with random bits lead to randomized algorithms, which are both practically useful and theoretically important. [**Model 3 – Randomized circuit:**]{} A circuit with $n$ bits of input and with one additional type of gate that provides a random bit. Again we assume that the circuit is of size at most $A n^c$ (here, again, $A$ and $c$ are positive constants). This time the output is a sample from a probability distribution on strings of length $k$ of zeroes and ones.[^6] Quantum computers ----------------- We will now give a brief description (based on circuits) of quantum computers. [**Model 4 – Quantum computers:**]{} - A [*qubit*]{} is a piece of quantum memory. A qubit is a unit vector in $\mathbb C ^2$, and the state of a qubit is a unit vector in a two-dimensional complex Hilbert space $H = \mathbb C^2$. The memory of a quantum computer (quantum circuit) consists of $n$ qubits and the state of the computer is a unit vector in the $2^n$-dimensional Hilbert space, i.e., $\mathbb (C^2)^{\otimes n}$. - [*A Quantum gate*]{} is a unitary transformation. We can put one or two qubits through gates representing unitary transformations acting on the corresponding two- or four-dimensional Hilbert spaces. As for classical computers, there is a small list of gates that are sufficient for the full power of quantum computing. - [*Measurement*]{}: Measuring the state of $k$ qubits leads to a probability distribution on $0-1$ vectors of length $k$. Quantum computers allow sampling from probability distributions well beyond the capabilities of classical computers (with random bits). Shor’s famous algorithm shows that quantum computers can factor $n$-digit integers efficiently, in roughly $n^2$ steps! It is conjectured that quantum computers cannot solve [**NP**]{}-complete problems and this implies that they cannot compute permanents. For the notions of noisy quantum computers and for fault-tolerant quantum computation that we discuss next, it is necessary to allow measurement throughout the computation process and to be able to feed the measurement results back into later gates. Noisy quantum circuits ---------------------- Next we consider noise. Quantum systems are inherently noisy; we cannot accurately control them, and we cannot accurately describe them. In fact, every interaction of a quantum system with the outside world amounts to noise. [**Model 5 – Noisy quantum computers:**]{} A noisy quantum circuit has the property that every qubit is corrupted in every “computer cycle” with a small probability $t$, and every gate is $t$-imperfect. Here, $t$ is a small constant called the rate of noise. Here, in a “computer cycle” we allow several non-overlapping gates to perform in parallel. We do not specify the precise technical meaning of “corrupt” and “$t$-imperfect,” but the following intuitive explanation (for a restricted form of noise called depolarizing noise) could be useful. When a qubit is corrupted then its state is replaced by a uniformly distributed random state on the same Hilbert state. A gate is $t$-imperfect if with probability $t$ the state of the qubits that are involved in the gate is replaced by a uniformly random state in the associated Hilbert space. [**Theorem 1: “The threshold theorem.”**]{} If the error rate is small enough, noisy quantum circuits allow the full power of quantum computing. The threshold theorem was proved around 1995 by Aharonov and Ben-Or (1997), Kitaev (1997), and Knill, Laflamme, and Zurek (1998). The proof relies on quantum error-correcting codes first introduced by Shor (1995) and Steane (1996). A common interpretation of the threshold theorem is that it shows that large-scale quantum computers are possible in principle. A more careful interpretation is that if we can control noisy intermediate-scale quantum systems well enough, then we can build large-scale universal quantum computers. As we will see, there are good reasons for why we [*cannot*]{} control the quality of noisy intermediate-scale quantum systems well enough. Quantum supremacy and NISQ devices ---------------------------------- [**Model 6 – Noisy intermediate-scale quantum (NISQ) computers:**]{} These are simply noisy quantum circuits with at most 500 qubits. The number 500 sounds arbitrary but there is a reason to regard NISQ circuits and other NISQ devices as an important separate computation model: NISQ circuits are too small to apply quantum error-correction for quantum fault-tolerance, since a single good-quality “logical” qubit requires a quantum error-correcting code described by a NISQ circuit with more than a hundred qubits. A crucial theoretical and experimental challenge is to understand NISQ computers.[^7] Major near-future experimental efforts are aimed at demonstrating quantum supremacy using NISQ circuits and other NISQ devices, and are also aimed at using NISQ circuits to build high-quality quantum error-correcting codes. For concreteness we mention three major near-term experimental goals. 1. Demonstrate quantum supremacy via systems of non-interacting bosons. (See Section \[s:bs\].) 2. Demonstrate quantum supremacy on random circuits (namely, circuits that are based on randomly choosing the computation process, in advance), with 50–100 qubits. 3. Create distance-5 surface codes on NISQ circuits that require a little over 100 qubits. In our discussion we will refer to the task of demonstrating with good accuracy boson sampling for 10–20 bosons as [**baby goal 1**]{}, to the task of building with good accuracy random circuits with 10–30 qubits, as [**baby goal 2**]{}, and to the task of creating distance-3 surface codes on NISQ circuits that require a little over 20 qubits, as [**baby goal 3**]{}. The argument presented in the next section asserts that attempts to reach Goals 1-3 will fail, and the difficulties will be evident already in the baby goals. The argument against quantum computers {#s:a} ====================================== The argument ------------ In brief, the argument against quantum computers is based on a computational complexity argument for why NISQ computers cannot demonstrate quantum supremacy and cannot create the good-quality quantum error-correcting codes needed for quantum computation. We turn now to a detailed description of the argument, which is based on the following assertions on NISQ devices. - Probability distributions described (robustly) by NISQ devices can be described by low-degree polynomials (LDP). LDP-distributions represent a very low-level computational complexity class well inside bounded-depth (classical) computation. - Asymptotically low-level computational devices cannot lead to superior computation. - Achieving quantum supremacy is easier than achieving quantum error-correction. Concretely, we argue that Goals 1 and 2 both represent superior computation that cannot be reached by the low-level computational NISQ devices and that Goal 3 (creating distance-5 surface codes) is even harder than Goal 2. ![NISQ circuits are computationally very weak and therefore unlikely to create quantum error-correcting codes needed for quantum computers.](fig2n) We will discuss in Sections \[s:bs\] and \[s:qc\] our argument for assertion (A) based on the theory of noise sensitivity and noise stability, and, in particular, a detailed study of noisy systems of noninteracting bosons. It would be interesting to explore other theoretical arguments for (A). Assertion (B) requires special attention and it can be regarded as both a novel and a weak link of our argument. There is no dispute that we can apply asymptotic computational insights to the behavior of computing devices in the small and intermediate scale when we know or can estimate the constants involved. This is not the case here. The constants depend on (unknown) engineering abilities to control the noise. I claim that (even when the constants are unknown) the low-level asymptotic behavior implies or strongly suggests limitations on the computing power and hence on the engineering ability. Moreover, these limitations already apply for the intermediate scale, namely, for NISQ circuits, already when the number of qubits is rather small. In my view, this type of reasoning is behind many important successes regarding the interface between the theory of computing and the practice of computing.[^8] Several researchers disagree with this part of my analysis and find it unconvincing. There is substantial empirical evidence for (C) and experimentalists often refer to achieving quantum supremacy as a step toward achieving quantum error-correction. Quantum circuits are expected to exhibit probability distributions beyond the power of classical computers already for 70–100 qubits, while quantum error-correcting codes of the quality needed for quantum fault-tolerance will require at least 150–500 qubits. It will be interesting to conduct a further theoretical study of the hypothesis that the ability to build good-quality quantum error correction codes already leads to quantum systems that demonstrate quantum supremacy. There is good theoretical evidence for a weaker statement (C’). (Claims (A), (B), and (C’) already support a weaker form of the argument against quantum computers.) - High-quality quantum error-correcting codes are not supported by the very low-level computational power [**LDP**]{} of NISQ systems. Predictions on NISQ computers {#s:pred} ----------------------------- The quality of individual qubits and gates is the major factor for the quality of the quantum circuits built from them. One consequence of our argument is that there is an upper bound on the quality of qubits and gates, which is quite close, in fact, to what people can achieve today. This consequence seems counterintuitive to many researchers. As a matter of fact, the quantum-computing analogue of Moore’s law, known as “Schoelkopf’s law,” asserts, to the contrary, that roughly every three years, quantum decoherence can be delayed by a factor of ten. Our argument implies that Schoelkopf’s law will be broken before we reach the quality needed for quantum supremacy and quantum fault-tolerance. (Namely, now!)[^9] Our first prediction is thus that - The quality of qubits and gates cannot be improved beyond a certain threshold that is quite close to the best currently existing qubits and gates. This applies also to topological qubits (Section \[s:scope\]). Our argument leads to several further predictions on near-term experiments, for example, on distributions of 0-1 strings based on a random quantum circuit (Goal 2), or on circuits aimed at creating good-quality quantum error-correcting codes such as distance-5 and even distance-3 surface codes (Goal 3). - For a larger amount of noise, robust experimental outcomes are possible but they will represent probability distributions that can be expressed in terms of low-degree polynomials ([**LDP**]{}-distributions, for short) that are far away from the desired noiseless distributions. - For a wide range of smaller amounts of noise, the experimental outcomes will not be robust. This means that the resulting probability distributions will strongly depend on fine properties of the noise and hence the outcomes will be chaotic. In other words, in this range of noise rate the probability distributions are still far away from the desired noiseless distributions and, moreover, running the experiment twice will lead to very different probability distributions. Following predictions (b) and (c) we further expect that - The effort required to control $k$ qubits to allow good approximations of the desired distribution will increase exponentially with $k$ and will fail in a fairly small number of qubits. (My guess is that the number will be $\le 20$.) Non-interacting bosons {#s:bs} ---------------------- Caenorhabditis elegans (or C. elegans for short) is a species of a free-living roundworm whose biological study shed much light on more complicated organisms. Our next model, [*boson sampling*]{} can be seen as the C. elegans of quantum computing. It is both technically and conceptually simpler than the circuit model and yet it allows definite and clear-cut insights that extend to more general models and more complicated situations. [**Model 7 – Boson Sampling (Troyansky and Tishby 1996; Aaronson and Arkhipov 2013):**]{} Given a complex $n$-by-$m$ matrix $X$ with orthonormal rows, sample subsets of columns (with repetitions) according to the absolute value-squared of permanents. This task is referred to as boson sampling. Boson sampling represents a very limited form of quantum computers based on non-interacting bosons. (The number of bosons is $n$, and each boson can be in $m$ modes.) Quantum circuits can perform boson sampling efficiently on the nose! There is a good theoretical argument by Aaronson–Arkhipov (2013) that these tasks are beyond the reach of classical computers. If we consider non-interacting fermions rather than bosons, we obtain a similar sampling task, called fermion sampling, with determinants instead of permanents. This sampling task can be performed by a classical randomized computer (Model 3). [**Model 8 – Noisy boson sampling (Kalai and Kindler 2014):**]{} Let $G$ be a complex Gaussian $n$-by-$m$ noise matrix (normalized so that the expected row norm is 1). Given an input matrix $A$, we average the boson sampling distributions over $\sqrt{(1-t)}A + \sqrt t G.$ Here, $t$ is the rate of noise. To study noisy boson sampling we expand the outcome distribution in terms of Hermite polynomials in $nm$ variables which correspond to the entries of the input matrix $A$. The effect of the noise is exponential decay of high-degree terms and, as it turns out, the Hermite expansion for the boson sampling model is very simple and quite beautiful (much like the simplicity of the graph of synaptic connectivity of C. elegans). This analysis leads to the following theorems: [**Theorem 2 (Kalai and Kindler 2014):**]{} When the noise level is constant, distributions given by noisy boson sampling are well approximated by their low-degree Fourier–Hermite expansion. (Consequently, these distributions can be approximated by bounded-depth polynomial-size circuits.) [**Theorem 3 (Kalai and Kindler 2014):**]{} When the noise level is higher than $1/n$, noisy boson sampling is very sensitive to noise, with a vanishing correlation between the noisy distribution and the ideal distribution. Theorem 2 asserts that noisy intermediate-scale systems of non-interacting bosons are, for every fixed level of noise, “classical computing machines”; namely, they can be simulated by classical computers. We do not expect [*classical*]{} computing devices to exhibit quantum supremacy. In this case, the argument is especially strong in view of the very low-level computational class described by Theorem 2, as well as in view of Theorem 3 that asserts that in a wide range of subconstant levels of noise the experimental outcomes will be unrelated to the noiseless outcomes. Furthermore, Theorem 3 strongly suggests that in this wide range of subconstant noise levels, experimental outcomes will be chaotic; namely, the correlation between the outcomes of two different runs of the experiment will also tend to zero. ![The huge computational gap (left) between boson sampling (purple) and fermion sampling (green) vanishes in the noisy versions (right).[]{data-label="fig:3"}](fig3n) From boson sampling to NISQ circuits {#s:qc} ------------------------------------ The following open-ended mathematical conjecture is crucial to part (A) of our analysis, as well as to predictions (b)–(d) in Section \[s:pred\]. [**Conjecture 4:**]{} Theorems 2 and 3 both extend to all NISQ computers (in particular, to noisy quantum circuits) and to all realistic forms of noise. 1. When the noise level is constant, distributions given by NISQ systems are well approximated by their low-degree Fourier expansion. In particular, these distributions are very low-level computationally. 2. For a wide range of lower noise levels, NISQ systems are very sensitive to noise, with a vanishing correlation between the noisy distribution and the ideal distribution. In this range, the noisy distributions depend on fine parameters of the noise. Assertion (A) of our argument is supported by Conjecture 4(i). The conjecture asserts that, for every fixed level of noise, probability distributions described by NISQ circuits can be simulated by classical computers. As in the case of boson sampling, the argument is especially strong in view of the very low-level computational class described by Conjecture 4(i), and in view of Conjecture 4(ii) that asserts that in a wide range of subconstant levels of noise the experimental outcomes will be unrelated to the noiseless outcomes and, furthermore, the correlation between the outcomes of two different runs of the experiment will also tend to zero. One delicate conceptual aspect of the argument is that it is a multi-scale argument. The threshold theorem asserts that noisy quantum circuits for a small enough level of noise [*support*]{} universal computation! However, in the NISQ regime the situation is different and Conjecture 4(i) asserts that NISQ circuits are “classical” and of a very low level of computational complexity even in the classical computational kingdom. It follows that in the NISQ regime quantum supremacy (e.g., Goal 2) is out of reach, and high-quality quantum error-correction (e.g. Goal 3) is therefore out of reach as well. This behavior of NISQ circuits implies lower bounds on the rate of noise that show that, in larger scales, the threshold theorem is not relevant. Results by Gao and Duan (2018), and by Bremmer, Montanaro, and Shepherd (2017) give some support to Conjecture 4(i). The scope of the argument {#s:scope} ------------------------- NISQ computers account for most of the effort to create stable qubits via quantum error-correction, to demonstrate quantum supremacy, and to ultimately build universal quantum computers. We expect (Section \[s:Pns\]) that noise stability and the very low-level computational class LDP that we identified for noisy NISQ systems apply in greater generality. Specifically, it is plausible that the failure of NISQ computers to achieve stable logical qubits extends to systems, outside the NISQ regime, that do not apply quantum error-correction. It is plausible that Google’s attempts to build “surface codes” with quantum circuits of 50–1000 qubits will meet the same fate as Microsoft’s attempts to build a single surface-code qubit based on non-Abelian anyons. The microscopic quantum process for Microsoft’s attempts is not strictly in the NISQ regime, but it is plausible that it represents the same primitive computational power of noisy NISQ circuits. In brief, the extended argument against quantum computers is based on a paradox. On the one hand, you cannot achieve quantum supremacy without quantum error-correction. On the other hand, if you could build quantum error-correcting codes of the required quality then you could demonstrate quantum supremacy directly on smaller and simpler quantum systems that involve no quantum error-correction. To sum > Noisy quantum systems that refrain from using error correction represent a low-level computational ability that will not allow building quantum error-correcting codes needed for quantum computation. It is not easy to define quantum devices that “refrain from using error correction,” but this property holds for NISQ circuits that simply do not have enough qubits to use quantum error correction, and appears to hold for all known experimental processes aimed at building high quality physical qubits including toplogical qubits. What we see next is that the low level complexity class of NISQ circuits does allow building basic forms of classical error-correcting codes. Noise stability, noise sensitivity, and classical computation {#s:ns} ------------------------------------------------------------- The study of noisy boson sampling relies on a study of Benjamini, Kalai, and Schramm (1999) of noise stability and noise sensitivity of Boolean functions. See Kalai (2018) where both these theories and their connections to statistical physics, voting rules, and computation are discussed. A crucial mathematical aspect of the theory is that the noise has a simple description in terms of Fourier expansion: it reduces “high frequency” coefficients exponentially and, therefore, noise stability reflects “low frequency” (low-degree) Fourier expansion. The theory of noise stability and noise sensitivity posits a clear distinction between classical information and quantum information. The class [**LDP**]{} of probability distributions that can be approximated by low-degree polynomials does not support quantum supremacy and quantum error-correction but it still supports robust [*classical*]{} information, and with it also classical communication and computation. The (“majority”) Boolean function, defined by $f(x_1,x_2,\dots,x_n) = 1$ if more than half the variables have a value of 1, allows for very robust bits based on a large number of noisy bits or qubits and admits excellent low-degree approximations. It can be argued that [*every form*]{} of robust information, communication, and computation in nature is based on a rudimentary form of classical error-correction where information is encoded by repetition (or simple variants of repetition) and decoded by the majority function (or a simple variant of it). In addition to this rudimentary form of classical error-correction, we sometimes witness more sophisticated forms of classical error-correction. The extended Church–Turing thesis revisited ------------------------------------------- The extended Church–Turing thesis asserts (informally) that (ECTT) It is impossible to build computing devices that demonstrate computational supremacy. Here, computational supremacy is the ability to perform certain computations far beyond the power of digital computers. A [*classical computing device*]{} (or a [**P**]{}-device) is a computing device for which we can show or have good reason to believe that it can be modeled by polynomial-size Boolean circuits. We now formulate the weak extended Church–Turing thesis that reads (WECTT) It is impossible to build a [*classical*]{} computing device that demonstrates computational supremacy. WECTT seems almost tautological and it is in wide agreement. A popular example of an application of WECCT is to the human brain. As many argue, it is unlikely that quantum effects in the human brain lead to some sort of quantum computational supremacy. Another implication of WECCT is that the recent proposal by Johansson and Larsson (2017) to demonstrate Shor’s factoring algorithm on certain classical analog devices cannot be realistic. The argument given in this section asserts that for constant level of noise, NISQ devices are [**P**]{}-devices. Consequently, WECTT suffices to rule out quantum supremacy of NISQ devices. What makes this argument stronger is that we have good evidence that 1. Probability distributions described by NISQ devices for constant error rate are actually modeled by [**LDP**]{}, a computational class well below bounded-depth computation, which is well below [**P**]{}. 2. The outcomes of the computation process are chaotic for a wide range of subconstant levels of errors. We argue that NISQ devices are, in fact, low-level classical computing devices, and I regard it as strong evidence that engineers will not be able to reach the level of noise required for quantum supremacy. Others argue that the existence of low-level simulation (in the NISQ regime) for every fixed level of noise does not have any bearing on the engineering question of reducing the level of noise. These sharply different views will be tested in the next few years. In his comments on this paper, physicist and friend Aram Harrow wrote that my predictions are so sweeping that they say that hundreds of different research teams will all stop making progress. Indeed, my argument and predictions say that the goals of these groups (such as Goals 1–3 and other, more ambitious, goals) will not be achieved. Rather, if I am correct, these research teams will make important progress in our understanding of the inherent limitations of computation in nature, and the limitations of human ability to control quantum systems. Aram Harrow also wrote: “The Extended Church–Turing Thesis (ECTT) is a major conjecture, implicating the work of far more than quantum computing. Long before Shor’s algorithm it was observed that quantum systems are hard in practice to simulate because we do not know algorithms that beat the exponential scaling and work in all cases, or even all practical cases. Simulating the 3 or so quarks (and gluons) of a proton is at the edge of what current supercomputers can achieve despite decades of study, and going to larger nuclei (say atomic weight 6 or more) is still out of reach. If the extended Church–Turing thesis is actually true then there is a secret poly-time simulation scheme here that the lattice QCD community has overlooked. Ditto for chemistry where hundreds of millions of dollars are spent each year simulating molecules. Thus the ECTT is much stronger than just saying we cannot build quantum computers.” I agree with the spirit of Harrow’s comment, if not with the specifics, and the comment can serve as a nice transition to the next section that discusses a few underlying principles and consequences that follow from the failure of quantum computing. The failure of quantum computers: Underlying principles and consequences ======================================================================== In this section we will propose some general underlying principles for noisy quantum processes that follow from the failure of quantum computers. (For more, see Kalai 2016b and Kalai 2018.) Noise stability of low-entropy states ------------------------------------- Principle 1: Probability distributions described by low-entropy states are noise stable and can be expressed by low-degree polynomials. {#s:Pns .unnumbered} --------------------------------------------------------------------------------------------------------------------------------------- The situation for probability distributions described by NISQ systems appears to be as follows: noise causes the terms, in a certain Fourier-like expansion, to be reduced exponentially with the degree. Noise-stable states, namely, those states for which the effect of the noise is small, have probability distributions expressed by low-degree terms. Probability distributions realistically (and robustly) obtained by NISQ devices represent a very low-level computational complexity class, [**LDP**]{}, the class of probability distributions that can be approximated by low-degree polynomials. In the absence of quantum fault-tolerance this description extends to (low-entropy) quantum states that arbitrary quantum circuits and (other quantum devices) can reach. Noise stability and descriptions by low-degree polynomials might be relevant to some general aspects of quantum systems in nature. In the previous section we considered one such aspect: the feasibility of classical information and computation. The reason that our argument against quantum computation does not apply for classical computation is that noise stability still allows basic forms of classical error-correction. In fact, every form of robust information, communication, and computation in nature is based on some rudimentary form of classical error-correction that is supported by low-degree polynomials. We will consider two additional aspects: the possibility of efficiently learning quantum systems, and the ability of physical systems to reach ground states. Before we proceed I would like to make the following two remarks. The first remark is that the specific “Fourier-like expansion” required for the notions of noise stability and noise sensitivity is different for different situations. (The computational class [**LDP**]{} applies to all these situations.) An interesting direction for future research would be to extend the noise stability/noise sensitivity dichotomy and to find relevant Fourier-like expansions and definitions of noise for mathematical objects of high-energy physics. The second remark is that the study of noise stability is important in other scientific disciplines, and the assumption that systems are noise stable (aka “robust”) may provide useful information for studying them. Robustness is an important ingredient in the study of chemical and biological networks; see, e.g., Barkai and Leibler (1997). ### Learnability {#learnability .unnumbered} It is a simple and important insight of machine learning that the approximate value of a low-degree polynomial can efficiently be learned from examples. This offers an explanation for our ability to understand natural processes and the parameters defining them. Rudimentary physical processes with a higher entropy rate may represent simple extensions of the class of [**LDP**]{} for which efficient learnability is still possible, and this is an interesting topic for further research. ### Reaching ground states {#reaching-ground-states .unnumbered} Reaching ground states is computationally hard ([**NP**]{}-hard) for classical systems, and even harder for quantum systems. So how does nature reach ground states so often? The common answer relies on two ingredients: the first is that physical systems operate in positive temperature rather than zero temperature, and the second is that nature often reaches meta-stable states rather than ground states. However, these explanations are incomplete: we have good theoretical reasons to think that, for general processes in positive temperature, reaching meta-stable states is computationally intractable as well. First, for general quantum or classical systems, reaching a meta-stable state can be just as computationally hard as reaching a ground state. Second, one of the biggest breakthroughs in computational complexity, the “PCP theorem,” asserts (in physics language) that positive temperature offers no computational complexity relief for general (classical) systems. Quantum evolutions and states approximated by low-degree polynomials represent severe computational restrictions, and the results on the hardness of reaching ground states no longer apply. This may give a theoretical support to the natural phenomenon of easily reached ground states. ![Low-entropy quantum states give probability distributions described by low degree polynomials, and very low-entropy quantum states give chaotic behavior. Higher entropy enables classical information.[]{data-label="fig:4"}](entnn) Noise and time-dependent evolutions ----------------------------------- Principle 2: Time-dependent (local) quantum evolutions are inherently noisy. {#principle-2-time-dependent-local-quantum-evolutions-are-inherently-noisy. .unnumbered} ----------------------------------------------------------------------------- It is an interesting challenge to give a satisfactory mathematical description of what “time dependent” means. We proposed in Kalai (2016) to base a lower bound on the rate of noise on a measure of the non-commutativity of unitary operations. This measure of non-commutativity can also serve as an “internal” clock of the noisy quantum evolution. We also proposed in Kalai (2016) a restricted class of noisy evolutions called “smoothed Lindblad evolutions” defined via a certain smoothing operation that mathematically expresses the idea that in the absence of quantum error-correction, noise accumulates. An important consequence of Principle 2 is that there are inherent lower bounds on the quality of qubits, or, more concretely, a universal upper bound on the number of non-commuting Pauli operators you can apply to a qubit before it get destroyed. We note that lower bounds on the rate of noise in terms of a measure of non-commutativity arise also in Polterovich (2014) in the study of quantizations in symplectic geometry. Noise and correlation --------------------- Principle 3: Entangled qubits are subject to positively correlated noise. {#principle-3-entangled-qubits-are-subject-to-positively-correlated-noise. .unnumbered} ------------------------------------------------------------------------- Entanglement, the quantum analog of correlations, is a notion of great importance in quantum physics and in quantum computing, and the famous [*cat state*]{} ${\frac{1}{\sqrt 2}}\left|00\right\rangle +{\frac{1}{\sqrt 2}} \left|11\right\rangle$ represents the simplest example of entanglement and the strongest form of entanglement between two qubits. Principle 3 asserts that the errors for the two qubits of a cat state necessarily have large positive correlation. This is an observed and accepted phenomenon for gated qubits and without quantum error-correction it is inherited to all pairs of entangled qubits. [*Error synchronization*]{} refers to a substantial probability that a large number of qubits, much beyond the average rate of noise, are corrupted. An important consequence of Principle 3 is that complicated states and evolutions lead to error-synchronization. Principle 3 leads to additional predictions about NISQ systems that can be tested for current experiments. - Every pair of gated qubits will be subject to errors with large positive correlation. - Every pair of qubits in a cat state will be subject to errors with large positive correlation. - All experimental attempts to achieve Goals 2 and 3 will lead to a strong effect of error-synchronization. We emphasize that our argument against quantum computers in Section \[s:a\] does not depend on Principle 3 and, moreover, the main trouble with quantum computers is that the noise rate of qubits and gates cannot be reduced toward the threshold for fault-tolerance. Correlation is part of this picture since, as is well known, the value of the threshold becomes smaller when there is a larger positive correlation for 2-qubit gated errors. We note (Kalai 2016) that Prediction (f) implies that the quality of logical qubits via quantum error-correction is limited by the quality of gates. See also Chubb and Flammia (2018) for an interesting analysis of the effect of correlated errors on surface codes. A reader may question how it is possible that entangled states will experience correlated noise, even long after they have been created and even if the constituent particles are far apart and not directly interacting. We emphasize that Principle 3 does not reflect any form of “non local” noise and that no “additional” correlated noise on far apart entangled qubits is ever assumed or conjectured. Principle 3 simply reflects two facts. The first fact is that errors for gated qubits are positively correlated from the time of creation. The second fact is that unless the error rate is small enough to allow quantum error-correction (and this may be precluded by the argument of the previous section), cat states created indirectly via a sequence of computational steps will inherit errors with large positive correlation. [**Remark:**]{} Error-synchronization is related to an interesting possibility (Kalai 2016b) that may challenge conventional wisdom and can also be checked for near term NISQ (and other) experiments. A central property of Hamiltonian models of noise in the study of quantum fault-tolerance (see, e.g., Preskill 2013), is that error fluctuations are sub-Gaussian. Namely, when there are $N$ qubits, the standard deviation for the number of qubit errors behaves like $\sqrt N$ and the probability of more than $t \sqrt N$ errors decays as it does for Gaussian distribution. Many other models in mathematical physics have a similar property. However, it is possible that fluctuations for the total amount of errors for noisy quantum circuits and other quantum systems with interactions are actually super-Gaussian and perhaps even linear. A taste of other consequences ----------------------------- The failure of quantum computers and the infeasibility of high-quality quantum error-correction have several others far-reaching consequences imposing severe restrictions of humans’ and nature’s ability to control quantum states and evolutions. Following the tradition of using cats for quantum thought experiments, consider an ordinary living cat. If quantum computation is not possible, it will be impossible to teleport the cat; it will be impossible to reverse time in the life of the cat; it will be impossible to implement the cat on a very different geometry; it will be impossible to superpose the lives of two distinct cats; and, finally, even if we place the cat in an isolated and monitored environment, the life of this cat cannot be predicted. These restrictions will already be in place when our “cat” represents realistic (but involved) quantum evolutions described by quantum circuits in the small scale, namely, with less than 50 qubits (baby goals 1–3 can serve as good candidates for such “cats”). See Kalai (2016b) for a detailed discussion. ![ Human imagination allows for a cat with an unusual geometry. Drawing by Netta Kasher (a tribute to Louis Wain)[]{data-label="fig:cat"}](cat6) Conclusion ========== > The intrinsic study of computation transcends human-made artifacts, and its expanding connections and interactions with all sciences, integrating computational modeling, algorithms, and complexity into theories of nature and society, marks a new scientific revolution! Avi Wigderson – [*Mathematics and Computation*]{} 2019. Understanding noisy quantum systems and potentially even the failure of quantum computers is related to the fascinating mathematical theory of noise stability and noise sensitivity and its connections to the theory of computing. Our study shows how insights from the computational complexity of very low-level computational classes support the extended Church–Turing thesis. Exploring this avenue may have important implications for various areas of quantum physics. These connections between mathematics, computation, and physics are characterized by a rich array of conceptual and technical methods and points of view. In this study, we witness a delightfully thin gap between fundamental and philosophical issues on the one hand and practical and engineering aspects on the other. Itamar {#s:ita} ====== This paper is devoted to the memory of Itamar Pitowsky. Itamar was great. He was great in science and great in the humanities. He could think and work like a mathematician, and like a physicist, and like a philosopher, and like a philosopher of science, and probably in various additional ways. And he enjoyed the academic business greatly, and took it seriously, with humor. Itamar had an immense human wisdom and a modest, level-headed way of expressing it. Itamar’s scientific path interlaced with mine in many ways. Itamar made important contributions to the foundations of the theory of computation, probability theory, and quantum mechanics, all related to some of my own scientific endeavors and to this paper. Itamar’s approach to the foundation of quantum mechanics was that quantum mechanics is a theory of non-commutative probability that (like classical probability) can be seen as a mathematical language for the other laws of physics. (My work, to a large extent, adopts this point of view. But, frankly, I do not quite understand the other points of view.) ![Itamar Pitowsky around 1985[]{data-label="fig:6"}](Itamarn) In the late ‘70s when Itamar and I were both graduate students I remember him enthusiastically sharing his thoughts on the Erdős–Turán problem with me. This is a mathematical conjecture that asserts that if we have a sequence of integers $0<a_1<a_2< \cdots < a_n< \cdots$ such that the infinite series $\sum \frac {1}{a_n}$ diverges then we can find among the elements of the sequence an arithmetic progression of length $k$, for every $k$. Over the years both of us spent some time on this conjecture without much to show for it. This famous conjecture is still open even for $k=3$. Some years later both Itamar and I became interested, for entirely different reasons, in remarkable geometric objects called cut polytopes. Cut polytopes are obtained by taking the convex hull of characteristic vectors of edges in all cuts of a graph. Cut polytopes arise naturally when you try to understand correlations in probability theory and Itamar wrote several fundamental papers studying them; see Pitowsky (1991). Cut polytopes came into play, in an unexpected way, in the work of Jeff Kahn and myself where we disproved Borsuk’s conjecture (Kahn and Kalai 1993). Over the years, Itamar and I became interested in Arrow’s impossibility theorem (Arrow 1950), which Itamar regarded as a major 20th-century intellectual achievement. He gave a course centered around this theorem and years later so did I. The study of the noise stability and noise sensitivity of Boolean functions has close ties to Arrow’s theorem. The role of skepticism in science and how (and if) skepticism should be practiced is a fascinating issue. It is, of course, related to this paper that describes skepticism over quantum supremacy and quantum fault-tolerance, widely believed to be possible. Itamar and I had long discussions about skepticism in science, and about the nature and practice of scientific debates, both in general and in various specific cases. This common interest was well suited to the Center for the Study of Rationality at the Hebrew University that we were both members of, where we and other friends enjoyed many discussions, and, at times, heated debates. A week before Itamar passed away, Itamar, Oron Shagrir, and I sat at our little CS cafeteria and talked about probability. Where does probability come from? What does probability mean? Does it just represent human uncertainty? Is it just an emerging mathematical concept that is convenient for modeling? Do matters change when we move from classical to quantum mechanics? When we move to quantum physics the notion of probability itself changes for sure, but is there a change in the interpretation of what probability is? A few people passed by and listened, and it felt like this was a direct continuation of conversations we had had while we (Itamar and I; Oron is much younger) were students in the early ‘70s. This was to be our last meeting. Acknowledgement {#acknowledgement .unnumbered} --------------- Work supported by ERC advanced grants 320924, & 834735, NSF grant DMS-1300120, and BSF grant 2006066. The author thanks Yuri Gurevich, Aram Harrow, and Greg Kuperberg for helpful comments, and Netta Kasher for drawing Figures 1–5. [99]{} [AarArk13]{} S. Aaronson and A. Arkhipov, The computational complexity of linear optics, [*Theory of Computing*]{} 4 (2013), 143–252. D. Aharonov and M. Ben-Or, Fault-tolerant quantum computation with constant error, STOC ’97, ACM, New York, 1999, pp. 176–188. K. Arrow, A difficulty in the theory of social welfare, [*Journal of Political Economy*]{} 58 (1950) , 328–346. N. Barkai, and S. Leibler. Robustness in simple biochemical networks, [*Nature,*]{} 387 (1997), 913. I. Benjamini, G. Kalai, and O. Schramm, Noise sensitivity of Boolean functions and applications to percolation, 90 (1999), 5–43. M. J. Bremner, A. Montanaro, and D. J. Shepherd, Achieving quantum supremacy with sparse and noisy commuting quantum computations, [*Quantum*]{} 1, 8 (2017). C. T. Chubb and S. T. Flammia, Statistical mechanical models for quantum codes with correlated noise, arXiv:1809.10704. D. Deutsch, Quantum theory, the Church–Turing principle and the universal quantum computer, [*Proceedings of the Royal Society of London A*]{} 400 (1985), 96–117. R. P. Feynman, Simulating physics with computers, [*International Journal of Theoretical Physics*]{} 21 (1982), 467–488. X. Gao and L. Duan, Efficient classical simulation of noisy quantum computation, arXiv:1810.03176. N. Johansson and J.-A. Larsson, Realization of Shor’s algorithm at room temperature, arXive:1706.03215. J. Kahn and G. Kalai, A counterexample to Borsuk’s conjecture, [*Bulletin of the American Mathematical Society*]{} 29 (1993), 60–62. G. Kalai, The quantum computer puzzle, [*Notices of the American Mathematical Society*]{} 63 (2016), 508–516. G. Kalai, The quantum computer puzzle (expanded version), arXiv:1605.00992. G. Kalai, Three puzzles on mathematics, computation and games, [*Proceedings of the International Congress of Mathematicians*]{} 2018, Rio de Janeiro, Vol. I, pp. 551–606. G. Kalai and G. Kindler, Gaussian noise sensitivity and BosonSampling, arXiv:1409.3093. A. Y. Kitaev, Quantum error correction with imperfect gates, in [*Quantum Communication, Computing, and Measurement* ]{}, Plenum Press, New York, 1997, pp. 181–188. E. Knill, R. Laflamme, and W. H. Zurek, Resilient quantum computation: Error models and thresholds, [*Proceedings of the Royal Society of London A* ]{}[454]{} (1998), 365–384. B. D. McKay and S. P. Radziszowski, R(4,5)=25, [*Journal of Graph Theory*]{} 19 (1995), 309–322. I. Pitowsky, The physical Church thesis and physical computational complexity, [*lyuun, A Jerusalem Philosophical Quarterly*]{} 39 (1990), 81–99. I. Pitowsky, Correlation polytopes: Their geometry and complexity, [*Mathematical Programming*]{} A50 (1991), 395–414. L. Polterovich, Symplectic geometry of quantum noise, [*Communications in Mathematical Physics*]{} 327 (2014), 481–519. J. Preskill, Quantum computing: Pro and con, [*Proceedings of the Royal Society of London A*]{} 454 (1998), 469–486. J. Preskill, Sufficient condition on noise correlations for scalable quantum computing, [*Quantum Information and Computing*]{} 13 (2013), 181–194. P. W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, [*SIAM Rev.*]{} 41 (1999), 303–332. (Earlier version, [*Proceedings of the 35th Annual Symposium on Foundations of Computer Science*]{}, 1994.) P. W. Shor, Scheme for reducing decoherence in quantum computer memory, [*Physical Review A*]{} 52 (1995), 2493–2496. A. M. Steane, Error-correcting codes in quantum theory, [*Physical Review Letters*]{} 77 (1996), 793–797. L. Troyansky and N. Tishby, Permanent uncertainty: On the quantum evaluation of the determinant and the permanent of a matrix, in [*Proceedings of the 4th Workshop on Physics and Computation*]{}, 1996. A. Wigderson, [*Mathematics and Computation,*]{} Princeton University Press, 2019. S. Wolfram, Undecidability and intractability in theoretical physics, [*Physical Review Letters*]{} 54 (1985), 735–738. [^1]: Pitowsky’s paper attributes the physical Church–Turing thesis to Wolfram (1985). [^2]: Quantum computers were proposed by Feynman (1982), Deutsch (1985), and others. The idea can be traced to Feynman’s 1959 visionary lecture, “There is Plenty of Room at the Bottom.” [^3]: The precise relation between the Turing machine model (considered in Pitowsky 1990) and the circuit model is interesting and subtle but we will not discuss it in this paper. [^4]: Factoring belongs to [**NP**]{} $\cap$ [**coNP**]{} and therefore, according to the basic conjectural view of computational complexity, it is not an [**NP**]{}-complete problem. The hardness of factoring is a separate important computational complexity conjecture. [^5]: The hardness of computing permanents defines an important computational class [**\#P**]{} (in words, number-P or sharp-P) that is larger than [**PH**]{} (the entire “polynomial hierarchy”). [^6]: For simplicity, we use in this paper the term [**P**]{} (rather than [**BPP**]{}) to describe the computational power of polynomial-time computers (and polynomial-size circuits) with randomization. We also use the term [**Q**]{} rather than [**BQP**]{} (for decision problems) and [**Quantum Sampling**]{} (for sampling problems) to describe the computational power of polynomial-time quantum computers (and polynomial-size quantum circuits). [^7]: John Preskill coined the terms “quantum supremacy” (in 2012) and “NISQ systems” (in 2018). Implicitly, these notions already play a role in Preskill (1998). The importance of multi-scale analysis of the quantum computer puzzle is emphasized in Kalai (2016). [^8]: A nice example concerns the computation of the Ramsey number $R(k,r)$, which is the smallest integer $n$ such that in every party with $n$ participants you can find either a set of $k$ participants where every two shook hands, or a set of $r$ participants where no two shook hands. This is an example where asymptotic computational complexity insights into the large-scale behavior (namely, when $k$ and $r$ tend to infinity) explain the small-scale behavior (namely, when $k$ and $r$ are small integers). It is easy to verify that $R(3,3)=6$, and it was possible with huge computational efforts (and human ingenuity) to compute the Ramsey number $R(4,5)=25$ (McKay and Radziszowski 1995). It is commonly believed that computing $R(7,7)$ and certainly $R(10,10)$ is and will remain well beyond our computational ability. Building gates that are two orders of magnitude better than the best currently existing gates can be seen as analogous to computing $R(10,10)$: we have good computational complexity arguments that both these tasks are beyond reach. [^9]: Schoelkopf’s law was formulated by Rob Schoelkopf’s colleagues based on Schoelkopf’s experimental breakthroughs, and only later was adopted as a prediction for the future. An even bolder related prediction by Neven asserts that quantum computers are gaining computational power relative to classical ones at a “doubly exponential” rate. Our argument implies that Neven’s law does not reflect reality.
Dark matter is one of the least understood aspects in physics. The evidence for dark matter is from its gravitational influence on galactic scales which cannot be explained by the presence of conventional matter. Despite its large gravitational interactions, it is notoriously difficult to learn about dark matter as it does not interact with electromagnetic fields, hence the name of “dark” matter. But just because it is difficult to get it to interact with anything on the electromagnetic spectrum does not mean it is impossible to detect other feeble interactions it may have. A team of theoretical physicists from Caltech have recently proposed a novel type of experiment that may just hold the key to understanding dark matter with specific types of interactions. The team is headed by Dr. Kathryn Zurek, a specialist in dark matter physics, who has been actively working on methods to directly detect dark matter for most of her career. One current research path the group has been pursuing is using a special kind of collective excitation known as a magnon. Remove All Ads on Universe Today Join our Patreon for as little as $3! Get the ad-free experience for life Magnons only arise in crystal lattice structures, and specifically only in those that exhibit “magnetic order”. Magnons can be thought of as the collective action of electron spins in a crystal structure. In specific types of crystals, these electron spins spontaneously line up to form patterns (known as a magnetic order) and begin to act interdependently, leading to what in solid state physics is known as a magnon. Tanner Trickle, a graduate student in Dr. Zurek’s group and co-author on the paper detailing the experiment, describes the way magnons form in a crystal lattice as akin to a wave in the ocean. A wave’s motion is due to the oscillations of its constituents, the water molecules, just as a magnons motion is due to the oscillations of the electron spins in the crystal. In the paper, the Caltech physicists suggest using yttrium iron garnet (or YIG for short) to search for magnon signals produced by passing dark matter particles. According to Mr. Trickle, there’s a two-fold reason for this choice. First, the physical properties of YIG are well understood, so modeling what might happen when dark matter interacts with the crystal to create a magnon is easier to predict. In addition, YIG itself is relatively inexpensive, as it is widely used in a number of electromagnetic applications, including current state of the art dark matter research. For now, the experiment is only described in theory. Dr. Zhengkang Zhang, a postdoc and another co-author on the paper, mentions that it could take years, or even decades, to build these experiments and start to take data. Such a long timeline is primarily due to the challenges of measurement, especially two problems in particular. The first is the sensitivity of the measurement. Everything from defects in the crystal lattice structure of the YIG to passing cosmic rays can impact any measurements on the experiment. This is primarily why current dark matter experiments, such as XENON1T, are located far underground, in order to isolate any potential noise-inducing interference. The second is how to actually detect the magnon itself that is produced by dark matter interactions. Sensors for monitoring these kinds of interactions are currently sorely lacking. There is some probability that a magnon might decay into what is known as a phonon, which, in particle physics terms, can be thought of as heat, and can be detected using an ultra-sensitive “thermometer”. However, the team is hoping to explore experimental options that use more novel ways to detect magnon interaction, and particularly the interaction of a single magnon. The Zurek group works very closely in the space between theory and experiment, and has already started reaching out to potential contacts about how exactly to implement the theorized experiment. However, if and when it does eventually get built, it will probably be built many more times than just once. That is because the two main advantages of this theorized way of using magnons to detect dark matter are the fact that it is both inexpensive and flexible. As mentioned above, YIG, the primary material used in the experiment is relatively inexpensive, and not much of it is needed to complete an experiment, therefore it can be run on a bench top rather than in a large particle collider or deep underground. The sensitivity of the instruments, and any potential denoising equipment, are likely to be the most expensive part of any experimental setup, and can potentially be reproduced relatively easily once first developed. They might have to be reproduced because the experiment itself can be set up in myriad different ways. Many potential changes would allow the experiment to test many different types of theories regarding the interaction of dark matter. There are also many different crystal materials that can host magnons, which may lead to other potential interactions that chip away at some of dark matter’s mystery. Understanding part of that mystery is really what the proposed experiment is trying to do. There is still so little known about dark matter that there is the potential for a fundamental breakthrough in understanding if an experiment can definitively prove that dark matter does primarily interaction through magnons, or some other types of collective excitation. Understanding and manipulating these relatively little understood phenomena might begin to describe some of the “Hidden World” that dark matter hints at. And while an actual experimental build might be years away, the way science, and especially theoretical physics, advances is through the collection of ideas. Maybe the fact that this type of experiment is relatively inexpensive can attract the right kind of funding to allow the theory to be put into practice. But until that happens, physicists will have to continue to chip away at understanding dark matter with whatever tools are available to them. Learn More:
https://www.universetoday.com/146880/a-tabletop-sized-experiment-could-help-in-the-search-for-dark-matter/
What is Poseidon’s symbol? What does Poseidon’s Trident Represent? … For Poseidon, the trident is the epitome of his control over the sea and its creatures, showing that he has the ability to catch them whenever he wants, without fail. In mythology, his trident was created by the three cyclopes and given to him once appointed as god of the sea. What are Poseidon’s three symbols? Poseidon - God of: The sea, earthquakes, and horses. - Symbols: Trident, dolphin, horse, bull, and fish. - Parents: Cronus and Rhea. - Children: Orion, Triton, Theseus, and Polyphemus. - Spouse: Amphitrite. - Abode: Mount Olympus and the ocean. - Roman name: Neptune. … - How was Poseidon usually pictured? Why is a bull Poseidon’s symbol? Poseidon Symbols The symbol of the bull is associated with the god due to the mythology of the Cretan Bull that he sent to King Minos. Is seaweed the symbol for Poseidon? Perhaps more than any other god of the pantheon of Olympians, Poseidon had one unique and consistent symbol. … As a sea god, Poseidon was often shown with the features and creatures of his domain as well. His retinue often included dolphins and fish and he was sometimes surrounded by shells or seaweed. Who was the ugliest god? Facts about Hephaestus Hephaestus was the only ugly god among perfectly beautiful immortals. Hephaestus was born deformed and was cast out of heaven by one or both of his parents when they noticed that he was imperfect. He was the workman of the immortals: he made their dwellings, furnishings, and weapons. What is Zeus the god of? Zeus is the god of the sky in ancient Greek mythology. As the chief Greek deity, Zeus is considered the ruler, protector, and father of all gods and humans. Zeus is often depicted as an older man with a beard and is represented by symbols such as the lightning bolt and the eagle. What was Poseidon’s weakness? Poseidon’s strengths: He is a creative god, designing all the creatures of the sea. He can control waves and ocean conditions. Poseidon’s weaknesses: Warlike, though not so much as Ares; moody and unpredictable. Spouse: Amphitrite, a sea goddess. What is Poseidon’s personality? Poseidon had a very violent character, Impulsive and hot-blooded, he couldn’t put up with Zeus’ arrogant behavior as a ruler. So, he teamed up with Hera and Athena to teach him a lesson. However, with the help of Thetis and Briareus, Zeus overpowered his challengers.
https://heraldry-society.com/logo/question-what-was-poseidons-symbol-and-why.html
No. 6 Sac State football team shut down by No. 3 Weber State in 36-17 loss Quarterback Kevin Thomson left the game with an injury in the second quarter Back to Article Back to Article No. 6 Sac State football team shut down by No. 3 Weber State in 36-17 loss Sac State junior quarterback Kevin Thomson prepares for a throw Saturday, Oct. 2 against Weber State at Hornet Field. Thomson had a total of 144 passing yards before leaving the game in the second quarter due to an injury. Sac State junior quarterback Kevin Thomson prepares for a throw Saturday, Oct. 2 against Weber State at Hornet Field. Thomson had a total of 144 passing yards before leaving the game in the second quarter due to an injury. Sac State junior quarterback Kevin Thomson prepares for a throw Saturday, Oct. 2 against Weber State at Hornet Field. Thomson had a total of 144 passing yards before leaving the game in the second quarter due to an injury. Hang on for a minute...we're trying to find some more stories you might like. Email This Story Send email to this address Enter Your Name Add a comment here Verification Sacramento State’s football team couldn’t find a way through Weber State’s defense at home on Saturday night and suffered its first conference defeat of the season, 36-17. The Hornets entered the game ranked at No. 6 in the Coaches and STATS Poll following its 38-14 win over California Polytechnic State University last week. Weber State was ranked No. 3 in both polls after a 36-20 win versus University of California, Davis. Weber State got the ball to start the game after Sac State won the toss and deferred. The Wildcats utilised the ground-and-pound technique on its opening drive, running eight times before quarterback Jake Constantine found Hayden Meacham for a three yard touchdown pass. The Hornets responded by driving down to the 24 yard line before settling for a 42 yard field goal from Devon Medeiros. A short drive for the Wildcats ended in a punt, downed on the Hornets two yard line. Deep in their own territory quarterback Kevin Thomson was sacked on a third down and fumbled. The ball was recovered in the endzone by Sac State offensive linemen Troy Stiefel for a Wildcats safety. The Hornets trailed at the end of the first quarter, 9-3. Weber State came out swinging in the second quarter with Constantine finding Ty Macpherson for a 59 yard touchdown pass, pushing the lead to 16-3. Sac State finally found the endzone with 10 minutes left in the half when Thomson connected with Marshel Martin from 31 yards out, cutting the lead to 16-10. Weber State then embarked on a 10 play, five minute drive, ending in a one yard touchdown run from Kris Jackson. Things got worse for the Hornets as Thomson was injured late in the quarter after being hit while throwing. He was replaced by sophomore Jake Dunniway who was picked off in the endzone by Ja’Kobe Harris. The Wildcats couldn’t score with the minimal time left on the clock and took a 23-10 lead into halftime. The normally potent running game for Sac State was pacified in the first half, only recording 44 yards on 15 attempts. The team only had one third down conversion in seven attempts. Defensive back Marcus Bruce said that the defense had to pick itself up at halftime in order to combat Weber State’s offense. “They had a really good offense. We had to go in at half time, we kinda came in and just sat there and looked at each other, everybody in the eye. And we were just like, man, we gotta get it together,” Bruce said. “We’re not playing the game that we’re supposed to play. We play fast and we attack and today, it just kind of wasn’t attacking all times.” Halftime didn’t do any wonders for Sac State as Dunniway was picked off by Harris on the first play of the second half, which Weber State converted into a two yard touchdown run by Jackson. Sac State junior quarterback Kevin Thomson hands the ball off to junior running back Elijah Dotson Saturday, Oct. 2, against Weber State at Hornet Stadium. Dotson had a total of 35 yards rushing in the loss. Neither team could do much with the ball in the third quarter and combined for six consecutive punts with the Wildcats retaining their 29-10 lead going into the fourth quarter. The Hornets had a chance to put points on the board early in the fourth, but turned the ball over on downs after Dunniway overthrew his man on fourth down. The Wildcats found the endzone again courtesy of a 24 yard touchdown run by Josh Davis. Sac State got a late consolation score as Pierre Williams caught a 58 yard touchdown, giving Dunniway his first career touchdown pass as a Hornet. This was the last score of the game however as Weber State claimed a dominant 36-17 win. Hornets coach Troy Taylor said that the the Wildcats prevented the team from getting into its natural rhythm. “We never quite got in sync,” Taylor said. “We did some good things, but you know, you gotta give them credit for that. They’re the ones that kept us from getting in sync. It hasn’t really happened in a while, so they did a great job in that.” Taylor says that the team needs to “lick our wounds and then get ready for Northern Arizona” following their first conference loss at the hands of Weber State. @SH_Sportspic.twitter.com/Kybh5InlBA Taylor didn’t have any update regarding Thomson’s condition following the game, but should he be out long term, Dunniway says that he is ready to start in his place. “We prepare everyday like you’re the guy,” Dunniway said. “So, we pray that Kevin recovers and he’s going to be okay, but every day at practice, I strive to push him to make him better. Make me better. For the unfortunate situation that, if he does go down that, you know, we don’t skip a beat on offense.” With the loss, the Hornets fall to 6-3 on the season and are now tied with Montana for second in the Big Sky. Sac State holds the tiebreaker thanks to its win over the Grizzlies two weeks ago. Taylor said that the team will not sulk after the loss, but move forward to the next game like they do when they win. “From here, we just got to respond,” Taylor said. “It’s no fun to lose but you gotta be able to bounce back and we’re going to treat it the same way when we wake up tomorrow, lick our wounds and then get ready for Northern Arizona.” The Hornets will travel to face Northern Arizona at the Walkup Skydome on Saturday at 2 p.m.
While launching CS: GO on your PC, you might have come across the error message “VAC was unable to verify your game session.” This is not a major error in, but it is pretty common among the players. This error is caused by VAC (Valve’s Anti-Cheat) software when it deems that your account has violated Valve’s terms and conditions. But you might also see this error due to some server error or if you’ve recently made changes to your game files. How to Fix “VAC was unable to verify your game session” Error First things first, you need to make sure that your account is not banned due to the use of third-party hacking software or scripts. If you’re caught using these software, you can kiss your account goodbye. However, if you think you’re seeing this error by mistake, you can try these methods to fix it. Verify CS: GO Game Files Integrity Sometimes when you update the game, there might be some corrupted files. Or, you might have accidentally deleted some files while you were browsing File Explorer. Whatever the case, it can cause serious issues in your game when something like that happens. Verifying integrity of game files ensures that there are no faulty files or missing files in the game’s directory. To verify your game files integrity: - Launch Steam on your PC. - Click on the Library tab to open your Steam Library. - Locate CS: GO from the list of your games. - Right-click on it and select Properties. - Now, click on the Local Files tab. - From the list of options, click on the Verify Integrity of Game Files option to verify your game files. You might need to wait for a while for this process to be completed. After it is completed, restart your PC and try to launch CS: GO again. You should be able to play the game normally now. However, if the problem persists, you can try other methods mentioned below. Close Steam and Relaunch It as Administrator Your apps start to misbehave when they don’t get the permissions they need. So to make sure they get all the permissions they need, launching them as administrator is the best choice. Launching Steam as an administrator usually fixes this issue. To force close Steam: - Right-click on the taskbar and select Task Manager. - Under the Processes tab, locate all the processes related to Steam and close their task by selecting them one by one and clicking on the End Task button. To launch Steam as Administrator: - Open the Start menu by pressing the Windows key on your keyboard. - Type steamin the search bar. - You should be able to see the list of options along with the Steam logo. Click on Run as administrator and click Yes in the pop-up window. Now, try to launch CS: GO and see if the problem is gone. If the problem still persists, you can move on to other methods. Restart Your Windows In times of any issues or problems, restarting your Windows can be a life-saving option. Restarting Windows fixes many glitches caused by programs, and surprisingly it seems to fix this particular issue as well. Log out from Steam and Re Login Again Relogging in fixes some glitches and errors you’re having with Steam. To try this method: - Launch Steam and click on your profile icon located at the top of the screen. - From the list of options, select Log out of account. - After you’ve logged out from Steam, log back in again using your username and password. Now, launch CS: GO and see if it runs normally. Repair the SteamService.exe One of the reasons you could be facing this problem is when you have corrupted files in the Steam directory. It is recommended that you perform this method at a regular interval of time to make sure that there are no broken or corrupted files in Steam. To do that: - Close the Steam app. - Open Run Command Box by pressing Windows Key + R together. - Type this command and press Enter. "C:\Program Files (x86)\Steam\bin\SteamService.exe" /repair After you press Enter, you’ll see an empty terminal in your Windows which will run a bunch of scripts. The terminal closes by itself when the script is run, and you don’t need to do anything. Just wait for it to complete and restart Steam after it’s done. Try launching CS: GO now and see if the problem is gone. Exclude Your Anti-Virus from Scanning CS: GO Directory As you know, anti-virus can cause a lot of problems on your PC if you haven’t configured it well. So if you’re getting a VAC error message out of nowhere, chances are your anti-virus accidentally marked your game files as a virus. Now, there isn’t a sure way to know that this issue is caused by your anti-virus. However, you can exclude the directory of CS: GO and try launching the game again. If it runs normally after that, you may need to apply some settings to the anti-virus. Reinstall CS: GO If none of the methods seem to work for you, you can always reinstall the game. Keep in mind that this should be done as the absolute last resort when nothing works. - Launch Steam on your PC. - Click on the Library tab to open your Steam Library. - Locate CS: GO from the list of your games. - Right-click on it and select Manage > Uninstall. - Now, you will see a pop-up to confirm if you really want to uninstall the game. Click on Uninstall to continue. Wait for this process to complete and restart your PC after that. After restart, launch Steam and install CS: GO again. Now, your issue should be fixed, and you should be able to play the game normally. That’s it! These are all the methods that will help you get back to your game. These methods usually work for most people, but if you’re still experiencing the issue, you can try updating your drivers, letting Steam and CS: GO through the Windows Firewall, or even updating Windows.
https://www.technewstoday.com/vac-was-unable-to-verify-your-game-session/
Per request I've started a locked thread for winners of the CN Imaging/Sketching contest. Please, even if you should find this thread unlocked do not post in here - it's for winning entries only! For those of you who are into stats, an Excel workbook with latest stats is attached. Centered at 00:00 UT 05 May 2006. August 2006 Winners - A tie! Imaging: RGB ( IDAS-LPS): 12x300sec/ISO800. Note: this is a mosaic of 2x2 images to cover this area of approx. 6deg x 4deg. 15 avi's and 54 point MAP processing went into creating this mosaic. Registax, Photoshop and AstraImage were used to process the image. Taken 1315 UT 18 May at Blackwood South Australia. Weather: Clear early, turning to occasional clouds mid to late during session, 10-15 knot winds late. Binoviewer: W.O. Bino-P with 1.6X Nosepiece. Sketch medium: White and black Conte' Crayons on black textured Strathmore paper. Sketch size: 18" x 24" "As for details, I used my 10in LX200 Classic (F10), and a Phillips SPC900NC webcam. I decided to use 20 frames per second despite the image compression (I figured that more frames = more chance of capturing something). Exposure I guaged by using Deneb (it was guesswork really). Sliders for both exposure and gain were at about 50% I think". Canon 10D, 14s @ ISO400, 16mm f/2.8 wideangle lens. M63 taken on the 19 & 20 April 07 from Somerset, UK. 48 light frames x 300 seconds, + 25 Darks, + 25 Bias + 15 Flats. Taken through the primary of my RCX with an AstroPhyiscs 0.75 adapter. Guided with 80mm APO, using PHD for guiding. All processing done with ImagesPlus and CS2. Telescope/Mount: Stellarvue SV115 at f5.6 with Televue 0.8 Reducer. Mountain Instruments MI-250 mount. CCD: SBIG ST2000-XM with Astrodon Ha and OIII filters. Image Details and Processing: 6-1/2 Hours Ha (Red) and 12 Hours of OIII (Blue) in 30 minute subframes. Captured with CCDSoft and CCD Commander, combined with CCDStack, processed in Photoshop. Synthetic green channel created with Noel Carboni's Astrophotography Tools. Venus recorded in Ultraviolet light over the course of 5 1/2 months. Two telescopes used; a 10" f/5 newtonian, and a 12.5" f/5.1 newt. Cameras used were a Lumenera LU075 and a Imaging Source DMK21AF04. The images span from January 28 2007 through July 16 for the last image. Telescope/Mount: Stellarvue SV115: 115mm f7. Mountain Instruments MI-250 mount. CCD: SBIG ST2000XM with Astrodon SII, Ha and OIII filters. Image Details and Processing: 27-1/2 total hours. 9-1/2 hours Ha and OII, 8-1/2 hours SII in 30 minute. Captured with CCDSoft and automated with CCD Commander. Processed with CCDStack and Photoshop. Larger image can be seen here. Each of the 6 frames is a stack of 256/2500 frames at 1/30s exposure per frame. This image of the Witch Head Nebula was taken from the 2007 Black Forest Star Party in PA. All channels were taken at 8 x 10min exposures bin 1x1. 18x600s Reduced aligned and combined in CCDSoft, touches in PS2.
https://www.cloudynights.com/topic/219746-gallery-of-imagingsketching-contest-winners/
News Dear clients, Due to transition to summer time in USA on 10 - 11 March, changes in working hours of certain financial instruments and accounting operations are about to be made. The changes will be effective until 24 March when Europe will switch to summer time. Until then, the time difference between Bulgaria and New York Dear clients, Due to the official holiday in USA (Presidents day) on 19 February 2018, some of the trading instruments will work with different trading hours. You can check the working hours changes in the table below: MetaTrader Instrument 15 January FX Standad trading hours US30 Closes 18:00 SPX500 Closes Dear clients, Please note that due to the upcoming Christmas and New Year Holiday period, our trading hours will be slightly modified. These changes will take place as follows: Working hours for BenchMark: Date Customer Services Backoffice 26 December Opens 06:30 Closed 27 December Standad hours Closed 01 January Opens Dear clients, We would like to inform you that due to the official holiday in the United States (Thanksgiving day), some of the instruments will be working with different trading hours on 23 and 24 November (Thursday and Friday): Instrument 23 November 24 November Currencies Normal trading Normal
A notional-functional syllabus is an approach where the organization of the material is determined with notions or ideas that learners expect to be able to express through the target language and the functions acts learners expect to be able to accomplish (Wilkins, 1976). In this type of syllabus, it contains the same teaching materials as traditional syllabus but organizes them in different way such as around uses or functions (Harlow & Linda L, 1978). According to Wilkins (1972), proponents of this kind of approach believe that the usage of language for learners is more important than the digestion of an unapplied system of grammatical forms. Therefore, a notional-functional syllabus is a kind of communicative syllabus which organize units with the foundation of some functions such as asking question, expressing opinions, expressing wishes, making suggestions, complaining, and apologizing rather than including units instructing noun gender or present tense ending (Wilkins, 1976). First of all, I show how the notional-functional syllabus was brought about and influenced by both theories of language and language learning/acquisition. If you need assistance with writing your essay, our professional essay writing service is here to help!Essay Writing Service In the second part, I discuss on strengths and weaknesses of the notional-functional syllabus by the relation between it and communicative language teaching and putting it into the practice. Because the functional-notional syllabus is intimately related to communicative language teaching, this type of syllabus has lots of significant merits. However, the relationship between communicative language teaching and functional-notional syllabus design is far from clear, it does present some problems when it is put into practice as well (Brumfit, 1984).As criticizing the structural syllabus for being product-based which is focusing on what language is learnt and opposed to process-based which is focusing on how language is learnt, the functional-notional syllabus would contain a list of items to be learnt rather than a specification of how they are to be learnt. However, the notional-functional syllabus is not considered with traditional structure but function, such formal strategies may not be so useful, because it is more difficult to generalize from functions or use them to create new sentences (Wilkins, 1976). A further problem of the notional-functional syllabus was presented with regard to grading, as there was lack of evidence to concern the frequency of functions and when selecting which forms should be used to realize functions, textbook writers had to “depend on intuition” (White, 1988). However, it is an approach which has significant contributions in fulfilling the needs of both foreign language students and teachers. The last part of the essay, I would argue the best suitable teaching situations for the notional-functional syllabus in English language teaching with the various elements of teaching situations. Theory of notional-functional syllabus A notional-functional syllabus is an approach where the organization of the material is determined with notions or ideas that learners expect to be able to express through the target language and the functions acts learners expect to be able to accomplish (Wilkins, 1976). The functional-notional syllabus takes semantic knowledge as primary and attempts to answer the question ‘what do users of the language need to express?’. This implies a belief in language as a system but a system of meaning rather than forms (Johnson, 1982). It answer that learning language consists of learning how to mean. Such a syllabus would seek correlations between form and function but would define the link as being between the forms of the language available to the user and the meanings he wishes to express (Munby, 1978). As described by Wilkins (1976), the functional-notional syllabus has its starting point something different form either the grammatical syllabus or the situational one. He also points that it is not the linguistic items to be taught but rather the behavioral organization in terms of the purposes for which language is being learned and the kinds of language performance (in terms of language functions) necessary for such purposes. The roots of this type syllabus would be to look at kinds of meanings which have to be considered in second-language teaching (Yalden, 1983). Therefore within them a central concerning is that the meaning of an expression originates from the whole situation in which language is used, not from words or sentences in isolation. 1.1 The theories of language Richards and Rodgers (2001) show a structural view of language, which is that “language is a system of structurally related elements for the coding of meaning”. They also identify a functional aspect, which states that “language is a vehicle for the expression of functional meaning.” The notional-functional syllabus was influenced by the functional view of language, which itself was partly opposite aspect and partly an evolution of the structural view of language. There have been numerous educators to discuss the ‘communicative revolution’ beyond structural analyses of language which is provided by linguists but with considering what ‘communicative ability’ in a language entailed. Therefore, it would apparent that a different view of language would help learners to develop such ability. Malinowshi (1923) showed that the functional view of language was superior to the structural view, and the discourse in context was extremely important. Teaching the knowledge of the structure of written or spoken texts was more important than exclusively teaching grammatical correct, sentences to language learners. The functional view of language also has an intimate relationship with the view expressed by the likes of Hymes (1972), i.e. “linguistic theory needed to be seen as part of a more general theory incorporating communication and culture”. Halliday (1970) argues that since all the functions of language are usage of studied language, linguistic is considered with the description of speech acts or texts, therefore all components of meaning have been brought into focus of the notional-functional syllabus. Above all, it can say that how the notional-functional syllabus’s focus on the meanings and functions of language was strongly influenced by functional and communicative views of language. 1.2 The theories of language learning/acquisition Richard and Rodgers (2001) also distinguish between two basic types of learning theories: process-oriented theories which “build on learning processes, such as habit formation, induction, inference, hypothesis testing, and generalization” and condition-oriented theories, which “emphasize the nature of the human and physical context in which language learning takes place”. Although it is true that teaching notions and functions must be with using behaviorist techniques. And Widdowson (1990) notes that teachers were “not bound to interpret the syllabus in line with its intentions”. In practically, there came to be a strong alliance between the functional view of language represented by the notional-functional syllabus, and a condition-oriented, communicative approach to learning. As Wilkins (1976) points that the meaning must be considered through the study of language in use, language in discourse. So we study the communicative functions of language and their relation to grammatical forms through approach language in this way. Moreover, the goal of learning language is communicative and not formal perfection in the learner. Language is seen as essentially a function of society, serving an interpersonal role, and making each speaker a member of a speech community through its use. Meanwhile, the grammatical syllabus teaches the language for learners by taking them progressively through the structures of the target language; the situational syllabus does so through recreating the situations in which native speakers use the language (Wilkins, 1976).Wilkins (1976) also points that the combination of grammar, lexis, stylistics, linguistic and non-linguistic context and, in speech, intonation ensures that any two sentences hardly have exactly the same meaning. Since the learning of a language is most commonly identified with acquiring digestion of its grammatical system, it is not surprising that most courses have grammatical pedagogic organization. And courses are based on the systematic introduction of vocabulary and others which take language situations as the starting-point. Therefore, the functional-notional syllabus is not necessarily mutually exclusive. Regarding them form the linguistic point of view, Richards (2001) asserts that the notional-functional syllabus not only be considered with an analytic approach for language learning but also was combined with restating of traditional structural grammar rules as functions. From above, Richards and Rodgers (2001) asserts that one of the first syllabus models to be proposed for communicative teaching was described as a notional syllabus and the progenitor of the notional syllabuses himself. And Wilkins (1981) highlights that the communicative purposes of language learning link the notional approach to the wider communicative movement in language teaching. Therefore, the notional-functional syllabus was one answer to the question of what kind of course content should be used to lead learners acquire the ability to convey communicative meaning through language. The strengths and weaknesses of the notional-functional syllabus The notional-functional syllabus concerns two important elements: one is a notional or conceptual view, which is involved with some concepts such as time, space, movement, cause and effect; another one is functional view which is used for intentional or purposive description and classification. It is a new type of syllabus because it could take notional-functional categories as an organizing principle which would not only be determined by grammatical considerations but also be concerned with communicative categories into account as well (White, 1988). All of the grammatical syllabus, the situational syllabus, and notional-functional syllabus belong to ‘Type A Syllabuses’. Neither grammatical nor situational syllabus would be denied that the purpose of learning languages is to communicate both of them give learners few adequate opportunities to promote the communicative capacity. However, the notional-functional syllabus takes the desired communicative capacity as the starting-point. From the notional-functional syllabus, it asks speakers to communicate through language. So the designers are able to organize language teaching in concerning of the content rather than the form of the language (Wilkins, 1976). 2.1 The strengths of the notional-functional syllabus The advantages of the notional syllabus include that it could consider the communicative facts of language from the beginning with concerning of grammatical and situational factors. So it is superior to the grammatical syllabus possibly (Wilkins, 1976). In the grammatical syllabus language elements are demonstrated more in complete possibilities of the language than the use of it needed in conversation. So learners would complain that foreign language learning is not practical and they have few opportunities to use out of it. However, a functional-notional syllabus would teach language to use it rather than instructing the use of its exclusive forms. As teaching the language through its uses, learners would consider the utility and the relevance of their study (Wilkins, 1976).Moreover, Harlow and Linda L. (1978) point that by perceiving language as a real means of communication; learners would feel more motivated to learn as they would feel what they were learning is useful. Language functions in a real-life setting would generate a special kind of excitement for learning and leads to productive learning. Therefore, as comparing to the structural syllabus where elements of language are learned in an isolated way from real life, students’ communicative competence and confidence can be well developed, and teachers can revitalize teaching materials to meet learning objectives in functional-notional approach study. Furthermore, the functional-notional syllabus is superior to the situational syllabus because it can include both of the most important grammatical forms and all kinds of language functions in it rather than concentrate those exist in specific situations typically (Wilkins, 1976). From above it can say that this type of syllabus does have some significant merits as follows: The first merit of the functional-notional syllabus is that it emphasizes the fact that students and their communicative purposes are at the very core of the teaching program. The learner’s actual and foreseeable academic, social, and vocational needs will underlie all aspects of the programs of linguistic and cultural content. While due attention is given to certain aspects of selection and grading of linguistic cultural content, the primary consideration is those functions that persons of a particular age level, in a particular situation, would wish or need to express. Thus, it suits the need of learners’. This syllabus is extremely useful for ESP clauses in which the learners can learn part of the language which they are badly in need without wasting their time and energy for detailed study of the whole language system. The second merit of this syllabus is that the act of communication, even at the elementary levels, will be intrinsically motivating. Unlike the grammatical syllabus which separates the language into discrete items and from which the learners have to communicative competence at the very beginning. The language forms, its functions, and communicative skills they have learned can be used immediately in the communicative activities and in role plays, or even in the real world. This direct effect of language use motivates the learners. They feel quite satisfied and are eager to learn as much as possible according to their needs because they are not passive listeners but active participants. The third merit is that language functions are quite generalizing. According to Wilkins (1973,1976), eight types of communicative functions are recognized, that is, eight kinds of things learners can do with language, such as: - Modality (to express degrees of certainty, necessity, conviction, obligation, and tolerance) - Moral discipline and evaluation (judgment, approval, disapproval) - Suasion (persuasion, recommendation, predictions) - Argument (information asserted or sought, agreement, denial, concession) - Rational inquiry and exposition (author’s note: similar in sub-categories to argument and evaluation) - Personal emotions (positive and negative) - Emotional relations (greeting, flattery, hostility…) - Interpersonal relations (politeness and status: degree of formality and informality) In a word, the functions of language, the very cores of the functional-notional syllabus, are fairly generalizing. 2.2 The weaknesses of the functional-notional syllabus Every syllabus has its demerits, so does the functional-notional syllabus. When putting it into practice, we will find that it presents some problems. What could make learners be able to communicate best in the foreign language decide the process of what to teach (Wilkins, 1976). So when we can decide the most appropriate forms for each type of communication, we can establish the syllabus. Although Hedge (2000) claims that structural syllabuses are amendable to planning, provide systematicity and make learners feel secure, the symbol of the each learning unit is semantic basically (Wilkins, 1976). Nunan (1988) asserts that an alternative to the grammatically-oriented textbook may not solve all of the problems in language teaching. These lists of functions and notions do not reflect the way languages are learned. Dividing language into discrete units of functions may misrepresent the nature of language as communication (Widdowson, 1978; Nunan, 1988). Therefore, the structural syllabuses coverage with notional-functional ones, they are both product-based, synthetic syllabuses. In short, the semantic needs of learners decide the planning of the linguistic content. Above all, it is ensure that this type of syllabus has some weaknesses as follows: The first problem is that language functions alone are not a satisfactory organizing principle. In the first place some realizations of functions are in fact little more than fixed phrases (e.g. ‘You must be joking!’ ‘Come off it!’). It may be important to learn them, but that is all we learn! In other words, some functional exponents are just single items- we cannot use them to generate more language as we can with grammatical structure. Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.View our services The second problem lies in the selection of items for the syllabus and the grading and sequencing of the items. Which should be selected and come first? As White (1988) notes that there was “a dearth of evidence for the frequency of functions” and that when selecting which forms should be used to realize functions, textbook writers had to “depend on intuition”. What order should the grammar be taught in for students to be able to apply it to functions? White also notes that the small amount of empirical evidence regarding the natural order of acquisition of functions by children was not directly applicable to adult language learning (White, 1988). This problem was exacerbated by the fact that linguistically complex forms could appear in more basic and essential functions, such as requesting (e.g. “Would you mind closing the window?”) In the functional-notional syllabus, the specification of needs may well turn out to be as global as the specification of types of situation does for the situational syllabus. Richards (2001) points that “the term ‘needs’ is not as straightforward as it might appear” and suggests that “what is identified as a need is dependent on judgment, and reflects the interests and values of those making such a judgment.” Moreover, Wilkins (1976) notes that the forms are asked to express the semantic needs, so they would be extremely varied. The third problem is impossibility of defining functions with precision and clarity. Although speech-act theories have proposed conditions whereby a given speech act may be defined as performing a given function, no reference is made to such specifications in proto-syllabus, nor indeed, in any other similar listings. The absence of a specification of conditions which limit or determine the interpretation of a given functions means that there is at best, some ambiguity, and, at worst, total misunderstanding over what is meant by such functions as expressing intention, expressing one is/ is not obliged to do something or expressing dissatisfaction. The best suitable teaching situations Selection of items to be included in this syllabus would be concerned with a variety of ways. According to Peck (1971), this type of syllabus contains the methods such as self-communion, observational research (research based on observation of oral and written use of the language), polls and surveys to users and learners of the language, and teachers’ identification of concepts that students want to express. In the notional-functional syllabus, each unit would include both of productive and receptive usage of language and use artificial situations. Therefore, teaching situations which adopted the notional-functional syllabus, learners would be the center of the teaching situations and listen to more than they would be asked to produce (Harlow & Linda L, 1978). In its transatlantic version, the functional-notional syllabus has been in Canada to all levels in education. At the time of writing, there has been the appearance of the functional-notional syllabus in the United States chiefly in courses for vocational or occupational purposes; however it has been discussed among the professional fields certainly (Yalden, 1983). Define teaching situations There are numerous elements have power to define teaching situations and decide whether can a notional-functional syllabus be adopted by them. Therefore, it will assume that language being taught in English and teachers are native speakers in order to narrow the discussed field down to analysis. 3.2 Best suitable teaching situations 3.2.1 Short-time courses According to Harlow and Linda L (1980) identify that language is used to realize communicative functions and convey meanings. Moreover, language teaching should focus more on the purposes (functions) of using the language and the meanings (notions) expressed through the language rather than grammatical forms. Therefore, a situation of short-term courses teaching where the students have two or three months to reach a given standard of English for a given purpose and are taught by native English teachers would be one of most suitable teaching situations. In this situation, students’ language level is intermediate. Learning content would be a degree of structural competence which students are able to produce a number of grammatical sentences by them, but may not be able to put them to appropriate use. Students also can be given some of the basics necessary for communication such as have the opportunity to talk with the native speakers who are their teachers. From that student will easily learn to be appropriate as they operate in the native speaker environment. After learning in this situation, students can get help for their vital needs and reap benefit from leaning immediately. As lack of the grammatical foundation to generalize and apply, the knowledge which is taught should be restricted in its area of application to meet students’ immediate needs and interests. In this period of restricted time available, teachers should spend time in teaching the use of knowledge and provide students with a general ‘overview’ of how the language operates by covering the main structures (Johnson, 1982). The language level of students has implications for both the language and methodology employed in the classroom (Harmer, 2001). In this kind of teaching situation, students’ language level is intermediate that they have capacity to apply grammatical structure in the areas of functional use. Moreover, there are two major categories of motivation: instrumental and integrative. The former refers to learners need a language as an instrument to achieve other purposes such as doing a job effectively or studying successfully at an English-speaking institution and latter one implies that learners wish to integrate into the activities or culture of another group of people (Hedge, 2000). Motivation can be linked with needs analysis so that it is an important element to decide whether to adopt a notional-functional syllabus. Meanwhile, White (1988) emphasizes that proponents of the notional-functional syllabus should be considered with which functions will be required for the future roles in which learners are expected to use the target language. It seems that the notional-functional syllabus would supply the functional language content to apply the presence of integrative or instrumental motivation. It would be invaluable to such learners who have certain purpose in the short-term courses. According to above, we can point that the functional-notional syllabus can promote learners’ motivation through meeting their needs and adapt learners’ language level in the short-term course. Therefore, the functional-notional syllabus can play the role fully in this kind of teaching situation. 3.2.2 Private remedial teaching situation The private remedial course is for students who have already followed one (structural) course, and have failed to learn properly or achieve the communicative purpose. In this kind of course, students either repeat the course or follow a similar one as complementary study. The grammatical knowledge would be provided in a different kind of framework in this kind of course. Comparing with the structural syllabus teaching the rules of grammar, the functional-notional syllabus teaches the rules of use as an additional dimension. Both of rules and rules of use are mastery of the language. The functional-notional approach can word off the tedium which is the potential danger inherent in remedial teaching (Johnson, 1982). Considering the status as one element of teaching situation, private institution may afford more freedom in which the syllabus is more commercially viable and attractive to potential students. Moreover, Hedge (2000) asserts that the effective and practical syllabus being used in this kind of teaching situation is extremely important. So in this commercial teaching situation, the notional-functional syllabus’s theoretical weaknesses, such as its product-based, synthetic nature (White, 1988), may be seemed as its pragmatic strength. Consequently, the functional-notional syllabus would have a dominant position in the private remedial teaching situation. Conclusion The notional-functional syllabus is brought and influenced by both theories of language and language learning/acquisition. And there are clear benefits connected with the notional-functional syllabus associated with a communicative teaching approach and plenty of criticisms exist when put it into practice as well. As considering theories which influence the functional-notional syllabus and characteristics of this type of syllabus, there are two kinds of teaching situations to be discussed are best suitable ones. However, there are also lots of questions haven’t been solved such as: What kinds of particular circumstances are in when students are instructed in the notional-functional approach? How much grammatical knowledge can be assumed? How restricted is the need for English? How long will the students study English? Will they have the time and the opportunity to learn how to apply any grammatical foundation provided in a course? Above these questions it cannot be automatically assumed that which kind of common teaching situation is the best suitable one. However, as a communicative teaching approach, the utility of the functional-notional syllabus will be in a wide range of teaching situations across the world continually. Cite This Work To export a reference to this article please select a referencing stye below: Related ServicesView all DMCA / Removal Request If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please:
https://www.ukessays.com/essays/english-language/a-notional-functional-syllabus-essay.php
SEP, 2017. The importance of adherence Ensuring that patients take their medications as prescribed is a key to successful therapy. However, it has also been recognized as a growing challenge in health care systems worldwide. Non-adherence and poor compliance can have serious impact on health, as patients do not receive optimal therapy for their condition. Poor adherence is often associated with increased healthcare use, morbidity, and mortality. It also causes additional costs due to waste of medicines, manpower/man-days and time. Patients’ non-adherence to medications costs EU governments an estimated €125 billion annually. It contributes to premature deaths of nearly 200,000 European citizens a year: - Approximately 20% to 50% of patients do not adhere to the prescribed medical therapy - It is estimated that 2 0% – 30% of patients do not adhere to the prescribed regimens which are curative or intended to relieve symptoms - 30% – 40% fail to follow the recommended preventive regimens Adherence in long-term medication regimens The numbers for long-term medication regimens are even more dramatic. The World Health Organization (WHO) report reveals that when the long-term therapy is prescribed, approximately 50% of patients fail to adhere to the regimen. The main reasons for not taking medication are: - Forgetfulness (71%) - Lack of belief that the medication was needed (20%) - The belief that the condition has improved and that the medication is not needed (16%) Why do patients fail to adhere to the regimen? WHO’s multidimensional model defines adherence as a multidimensional phenomenon determined by the relationship of five factors: socio-economic, healthcare system, condition, treatment, and patient-related factors. The reasons for non-adherence may also be divided into non-intentional (patients forget to take their therapy or do not understand the regimen) and intentional (try to reduce costs, do not think that the medication is needed, they are worried about side effects). The non-intentional non-adherence is easier to address through patient reminders, while intentional non-adherence requires different strategies. The importance of patient support Although the factors which may contribute to non-adherence are complex and challenging to address, including forgetfulness, confusion due to a complex treatment regimen, struggle with self-administration, side effects, no perceived benefit etc., it is of the utmost importance that all the stakeholders gather in the effort of encouraging the patients to adhere to their therapies and to achieve health outcomes that are as good as possible. This is particularly critical in countries of lower GDP with more challenging access to expensive medication. The collaboration includes policy makers (Ministry of Health, health insurance funds), healthcare professionals, pharmaceutical companies, patients and their associations, families/caregivers and the media. Our patient support programs Weare proud to be among the pioneers in Croatia to develop tailor-made patient support programs (PSPs) for various needs of different groups of patients, therapies and healthcare systems. PSPs are designed to use multiple methods of interaction and multiple communication channels to assist in improving compliance to therapy. A strategy to create and deploy incentives for health professionals and patients to integrate therapy adherence in treatment plans, focusing on quality instead of the volume of care services: - Increases therapy adherence - Helps dismantle barriers - Streamlines the adoption of practices The regulation of PSP Our activities in the field of PSP are compliant with all applicable laws and regulations. We see each PSP as a tailor-made program which helps the patients in managing their disease(s) in a better way. Each patient is unique, and so is each medicinal product and medical device. We in Marti Farm recognize the particular needs of patients, the industry and payers, and work together with our partners for the benefit of all. 21 SEP, 2017. Contact us Headquarters Lašćinska cesta 40 HR-10000 Zagreb Croatia Office Planinska ulica 13/2 HR-10000 Zagreb Croatia Office: +385 1 5588 297 Pharmacovigilance: +385 1 5588 297 Clinical trials: +385 1 5614 330 Registration: +385 1 242 0873 Marketing: +385 1 2420 890 Fax: +385 1 2420 860 [email protected] Pharmacovigilance [email protected] Tel: +385 1 5588 297 Legal info Full company name Short company name Headquarters Office Legal form Court register Registration number Marti Farm Ltd. Trade and Services Marti Farm Ltd. Lašćinska cesta 40, HR-10000 Zagreb Planinska ulica 13/2, HR-10000 Zagreb a limited liability company Commercial Court of Zagreb 080751121 OIB Share capital Authorized representative 29969122438 HRK 20,000.00 (paid in its entirety) Martina Diminić Smetiško, director of the company (Representing the company individually and independently, Responsible person for data protection) Bank account HR3623600001102197724 (Zagrebačka banka) HR4324020061100628669 (Erste banka) Full company name: Marti Farm Ltd. Trade and Services Short company name: Marti Farm Ltd.
http://martifarm.com/the-importance-of-patient-support/
rom {m: 5, l: 7}. Give prob of picking 2 m and 1 l. 7/22 Two letters picked without replacement from {b: 3, r: 6, a: 2, v: 1}. What is prob of picking 1 r and 1 a? 2/11 Two letters picked without replacement from {u: 2, b: 2, z: 2}. What is prob of picking 1 b and 1 u? 4/15 Two letters picked without replacement from {h: 7, k: 1, m: 2}. Give prob of picking 2 h. 7/15 Four letters picked without replacement from txxxtwxipxptti. What is prob of picking 1 p and 3 x? 20/1001 Two letters picked without replacement from sxxhxhphppspxqxp. Give prob of picking 1 x and 1 h. 1/8 Calculate prob of picking 1 k and 1 l when two letters picked without replacement from {z: 1, k: 1, l: 9}. 9/55 Two letters picked without replacement from guu. What is prob of picking 2 u? 1/3 Three letters picked without replacement from {x: 9, a: 3}. Give prob of picking 3 x. 21/55 What is prob of picking 2 x, 1 p, and 1 b when four letters picked without replacement from {n: 3, b: 4, z: 6, x: 2, p: 2}? 2/595 Two letters picked without replacement from {k: 1, x: 3, z: 2, p: 1}. Give prob of picking 2 x. 1/7 Three letters picked without replacement from {d: 1, b: 12}. Give prob of picking 2 b and 1 d. 3/13 Two letters picked without replacement from {x: 4, q: 1, h: 3, t: 4, o: 6, b: 2}. Give prob of picking 1 o and 1 q. 3/95 Two letters picked without replacement from {f: 2, l: 4, j: 8, s: 1, h: 1}. What is prob of picking 1 f and 1 h? 1/60 What is prob of picking 1 q, 1 j, and 1 w when three letters picked without replacement from {w: 10, q: 2, j: 2}? 10/91 Three letters picked without replacement from yyyssxnyynyyxrsynsny. What is prob of picking 1 y and 2 x? 3/380 Four letters picked without replacement from gogfgowrgggfgfgggg. Give prob of picking 2 f and 2 o. 1/1020 Calculate prob of picking 1 e and 1 m when two letters picked without replacement from dddmmercmddrmgdmc. 5/136 Three letters picked without replacement from {p: 1, s: 2, i: 1, b: 5, w: 2, m: 4}. Give prob of picking 1 i and 2 w. 1/455 Two letters picked without replacement from slnss. Give prob of picking 1 n and 1 l. 1/10 What is prob of picking 2 z when two letters picked without replacement from {o: 5, z: 7}? 7/22 Three letters picked without replacement from {e: 4, m: 8, v: 2}. Give prob of picking 1 m, 1 v, and 1 e. 16/91 Calculate prob of picking 4 s when four letters picked without replacement from shhsssssshsshhsssss. 1001/3876 Two letters picked without replacement from {r: 2, t: 7, e: 3}. What is prob of picking 2 t? 7/22 Three letters picked without replacement from {e: 8, d: 1, a: 8}. What is prob of picking 1 d, 1 a, and 1 e? 8/85 Three letters picked without replacement from {c: 4, e: 5, l: 1}. Give prob of picking 2 c and 1 e. 1/4 What is prob of picking 1 r and 2 h when three letters picked without replacement from zzhhhhhrrroh? 9/44 Three letters picked without replacement from crcrskcsrrbncn. What is prob of picking 1 b and 2 n? 1/364 What is prob of picking 1 s and 1 z when two letters picked without replacement from {s: 1, z: 1, y: 2}? 1/6 Four letters picked without replacement from qjjqkqqjqqjqqkqjqqj. Give prob of picking 2 q and 2 k. 55/3876 Calculate prob of picking 1 r, 1 h, and 1 i when three letters picked without replacement from rrjwiththwhjtttwht. 1/102 Four letters picked without replacement from iiiitiiiiiitiiiiii. What is prob of picking 3 i and 1 t? 56/153 Calculate prob of picking 2 p when two letters picked without replacement from {p: 6}. 1 Three letters picked without replacement from {c: 5, v: 2, g: 7}. What is prob of picking 2 c and 1 g? 5/26 Three letters picked without replacement from {v: 1, n: 1, g: 1, q: 2, c: 2, a: 1}. What is prob of picking 1 n, 1 g, and 1 c? 1/28 Three letters picked without replacement from {r: 9, t: 7}. Give prob of picking 1 t and 2 r. 9/20 Calculate prob of picking 2 h, 1 l, and 1 k when four letters picked without replacement from zhzzklzkkkzhczc. 4/1365 Four letters picked without replacement from vvtvvttvtttvtvvvvttv. Give prob of picking 4 v. 22/323 Calculate prob of picking 2 w and 2 t when four letters picked without replacement from {t: 6, w: 12}. 11/34 What is prob of picking 1 p and 1 u when two letters picked without replacement from pupudpu? 3/7 Calculate prob of picking 1 q and 3 r when four letters picked without replacement from nqnrrnrrrqrrnrrq. 9/65 Two letters picked without replacement from {b: 7, f: 5, m: 2, a: 3}. Give prob of picking 2 f. 5/68 What is prob of picking 2 a when two letters picked without replacement from {l: 3, a: 2}? 1/10 Calculate prob of picking 1 b and 3 t when four letters picked without replacement from rrrrrrrtrbtrrbtt. 2/455 Four letters picked without replacement from {j: 5, y: 8}. Give prob of picking 4 j. 1/143 Three letters picked without replacement from aasssssaaaaa. Give prob of picking 3 s. 1/22 Two letters picked without replacement from {d: 1, r: 1, t: 1, i: 1, e: 2, v: 1}. What is prob of picking 1 d and 1 t? 1/21 What is prob of picking 2 f and 1 d when three letters picked without replacement from fffooffqquqoqdqfoof? 7/323 Four letters picked without replacement from {l: 3, h: 3}. What is prob of picking 1 h and 3 l? 1/5 Three letters picked without replacement from {b: 3, n: 1, a: 6, j: 3, f: 1, c: 3}. What is prob of picking 1 b, 1 a, and 1 n? 9/340 Two letters picked without replacement from ffwdwddd. What is prob of picking 2 d? 3/14 Four letters picked without replacement from {l: 10, h: 1, b: 2, t: 4, z: 2}. Give prob of picking 1 z, 2 t, and 1 b. 2/323 What is prob of picking 3 n when three letters picked without replacement from ccnccnnyync? 4/165 What is prob of picking 3 l when three letters picked without replacement from bbbtkkgkklbll? 1/286 Two letters picked without replacement from ggppogqqqqoqg. Give prob of picking 2 g. 1/13 Two letters picked without replacement from xdxwxdddwdxxddddfx. Give prob of picking 1 x and 1 f. 2/51 Calculate prob of picking 1 i, 2 a, and 1 m when four letters picked without replacement from {q: 1, a: 3, t: 6, n: 2, m: 1, i: 2}. 2/455 Two letters picked without replacement from jgqbv. What is prob of picking 1 j and 1 g? 1/10 Calculate prob of picking 1 c and 1 n when two letters picked without replacement from nvvvvvncuvcccdvncd. 5/51 Calculate prob of picking 2 t when two letters picked without replacement from {j: 9, t: 2}. 1/55 What is prob of picking 4 r when four letters picked without replacement from rrririiidrirrriiirii? 42/1615 Four letters picked without replacement from {j: 1, f: 12}. Give prob of picking 1 j and 3 f. 4/13 What is prob of picking 1 u and 1 x when two letters picked without replacement from xux? 2/3 What is prob of picking 1 q and 1 t when two letters picked without replacement from lltqmmqqlwbll? 1/26 Calculate prob of picking 2 a and 2 r when four letters picked without replacement from {a: 3, r: 9}. 12/55 Calculate prob of picking 1 h and 3 d when four letters picked without replacement from {d: 4, p: 1, h: 2}. 8/35 Four letters picked without replacement from {b: 1, p: 1, a: 1, r: 2, c: 3, s: 4}. Give prob of picking 1 a, 1 p, 1 b, and 1 s. 4/495 What is prob of picking 1 i and 1 s when two letters picked without replacement from esjxjbixs? 1/18 What is prob of picking 1 j, 1 e, and 1 x when three letters picked without replacement from zszjzxejzjzcxzc? 6/455 Three letters picked without replacement from {c: 5, a: 3, o: 5}. What is prob of picking 1 o and 2 a? 15/286 Two letters picked without replacement from wtwwwwwwwwtwwwwwww. Give prob of picking 2 t. 1/153 Calculate prob of picking 1 m, 1 f, and 1 h when three letters picked without replacement from {f: 4, x: 1, h: 9, m: 1, o: 2}. 9/170 Three letters picked without replacement from {v: 4, r: 7, n: 1, s: 1, i: 3}. What is prob of picking 3 i? 1/560 Three letters picked without replacement from {d: 2, u: 2, n: 2}. What is prob of picking 1 d and 2 n? 1/10 What is prob of picking 2 s when two letters picked without replacement from sssszzssssszsz? 45/91 Three letters picked without replacement from {j: 2, l: 2, u: 4, h: 6, e: 1, g: 3}. Give prob of picking 3 h. 5/204 Two letters picked without replacement from {k: 10, v: 2}. What is prob of picking 2
The General Authority for Import and Export Control sent an official note to all listed exporters of agricultural crops informing them that the Saudi ban was in force. The ban could have a negative impact on exports of strawberries this year, leading to losses for exporters, Helmi Eissa, a member of the Agricultural Export Council (AEC), told Al-Ahram Weekly. The strawberry season starts in November and lasts until April. “This means that the season has been hit hard, and exporters will be obliged to redirect their produce and sell it at lower prices,” Eissa said. Egyptian exports of strawberries to Saudi Arabia were estimated at 39,000 tons last year, valued at some $90 million. In an attempt to prevent the application of the ban, a delegation from the ministries of agriculture and land reclamation as well as industry and foreign trade visited Saudi Arabia in November to discuss the issue, but Saudi officials decided nonetheless to impose the ban. “The Egyptian delegation suggested that the Saudi government would do better to ban imports from just the exporter or company that had violated the specifications rather than ban all strawberry imports,” said Hamed Abdel-Dayem, a spokesman for the Ministry of Agriculture and Land Reclamation. Abdel-Dayem said the government was in constant contact with Saudi officials and the ban was expected to be lifted soon. The problem had arisen from the fact that new exporters had entered the market last year due to the great demand for Egyptian crops, and some of them were unaware of the rules and specifications, he said. An official investigation is underway to discover which company did not abide by the regulations, leading to its removal from the list of exporters kept by the AEC. Two companies were removed in the past by the AEC when it was shown that their products did not meet specifications. Excessive pesticide residues on Egyptian crops have been a problem that has hindered exports of agricultural goods over the past year to the United Arab Emirates, Bahrain and Kuwait. This is also not the first time that Saudi Arabia has banned Egyptian crops, since it imposed a ban on Egyptian strawberries in July 2017 and on peppers in January 2017. The United Arab Emirates, Kuwait and Bahrain have banned Egyptian crops unless shipments have certificates from quarantine authorities that they are in accordance with EU specifications. To avoid the recurrence of the problem and retain the good reputation of Egyptian exports in international markets, the ministries of agriculture and land reclamation and of industry and foreign trade issued a decree in May 2017 imposing a new system of exports control. All agricultural shipments must be inspected by the Central Laboratory for Pesticide Residues and gain certificates showing that any pesticide residues follow international specifications as well as the importing country’s regulations. Under the old system, this inspection was not obligatory but was conducted on an exporter’s request since it was not demanded by some importing countries. Eissa said that shipments exported to European Union countries had had to be inspected, but often Arab countries had not requested this certification in the past. The problem had come when the Arab countries started to apply the same specifications as the EU, he said. In order to guarantee that exported crops do not contain pesticide residues, Abdel-Dayem said a new system had been put in place under which crops would be inspected several times while in the fields, after being harvested, and finally after being prepared for export. Crop samples would be collected from the fields by officials to guarantee accuracy, he said. Strawberry fields that do not export their harvest will need to be registered by the AEC in advance in order to arrange an official inspection. Smaller inspection lab units will also be established near large farms, and the first has been set up in Al-Salhiya Al-Gadida, a town in the Sharqiya governorate in the Delta. The Saudi ban has had a positive effect, according to Eissa, since it has led to a new export-control system. “All the countries that import our products are satisfied with the new system and accept the Egyptian laboratory certificates. It may take some time, but Saudi Arabia will eventually accept the system as well,” Eissa added. Since the floatation of the currency in November 2016 that cut its value in half, demand for Egyptian crops has increased abroad since they are more competitive in international markets. Egyptian agricultural exports increased to five million tons in 2017, compared to 4.5 million in 2016, Abdel-Dayem said.
http://en.amwalalghad.com/egypt-hopes-new-export-controls-to-encourage-repeal-of-saudi-ban-on-strawberries/
TECHNICAL FIELD This disclosure relates generally to reduction of aerodynamic drag for ground vehicles, and, more particularly, to a method of and system for reduction of aerodynamic drag by utilizing one or more devices configured to control the air flow and the pressure gradients surrounding a moving ground vehicle. BACKGROUND As ground vehicles move forward while penetrating through the air, their movement creates a significant amount of aerodynamic drag on the vehicles. To continue moving forward, a substantial amount of force is needed to overcome the drag. This amount of force, however, requires additional energy, and as such, results in increased fuel and energy consumption. This is particularly the case for large ground vehicles and/or those traveling at high speeds, which require more energy to overcome the aerodynamic drag. To address this problem, there have been several incremental changes to vehicle designs in addition to a number of after-market products. These changes and products are often designed for improving aerodynamic drag efficiencies of vehicles, particularly ground vehicles and vehicles used in the heavy-truck industry. However, most of these design changes and products either fall short in efficiently reducing aerodynamic drag or they suffer from other shortcomings. One commonly used after-market product for reducing the aerodynamic drag of a ground vehicle is a trailer side skirt that can be attached to the trailer body of ground transportation vehicles such as trailers, trucks, and semi-trailers. One configuration of the trailer side skirt is a straight and flat surfaced trailer side skirt which can reduce the rear wake of the vehicle to which it is attached by causing the air to travel upwards and breaking the wake into smaller sizes as the wake exits behind the vehicle. When the side skirt is attached to the sides of a trailer, it can create a separation in the flows of air from the sides and underneath of the vehicle. This may prevent the exchange of air into different pressure gradients, thus creating a uniform path of travel for the surrounding air to follow. The new path of uniform travel for air can reduce the amount of turbulence encountered by the vehicle. As a result, use of a side skirt can reduce the amount of aerodynamic drag affecting the vehicle. A later modification of the straight and flat surfaced side skirt is the angled or tapered in installation of the traditional side skirt on a vehicle's trailer. An angled side skirt can create a smaller wake size than a straight side skirt. That is because the angled side skirt directs the air to make a sharper upwards turn and as such causes the air to travel further upward. Both the straight and angled side skirt systems are designed to control the flow of air from entering the undercarriage region. While these side skirts may reduce the amount of aerodynamic drag generated underneath the vehicle, they do not substantially affect the amount of aerodynamic drag behind the vehicle. As such, these devices fail to adequately address energy consumption as a result of aerodynamic drag on ground vehicles. Hence, there is a need for improved systems and methods of efficiently reducing aerodynamic drag for a moving ground vehicle. SUMMARY In one general aspect, the instant disclosure presents a method for reducing an amount of aerodynamic drag generated within a vicinity of a moving vehicle. The method may include positioning or manufacturing a plurality of devices in a selected pattern on an exterior surface of the vehicle or a surface of an accessory attached to the vehicle, wherein each of the plurality of devices includes a flat surface and one or more non-flat surfaces, and the plurality of devices cause an airstream traveling along the side of the vehicle to curve behind the vehicle and provide a push in the forward direction. In another general aspect, the instant disclosure presents a system for reducing an amount of aerodynamic drag generated within a vicinity of a moving vehicle. The system may include a plurality of devices for attaching to or manufacturing on at least one of an exterior surface of the vehicle or a surface of a vehicle accessory attached to the vehicle, each of the plurality of devices comprising a flat surface and one or more non-flat surfaces, and the plurality of devices positioned in a pattern on the exterior surface of the vehicle, wherein the plurality of devices cause an airstream traveling along the side of the vehicle to curve behind the vehicle and provide a push in the forward direction. This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Furthermore, the claimed subject matter is not limited to implementations that solve any or all disadvantages noted in any part of this disclosure. BRIEF DESCRIPTION OF THE DRAWINGS The drawing figures depict one or more implementations in accord with the present teachings, by way of example only, not by way of limitation. In the figures, like reference numerals refer to the same or similar elements. Furthermore, it should be understood that the drawings are not necessarily to scale. FIGS. 1A-1B depict examples of patterns in which non-flat devices for reducing aerodynamic drag of ground vehicles can be installed on the body of the vehicle and/or trailer. FIGS. 2A-2B depict examples of geometrical shapes of devices for reducing aerodynamic drag of ground vehicles, upon which aspects of this disclosure may be implemented. FIG. 3 depicts a side view of an alternative geometrical structure of devices for reducing aerodynamic drag of ground vehicles. FIGS. 4A-4B depict examples of patterns in which non-flat devices for reducing aerodynamic drag of ground vehicles can be installed on vehicle attachments, fairings and/or accessories. FIG. 5 depicts an example pattern in which non-flat devices having an alternative geometrical shape can be installed on the bodies of the vehicles. DETAILED DESCRIPTION In the following detailed description, numerous specific details are set forth by way of examples in order to provide a thorough understanding of the relevant teachings. It will be apparent to persons of ordinary skill, upon reading this description, that various aspects can be practiced without such details. In other instances, well known methods, procedures, components, and/or circuitry have been described at a relatively high-level, without detail, in order to avoid unnecessarily obscuring aspects of the present teachings. Aerodynamic drag is a substantial source of fuel and energy usage in ground vehicles. This is particularly the case for large vehicles and those moving at high speeds such as trucks and other cargo carrying vehicles. When a forward moving vehicle meets air resistance, there is an impact on the frontal face of the vehicle. This pushes the vehicle backwards and causes the air streams to spread around the vehicle. This spread leads to unsteady turbulence around the vehicle. Furthermore, the spread causes flow separation, leading to a large, slow-moving air pocket at the rear of the vehicle. This pocket of air is referred to as a “wake” in this disclosure. The wake features a pressure difference that exerts a pulling force on the rear of the vehicle. Together, the push at the front and the pull at the rear result in a drag pressure that is counter to the intended direction of the vehicle. To overcome this drag pressure, the vehicle would need to exert more power, thus resulting in additional fuel and energy consumption. Furthermore, the unstable turbulence caused by flow separation leads to the vehicle shaking and therefore, deteriorating the vehicle's stability. While certain devices and improvements have been made over the years to reduce some of the aerodynamic drag on large vehicles, current devices do not adequately address the amount of wake generated around the rear end of the vehicles. Furthermore, some of the currently used devices add substantial weight to the vehicle, require maintenance and/or require the driver's involvement in employing the device. As such, none of the currently available devices provide an easy to use, lightweight, inexpensive and efficient mechanism for reducing the amount of wake and turbulence generated by a moving ground vehicle. To address these problems and others, in an example, this description offers a solution by providing lightweight, easy to install and easy to operate non-flat devices that reduce the amount of aerodynamic drag and unstable turbulence generated around the vehicle, while also decreasing the amount of unstable turbulence generated around the vehicle. In one implementation, this is achieved by utilizing a plurality of non-flat devices that can be installed on the body of the vehicle in a variety of patterns. In an example, a non-flat device includes one or more curve-shaped surfaces. In addition to being applied to the body of the vehicle, the non-flat devices may be applied to or manufactured on aerodynamic aftermarket attachments, fairings and accessories. The non-flat devices may have varying geometries. In some implementations, the non-flat devices may take the form of a hemisphere, a hemisphere-like shape, or a hemisphere-like shape with the cross section of a cycloid. The hemisphere-like shapes may operate as both protruding, convex geometries as well as inverted, concave geometries. In other implementations, the non-flat devices resemble a wave without a breaking crest, an ancient battle helmet (e.g., the shape of the helmet in the “Man in Armour Holding a Pike”/“Mars Vigilant” painting by Jan van Bijlert), or any other combination of shapes grouped together. The term “non-flat” as used in this disclosure may refer to any raised or dented surface having a portion resembling a curve. The curve may be actuated by using one or more curved surface or by using straight lines that approximate closely to a curved shape. The non-flat devices may alter the pressure gradients surrounding the vehicle and create a faster path for the air to travel. This may be achieved by constricting the air streams surrounding the vehicle and pulling them closer to the sides of the vehicle. When applied to aftermarket accessories, the non-flat devices may cause the flow of air to travel upwards along the laterals of the vehicle and turn inwards towards the rear of the vehicle. This may lead to a forward assistive push on the rear end of the vehicle that provides a push in the vehicle's direction of travel and may thus reduce the force of the wake. Thus, the air streams from above and below the vehicle may be able to continue their trajectories unabated and curl more directly into the rear face of the vehicle, providing an assistive push in the vehicle's direction of travel. Furthermore, the non-flat geometries may use the Coand{hacek over (a)} effect to keep the air from turning turbulent while increasing the surface area of the vehicles. This may be advantageous because the drag force equation dictates that increasing the frontal surface area of the vehicle while keeping the amount of the forces the same decreases the drag coefficient. Thus, increasing the surface area results in a smaller drag force. In practice, the number of forces changes slightly as an additional force of friction may need to be taken into account. However, the increase in friction is much less than the overall decrease in the amount of force that stems from the smaller drag coefficient. Thus, the overall result is a reduced drag force. The varying geometries of the non-flat devices may also create a brachistochrone curve effect where the non-flat shapes allow the air to travel faster along the same path. Creating a brachistochrone geometry in the body, sides, and/or face of the vehicle or accessories, attachments, and fairings of the vehicle, results in the airstreams traveling from any starting point of the brachistochrone curve to its end point (e.g., front to rear) faster than they would have normally traveled given a straight path. Considering the other physical frame of reference, where the vehicle moves through the air rather than the air moving along the vehicle, the vehicle is able to move through the air faster with a brachistochrone geometry applied to its body or attached to its aerodynamic accessories. Given a constant speed for the vehicles with and without brachistochrone geometries, the vehicle with a brachistochrone geometry is able to exert less force to move at the same speed, thereby reducing its energy consumption. This results in a reduction in fuel and energy consumption and thus better fuel and energy economy for a moving ground vehicle. In some implementations, to achieve the desired results, a plurality of the non-flat devices is applied or manufactured on the lateral, top, and or bottom sides of a ground vehicle, or the sides of existing after-market aerodynamic accessories, attachments, and fairings such as the side skirt. The non-flat devices may be installed individually or secured as a system. Whether attached individually or as a system, the devices may be attached to the vehicle or aftermarket accessory in any manner such as a uniform grid or placed in the shape of an offset grid pattern (e.g., diamond-like layout). In some implementations, the offset grid pattern provides an optimal result. In an example, the pattern is omnidirectional. In other examples, non-flat devices with different specialized geometries are aligned parallel to the direction of air flow. The attachment pattern may depend on the geometry of the vehicle. The mechanisms offered herein provide a maintenance-free or low-maintenance device that does not interfere with regular operational procedures of the vehicles and/or does not require additional operational steps to ensure successful operation. Furthermore, the non-flat devices maintain a low profile on the area to which they are applied. As such, the non-flat devices discussed herein may be used to reduce aerodynamic drag of all existing and future vehicles (e.g., cars with trailers, tractor-trailers, trucks, trains, buses, etc.). As will be understood by persons of skill in the art upon reading this disclosure, benefits and advantages provided by such implementations can include, but are not limited to, a solution to the problem of substantial wake and aerodynamic drag on ground vehicles. Technical solutions and implementations provided herein provide a mechanism for reducing the aerodynamic drag around the rear end of the vehicle efficiently, without substantially increasing the weight of the vehicle. Furthermore, the solutions provided herein provide an inexpensive, easy to apply, and easy to operate mechanism that does not hinder the operational performance of the vehicle. The benefits made available by these solutions include increasing fuel or energy efficiency at an affordable cost, and thus providing environmental and cost-saving benefits. The present disclosure should be considered as illustrative and not restrictive in character. It is understood that only certain embodiments have been presented and that all changes, modifications, and further applications that come within the spirit of the disclosure are desired to be protected. It should be noted that while a truck may be used as an example vehicle in this disclosure, the scope of the present disclosure is not limited to medium and heavy-duty trucks and is applicable for all modes of ground transportation vehicles to reduce the drag of all existing and future ground vehicles (e.g., cars with trailers, tractor-trailer trucks, trains, buses, heavy-duty vehicles, medium-duty vehicles, etc.). The placement of the devices disclosed herein may be adapted to the geometry of the vehicle. FIGS. 1A-1B FIG. 1A FIGS. 1A-1B FIG. 1A 110 100 110 100 110 illustrate examples of patterns in which non-flat devices for reducing aerodynamic drag of ground vehicles can be installed or manufactured on vehicles. depicts an example of a plurality of non-flat devices (only one example non-flat device is referenced with an element number in ) installed on a lateral of an example vehicle . The non-flat devices of are installed in a grid pattern including a plurality of rows and columns that cover the majority of the surface area of the truck on the lateral side. The pattern may include columns of non-flat devices where each pair of consecutive columns are distanced closer to each other with a larger distance between the various pairs. Further, the consecutive columns are positioned such that they create slanted sides on the top and the bottom sides. 110 100 100 110 100 100 Each of the columns and/or rows may be in the form of strips containing a plurality of non-flat devices that can be attached to the vehicle as a system. In some implementations, a strip may include a plurality of columns or rows. For example, pairs of consecutive columns may be provided on a single strip that can be applied to the body of the vehicle . As an example, each strip may include an adhesive material that can form an adhesive bond with the body of the vehicle . In alternative implementations, rows and/or columns of non-flat devices are manufactured (e.g., stamped) directly on the body of the vehicle and/or on attachments, fairings and accessories of the vehicle . 110 110 110 110 100 110 100 110 FIG. 1A In some implementations, each of the non-flat devices can be installed on the vehicle individually by using an adhesive material such as glue or any other type of material that can bind the flat surface of the non-flat device to the side of the vehicle. In some implementations, the non-flat devices are installed on the body of or are generated on the vehicle and/or on side skirts, accessories, fairings and/or attachments during the manufacturing process of the vehicle. In other implementations, the non-flat devices are attached afterward the manufacturing process is completed in a desired pattern. Although only one side of the vehicle is shown in , the non-flat devices can be installed on any portion of the vehicle's body (e.g., both sides, top surface, and rear of the vehicle). Furthermore, the non-flat devices do not need to cover the majority of the surface area of any side. For example, the devices may cover the entire surface area of the body of the vehicle or they may be applied in segments. Any number of the non-flat devices can be installed on the vehicle . However, use of a larger number of devices and/or covering more of the surface area may result in a larger reduction in the wake and the force of drag, and as such, may result in better fuel and energy efficiency. FIG. 1B FIG. 1A FIG. 1A FIG. 1B FIG. 1B FIG. 1A 150 110 150 150 depicts another example of a pattern in which a plurality of non-flat devices can be installed or manufactured on a lateral side of an example trailer . The non-flat devices of are installed in a diamond shaped grid pattern. Similar to the grid pattern of , the diamond grid pattern of includes a plurality of rows and columns that cover the majority of the surface area of the truck on the lateral side. However, in the diamond shaped grid pattern of , the columns and rows that make up the pattern are distanced equally from each other. Similar to the non-flat devices of , the pattern may be formed via strips of non-flat devices that take the form of one or more columns or rows or may be manufactured (e.g., stamped) directly on the body of the trailer and/or on attachments, fairings and accessories of the trailer . FIGS. 1A-1B It should be noted that while display diamond shaped grid patterns, non-flat devices can be installed or manufactured on a vehicle in any type of design or pattern. For example, even randomly placed non-flat devices installed or manufactured on a vehicle may decrease the amount of aerodynamic drag on the vehicle. FIGS. 2A-2B FIG. 2A FIG. 2A FIG. 2B 210 220 220 depict example geometries for non-flat devices that reduce aerodynamic drag of a ground vehicle. provides a zoomed-in view of non-flat devices having protruding hemispherical shapes. As depicted in , in some implementations, the non-flat devices take the form of a hemisphere having an upper curved body, and a bottom flat surface. The flat surface may be attached to the body of the vehicle such that, when installed, the devices have protruding convex shapes. In alternative implementations depicted in , the curved side of the non-flat devices may be attached to the vehicle body such that, when installed, the devices have inverted concave shapes. In a third rendition, the non-flat devices may be manufactured so that they are concave on one side of the vehicle or aerodynamic attachment and convex on the opposite side of the surface of the vehicle or aerodynamic attachment. In this example, the protruding convex and inverted concave shapes are slightly more aerodynamically efficient. FIG. 3 FIG. 3 300 310 320 300 310 depicts a side view of an alternative geometrical structure for the non-flat devices of the instant disclosure. The non-flat device of may have a shape resembling a wave. The wave-shaped geometry may include a flat surface attached to one or more waved-shaped surfaces . The geometrical shape may be likened to an ancient battle helmet (e.g., the helmet depicted in the “Man in Armour holding a Pike” painting by Jan van Bijlert). The wavelike shaped devices may be attached to the body of the vehicle by adhering the flat surface to the body. It should be noted that in addition to the geometrical shapes described herein, other non-flat devices may be utilized. For example, though not specifically described, the non-flat devices may take many shapes (e.g., leading and trailing edge shapes) and have varying widths, spacing and orientation of surfaces. Furthermore, they may be applied to many different types of vehicles and can have varied fabrication means, materials, and attachment mechanisms. The concave or convex hemispherically shaped, wavelike shaped or other non-flat devices may cause the air streams surrounding the vehicle to constrict. This may pull the air streams closer to the sides of the vehicle and prevent them from separating from the body of the vehicle (e.g., trailer body). This may cause the air streams to travel upwards along the lateral end of the vehicle and turn inwards towards the rear of the vehicle. By turning the air streams inward behind the vehicle, an assistive push forward may be applied on the rear end of the vehicle. This may reduce the force of the wake in the rear of the vehicle and as such reduce the amount of energy required to push the vehicle forward. FIGS. 4A-4B FIG. 4A FIG. 4B 410 420 420 410 410 410 420 In addition to being attached to the body of the vehicle, the non-flat devices of the disclosure may be installed on various aftermarket vehicle accessories to reduce aerodynamic drag. depict an example pattern in which curve-shaped devices can be installed on vehicle accessories. illustrates a close-up view of a diamond-like grid pattern in which non-flat devices can be installed on a side skirt , while depicts a distant view of non-flat devices installed on the side skirt . The non-flat devices may be installed on one or both side skirts in a variety of patterns. The example diamond-like grid pattern includes a plurality of rows and columns of non-flat devices where the rows and columns are equally distanced and diagonally aligned. It should be noted that while a diamond-like grid pattern is illustrated, many different types of patterns may be used to apply the non-flat devices to an aftermarket accessory such as the side skirt . Use of the non-flat devices on after-market aerodynamic attachments such as the side skirt may optimize fuel and energy performance for multiple reasons. When attached to the sides of the vehicle, side skirts may allow for a large vortex to form on the side of the vehicle. The non-flat devices of this disclosure may cause the large vortex to be delayed in its formation and greatly reduced in size. This delay causes the air to stay closer to the body of the vehicle. Furthermore, the non-flat devices may cause a second premature vortex to form that can act as a shield to the large vortex. This may direct the air to travel more upwards, reconnecting with the surface of the vehicle, and breaking the wake into smaller sizes as it exits behind the vehicle. Moreover, the geometries of the non-flat devices installed on the side skirts may cause the air streams to travel upwards as they move towards the back of the vehicle. This leaves low pressure zones at the rear sides, causing the air below the vehicle to curl upwards behind the truck much closer to the rear of the vehicle than it otherwise would. This curling may provide an assistive push of air onto the back of the vehicle in the forward direction. Thus, the non-flat devices assist in reducing the wake and creating an assistive push forward. When the invention is applied to a side skirt that is installed at an angle or tapered in, the vortices that are created may take a more lateral path along the side skirts. This effect may reduce the amount of friction along the side of the vehicle and create a more uniform path for the air to travel to be able to curl backwards and provide an assistive push. Thus, applying the non-flat devices on any side skirt can have beneficial effects. FIG. 5 FIG. 5 FIG. 3 FIG. 5 510 510 depicts an example pattern in which non-flat devices having an alternative geometrical shape can be installed on a body of the vehicle. The non-flat devices of are wave-like shaped (as depicted in ). These devices may be directly attached to the exterior body of a vehicle or may be attached to panels on the body of the vehicle in a similar manner as that discussed above with respect to hemispherical devices. For example, they may be installed in diamond-like grid patterns or any other patterns. Furthermore, they may cover the entire surface of one or more sides of the vehicle, or as depicted in , they may only be applied in small segments. The non-flat devices disclosed herein may be mounted to the exterior body of the vehicle or affixed to existing aerodynamic attachments on the vehicle. In one implementation, the devices are affixed to the body of the vehicle as individual devices on the surfaces of the trailer body or as a system with a multiplicity of devices connected to one another on the surface of the trailer body. Both singular devices and systems are mounted in such a way to maintain a low profile so that they do not disturb regular operations such as opening of doors. For trailers carrying cargo or shipping containers, the non-flat devices may be attached to the body of the cargo or shipping container or may be attached as side skirts to the bottom of the cargo or shipping container. For caravans (multiple trailers or multiple bodies such as train cars), the non-flat devices may be attached to the entire exterior surface of the vehicle, a segment of the exterior surface of the vehicle, or on aftermarket attachments of any or all trailers. As air passes along the non-flat devices, the air travels faster, and more uniform than it otherwise would, thus greatly reducing the aerodynamic drag experienced in the gap between the bodies as well as by the front of the subsequent body, itself. While various embodiments have been described, the description is intended to be exemplary, rather than limiting, and it is understood that many more embodiments and implementations are possible that are within the scope of the embodiments. Although many possible combinations of features are shown in the accompanying figures and discussed in this detailed description, many other combinations of the disclosed features are possible. Any feature of any embodiment may be used in combination with or substituted for any other feature or element in any other embodiment unless specifically restricted. Therefore, it will be understood that any of the features shown and/or discussed in the present disclosure may be implemented together in any suitable combination. Accordingly, the embodiments are not to be restricted except in light of the attached claims and their equivalents. Also, various modifications and changes may be made within the scope of the attached claims. While the foregoing has described what are considered to be the best mode and/or other examples, it is understood that various modifications may be made therein and that the subject matter disclosed herein may be implemented in various forms and examples, and that the teachings may be applied in numerous applications, only some of which have been described herein. It is intended by the following claims to claim any and all applications, modifications and variations that fall within the true scope of the present teachings. Unless otherwise stated, all measurements, values, ratings, positions, magnitudes, sizes, and other specifications that are set forth in this specification, including in the claims that follow, are approximate, not exact. They are intended to have a reasonable range that is consistent with the functions to which they relate and with what is customary in the art to which they pertain. The scope of protection is limited solely by the claims that now follow. That scope is intended and should be interpreted to be as broad as is consistent with the ordinary meaning of the language that is used in the claims when interpreted in light of this specification and the prosecution history that follows, and to encompass all structural and functional equivalents. Notwithstanding, none of the claims are intended to embrace subject matter that fails to satisfy the requirement of Sections 101, 102, or 103 of the Patent Act, nor should they be interpreted in such a way. Any unintended embracement of such subject matter is hereby disclaimed. Except as stated immediately above, nothing that has been stated or illustrated is intended or should be interpreted to cause a dedication of any component, step, feature, object, benefit, advantage, or equivalent to the public, regardless of whether it is or is not recited in the claims. It will be understood that the terms and expressions used herein have the ordinary meaning as is accorded to such terms and expressions with respect to their corresponding respective areas of inquiry and study except where specific meanings have otherwise been set forth herein. Relational terms such as first and second and the like may be used solely to distinguish one entity or action from another without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms “comprises,” “comprising,” and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. An element preceded by “a” or “an” does not, without further constraints, preclude the existence of additional identical elements in the process, method, article, or apparatus that comprises the element. The Abstract of the Disclosure is provided to allow the reader to quickly identify the nature of the technical disclosure. It is submitted with the understanding that it will not be used to interpret or limit the scope or meaning of the claims. In addition, in the foregoing Detailed Description, it can be seen that various features are grouped together in various examples for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that any claim requires more features than the claim expressly recites. Rather, as the following claims reflect, inventive subject matter lies in less than all features of a single disclosed example. Thus, the following claims are hereby incorporated into the Detailed Description, with each claim standing on its own as a separately claimed subject matter.
The geometrical factor in freckle formation has rarely been taken into account. In this work, freckle formation in superalloy components is examined. It is found that freckle formation is subject to the effects of the edge and curvature. In polygonal casting sections, freckles are formed preferably on the convex edges. In the components with a curved contour, freckles are exclusively formed on the outward-curving surface having positive curvature. Freckles remain as one of main casting defects in single-crystal (SC) or directionally solidified (DS) Ni-base components.[1,2,3,4] They appear to be long trails of equiaxed grains aligning roughly parallel to the direction of gravity and are often found on the surface of SC or DS superalloy castings.[5,6,7] It is generally acknowledged that freckles are formed as a consequence of thermos-solutal convection, which is driven by density inversion in the mushy zone.[1,8,9,10,11] The interdendritic liquid in the mushy zone tends to “jet” upward from the mush zone. Along the way, these jets erode dendrites and break them apart. Thereafter, the eroded dendrites re-dissolve into the liquid or act as nuclei for equiaxed grains.[12,13,14,15,16,17] Apart from chemistry segregation,[18,19,20] solidification parameters and casting size also play significant roles with respect to freckle formation in Ni-base superalloy casting.[1,2,21,22,23,24,25] During solidification, convective flow in the mushy zone can be accelerated by a lower temperature gradient (G) or solidification velocity (V), resulting in larger dendrite spacing and higher permeability. Hence, freckles are preferentially formed under such conditions. To prevent the formation of freckles, high temperature gradients or high solidification velocities are required. Above a critical thermal gradient, the mushy zone becomes too small to accommodate the convective currents for freckles to form. With an increasing solidification velocity, the local solidification time will be shorter than the minimum one required to form freckles, resulting in a freckle-free structure. In addition, larger casting size leads to severe freckling.[1, 4, 5, 26,27,28] This is because an increased cross section of a casting has a wider mushy zone, providing a sufficient reservoir for the interdendritic convection, and the convention favors the freckle formation.[29,30,31,32] In contrast, freckles are normally not found in components with small cross-sectional area. This is commonly referred to as the size effect of freckle formation. In recent work,[16,24,25,26,27] a series of SC and DS experiments with a relatively complex geometry was carried out under industrial conditions, and a number of interesting phenomena related to freckle formation were observed, such as the shadow, step,[33,34] orientation, slopping and edge effects.[33,36] Recently, we observed that freckles prefer to form on the edges of components instead of on the plane surface despite the higher cooling rate on the edges, which is unfavorable for freckle formation. In this article, the edge and curvature effect on freckle formation will be reported. Compositions of Ni-base superalloy CMSX4 involved in this article are provided in Table I. The components were cast at 1500 °C. The pulling velocities were 1 mm/min for bars and 3 mm/min for real blades, respectively. Sixteen trails were carried out for casting bars and over 20 trails for blades. The geometries of casting components involve the rectangular and cylindrical cross section. As shown in Figure 1, freckles are commonly located on the edge of the sample in either the simple geometries or real blades of the superalloy. This so-called “edge effect” phenomenon contradicts our current understanding of freckle formation; freckles form at lower cooling rates. A higher solidification rate results in an unfavorable thermal condition for freckle formation in the edges. Therefore, it is usually believed that freckles arise preferentially on the smooth surfaces of the thicker parts of the components. Further details of the geometrical effect on the freckle formation are shown in Figure 2, which presents an incomplete cast blade consisting of four parts with respect to the side surface, i.e.., convex side A, concave side B, leading edge C and trailing edge D. Freckle chains can be observed on both leading and trailing edges indicating the edge effect on freckle formation. In addition to freckles forming on the leading and trailing edge C and D, most of the freckles occurred on the convex side A of the blade body compared with concave side B where the blade surface was totally freckle free. Moreover, the freckle appearance became very pronounced, especially in the middle part of the convex side where the surface curvature and local thickness were the largest. A solidified structure is revealed in the decanted mushy zone because of the insufficient feeding. The decanted mushy zone can be easily recognized as the dark zone ahead of the fully solidified solid zone, which appears much brighter, as shown in convex blade side A in Figure 2. In the exposed freckling channels in the mushy zone, growing dendrite and broken dendrite arms can be observed. At the locations corresponding to the freckling channels, the mushy zone is wider because of the delayed solidification processing. Under each channel in the mushy zone, a freckle chain can be found in the solid zone. It is then evidently confirmed that the freckle formation resulted from the channel-shaped segregation and convection in the mushy zone. The molten alloy in the freckling channels was seriously segregated, significantly lowering the solidus temperature. As a result, the residual melt in the channels was exhausted by the neighboring dendrites, leaving open grooves on the surface of convex side A. On the middle part of convex side A, as shown in Figure 2, the most serious freckles were observed, although the local curvature effect was relatively small. The thickness of the cross-sectional mold must be an important promoting factor, i.e., the size factor, to provide a sufficient reservoir to support the interdendritic convection and hence the onset of freckling. On the other side, regardless of the favorable size factor and thermal condition of concave side B, no freckles were observed. The interpretation for this important phenomenon is proposed as the curvature effect of the component cross section. The negative curvature of site B diverges and weakens the surface effect compared with positive curvature, which will strengthen the surface effect owing to the overlapping effect. Based on our recent work,[37,38] freckles occur not only on the external surfaces, but also inside the castings where a core was inserted. This is also attributed to the above-stated surface effect or wall effect, because both the shell and core wall can provide very high permeability for freckling convection in the mushy zone. Figure 3 shows the cross section of a cylindrical sample with an inserted ceramic tube as core. The external freckles were observed beneath the outside surfaces as indicated with A1 in Figure 3, revealing the surface effect, i.e., the wall effect, on the freckle formation. Internal freckles were observed only in regions A2 inside of the core tubes, while region B outside the core tube remained freckle free. This important phenomenon is correlated with the curvature effect on freckle formation. Since convex shapes (regions A1 and A2 in Figure 3) have a positive curvature, the combination of the overlapping effect aggravates the formation of freckles. This is similar to the convex side of the blade where the most serious freckles were observed (Figures 2 and 3(a)). For the concave surface in region B, a negative curvature suppresses the freckle formation leading to a freckle-free structure (Figure 2). The schematic diagram summarized in Figure 3(b) indicates the freckling and freckling-free regions contacted the ceramic core. The insertion of the ceramic cores into the superalloy components provides the internal wall to promote freckle formation. However, the freckling consequence is very different because of the curvature effect of the core surface shape. The favorable locations around the blade contour are schematically illustrated in Figures 4(a) and (b) with shell mold thickness to indicate the local solidification condition. The freckle formed on the leading (C) and trailing edge (D) of the large blade indicates the edge effect—promoting freckle formation. However, this phenomenon appears to contradict the current knowledge about the size effect in which freckles are normally not present in small cross sections. Figure 4(b) shows both edges, especially the trailing edges, have very thin mold thickness. Freckle formation should be avoided in these regions because of the faster solidification rate in the component. In addition, the edges in C and D have good cooling conditions due to the thin mold thickness as shown in Figure 4(b). Therefore, relevant locations on blades are assumed to be unfavorable sites for freckle formation. On the other hand, the middle part of concave side B with a thick mold is assumed to have the worst cooling condition and the smallest viewing angle for heat radiation. It was surprising to observe the freckles on side A, which has better cooling conditions. Therefore, there must be other factors influencing the freckle formation apart from the effects of the casting size and cooling rate. The result of edge and curvature effects on freckle formation is schematically illustrated in Figure 4(c). In the figure the blade contour is simplified as a polygonal section to illustrate the surface effect on freckle formation in complex components. Edges A, C and D are convex edges with different angles, whereas concave edge B presents an angle > 180 deg. Surface effect zones and overlapping zones are marked on Figure 4(c). At edges A, C and D, the surface effect zones of the neighboring sides are overlapped for an angle < 180 deg. As illustrated in the figure, the effect of the convection condition on freckle formation in the overlapping region is doubled compared with the effect at the flat side, leading to the so-called “edge effect” on freckle formation (Figures 1 and 2). To some extent, the overlapping effect of the neighboring sides is more pronounced if the included angle becomes smaller according to the observations of freckles on the trailing edges of turbine blades. At concave edge B in Figure 4(c) where an included angle > 180 deg occurs inside of the polygonal, there is a gap in the wedge shape. No freckle forms in concave edge B. Based on the above results, the following conclusions can be drawn: - (1) Fluid permeability near the wall is much higher than that inside of the casting, promoting thermal-solutal convection and freckle formation on the component surface. - (2) On the edges of the components, the surface effects on convection overlap each other, providing a more favorable freckling condition than that on the flat surfaces, leading to the so-called “edge effect,” promoting freckle formation. - (3) The edge effect can be extended to the curvature effect. The convex side has a positive curvature, and the surface effect can be overlapped and then strengthened, while the concave side has a negative curvature, and the surface effect will diverge and then weaken. Therefore, freckles are observed more frequently on the convex surface than on the concave ones of castings. - (4) The insertion of ceramic cores into casting components provides an internal wall, which promotes freckle formation on the convex surface. References - 1. A. F. Giamei and B. H. Kear, Metall. Trans. 1970, vol. 1, pp. 2185-2192. - 2. S. M. Copley, A. F. Giamei, S. M. Johnson and M. F. Hornbecker, Metall. Trans. 1970, vol. 1, pp. 2193-2204. - 3. D. J. Sun, L. Liu, T. W. Huang, W. C. Yang, C. He, Z. R. Li, J. Zhang and H. Z. Fu, Metall. Mater. Trans. A 2019, vol. 50A, pp. 1119-1124. - 4. A. Kao, N. Shevchenko, M. Alexandrakis, I. Krastins, S. Eckert and K. Pericleous, Philos. Trans. Royal Soc. A 2019, vol. 377, p. 15. - 5. S. Tin and T. M. Pollock, J. Mater. Sci. 2004, vol. 39, pp. 7199-7205. - 6. P. Auburtin, T. Wang, S. L. Cockcroft and A. Mitchell, Metall. Mater. Trans. B 2000, vol. 31, pp. 801-811. - 7. Schadt R, Wagner I, Preuhs J, Sahm PR (2000) New aspects of freckle formation during single crystal solidification. Minerals Metals Materials Soc, Warrendale - 8. J. P. Gu, C. Beckermann and A. F. Giamei, Metall. Mater. Trans. A 1997, vol. 28, pp. 1533-1542. - 9. A. Hellawell, J. R. Sarazin and R. S. Steube, Philos. Trans. Royal Soc. A 1993, vol. 345, p. 507. - 10. Ling Qin, Jun Shen, Qiudong Li and Zhao Shang, J. Cryst. Growth 2017, vol. 466, pp. 45-55. - 11. M. T. Rad, P. Kotas and C. Beckermann, Metall. Mater. Trans. A 2013, vol. 44A, pp. 4266-4281. - 12. S. N. Tewari, R. Shah and M. A. Chopra, Metall. Trans. A 1993, 24, 1661-1669. - 13. M. C. Schneider and C. Beckermann, Int. J. Heat Mass Transfer 1995, vol. 38, pp. 3455-3473. - 14. Fu Wang, Dexin Ma, Jun Zhang and Andreas Bührig-Polaczek, J. Alloys Compd. 2015, vol. 620, pp. 24-30. - 15. R. Mehrabian, M. Keane and M. C. Flemings, Metall. Mater. Trans. B 1970, vol. 1, pp. 1209-1220. - 16. M. C. Schneider, J. P. Gu, C. Beckermann, W. J. Boettinger and U. R. Kattner, Metall. Mater. Trans. A 1997, vol. 28, pp. 1517-1531. - 17. Lang Yuan and Peter D. Lee, Acta Mater. 2012, vol. 60, pp. 4917-4926. - 18. Yang WH, Chen W, Chang KM (2001) Freckles in remelted niobium containing superalloys. Minerals Metals &Materials Soc, Warrendale - 19. D. Ma, U. Grafe, Mater. Sci. Eng. A 1999, 270, 339-342. - 20. Erik M. Mueller: The characterization of freckle casting defects in directionally solidified nickel-base superalloy turbine blades. University of Florida, 2003. - 21. P. Auburtin, S. L. Cockcroft and A. Mitchell, In Material for Advanced Power Engineering 1998, Proceedings of the 6th Liege Conference, ed. F. Schubert and P.J. Ennis J. Lecomte-Beckers (Forschungszentrum Jülich: Uni. De Lieghe, 1998), pp 1459–68. - 22. Yizhou Zhou, Scripta Mater. 2011, vol. 65, pp. 281-284. - 23. 23. Dexin Ma and Andreas Bührig-Polaczek, Metall. Mater. Trans. A 2014, vol. 45, pp. 1435-1444. - 24. X. B. Meng, J. G. Li, Z. Q. Chen, Y. H. Wang, S. Z. Zhu, X. F. Bai, F. Wang, J. Zhang, T. Jin, X. F. Sun and Z. Q. Hu, Metall. Mater. Trans. A 2013, vol. 44A, pp. 1955-1965. - 25. X. H. Wang, R. M. Ward, M. H. Jacobs and M. D. Barratt, Metall. Mater. Trans. A 2008, vol. 39A, pp. 2981-2989. - 26. S. Tin: Carbon additions and grain defect formation in directionally solidified nickel-base superalloys. University of Michigan, 2001 - 27. R. A. Hobbs, S. Tin and C. M. F. Rae, Metall. Mater. Trans. A 2005, vol. 36, pp. 2761-2773. - 28. Tin S, Pollock TM, King WT (2000) Carbon additions and grain defect formation in high refractory nickel-base single crystal superalloys. Minerals Metals Materials Soc, Warrendale - 29. H.T. Pang, H.B. Dong, R. Beanland, H.J. Stone, C.M.F. Rae, P.A. Midgley, G. Brewster and N. D’Souza, Metall. Mater. Trans. A 2009, vol. 40, pp. 1660-1669. - 30. Welton D, Souza N, Kelleher J, Gardner S, Dong ZH, West GS, Dong H (2015) Metall. Mater. Trans. A 2015, 46, 4298-4315. - 31. N. D’Souza, S. Simmonds, G. D. West and H. B. Dong, Metall. Mater. Trans. A 2013, vol. 44, pp. 4764-4773. - 32. A. Wagner, B. A. Shollock and M. McLean, Mater. Sci. Eng. A 2004, 374, 270-279. - 33. Dexin Ma, Qiang Wu and Andreas Bührig-Polaczek, Metall. Mater. Trans. B 2012, vol. 43, pp. 344-353. - 34. D. Ma, J. Ziehm, W. Wang and A. Bührig-Polaczek, IOP Conference Series: Materials Science and Engineering 2012, vol. 27, p. 012034. - 35. Ma DX, Mathes M, Zhou B, Bührig-Polaczek A: Adv. Mater. Res. 2011, 278, 114-119 - 36. Dexin Ma, Acta Metallurgica Sinica 2016, vol. 52, pp. 426-436. - 37. Hong J, Ma D, Wang J, Wang F, Dong A, Sun B, Bührig-Polaczek A: J. Alloys Compd. 2015, 648, 1076-1082 - 38. F. Wang, D. Ma, and A. Bührig-Polaczek: Metall. Mater. Trans. A, 2019, vol. 50, pp. 804–15. Additional information Publisher's Note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Manuscript submitted June 13, 2019. Rights and permissions Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. About this article Cite this article Ma, D.X., Dong, Z.H., Wang, F. et al. A Phenomenological Analysis of Freckling in Directional Solidification of Ni-Base Superalloy: The Role of Edge and Curvature in Casting Components. Metall Mater Trans A 51, 88–92 (2020). https://doi.org/10.1007/s11661-019-05513-5 Received: Published: Issue Date:
https://link.springer.com/article/10.1007/s11661-019-05513-5?error=cookies_not_supported&code=dff262e8-4e2b-45c5-b50e-6bae95c558d2
The City of Birmingham, population 20,103 (2010), is a suburb in Oakland County, roughly 20 miles north of downtown Detroit. In 2007, Birmingham adopted a form-based code for a 20-block area bounded by Maple, Adams and Woodward. Within three of the four zoning districts in this Triangle Overlay District, TDR from protected historic landmarks, in addition to three other mechanisms, can be used to exceed baseline building height. The code establishes baseline building heights that can be exceeded when developers propose to add two or more of the following features to their projects. A multi-level parking structure with publicly-available parking at the ratio of one space per 300 square feet of floor area in all floors above the baseline height. In the event that no additional floors are proposed, the applicant must supply one space per 300 square feet in the building’s top floor. Developers have the option of paying $15,000 in lieu of each required parking space, which the City then uses to build offsite public parking. Dedication of an improved public plaza with an area at least 25 percent of the floor area of all floors above baseline or 25 percent of the floor area of the top floor if no additional floors are proposed. A mixed use building in which at least half the building is residential and the dwelling units are above first floor commercial. Transfer of development rights for unused potential floor area from a designated historic landmark (calculated as the difference between the landmark’s floor area and the amount of floor area permitted in the landmark’s zoning district). The TDRs are granted following the recording of a conservation easement on that landmark as reviewed and approved by the Historic District Commission. The bonus height available when two or more of the above features are proposed varies depending on which of the three qualifying zoning districts the receiving site project is located within.
http://smartpreservation.net/birmingham-michigan/
The DNA markers of those who practice the concepts of KingdomNomics differ radically from those who abide by the “wisdom” promoted by the world system. KingdomNomics thinkers focus their thoughts on the person of Jesus Christ. KingdomNomics thinkers understand that they have been given a “loaf of time” that is being shortened by a slice each day. KingdomNomics thinkers accept that they have been designed by God for a purpose to be fulfilled in the time they have left in this world. KingdomNomics thinkers view their 3 Ts—time, talent, and treasure—as items at risk of being consumed by perishable goals in this temporary world, leaving them with nothing in the world to come. KingdomNomics thinkers discover that, through honoring God, they can convert the perishable into imperishable goals with lasting values. KingdomNomics thinkers value their relationship with God through Jesus Christ as priceless gold. KingdomNomics thinkers practice the core concept of the Christian life: SOAK, SOW, and FLOW. They see Christ living in and through them. “For Christ’s love compels us, because we are convinced that one died for all, and therefore all died. And he died for all, that those who live should no longer live for themselves but for him who died for them and was raised again” (2 Corinthians 5:14-15, NIV). KingdomNomics thinkers believe that God works through the grace-giving principles outlined in 2 Corinthians 9:6-15: “And God is able to bless you abundantly, so that in all things at all times, having all that you need, you will abound in every good work” (2 Corinthians 9:8, NIV). KingdomNomics thinkers are strategic kingdom investors who focus on giving while they are living. They follow the example of those who have gone before them: Moses “regarded disgrace for the sake of Christ as of greater value than the treasures of Egypt, because he was looking ahead to his reward” (Hebrews 11:26, NIV). The wise men “saw the child with his mother Mary, and they bowed down and worshiped him. Then they opened their treasures and presented him with gifts of gold, frankincense and myrrh” (Matthew 2:11, NIV). Zacchaeus “stood up and said to the Lord, ‘Look, Lord! Here and now I give half of my possessions to the poor, and if I have cheated anybody out of anything, I will pay back four times the amount’” (Luke 19:8, NIV). The world focuses on the here and now, with no thought of tomorrow. But the things the world considers important—power, position, wealth, and status—are perishable. KingdomNomics thinkers “speak a message of wisdom among the mature, but not the wisdom of this age or of the rulers of this age, who are coming to nothing” (1 Corinthians 2:6, NIV). Today, ask yourself: If someone were to examine me today, would they recognize the DNA MARKERS of a strategic kingdom investor in me?
https://kingdomnomics.com/dna-markers-of-a-strategic-kingdom-investor/
Collection of independent publications, bound in one volume – convolute that is demonstrated at the exhibition, made up of 6 books of the Bible printed by Francysk Skaryna in different years in Prague. Collection includes: Proverbs of Solomon, 1517 Ecclesiastes, 1518 Song of Songs, 1518 Book Wisdom of God, 1518 Book of Jesus Sirohova, 1517 Book of Daniel, 1519 Titles in the list are given in order of their sequence in the collection. The convolute belongs to the State Historical Museum – the most important of Russian museums of national history. His fund of ancient manuscripts and books kept large and rather interesting collection of a famous collector of Russian antiquities Ivan Nikitovich Tsar (1790–1853). The convolute, which is in the window – one of the items of this collection. No one knows who, where and when this collection was completed. However, the known history of the entire collection, due to the change of its owners. Ivan Nikitivich Tsarev, rich Moscow merchant–old believer was one of the important bibliophiles of the first half of the 19th century. After his death, a great library, collected by him, which included the publication of Francysk Skaryna moved to two owners: the manuscript and part to early printed books bought by Count Aleksey Sergeevich Uvarov (1802–1884). He was an archaeologist and Archeograf, founder of the Moscow Archaeological partnership. Another portion early printed book acquired by graph Vladimir Petrovich Orlov–Davydov (1809–1882), known patron and bibliophile. In 1917, two were nationalized and transferred to the State Historical Museum Foundation. Since that time, as a collection of these treasures are kept as a collection in the manuscript department of the State Historical Museum. The convolute, given by the State Historical Museum (Moscow) to the National Historical Museum of the Republic of Belarus for: “Belarus:Revival of Spirituality” exhibition, dedicated to the 500th Anniversary of Belarusian book printing, is displayed for the first time in Belarus. Open: 11.00–19.00 Daily Ticket desk open: 11.00 – 18.30 Visitors enter: 11.00 – 18.30 Adults: Permanent exhibitions tour – Br 10 BYN Guided tour – Br 30 BYN Full-time students: Permanent exhibitions tour – Br 8 BYN Guided tour – Br 25 BYN Schoolchildren and specialised secondary school students: Permanent exhibitions tour – Br 5 BYN Guided tour – Br 15 BYN Retirees:
http://histmuseum.by/en/collection/museum-treasury/convolute-skaryna/
Growing radish (Raphanus sativus var. radicula) in plug trays in a floating system This paper compares the growth of radish 'Tinto F1' grown in a greenhouse in polystyrene plug trays with 84 and 40 cells, on a floating system, with the plants placed on a growing table. Plug trays placed on a floating system were filled with a mixture of perlite and granulated rockwool 1:1, while those placed on a growing table were filled with a peat substrate. Four nutrient solutions were tested in 2 growing cycles in Ljubljana ' the central part of Slovenia. The first cycle took place from 6th April to 21st May 2010, and the second from 27th May to 13th July 2010. Two nutrient solutions were made from reagents and two from water soluble fertilizer (WSF). Two different N concentrations were also tested. Each experiment consisted of three repetitions and the radishes were harvested three times (at weekly intervals) when plants had formed at least a 2 cm large hypocotyl. In both experiments, the trays with 40 cells (264 plants m-2) resulted in a higher % of marketable hypocotyls but the number of marketable hypocotyls was not statistically higher in trays with 84 cells (554 plants m-2). In the second cycle, in which the last harvest was done on 13th July, the radishes grown on a floating system was more than 60% marketable, but the radishes grown in peat in a tray with 84 cells began to flower and less than 15% of the plants formed a fleshy tap root. The addition of N to the nutrient solution accelerated bolting. The radishes grown in the second cycle on a floating system were harvested 7-14 days earlier than the radishes in a peat substrate.
https://www.ishs.org/ishs-article/1209_6
Antarctica’s climate: the key factors What are the main characteristics of Antarctica’s climate, and what large-scale factors are responsible? Why is Antarctica’s climate colder than the climate of the Arctic? Antarctica’s climate is also very windy and dry. Wind speeds vary across the continent and are discussed in Regional climate variation and weather; but the idea that Antarctica is a kind of desert requires some explanation here. The relative humidity of air at the South Pole is often as low as 0.03%, and the continent is a polar desert. This may at first seem surprising with 99% of its area being covered by ice; and Antarctica certainly doesn’t conform to the image that most people have of a desert. Yet, most of Antarctica is classed as a desert on the basis of its mean annual precipitation. What little precipitation there is mostly falls as snow, averaging less than 50mm a year (water equivalent) across much of the interior. This is in the ‘hyper arid’ category, shared with the Sahara, Namib, Atacama, and other great deserts of the world. The presence of so much ice despite such low precipitation is simply due to the fact that low temperatures cause even less ablation than accumulation (see Tectonic history: into the deep freeze and Ice sheets and glaciation for an account of the build up of the Antarctic Ice Sheet). Although related, the terms climate and weather do have distinct meanings. This section focuses on the general climate characteristics of Antarctica as a whole, while the next section looks more specifically at regional differences in Antarctica’s climate and weather across the continent. Q&A Climate or weather? Match the following statements with the correct term (climate or weather) to review your understanding of the differences. - Day to day variations in atmospheric conditions (temperature, humidity, precipitation, wind speed, sunshine etc.) - Lowest temperature recorded at Vostok Station, 21 July 1983. - Rothera Station mean annual temperature calculated by averaging 30 years of data. - Days of high winds which slowed progress and caused Shackleton to abandon the 1907-09 expedition to the South Pole when within 100 miles of the destination. - Globally averaged surface air temperature rise of 0.7°C over the past century. - A strong low pressure system causing storms and rough seas in the Drake Passage. - Air over the high East Antarctic plateau is very cold causing it to sink and create persistent high pressure over the polar region. Answers - Antarctica’s weather - Antarctica’s weather - Antarctica’s climate - Antarctica’s weather - Antarctica’s climate - Antarctica’s weather - Antarctica’s climate Cold facts Why is Antarctica’s climate so cold? The coldness of Antarctica’s climate is the result of a combination of factors. As with the Arctic, Antarctica’s high latitude means that sunlight (insolation) hits the surface at a low angle (low angle of incidence), and this means that solar energy is spread over a larger area than would be the case if the sunlight hit the surface at a higher angle. By being spread over a larger area, the energy received per unit area (e.g. watts per m2) is reduced. Furthermore, southwards of the Antarctic Circle (66.56°S) there is a period during the austral winter when the sun does not rise above the horizon (the length of this period increases with increasing latitude). At the South Pole itself there is low angle sunlight continuously between September 21st and March 21st, and darkness during the other half of the year. During the dark period in the austral winter, there continues to be heat output to space, but there is no insolation input. This causes temperatures to drop to their lowest point of the year. The fact that the air is very dry also means that relatively little of the heat given off by the ground is retained by the atmosphere. Due to the long day length of the austral summer, and the thin atmosphere over the high elevation ice sheet, a relatively high amount of insolation reaches the surface, despite the low angle of incidence. However, it imparts little heat to the surface because of the high reflectivity (albedo) of the snow and ice. This albedo causes up to 85% of the insolation to be reflected, thereby limiting the absorption of solar radiation at ground level and limiting the amount of warming that can occur during the summer months. The high elevation and high albedo of the East Antarctic Plateau limits heating so much that in this region there is little difference between summer and winter temperatures. Why is Antarctica’s climate colder than the Arctic climate? The low angle of incidence and large seasonal changes in the length of day and night also affect the Arctic (although at opposite times of the year); therefore, additional factors are needed to explain why Antarctica’s climate is colder. These additional factors are related to the vastly differing geography and topography of the two areas: the Arctic is mainly ocean surrounded by land masses, whereas the land mass of Antarctica is surrounded by the Southern Ocean. Given the different heat capacities of land and sea (sea is much slower to both heat up and cool down), we would expect the coldest temperatures to occur at the pole that is dominated by land rather than sea. However this is only part of the story, and two other major effects need to be considered: Differences in elevation There is a high surface elevation across Antarctica because ice has built up on top of a large continental landmass. (By contrast, Arctic sea ice is floating and is only two or three metres thick.) Temperature declines with elevation due to the decrease in atmospheric pressure that occurs as height above sea level increases (this is the concept of adiabatic temperature decline). Therefore, on the basis of altitude, it is expected that temperature averaged across Antarctica will be lower than temperature averaged across the Arctic. While the Arctic does have some high elevation areas (e.g. on Greenland), these make up a small proportion of its total area. Differences in heat transport Both polar regions are cold because of low angle sunlight (along with periods of prolonged darkness) coupled with a high surface albedo. In relation to the energy balance of the whole planet, the polar regions are areas of energy deficit while the low latitudes are areas of energy surplus; however, the poles are not getting steadily colder and low latitudes steadily warmer. Instead, the Earth’s climate system transfers excess heat from low to high latitudes in various ways, for example through wind systems and ocean currents. However, the differing geography of the north and south polar regions leads to large differences in how this heat transport occurs. One key difference lies in the nature of ocean circulation in the two hemispheres. The North Atlantic Ocean has a strong ‘meridional’ (north/south) circulation that delivers relatively warm water to high latitudes. The Gulf Stream and North Atlantic Drift Currents are the surface components of a much larger system (the thermohaline circulation) that includes deep water currents that flow back south along the ocean floor (see The coast and adjacent seas for a discussion of deep water currents). With the connection between the Atlantic and Arctic Oceans between Greenland and Scandinavia, warmer seas and moist air masses have a stronger influence at high latitudes of the Arctic compared with the Antarctic. An important effect of moist air masses originating over the North Atlantic Ocean (and the North Pacific) is that they release heat at high latitudes when the vapour they carry turns into ice crystals or liquid droplets in the atmosphere to form clouds (and sometimes precipitation). This process is referred to as the release of latent heat. It is interesting to note that the coldest recorded temperature in the Arctic (-67.8°C) was measured in an area far from the influence of the sea – at Verkhoyansk, north-east Siberia. In contrast with ocean circulation in the Northern Hemisphere, the Antarctic Circumpolar Current (introduced in The coast and adjacent seas) is a more ‘zonal’ (west/east) system that circulates cold water clockwise around the continent, presenting a barrier to the more temperate ocean waters found northwards of the polar front. The heat that is transported into Antarctica is largely from low pressure systems that form out to sea between 60 and 65°S in an area known as the circumpolar trough. The large temperature difference between cold Antarctic air masses and mild maritime air masses from the mid-latitudes creates a frontal boundary in the atmosphere over the Southern Ocean that causes frequent storms to develop which move east and south-east due to the prevailing winds. Not only do these storm systems take moist air towards Antarctica, but they also account for the notoriously rough seas encountered in the Southern Ocean. Why is Antarctica’s climate so dry? There are multiple reasons for the aridity of Antarctica’s climate , most easily conceptualised as involving the combined effects of temperature, pressure, and ‘continentality’. Cold air cannot hold as much water vapour as warm air: in fact the relationship between temperature and vapour holding capacity is an exponential one, so the ability of very cold Antarctic air to hold moisture is miniscule compared with the warmer air of lower latitudes. This in itself limits the quantity of precipitation that can fall on Antarctica because there is relatively little water vapour to begin with. Precipitation is also limited by the influence of polar high pressure. In brief, high pressure is associated with dry climates whereas low pressure with wet climates. To understand why, we need to look more closely at the phenomenon of atmospheric pressure. Air has weight, and exerts pressure, because the gases making up the atmosphere are subject to the pull of Earth’s gravity. At sea level, the average air pressure is approximately one ‘bar’ (or 1000 millibars). However, the amount of pressure exerted on the surface by air is not equal everywhere because of differences in heating across the Earth. As a ‘parcel’ of air is heated, it becomes less dense than surrounding air, and rises in a way analogous to the uplift of a hot air balloon. In areas where air is rising (such as around the Equator), there is a reduction in the pressure of the atmosphere upon the surface (a region of low pressure). Cold air, on the other hand, is more dense than warm air so will sink towards the surface causing an increase in pressure (a region of high pressure). Because the poles are the areas of the globe that are heated least by the Sun, the air overlying the poles therefore descends towards the surface: this is the cause of polar high pressure. Air then moves away from the centre of high pressure forming prevailing winds that (under the influence of Earth’s rotation) move outwards towards the edges of the continent from east to west. These are the polar easterlies described further in the next section. The link between pressure and precipitation is as follows: as air rises (causing lower pressure on the surface) it cools because of the pressure decline that occurs with increasing altitude. With cooling, the capacity of air to hold water vapour decreases (relative humidity increases); and, once the dew point temperature is reached, vapour condenses to form liquid droplets or, as is the case in cold climates, sublimates to form ice crystals. Clouds are formed, and if the cloud particles become large enough to have a downward force (mass ? gravitational acceleration) exceeding the force of air currents, precipitation will occur. On the other hand, if air is descending (high pressure on the surface) its temperature increases. This means that the vapour holding capacity increases, relative humidity decreases, and precipitation is less likely. It may seem paradoxical at first that polar high pressure is caused by the cold air sinking, while the sinking process itself causes the air to warm up. To put this in perspective however, dry air gains about 1°C on each 100m of descent. Given the extremely low temperatures of the lower atmosphere over Antarctica (often below -50°C), air remains very cold at surface level despite this adiabatic process. Lastly, Antarctica’s aridity can also be explained in terms of its ‘continentality’. Being a large landmass, much of its terrain is far from the sea. In the austral winter, when sea ice expands over an area of the Southern Ocean larger than the area of the continent itself, moist maritime air masses are even more distant. As detailed in Regional climate variation and weather, there is a large difference in levels of precipitation near the coast compared with further inland. A further factor behind Antarctica’s aridity is the temperature of the Southern Ocean itself: sea surface temperatures below 3.5°C limit the amount of warming of overlying air and hence the amount of vapour that the air can carry and transport to Antarctica. The following websites contain more information about polar climates: Student activities - Write up a short essay (or fact file) describing and explaining the general characteristics of Antarctica’s climate. Refer to values of temperature, humidity, precipitation, and surface air pressure in your write-up. - Write a paragraph explaining why the South Pole is not the coldest place in Antarctica. - Make a table summarising the similarities and differences between Antarctica’s climate and the climate of the Arctic.
https://discoveringantarctica.org.uk/oceans-atmosphere-landscape/atmosphere-weather-and-climate/key-factors-behind-antarcticas-climate/
You will need a 40 inch by 60-inch material to finish your Afghan. Once you have the finish you can start building your materials. It’s up to you what type of Afghan you want to create, however in this article I will show you a few steps in my the “Ivy League.” You want to select deep, vivid colors. Ultimately, you can select soft fabrics. You will need wool, preferably the heavy-duty. Purchase 45 ounces of aqua, red, etc, in a variety of colors. Choose 22 ounces of red, light green; dark greens, forest green, etc, and blue. Choose 28 ounces of red and navy blue in a variety of colors. You will need to purchase a hook, preferably the “K” crocheting hook. The gauge is around 6 ½ squares, which you can purchase a hook that matches this gauge also. Use a variety of colored yarns in succession per square. If you want to shift colors, it is best to avoid chain stitching at the end of your lines. Start turning your work until you connect with the colors, chain stitch I row and work your line in accordance. When you start you, Afghan you will need to square, row, row, border, assembly, border, etc. When you start squares, create 54 squares on a chain two stitch. Move to row. To row one work, you will need three single crochets in your second chain stitch and away from your hook on another single chain turn. Move to your second row. Work two single crochets in your first single crochet and move to the following single crochet and the second, single crochet in the last single. Continue with five stitches and chain another single turn. In your third row work two single crochets in your first single, continue singles within the following three singles, adding two more singles to your last single, and then chain another turn. Moving to the fourth row, work two singles in your first single and then single crochet an even row to the last single. Work another two singles to the last and chain one turn. Next row, repeat by adding four rows and after you reach rows eleven up to twenty-three begin your stitches across the material. Continuing, create a loop in all of your first two singles. Use the “Yarn over Yo” method and move through all three of your loops on the crochet hook, which brings you to one single crochet and the decreasing phase. Next, single crochet two even stitches to decrease your last two singles and churn one turn. Repeat the steps on the twelve rows, yet only stitch three single crochet remains. On your last row create a loop in each of your preceding three singles and start the “Yarn over Yo” method to continue through each loops on your crochet hook and then close. Now you will start border rounds. Gather your greens, blue, and reds with a slipstitch in your corners. Do another three singles in the corner and another single to the following corner making sure the singles are even. Repeat the steps from about, and slip stitch toward the first single crochet. On your second and third rounds, slip stitch toward the middle stitch of your corner, and repeat the round once, and close after your finish the third round. Now you are ready to assemble. You should have a six square Afghan created, which is wide and has another 9 squares lengthwise. You want to oversew stitch (Whipstitch) the square togs and run ALL crosswise stripes so that they move in the same course. Now, border another round. Gather your yarn with another slipknot at the corner, and single crochet three in the corner, single crocheting another in the following corner, while making sure it is even. Repeat, stitching around and slip knot to reach the first single. Round two includes the slipknot to the middle single crochet of your corner, repeat round one, and close.
http://delawarefleamarkets.com/crafts/how_to_craft_an_afghan.html
96-year-old woman has been greeting O'Hare passengers for 50 years 96-year-old woman has been greeting O'Hare passengers for 50 years June Kreplin is 96 years old and one of the longest serving volunteers at Chicago’s O'Hare Airport. CHICAGO - She was born around the time the first passenger airliner took flight. Now, she is pointing travelers in the right direction at O’Hare. June Kreplin is 96 years old and one of the longest serving volunteers at Chicago’s main airport. While most of us view the airport as a stressful experience, for decades, Kreplin has seen it as an opportunity to help. Fifty years ago, Kreplin began her work as a traveler's aid volunteer at O’Hare Airport. “I spent a lot of time with the Korean orphans. My daughter is an adopted child. My first encounter with it was a little bit hard because I know what they do. They have to give a child up,” Kreplin said. She says watching eager American parents meet their adopted Korean babies for the very first time was both the most difficult and rewarding part of her time at O’Hare. Advertisement “I did go to Korea to pick up some children. We brought six of them back with us. They usually had someone from their agency coming with them. We would sometimes have 25 children on the plane. We had a lot of them. That was my favorite,” she said. Now a day, Kreplin still drives to O’Hare once a week, helping hundreds of travelers a day. She is the volunteer with the longest tenure at O’Hare, and maybe that's why she's closing in on 100 years old. “I do love it. I think everyone should have a volunteer job,” she said. “I think volunteering helps you navigate in life.” Travelers Aid has over 160 volunteers throughout O’Hare. You can find Kreplin at the information desk in Terminal 5.
Q: How many valid categorical syllogisms are there? Almost all contemporary logic books I have checked (as well as Wikipedia) agree that there are 24 conditionally valid logic syllogisms (Aristotle interpretation) 6 per figure and 15 unconditionally valid syllogisms (Brentano-Boole interpretation). Then why do I still read in a lot of resources that there are 19 valid syllogisms? A: See Syllogism: Aristotle's Theory: terms can be combined in different ways to form three figures (skhemata), which Aristotle presents in the Prior Analytics. When the four categorical sentences are placed into these three figures, Aristotle ends up with the following 14 valid moods [...] A fourth figure was discussed in ancient times as well as during the Middle Ages. If we perform a simple calculation based on the four categorical sentences and the four figures, we find that there are 256 possible combinations of sentences. Of these, 24 have traditionally been thought to yield valid deductions. To the 19 already mentioned we must add two subalternate moods in the first figure (Barbari and Celaront), two subalternate moods in the second figure (Camestrop and Cesaro), and one subalternate mood in the fourth figure (Camenop). See also Syllogism.
Mesquite Rotary donates to Scouts BSA’s Circle 10 Council The Mesquite Rotary Club donates $2,000 to Circle 10 Council of Scouts BSA to support their Mesquite area operation. Pictured from the left are Mesquite Rotary Club president elect Angel Rivera, Circle 10 Council's Jo Lena Lancaster, and Mesquite Rotarian and Circle 10 Council board member Raymond Rivas. Photo courtesy of Mesquite Rotary Club Mesquite Rotary president elect Angel Rivera presented a donation of $2,000 to assist the Scouts BSA Circle Ten Council in funding local scouting programs at the club’s meeting on Jan. 14. Receiving the check was Rising Sun District assistant commissioner and membership chair Jo Lena Lancaster. The funds donated by the Rotary club will go directly to underwrite supervisory personnel support and other membership related costs for the area’s scout troops, to enable a greater number of local students to participate in scouting, and to reap its benefits. The Mesquite Rotary Club was established in 1959, and meets at noon each Tuesday at the Dallas Athletic Club. For more details, visit their website at mesquitetxrotary.org. Watch this discussion.Stop watching this discussion. (0) comments Welcome to the discussion. Keep it Clean. Please avoid obscene, vulgar, lewd, racist or sexually-oriented language. PLEASE TURN OFF YOUR CAPS LOCK. Don't Threaten. Threats of harming another person will not be tolerated. Be Truthful. Don't knowingly lie about anyone or anything. Be Nice. No racism, sexism or any sort of -ism that is degrading to another person. Be Proactive. Use the 'Report' link on each comment to let us know of abusive posts. Share with Us. We'd love to hear eyewitness accounts, the history behind an article.
At the apex of modern philosophy stands the “sage of Konigsberg”, Immanuel Kant (1724-1804).His Categorical Imperative philosophical doctrine of Deontology was conceptualised when he deduced accepting things on faith alone “as a scandal on Philosophy”. Kant’s three questions “What can I know? “, “What should I do? “, “What can I hope? “, as extolled in his Critique of Pure Reason posited that all philosophic doctrines attempts to answer these three questions. Beginning with the need or desire to do the right thing, he established in his seminal work “Grounding for the metaphysics of morals” a framework for morally ethical behaviours. His Deontological moral theories are such that the rightfulness or otherwise of an action is not dependable on their consequences but rather with the imperative to fulfil a duty. (Scruton) Kant states that our duty is to be rational, consistent, and impartial. He decrees that we recognise the intrinsic worth of fellow human beings. That we act with Autonomy as if we are in “the Kingdom of ends”. Kant embodies his Categorical Imperative by stating that humans should”Act only on the maxim through you can at the same time will that it becomes a universal law”. This imperative according to Kant was the supreme morality which underpinned all other moralities. “What should I do? “ Kant states that humans being naturally rational unlike animals should act in accordance with the universal morality as set out in the Categorical Imperative. Hume objected to this position and stated that “reason is wholly inactive and can never be a source of so active a principle as conscience or a sense of morals”. Hume also argued that morality is intuitive and that reason is not a motivator of moral actions. Aristotle spoke of a common sense (sensus communis) that humans intrinsically possess and therefore they should naturally know right from wrong. In the doctrine Critique of Pure Reason, Kant considers time and space as mentalities of how a mind perceives the world. If that mind is that of journalist then there is a moral obligation to make proper sense of the how accurately that mind perceives events prior to reporting of same to media consumers who have put their trust in a noble profession to tell truths.(Frankfurt) Kant stated that humans must never lie and that this is a perfect duty which must always hold true. If a journalist alters a story in any way, be it by embellishment, positive or negative subjective bias, withholding of essential facts etc, and in doing so alters the true reporting of the story and thereby rendering it a fiction. According to Kant’s “means to an end” preposition this was an immoral choice where truthfulness is one of the cornerstones of Categorical Imperative”. (Warburton) Otherwise, all parties to the story engage in a conspiracy of “fake news” which is a Hypothetical Imperative desire driven action and not from the reasoning of the Categorical Imperative. The most obvious current example of this is how U.S President Donald Trump has manipulated mass media and social media platforms with sometimes blatant untruths while at the same time debasing the basic tenets of journalism. Trumps approach is potentially very damaging for journalism as his propaganda may be perceived as actual news. It may very well be that Trump feels that he is acting in a Kantian manner based on duty with scant regard for the consequences of his actions.(Frankfurt) (Gardner) The Kantian view holds that merely by being rational humans certain rights naturally accrue, like dignity, privacy rights and a sense of worth. This implies an empathic disposition towards other humans. The Categorical Imperative states “that you must not exploit people to suit yourself”. Considering the maxim “that you shouldn’t let the truth get in the way of a good story” and its implications for media ethics. As humans are ends in themselves, the Kantian ethics dictate that the journalist must not exploit them as useful subjects. (Scruton) Deontological considerations are made at different levels. The first level being the individual journalists’ commitment to adhere to set guidelines in line with Kant’s requirement for free will. The second deontological level is a collective, for example the NUJ’s code of ethics. The establishment of common ethical guides formulating three ethical commitments namely (1) accuracy, (2) fairness and (3) the protection of confidential informants which underpin the journalistic code of ethics not dissimilar to the physicians Hippocratic Oath which is to ultimately cause no harm.Codes of practices and the setting up of regulatory bodies are embodiments of Kantian influence. (Gardner) What should I do? “Kant, in line with universal morality and drawing from the Enlightenment movement held that reason should dictate how people should act. Kant also held that only an unqualified good virtue is the only good will as other virtues can be misused in an immoral fashion. Kohlberg (1927-1987) held that there were three basic levels of moral concern (fear of punishment, (2) loyalty and most importantly for journalists (3) Kohlberg posited that moral development meant going beyond rules and laws with Kant’s universal principal being freely adopted. The obvious implication is that there is now a way of dealing with the schism between the law and what action Kant felt duty required. There is a duty on journalist to preserve sources anonymity. What can I hope? “, his ethical theory holds free will as a pre-requisition and a belief in what we can’t have knowledge of, such as supersensible objects and concepts like God and the soul. Kant refused to consider the consequences or teleological ethics of moral decisions. This is perceived as a serious weakness for many of his critics including Mill. A common criticism of Kant’s moral theory is that it is empty (Warburton). Can we predict 100% the consequences of our actions? The consequences of our actions based on our intentions can reverberate far beyond the reality setting of the initial occurrence. Consider how the Media behaved on the night of the death of Princess Diana, which put the ethical behaviours of journalist into sharp focus. By not adhering to ethical codes, foreseeability and casual contributions to consequences are evident in the Diana tragedy. In summation, the fourth estate can take warning from modern day Kantian Onora O’Neill’s sagely advice that in the world today we should look out for three things: “Honesty, reliability and competence.” And “that transparency is not what we fantasise it to be”.(Humphreys) –In her 1989 work, O’Neill states that Kant’s ethical writings are as much admired as ever and she also holds that obligations come before rights. ”On Bullshit”, Frankfurt (2005) states that “we have no theory” on what exactly bullshit is. He states that at least liars know they are liars but bullshitters do so with scant regard of their utterances being true or false.His follow up book. “On Truth”(2006) states that truth is a virtue and he defends truth by saying ;” How could society which cared too little for truth make sufficiently well informed decisions”. For Frankfurt, like Kant he considers a duty to be the most important factor, a duty like truthfulness.
https://thecircular.org/if-youre-a-journalistyou-kant-and-you-must/
Please offer feedback if you have any. While the authors have focused primarily on summarizing existing, known risks of satellite communications, the mitigations suggested may be incomplete. Consider your specific needs, vulnerabilties, and your adversary in applying this document to your situation. Introduction Risks are inherent in using any form of communication tool when speaking truth to power. Satellite communication tools are often rolled out quickly during crises as they provide critical access and are difficult – but not impossible – to block. However, the risks of using these tools must be considered. This guide discusses threats which are widely applicable to 2-way satellite communications devices, such as satellite phones and pagers, Inmarsat BGANs, Starlinks, and VSAT terminals. Some of the risks discussed may also apply to receive-only / broadcast satellite in situations where satellite dishes are regulated/illegal. These satellite devices are easy to geolocate, with documented evidence of this turning into lethal actions. The communications can also be easily intercepted, jammed, and users can be arrested/harassed because of the hard-to-conceal use of specialty hardware. “[S]atellite phones may also be susceptible to jamming, surveillance, interception, and other security threats […] users should have no expectation of privacy when communicating by satellite phone. Additionally, satellite phone users could potentially be tracked through frequency emissions, commercially available tracking devices, and built-in global positioning system (GPS) capabilities. [GPS] could also be a potential security vulnerability to be exploited and used for malicious intent, like kidnapping or detention. […] It is also feasible for a nation-state or criminal enterprise, with financial resources and access to the right commercially available technology, to track a satellite phone and intercept communication beyond voice calls and texts.” –OSAC Cybersecurity Team (July 2 2021) Guide for Overseas Satellite Phone Usage OSAC.gov. This document is focused on Internet shutdown, crisis, conflict, and emergency situations where a journalist, activist, or human rights defender may be using these tools to access and share critical information, with a wide range of adversaries including well-resourced, state or military-level ones. This does not focus on any specific adversary but tries to identify the complexity of the different threats and what resources, capacity, and intent an adversary would need to use the threat. A note on Alternative Communication Options While not in scope for this document, for situations such as preparation for internet and/or electricity shutdowns, planning for multiple alternative communication options adds resilience and enables more flexibility during a crisis. Topics, plans, and tools can include: - Planning for physical meetings (and contingency planning if there are safety concerns or limited movement options) - HF/UHF/VHF Radio - Shortwave receivers to track international news Summary of mitigations |Satellite communications are slow and expensive|| | |Satellite communication devices can be geolocated|| | |Satellite communications might be intercepted and jammed|| | |Be mindful of the physical environment|| | Detailed Risks and Mitigations Geolocation Multiple approaches can be used to geolocate an active satellite communications device regardless of the type of device. While satellite phones are the easiest to track given their omnidirectional antenna, other devices such as BGANs and Starlinks are still locatable by multiple methods. These methods range from easy to use but expensive to low-cost DIY tools which are easy to source but require more skills. Military adversaries in a conflict zone are likely to be resourced with skills and devices and also likely to be actively scanning for satellite communications. Geolocation methods include the following, see the Details section below for specific references and capabilities - Satellite-based tracking - There are commercially available satellite-based offerings which enable fully global and remote location, tracking, and even custom alerts for “unexpected” satellite (and other radio frequency) signals. Intelligence satellites are an additional option for some countries. - Intercepting of GPS data - Satellite devices often communicate GPS locaiton details which can be intercepted. - Radio Frequency (RF) monitoring and triangulation - Geolocation tools can be mounted on aircraft and drones/UAVs for better detection of BGAN, Starlink, and other more directional connections, as well as locating signals where terrain or other obstacles limits ground-based tool effectiveness. RF monitoring tools (incuding simply, DIY once) can also be mounted on vehicles or even be handheld. Tools can also be placed in fixed locations to track signals in an area over time. - Legal pathways - In addition to technical means, there are also legal avenues (simply demanding records from satellite service providers directly and/or in the country(s) where their ground stations are located. Mitigations The longer a device is used, and the more times it is used from the same location over time, the more precise the location can be calculated and/or corroborated with other events or known locations (such as office or house addresses, posting of news stories, social media engagement, etc.). - Minimize usage time - short calls or messages, very planned and prepared sending/receiving of data - If possible, use the device from a different location each time to reduce the ability for an adverdsary to correlate the device with a specific location over time. - Leave the device fully turned off when not in use - If the device also has cellular service (GSM/4G/etc.) disable that functionality when not in use to limit tracking by cellular tower triangulation. - Also practice the mitigations under device seizure, above. - In specific, the use of a wireless router to give physical distance from the satellite device provides specific benefit here by giving you some warning of a raid or other targeted activity against the location of the device, as well as (in military/conflict situations) some distance from kinetic attacks such as missiles or other bombardment. - Where you use the device from impacts how easy it is to locate, track, and respond to by adversaries. There is no universal guidance here, and specific use cases, requirements, adversaries, and context play roles: - Consider the terrain / urban infrastructure and how it can help limit geolocation. In Afghanistan for instance, it’s extremely difficult to use direction finding equipment due to the mountains and deep valleys, act as an automatic shield for signals. - Making sat-phone calls from highly populated areas can make it difficult for law enforcement type authorities to identify and physically intercept the caller after a short call. However, if facing military or state actors, this could instead add risk of bombardment of the area. - Using devices in locations far from urban areas, government infrastructure, military installation/activity, and borders, and using them for short periods of time and Details Satellite-based tracking “HawkEye 360 is a Radio Frequency (RF) data analytics company. We operate a first-of-its-kind commercial satellite constellation to identify, process, and geolocate a broad set of RF signals. We extract value from this unique data through proprietary algorithms, fusing it with other sources to create powerful analytical products that solve hard challenges for our global customers. Our products include maritime domain awareness and spectrum mapping and monitoring; our customers include a wide range of commercial, government and international entities.” – HawkEye360 Press Release, (March 4 2022), HawkEye 360 Signal Detection Reveals GPS Interference in Ukraine he360.com Video from HawkEye360 detailing commerical capabilities Radio Frequency (RF) Monitoring and Triangulation ““Russia has spent a long time perfecting these techniques. On April 21, 1996, Chechnya’s breakaway president, Dzhokhar Dudayev, was speaking on a satellite phone with Russian envoy Konstantin Borovoi about setting peace talks with Yeltsin. During the phone call, he was killed by a signal-guided missile fired from a Russian jet fighter. The warplane had received Dudayev’s coordinates from a Russian ELINT (electronic intelligence) plane that had picked up and locked on to the signal emitted by the satellite phone. It was Russian deception and brutality at its finest.” – Pelton, Robert Young (March 3 2012) Kill The Messenger, Foreign Policy. “During our market scan, we found examples of SIGINT capabilities outside of government that are available to anyone. The capabilities we found have applications in maritime domain awareness; radio frequency (RF) spectrum mapping; eavesdropping, jamming, and hijacking of satellite communications; and cyber surveillance. Most of these capabilities are commercially available, many are free, and some are illegal. In our view, the existence of both legal and illegal markets and capabilities results in an environment where SIGINT has been democratized, or available to anyone. The capabilities we found have implications for the U.S.” – Weinbaum, Cortney et al, (2017) SIGINT for Anyone: The Growing Availability of Signals Intelligence in the Public Domain RAND. “[Satellite communications] can be triangulated with affordable, even homemade tools. […] Highly developed countries with advanced technical security are likely to have this capacity, less developed states and even non-state actors may be able to develop the capacity.” – SMALL WORLD NEWS (March 2012) GUIDE TO SAFELY USING SAT PHONES The Global Interagency Security Forum. “It is possible that the Syrian army used the long-established ‘direction-finding’ approach to pin-point the location of the journalists in the media centre. […] It is relatively simple to receive this signal for a trained technician, using an RF (Radio Frequency) spectrum analyser. […] After detecting the presence of sat phone transmissions, it would be relatively easy for communications technicians to find the location of the phone by tuning to that frequency, moving the antennas to find the direction where the signal was strongest and then triangulating with their opposites. This would provide an ever-shrinking triangle until the points intersect.” – SaferMobile Anonymous Contributors (February 23 2012) Be Afraid, Be Very Afraid of Satellite Phones in Insecure Locations SaferMobile. Intercepting GPS Coordinates “It is very likely that the GPS location data is transmitted by the sat phone is sent in the clear. According to the specification (GSM-1 04.008 Section 10.1.8) the message from the sat phone requesting a channel carries among other information the dialed number and the GPS location data before the handset identity is established. This makes the location data easily readable by an adversary.” – SaferMobile Anonymous Contributors (February 23 2012) Be Afraid, Be Very Afraid of Satellite Phones in Insecure Locations SaferMobile. Legal pathways “There are a few different ways by which satellite phones can be tracked. The first—and easiest for a government actor—would be to simply ask or pressure a company to hand over user data.” – York, Jillian and Timm, Trevor (February 2012) Satphones, Syria, and Surveillance EFF. Communication Interception Similarly to the device geo-location options, interception of satellite communication has a range of technical options as well as legal pathways. Interception of satellite phone calls can take place nearby using ground-based equipment. Interception of any satellite device can take place by intercepting the signal from the satellite back down to its earthstation, or even by using commercial and private satellite options. Finally, a small number of nations have the ability to position satellites alongside (“co-orbital”) popular communication satellites to eavesdrop on communications to/from that satellite. While this is very rare and much more likely focused on military/defense outcomes, there are many similarly capable commercial options. Further, research to date has revealed that the baseline security of the communication is not a priority for providers or the standards-setting bodies. This means that without additional encryption, basic satellite communication is both insecure and easy to passively monitor. Mitigations - Because Sat Phones don’t operate well as “standby”, but a set schedule of when you call is risky, decide on a method to plan call times - Using secure Internet communications tools on top of a data connection provides security against interception of the message content (at higher financial cost). This includes both end-to-end encrypted apps like Signal, but also more simple encrypted-to-server communication tools like webmail and video conferencing platforms. - Presume that an adversary with specific interest can and will be able to track and often listen in to comms, so focus usage of the satellite communication options for emergencies, public data, or urgent sharing of information (e.g. video documentation relevant to a human rights case and/or of key journalistic importance) with the understanding that an adversary may also see this and leverage it. Details Baseline Encryption “Modern satellite phones encrypt voice traffic to prevent eavesdropping. It’s that modern GMR-2 algorithm that was the focus of the research, given that it’s used in most satellite phones today. […] The end result was that encrypted data could be cracked in a fraction of a second. “This again demonstrates that there exists serious security flaws in the GMR-2 cipher, and it is crucial for service providers to upgrade the cryptographic modules of the system in order to provide confidential communication,” said the researchers.” – Whittaker, Zack (July 6 2017) New attack can now decrypt satellite phone calls in “real time” ZDNet. “[E]avesdropping on satellite communications is (in principle) easier than eavesdropping on cellular signals. That’s because satellite ‘spot beams’ cover relatively broad geographic territories (Thuraya’s are 600km on average). So you don’t just have to worry about eavesdropping by your neighbor, you have to worry about eavesdropping by neighboring countries.” – Green, Matthew (February 5 2012) Satellite phone encryption is terrible. Anyone surprised? Cryptography Engineering. Nearby (Tactical) Interception “Proximity is relative. First you have to distinguish between what’s commonly called “tactical” intercepts which are done in the field. For those, you receive the phone uplink but a phone transmits with quite a bit of power and doesn’t have very directional antenna, so it can be several kilometers, especially if you have a good vantage point. Then there is what’s called “strategic” interception setups, done at dedicated facilities. What goes up must come down and most satellites are just “bent pipe”, dumbly retransmitting what they receive back to earth. So instead of receiving the phone, you can just listen to the sat retransmitting the phone comms back to the ground station.” – Sylvain Munaut 2021 (paraphrased) “The satellite doesn’t do much,” said Pavur. “It’s basically just a dumb, bent pipe.” It sends the data back to a base station on Earth, which then connects to the internet as usual. This part of the journey is very difficult for an attacker to intercept. When data comes back from the internet, it heads to the satellite and back down to customers. This time, Pavur explains, the satellite blasts data across an enormous area in order to reach all of the satellite ISP’s customers. “This is the crux of satellite eavesdropping,” he explained. Because the broadcast covers such a wide area, an attacker can easily intercept one side of the communications. … Intercepting satellite communications can be done by someone in a different country, or even different continent, than the victim. – - Eddy, Max (August 6, 2020) Sensitive Satellite Internet Data Is Easily Accessible, If You Know Where to Look PCMag. “One example of satellite eavesdropping was the use of the $26 Russian SkyGrabber program by hackers in Iraq to capture U.S. military Predator drone video feeds in 2009. Insurgents eavesdropped on the unencrypted video feed backhauled from Predator drones through commercial communications satellites. Surprisingly, such encryption weaknesses still exist for some commercial satellite systems. The government addresses this weakness by requiring encryption for military communications that rely on commercial systems, but other nongovernmental traffic through those systems may remain vulnerable.” – Weinbaum, Cortney et al, (2017) SIGINT for Anyone: The Growing Availability of Signals Intelligence in the Public Domain RAND. “As the conflict grew, an increasing number of users migrated from Thuraya to other networks, both because of the interruptions associated with the intermittent jamming as well as a strong perception among many in the Libyan opposition that the Thuraya servers were especially vulnerable to LAJ signals intelligence or some other form of unspecified interception. […] It would become clear after the conflict ended that this concern was at least in part well-founded: the LAJ was found to have training materials for the L3 Communications Tactical Thuraya Monitoring System, an interception and localization package developed for field-deployed signals intelligence applications.” – Scott-Railton, John (January 2013) Revolutionary Risks: Cyber Technology and Threats in the 2011 Libyan Revolution U.S. Naval War College Digital Commons / CIWAG Case Studies. “By this point, the regime’s electronic warfare had become even more sophisticated. Cell phone and landline calls had long been monitored, but now the spies turned their attention to satellite phones. To avoid NATO air strikes, one team of Ukrainian mercenaries set up shop in a kindergarten, right around the corner from the intelligence headquarters; from there they snooped on sat-phone traffic using frequency scanners. Gadhafi had declared that anyone caught with a satellite phone could be sentenced to death.” – Aikins, Matthieu (May 18 2012) Jamming Tripoli Wired. Global/Remote (Strategic) Interception “The portfolio of Rohde & Schwarz satellite monitoring solutions for passive interception and monitoring of satellite communications signals is based on many years of professional experience. It ranges from flexible, transportable solutions to complex stationary strategic systems for simultaneous interception of signals and services from multiple satellites. Areas of application include the analysis and identification of unknown satellite based communications as well as the processing of satellite signals and services for intelligence purposes. Field-proven operational concepts and sophisticated analysis tools help organizations efficiently and effectively analyze carriers, services, content and metadata.” – Rohde & Schwarz (Retrieved Mar 24 2022) Satellite Intelligence rohde-schwarz.com Archive “That new primary mission was “Thuraya collection and Afghanistan/Pakistan exfiltration.” The first confirms that the close placement near, and apparent co-orbital shadowing of, the commercial Thuraya 2 satellite is indeed intentional: Mentor 4 is indeed eavesdropping on Thuraya 2. The second relates to a more typical mission of ORION SIGINT satellites: collecting radio signals from a wide geographic region on Earth. The document also mentions (in the byline with the illustration) that the satellite was expected to be fully operational around mid-May of 2009. This tallies with the observed moment of Mentor 4’s arrival near 44 degrees east. It arrived there in late April of 2009, although it did not fully stabilize there until July 2009 (see diagram below.) Like PAN’s orbital behavior, the behaviour of Mentor 4 is unusual for a SIGINT satellite. The very close placement and closely synchronized co-orbital movement of Mentor 4 with regard to Thuraya 2 is unique, in the sense that it is behavior different from both earlier and later satellites in the ORION series: none of these shadow another satellite this closely.” – Langbroek, Marco (Octover 31 2016) A NEMESIS in the sky The Space Review. “In a speech outlining France’s space policy and security issues, Parly said that the Athena-Fidus satellite, operated jointly by France and Italy, was approached “a bit too closely” by Russia’s Luch-Olymp craft, known for its advanced listening capacity. “It got so close that we might have imagined it was trying to intercept our communications,” she added. “Trying to listen to your neighbours is not only unfriendly, it’s an act of espionage.” – Chrisafis Angelique (September 7 2018) ‘Act of espionage’: France accuses Russia of trying to spy on satellite data The Guardian Groundstation Monitoring “Governments can also intercept communications on satellite phones. Satellite phone calls with a mobile phone or landline are routed through ground stations in numerous countries. When transmitting through these ground stations, communications providers must comply with local legal and regulatory frameworks, making it possible for local governments to intercept private communications. “ –OSAC Cybersecurity Team (July 2 2021) Guide for Overseas Satellite Phone Usage OSAC.gov. (Also has a table of known laws) Legality and Seizure Satellite communication tools, from phones to more robust data connection setups, are often tightly regulated and may be illegal. OSAC’s July 2021 report has a list of countries where sat phones are known to be illegal. Additional law tracking resources include UNIDIR’s Cyber Policy Portal, GPD’s Encryption Policy map , and Cyrilla. In addition, due to the need for an outside, direct line of sight to the sky - combined with visually distinct features from cell phones and other equipment, satellite communication systems can be difficult to conceal. Device seizure (and the further impacts that can have) is a very real risk to consider. Device siezure can reveal your contact network, stored files, and recent call logs, as well as be used potentially to impersonate you to your contacts. Further, given the illegality of non-registered devices in many countries, possession/use alone can be enough to detain someone. Mitigations - Track which devices you are using (including smartphones and laptops) have what data stored on them. Satellite phones and pagers are likely to have recent call logs and contacts. Regularly purge contacts, recent calls/message and any other content/documents on as many devices as possible - in particular ones which cannot be protected with encryption. Use automatically disappearing message options. Log out of apps/websites. - Use a bluetooth headset (for calls/satphones) or wifi connectivity / router to not be in possession of the device when you use it. (See device geolocation mitigations below) - If you are in a location where raids or similar physical searches are likely, find a safer location to store equipment, and carefully consider the potential value of the satellite device against the possibility of arrest. Should you dispose of or destroy this device instead? - If purchasing, seek out dual-use equipment, for example, devices which look like GPS units but which also provide a satellite data connection. If using this approach, ensure that users have a reason to use a GPS device and familiarity with its features. - Consider your adversary – are you trying to conceal your device from someone walking by on the street, or from someone flying over in a helicopter? Both? Additional guidance for satellite dishes and BGANs - Concealment – limit how visible the device is when it is outside: - BGANs are directional (as opposed to omnidirectional satellite phones) and require specific angles of visiblity to the sky. This map provides a very rough idea of the angles (both compass directional and vertical) that you will need for BGANs depending on your location. - Starlink terminals require a 100° cone up from the dish, which will calibrate itself to the ideal base angle depending on your location. - Understanding what angle your device requires allows you to minimize its visibility from other directions - including to some extent from above in the case of BGAN and other directional dishes pointing at geostationary satellites. - Camoflauge – different materials will have different effects if covering a satellite dish. In general, any covering is likely to reduce your signal. Consider lightweight, dry cloth or plastic, or non-metallic paint. - As you explore your concealment options, review your device’s diagnostics tools to see how that is impacting its connectivity. Details “OSAC members have reported difficulties importing satellite phones in countries where the devices are technically permitted (or not restricted). In Libya, there are no laws against satellite phones, but there have been multiple reports of authorities confiscating satellite phones, GPS devices, and personal tracking devices at the airport. “ –OSAC Cybersecurity Team (July 2 2021) Guide for Overseas Satellite Phone Usage OSAC.gov. (Also has a table of known laws) Jamming Jamming is used to block all communications in an area (downlink) or with a specific satellite (uplink). Both are relatively easy and inexpensive, but untargeted. Jamming a satellite (uplink) can have international impacts and would be a breach of ITU’s Article 15, Interference from Radio Stations, and will be quickly noticed internationally. GPS signals can also be targeted for jamming, which inhibits satellite devices from connecting and staying connected with satellites. Jamming may not be targeted at you specifically, but could still impact your ability to connect using satellite communications – you may be a bystander to jamming targeted in the area and/or against the same satellites you are using. Finally, environmental factors may also cause failed connectivity. Weather and/or other obstructions between your satellite device and the sky (dependent on the type of device, it’s precise angle to aim at the satellite, etc.) all can cause connectivity issues. Mitigations - Downlink jamming in range dependent and must be within line of sight, moving to a different area could get outside of the area of effect. Consider if your adversary is trying to force you to move. - Uplink jamming is often scheduled around specific events or times of day, try testing connectivity at different times. Details “There are two main types of satellite jamming. The first, uplink jamming, interferes with the signal going from a ground station or user terminal to the satellite. An RF signal of the same frequency as the targeted uplink signal is transmitted to the satellite, aiming to limit the satellite transponder from differentiating between the jamming signal and the actual signal. The second type, downlink jamming, disrupts transmissions sent from the satellite to ground-based or airborne receivers using RF signals that mimic the frequency of the downlink signal. It aims to inhibit ground users from receiving transmissions from the satellite and only needs to be as strong as the signal being received on the ground. Uplink jamming is considered more difficult because greater transmitter power is required to reach a given satellite’s transponders. It could be more impactful, however, due to its ability to degrade the satellite’s signal for all its users. Because downlink jammers must be within the field of view of the receiving terminal’s antenna, however, the effects of downlink jamming are more localized.” – Velkovsky, Pavel; Mohan, Janani; and Simon, Maxwell (April 03 2021) Satellite Jamming On the radar / CSIS. “Jamming technology tends to be commercially available and relatively inexpensive. Satellite jamming systems are easy for states and non-state actors to develop given the relative low cost of their procurement and operation. There is a low threshold of technological competency required to perform jamming, and the technology is available to a plethora of actors across the globe. For example, interference with satellite signals has emanated from Indonesia, Cuba, Ethiopia, Libya, and Syria, among others.” – Velkovsky, Pavel; Mohan, Janani; and Simon, Maxwell (April 03 2021) Satellite Jamming On the radar / CSIS. Downlink / Ground-based / Terrestrial Jamming “It is true that the Starlink ground terminals will be broadcasting, and thus potentially targetable using RF signal detection equipment. But I doubt they’d be that high of a priority for Russian targeting, so I think the odds of them being targeted is probably low,” Weeden said Monday by email. “A much bigger challenge would be Russian ground-based mobile jamming, which is sophisticated and can already deal with existing satellite signals such as GPS and satellite communications.” – Berger, Brian (February 28 2022) SpaceX heeds Ukraine’s Starlink SOS SpaceNews. “Terrestrial jamming takes place in a specific location and involves equipment that is easy to purchase, use and conceal. Rather than targeting the satellite itself, as is the case in orbital jamming, terrestrial jamming involves transmitting rogue frequencies in the direction of local consumer-level satellite dishes. The contradictory frequencies are area-specific, interfering only with the frequency emanating from the satellite in a specific location. Small, portable terrestrial jammers have a range of 3-5 kilometres in urban, built-up areas. In rural areas, their range can increase to up to 20 kilometres“ – Small Media (November 2012) Satellite Jamming in Iran: A War Over Airwaves, Small Media. “When HawkEye 360 analysts examined Ukraine over the past four months, they discovered continued and increased GPS interference across the region. The data showed extensive GPS interference in November 2021 along the boundary of the pro-Russian separatist-controlled regions in Luhansk and Donetsk. Open-source information confirmed Unmanned Aerial Vehicles (UAVs) operating in the area were disrupted due to lost GPS connections… And in February 2022, HawkEye 360 detected GPS interference along the border between Ukraine and Belarus, shortly before the Russian invasion started.” –HawkEye360 Press Release, (March 4 2022), HawkEye 360 Signal Detection Reveals GPS Interference in Ukraine he360.com “The jamming of Persian-language satellite channels has been ongoing since 2003. Infrequent bouts of pressure from the international community have achieved limited success. Alongside international organisations like the International Union (ITU), the governments of the UK, US, France and the European Union have condemned the Iranian government for not acting on the issue of satellite jamming. Despite these condemnations, the jamming of satellite TV channels has continued. At the time of publishing, the sudden devaluation of the Iranian Rial in October 2012 had spurred another intense period of jamming, with the broadcasts of both BBC and the VOA being disrupted … It is important to note here that Iran is not the only country engaged in or experiencing satellite jamming. There are reports of jamming from countries such as Bahrain, Libya, Syria, Ethiopia, North Korea, and China.“ – Small Media (November 2012) Satellite Jamming in Iran: A War Over Airwaves, Small Media. Uplink / Satellite Jamming “Over the weekend of February 19, transmissions from two television satellites that served a wide range of news programming to Libya and the region were disrupted by jamming, according to the Lebanese Telecommunications Regulatory Authority. And on February 21, Al Jazeera accused Libya of jamming its satellite transmissions in the region, and stated that it had conclusively identified the jamming as emanating from an LAJ intelligence services building south of Tripoli. Satellite telecommunications were not immune to LAJ disruption and denial efforts, which were likely targeted against the use of satellite telephones like the Thuraya handset, which were widely used in Libya. On February 25, Thuraya accused Libya of having engaged in a week’s worth of jamming of the Thuraya-2 satellite that provided satellite phone and data connectivity to Thuraya devices within Libya. Shortly thereafter, Thuraya announced that its technical efforts had restored voice services to much of Libya. Nevertheless, users of Thuraya phones continued to experience substantial difficulty connecting throughout the revolution.” – Scott-Railton, John (January 2013) Revolutionary Risks: Cyber Technology and Threats in the 2011 Libyan Revolution U.S. Naval War College Digital Commons / CIWAG Case Studies. “Jamming can also occur accidentally: in 2015, U.S. military officials noted they were unintentionally jamming satellite communications an average of 23 times per month. Purposeful jamming can be difficult to differentiate from accidental interference, making attribution more challenging.” – Velkovsky, Pavel; Mohan, Janani; and Simon, Maxwell (April 03 2021) Satellite Jamming On the radar / CSIS. Device Firmware and Software Security Mitigations - To the extent possible, leverage satellite communications devices as untrusted network connections and layer on independent security. - If possible, consider having backup / alternative satellite connectivity options using different providers. - Check the manufacturer website for your device to ensure you have the latest possible firmware. Details “The agencies have advised SATCOM network providers and customers to use secure authentication methods, enforce a principle of least privilege, review existing trust relationships with IT service providers, implement independent encryption, strengthen software and firmware security, monitor their networks for suspicious activity, and ensure that they have incident response and resilience plans in place.” – - Kovacs, Eduard (March 18 2022)SATCOM Cybersecurity Alert Issued as Authorities Probe Possible Russian Attack Security Week. ”[S]atellite modems belonging to tens of thousands of customers in Europe were knocked offline. … The hackers disabled modems that communicate with Viasat Inc’s KA-SAT satellite, which supplies internet access to some customers in Europe, including Ukraine. More than two weeks later some remain offline, resellers told Reuters. … The Viasat official said a misconfiguration in the “management section” of the satellite network had allowed the hackers remote access into the modems… He said most of the affected devices would need to be reprogrammed either by a technician on site or at a repair depot and that some would have to be swapped out. – Pearson, James, et al (March 11 2022) Exclusive: U.S. spy agency probes sabotage of satellite internet during Russian invasion, sources say Reuters. “Between October and December last year, researchers from IOActive analyzed the firmware of popular satellite communications (SATCOM) devices that are used in the military, aerospace, maritime, critical infrastructure and other sectors… The analysis focused on SATCOM terminals that are used on ground, in the air and at sea, not satellite communications equipment in space. “IOActive found that all devices within the scope of this research could be abused by a malicious actor,” the IOActive researchers said in a report published Thursday. “We uncovered what would appear to be multiple backdoors, hardcoded credentials, undocumented and/or insecure protocols, and weak encryption algorithms.” – Constantin, Lucian (April 18 2014) Satellite communication systems rife with security flaws, vulnerable to remote hacks ComputerWorld. “Unfortunately, except for Iridium, the vendors did not engage in addressing this situation,” the researchers said. “They did not respond to a series of requests sent by the CERT Coordination Center and/or its partners.” – Santamarta, Ruben (2014) A Wake-up Call for SATCOM Security IOActive. Commonly overlooked challenges Most of this document focuses on the operational security challenges and mitigations involved in using satellite communications. However, there are some baseline requirements to also keep in mind to simply ensure the service is available when and if you choose to use it. Electricity All satellite communications devices require power. VSAT and Starlink Dishes require anywhere up to 100 watts while actively transmitting, which can rapidly exhaust a battery backup / UPS system. Satphones, pagers, and BGANs come with batteries capable of up to 3 hours active time and 30 hours idle. Mitigations - Make sure your satphone/pager/BGAN is fully charged, re-charging when power is available. - Maintain backup batteries, and ensure USB chargers are compatible with your satphone and that they are fully charged. - Have (and test) a plan for usage of satellite terminals and base stations, and how they can be powered if electricity goes out. Know how long your backup solutions (generator, battery, solar) can last, and under what conditions. - Identify what other devices will also need power (possibly drawing from the same backup sources) such as network routers, laptops, computers/servers without built-in batteries -- to make sure the satellite connection will be functional for your needs. - Do you have adapter power cables for these devices which could be powered from a vehicle? Service Subscription and Costs Satellite data plans are expensive and often tightly constrained in terms of total or daily/monthly usage. This is not a limitation you want to be concerned about during a crisis, so ensuring there is someone or a process supporting account maintenance is valuable. Mitigations: - Top up / add funds to / pre-purchase bandwidth for your satellite devices (this may be topping up your SIM card for a satphone/pager or BGAN) ahead of time. - Do not use satellite communications when other options are available. - Strictly plan and limit your usage time. - Know how your plan works if you reach your usage limit: will it stop working until you manually add funds? Will it continue at lower rates? Will it continue and charge overage fees? - Have a person outside of the conflict who has the information needed to track usage and provide additional account funds / recharge the SIM if the conflict is extended, or if you are unable to continue funding it directly (this could be due to other issues such as banking problems, or over-compliance/confusion around sanctions). This can protect against loss of access leading to an inability to regain access. Coverage and connectivity When selecting devices, ensure that they have coverage in the areas they will be (or could potentially be) used. This is relevant both at a country level as well as a more specific daily usage level. Satphones will not likely work inside, and will need to be outside to get a connection. IN addition, not all services work in all locations. This [at phone reseller provides a good collection of coverage maps, but check before purchase. Preparation Voice calls via satphone can have bad audio, background noises, signficant delays/latency and overall poor call quality. Particularly if calls will be happen (possibly in emergency situations) between people communicating who aren’t native speakers of the same language, preparation and training on how to communicate effectively in these situations is critical. Mitigations - Much like with communicating via radio, it is handy to have staff briefed before on things like the NATO alphabet or other simple, pre-arranged codewords. - Use 2-way good radio etiquette to help with latency problems, see this Two-Way Radio Protocol by California State University. Glossary of terms - “Bent Pipe” - a term used to discuss “how” satellites deal with communication – for the most part, the satellite simply relays the signals it receives directly between the device and the groundstation. - BGAN - Broadband Global Area Network - Inmarsat’s portable satellite internet and related hardware - Direction-Finding or DF equipment - are tools which can help track the location of satellite (and other!) communication equipment. These systems can be permanently mounted, or used as hendheld kits or placed on vehicles or aircraft/drones. - Downlink - the broadcast from the satellite in orbit back down. Generally the “footprint” of these cover wide areas (hundreds of miles) each. - ELINT - A subset of SIGINT (“SIGnals INTelligence”), ELINT (“ELectronic INTelligence”) focuses on only the radio frequency and related electronic components of communication, to support geolocation, signal jamming, and interception needs. A common term in researching satellite communication security. - GEO - Geostationary orbit (“Geosynchronous Earth Orbit”) - a satellite, often for communications, which is in an orbit such that it is always in the same location in the sky above a fixed point on the Earth’s equator. These are high orbits, so there is additional latency in communications. - Groundstation Also referred to as a “teleport”, Earth Stations, and Satellite Earth Stations (“SES”)) - Satellites relay the comms to dedicated ground stations where the data/call rejoins the “normal” terrestrial internet. Groundstations are strategically located for satellite visibility, but may be in countries without strong human rights or data privacy track records. Ground Stations can also refer to any two-way satellite communications terminal on the ground. - LEO - Low Earth Orbit - Due to their lower orbit, satellites in LEO offer higher bandwidth and lower latency, but require more satellites to cover a communication area. Iridium and Starlink are examples of LEO communications satellite systems. - Radio Frequency (RF) - for the purspose of this guide, the signals used by satellite communication devices - but also cell phones, radios, and TV – which can be blocked, intercepted and detected remotely. Specific frequencies are reserved for specific applications, internationally by the ITU and per-country by regulation. - Satphone / handset - a device in the form factor of a large cell phone with a non-directional antenna. - Uplink - the communication from the satellite device up to the satellite in orbit. Directional antennas (dishes) limit the area one must be to intercept this, but most sat phones do not have directional antennas. - VSAT - “Very-small-aperture terminal” - a two-way groundstation with a dish antenna smaller than 3.8 meters (so most satellite internet antenna like for starlink). These tend to require some “aiming” to make a connection.
https://satellitesafety.openinternetproject.org/en/
This petition of patent for industrial invention is related to a polyphonic and polytimbric digital synthesizer: it simultaneously generates various sounds eventually distinguished by different timbres. s The generation of a sound means the building of an electric signal that, amplified and sent to the loud-speaker, will originate the sound itself in this particular case, having a digital synthesizer, it means to build the patterns of that signal at a certain patterning frequency (from now on referred to as FS) that the last step of the system, the analog digital converter, will convert to the analog signal that can be sent to an amplifier and then to the loud-speaker. The synthesizer determines, for each sound to be generated, the frequency patterns (FS) of the relative signal, in every patterning moment it adds up the patterns relative to the various signals, originating the patterns of the complex signal, sum of the signals that make up the single soundss this is so because the patterning operation is linear and therefore the sum of the patterns of the single sounds is equal to the patterns of the sum of the signals. A signal is characterized by its fundamental frequency (FF) and by its timbre, that is by the time evolution of its spectral composition. The system stores the signal timbres to be synthesized and at the moment of synthesis it generates the sound associating timbre and funda mental frequency. The timbres are stored in this way: starting from the time evolution analysis of the spectral composition, the period is subdivided into a number (n) of intervals delimited by the times: (tl, t2, ... tn) and in each interval (ti-1, ti) this time evolution is approximated attaching to the signal on the whole interval the spectral composition it has at the center of the interval. a) the patterns on a period of (n) periodical wave forms of period normalized to (1), with the spectral composition given to the signal in the (n) intervals as defined above) later on it will be illustrated how, starting from these patterns, it is possible to synthesize periodi cal signals characterized from those spectral compositions and from different fundamental frequencies. b) an algorithm that defines the times and the modalities with which the wave forms referred to in point a) come together to create the signal. For each of the timbres that the synthesizer makes available the fol lowing is stored: This algorithm is implemented in the system through a simple language: for each timbre there exists in the EPROM memory a coded program in this language that is interpreted by the processing unit supported by a microprocessor (CPU). The microprocessor loads into a RAM area, that we will name RAMTIMBRI, the wave forms relative to the timbres that the user selects as immediately executable and it coordinates the sound generation programming the fundamental frequency and executing the operations defined by the timbre algorithm. Sounds distinguished by the timbres whose wave forms are loaded in the RAMTIMBRI can be synthesized, at any rate the (CPU) can still load a new timbre in the RAMTIMBRI, substituting it, if the memory is comply telv occupied, with one of the timbres already present, even when the synthesizer is generating sounds. All the sounds are built by the withdrawal of patterns stored in the RAMTIMBRI: the microprocessor based on the signal timbre makes it pos sible to withdraw patterns of the wave forms relative to it and, interpreting the program that implements the timbre algorithm, it makes it possible to access at any moment the appropriate wave form between those relative to the timbre. It was above mentioned that a signal is characterized by a timbre and a fundamental frequency (FF). The system provides a set of (p) programmable oscillators; they are pro grammed by the microprocessor such as to generate a frequency oscillation equal to (m) times the frequency (FF), where (m) is the number of patterns that define the wave forms. This oscillation is utilized by a dedicated digital hardware (HW1), substantially a modulus counter (m), to sequentially address all the patterns of the wave form selected by the microprocessor. Scanning the (m) patterns of the wave form with frequency (m x FF), the repetition period of the scanning cycle is equal to (FF), that is the generated signal has fundamental frequency (FF). Summarizing, during the synthesis of a signal, at every moment there is an addressing of the pattern stored in the RAMTIMBRI: the (CPU) provides the addresses that locate the wave form to access, the hardware (HW1) provides the addresses to determine which one of those of the wave form is the concerned pattern. All this happens for all the signals that have to be utilized simultaneously.. Following is the description of the operation of pattern determination of the various signals at the pattern frequency (FS), and their sum. For this operation we have another block of dedicated hardware (HW2), driven by an oscillator of frequency (q) times (FS), where (q) is the maximum number of signals that can be added up (degree of polyphony of the synthesizer). This hardware (HW2) subdivides the patterning period (TS = 1/FS) into (q) equal intervals, that we will call time slots, each of which is assigned to one of the signals to add up. During each of these time slots the hardware (HW2) executes the following operations for the determination of the pattern of the relative signal: 11 gets the address of the pattern of that signal (built in the way above mentioned), After all these operations are executed in all the time slots, on all active signals, at the end of the patterning period the accumulator contains the sum of the patterns of all the signals: at this point the accumulator contents are given to the converter, the accumulator is reset to zero. and a new patterning cycle is started. The structure implemented in the synthesizer that carries out the ope rations mentioned above shows a high degree of flexibility: in fact, it is possible to associate to each of the time slots above defined signals characterized by each of the current timbres and by frequencies (FF) generated by each of the present programmable oscillators, this association is carried out by the microprocessor, that is it is handled by the software. The described time slot structure allows for an interpolation between two wave forms of a timbre, permitting a gradual transition from one to the other. This is possible when the number of the present sounds is small ; in this case it is possible to assign more than one time slot to each signal, so that in the summing phase its patterns are added up various times (a convenient scale factor acting on the final signal makes up for this fact ). When the (CPU). implementing the timbre algorithm, has to carry out the transition from one wave form to another, this commutation is executed on a "copy" of the signal at the time, that is on one slot at the time of the slots assigned to that signal. The result is that in the transition phases the same signal appears coming out with the patterns of two different wave forms, thus carrying out an interpolation between the two waves. The maximum degree of interpolation comes up in the presence of a single signal, that occupies all available time slots: in this case the transition occurs in (q) (time slots number) subsequent steps, with the wave of the final wave form always greater. Another peculiar feature of the synthesizer is the way in which the wave form patterns which make up the timbre are stored to minimize the required memory quantity. It was mentioned above that for each wave form (m) patterns are stored ; the compacting form of the adopted memory permits to reduce these patterns to (m/r) and to calculate in real time the (m) global patterns through an interpolation technique approximated between each of the (m/r) stored and the next. a) a set of (s) values (11, 12, ..., Is) has been appointed and, in cor respondence of each of the values (Ii), (r) values (0, Ii/r, 2 Iilr, ... (r-1) Ii/r) have been stored in a PROM memory. b) in the off-line generation phase of the (m/r) patterns of the wave forms to be stored, for each of them-the difference is calculated: Aa = value of next pattern - value of pattern. c) for each pattern the value (Ii) closer to the value (Aa) relative to it is determined: (Ii) is assumed as an approximated increment between one pattern and the next; d) still in the pattern generation phase the index (i) of the value (Ii) determined as mentioned in part c) is stored together with the values of the (m/r) patterns. e) in real time the hardware block (HW2) calculates the value of the patterns of the various signals in the following way: 1 ) gets (i = log2 m) address bits provided by the hardware (HW1) relative to the signal in consideration; uses (i k) most significant bits, where (k = log2 m/r) to get one of the (m/r) wave form patterns stored in the RAMTIMBRI; moreover it gets the index (i) of the increment (Ii) to use: this increment is expressed in (h = log2 s) bits; 2) uses the (h) bits above defined and the remaining (j - k = log2 r-) bits provided by the hardware (HW1) respectively as high and low part of the address with which one can access the PROM increments memory: the value obtained is added up to the one obtained from the RAMTIMBRI thus building the pattern of the signal. The technique used consists of: Another feature of the system is the fact-that the commutation between the two wave forms of a timbre always occurrs in a situation in which the patterns of the wave forms are both (0), avoiding any discontinuity in the resulting signal. This function is given to a hardware modulus (HW4) which verifies the addresses provided by the (HWl) moduli and signals to the microprocessor where to carry out the commutation. 1) Programmable oscillators, programmed by the processing units for the generation of oscillators of frequency equal to (m) (number of the patterns that define the wave forms) times the fundamental frequency (FF) of the signal to synthesize. 2) Moduli (HW1), driven by the previous, they are modulus counters (m) that scan, for the associated signal, the patterns of the wave form selected by the microprocessor, generating some of the addresses (the rest are generated by the microprocessor) which are stored in the RAMTIMBRI memory. 3) Modulo (HW2): it's the block that coordinates the building of the patterns at the patterning frequency (FS) of the active signals, their sum and their conversion in analogic signal. a) which (HW1) is associated to the time slot; b) if there is an active signal associated to the time slot; c) which timbre is associated to the time slot; d) which wave form of the timbre is associated to the time slot; 4) Modulo (HW4) programmed by the microprocessor, makes available for block (HW2) the following information concerning each time slot: 5) Modulus of address patterning: in each time slot it patterns and makes available the exits of block (HW1) associated to the time slot. 6) Modulus (HW3), handles the access to the patterns of the wave forms stored in RAMTIMBRI, it ensures the microprocessor of the transparent access to RAMTIMBRI and, during the adding phase, it carries out the correct sequencing of access to RAMTIMBRI and to PROM. 7) RAMTIMBRI memory: it stores in compact form the patterns of the wave forms of the rimbres immediately executable. It provides part of the address with which to access the PROM increments memory. 8) PROM increments memory, in which are stored (r) values for each appointed increment (li): in the accessing phases, part of the address is obtained from RAMTIMBRI, and another part is provided by modulus (5). 9) Adder-accumulator block: driven by (HW2) it sums up the patterns of the active signals during the patterning period (TS), it makes available the frequency sequence (FS) of the patterns of the sum signal. 10) Converter block: it converts the frequency sequence (FS) into the analogic sum signal. It moreover provides a width check to account for the fact that the same signal might have been added up various times to allow for interpolation between two wave forms of the timbres in the transition between one and the other. 11) Block (HW5) : modulus programmed by the microprocessor which controls the exits of the moduli (HW1) relative to the various signals, and it can tell the central unit, if properly programmed, that the addressed pattern of a certain signal is (0). 12) Central processing unit, which consists of a microprocessing system that manages the whole sound generation system. We now continue with the description of the block diagram (fig. 1): 1 2 gets the pattern from the memory RAMTIMBRI; 3) adds the pattern into a summer-accumulator modulus.
Behavior Analysis with Machine Learning Using R introduces machine learning and deep learning concepts and algorithms applied to a diverse set of behavior analysis problems. It focuses on the practical aspects of solving such problems based on data collected from sensors or stored in electronic records. The included examples demonstrate how to perform common data analysis tasks such as: data exploration, visualization, preprocessing, data representation, model training and evaluation. All of this, using the R programming language and real-life behavioral data. Even though the examples focus on behavior analysis tasks, the covered underlying concepts and methods can be applied in any other domain. No prior knowledge in machine learning is assumed. Basic experience with R and basic knowledge in statistics and high school level mathematics are beneficial. Features: - Build supervised machine learning models to predict indoor locations based on WiFi signals, recognize physical activities from smartphone sensors and 3D skeleton data, detect hand gestures from accelerometer signals, and so on. - Program your own ensemble learning methods and use Multi-View Stacking to fuse signals from heterogeneous data sources. - Use unsupervised learning algorithms to discover criminal behavioral patterns. - Build deep learning neural networks with TensorFlow and Keras to classify muscle activity from electromyography signals and Convolutional Neural Networks to detect smiles in images. - Evaluate the performance of your models in traditional and multi-user settings. - Build anomaly detection models such as Isolation Forests and autoencoders to detect abnormal fish behaviors. This book is intended for undergraduate/graduate students and researchers from ubiquitous computing, behavioral ecology, psychology, e-health, and other disciplines who want to learn the basics of machine learning and deep learning and for the more experienced individuals who want to apply machine learning to analyze behavioral data. Table of Contents 1. Introduction to Behavior and Machine Learning 2. Predicting Behavior with Classification Models 3. Predicting Behavior with Ensemble Learning 4. Exploring and Visualizing Behavioral Data 5. Preprocessing Behavioral Data 6. Discovering Behaviors with Unsupervised Learning 7. Encoding Behavioral Data 8. Predicting Behavior with Deep Learning 9. Multi-User Validation 10. Detecting Abnormal Behaviors Appendix A. Setup Your Environment Appendix B. Datasets View More Author(s) Biography Enrique is a Data Scientist at Optimeering. He was previously a Researcher at SINTEF, Norway. He also worked as a PostDoc at the University of Oslo. For the last 11 years, he has been conducting research on behavior analysis using machine learning. Feel free to contact him for any questions, comments, and feedback. e-mail: e.g.mx [at] ieee.org twitter: https://twitter.com/e_g_mx website: http://www.enriquegc.com Reviews "Behavior Analysis with Machine Learning Using R seamlessly integrates (1) an introduction to machine learning, (2) how to build machine learning models with R, and (3) how to apply these models to human behavior. The text is well written, concise, clear, and engaging – one of the best introductions to the topic of machine learning that I have read. The methodology is clearly explained without getting bogged down in the mathematics. At the same time, the code examples clearly demonstrate the underlying mechanics of each approach. The examples are fresh and unique. Anyone interested in machine learning will find the book valuable. For those interested in human behavioral analysis with R, there is no better book currently available."
https://www.routledge.com/Behavior-Analysis-with-Machine-Learning-Using-R/Ceja/p/book/9781032067049
Neuromuscular factors influencing the maximum stretch limit of the human plantar flexors. Maximum joint range of motion is an important parameter influencing functional performance and musculoskeletal injury risk. Nonetheless, a complete description of the muscle architectural and tendon changes that occur during stretch and the factors influencing maximum range of motion is lacking. We measured muscle-tendon elongation and fascicle lengthening and rotation sonographically during maximal plantar flexor stretches in 21 healthy men. Electromyogram (EMG) recordings were obtained synchronously with ultrasound and joint moment data, and H-reflex measurements were made with the ankle at neutral (0°) and dorsiflexed (50% maximal passive joint moment) positions; the maximum H amplitude (normalized to maximum M-wave amplitude; M(max)) and H-amplitude elicited at a stimulation intensity that evoked 10% M(max) were obtained. Maximal stretch was accomplished through significant muscle (14.9%; 30 mm) and tendon lengthening (8.4%; 22 mm). There were similar relative changes in fascicle length and angle, but planimetric modeling indicated that the contribution of fascicle rotation to muscle lengthening was small (<4 mm). Subjects with a greater range of motion showed less resistance to stretch and a greater passive joint moment at stretch termination than less flexible subjects (i.e., greater stretch tolerance). Also, greater fascicle rotation accompanied muscle elongation (9.7 vs. 5.9%) and there was a greater tendon length at stretch termination in more flexible subjects. Finally, a moderate correlation between the angle of EMG onset and maximum range of motion was obtained (r = 0.60, P < 0.05), despite there being no difference in H-reflex magnitudes between the groups. Thus clear differences in the neuromuscular responses to stretch were observed between "flexible" and "inflexible" subjects.
TransAmerican Title and Settlement Services was established by Alexander Rotbart, Esquire, in 2007. The company offers a seasoned team of closing agents, processors, and industry professionals primed with the industry’s latest technology. We are a national settlement service company providing title and escrow closings in all 50 states. TransAmerican Title has maintained the reputation of being an outstanding, service oriented and knowledgeable company in the title industry. Our continued commitment to providing superior services rests firmly on the foundation of years of financial stability, long-term professional team of industry experts, and long-cultivated relationships with the industry’s most trusted underwriting companies. Locally owned and operated, TransAmerican Title and Settlement Service is a beacon among title companies in the United States. Our greatest asset is our outstanding staff of industry experts with a combined experience of over 100 years. We take pride in this fact as it speaks to our commitment to excellence and consistency in a market of constant change. Our commitment to community, experience and relationships truly sets our organization apart from the rest. TransAmerican Title & Settlement Services was founded on three fundamentals of good business:
http://transamtitle.com/about.html
The invention discloses an electric pipe embedded type blank integral bathroom with a water pipe groove in the wall. The bathroom is made of reinforced concrete materials and is used for prefabricating wallboards and a floor in sections in a factory by adopting steel molds. When the wallboards are poured, a wire pipeline is embedded into the interior of the wallboards, and the wallboards are spliced in a grouting sleeve mode and combined with the floor. Waterproof materials are laid on the inner surfaces of the wallboards, a water diversion pipeline is installed in a groove reserved in the outer side and trowelled through gypsum, a water pipeline is installed in a groove reserved in the inner side and does not need filling treatment, tile adhesive tiling covering can be directly conductedin the later decoration stage, and therefore pipeline separation is achieved, and later inspection and pipeline maintenance are facilitated; during construction, each layer of the bathroom is assembled in a hoisting mode, and a suspended ceiling is installed after pipeline connection in a floor slab overhead layer is completed on site. The bathroom is high in manufacturing precision, the inner surfaces of the wallboards and the floor are extremely flat, ceramic tile adhesive tiles can be directly used for tiling, the wallboard grooves are reserved, and materials and the using space are saved.
FIELD BACKGROUND SUMMARY OF INVENTION BRIEF DESCRIPTION OF FIGURES DETAILED DESCRIPTION The present invention relates to a multi-screen display apparatus and a method of controlling a multi-screen display. It is known to display large video display images or display pictures by using a plurality of smaller screens for a variety of reasons, including advertising, exhibitions and sports events. One common problem is to ensure that the user is able to control all of the screens at the same time without needing to use individual control devices for each display screen. The relative positioning of screens can be input manually and adjusted to create an appropriate image. This method relies on direct input from the user to ensure that the final multi-screen image is correctly shown. US2011/0074666 In , a multi-screen display is disclosed which can be controlled by a remote controller which can control a sub-display or a portion of sub-displays as well as all sub-displays. CN205751232 In , a multi-screen display is disclosed which has multiple displays in which the infra-red control modules of each display can be turned on or off independently. JP 2010-079127-A discloses a multidisplay apparatus with a remote control. There is an algorithm to enable one of the display apparatuses to receive the remote control commands and to disable all others. JP H08 223591 discloses a multi display apparatus. All displays have an infra red (IR) receiver. The master display receives remote control (RC) commands. The slaves ignore RC commands to their IR receiver but are forwarded instructions from the master display. US6624854 In , a projection image device capable of controlling a plurality of projection image displays by one remote control transmitter is disclosed, which the received remote control signal is used to control a projection image display when the projection image display is in MASTER state and the remote control signal is intended for the display which is in MASTER state, and projection image display passes the remote control signal to other projection displays for their control when the projection image display is in MASTER state and the remote control signal is intended for the display which is in SLAVE state. However, in order to select which displays can be controlled by a controller, it is necessary to undertake a number of steps. a screen; an information receiver for receiving information from a remote control device; and a manually operable on/off switch for enabling and disabling the information receiver; (i) a plurality of display devices in an array, wherein each display device comprises: (ii) at least one connector for allowing the display devices to communicate with each other; and (iii) at least one controller configured to control each information receiver and each on/off switch, In a first aspect of the present invention, there is provided a multi-screen display apparatus comprising: wherein the at least one controller is configured such that when a first on/off switch on a first display device is activated, the at least one controller enables the information receiver of said first display device by sending a first command to the information receiver of the first display device and disables all other information receivers in the array by sending a second command to other display devices in the array. A multi-screen display is provided in which a single information receiver can be activated easily with all other receivers being deactivated. In a preferred embodiment, the at least one controller additionally de-activates all other on/off switches in the array. Each display device is formed of a screen an information receiver and an on/off switch. In standard display devices, the screen is commonly surrounded by a frame or bezel to support the structure of the screen. As the display devices are used to produce a multi-screen display for displaying images, it is preferred that the bezel is as narrow as possible in order to maximise the total screen area and avoid blank spots. In one preferred embodiment, a display device does not have a bezel and the screen extends to the edge of the display device. However, the display device does have an on/off switch for enabling and disabling the information receiver to be activated manually by the user. The switch is typically situated on the bezel of the display device. However, where the display device does not have a bezel, it is possible to locate the switch elsewhere, so long as it is accessible to the user when the display devices are positioned in the multi-screen display. One possibility is to position the switch on the edge of screen. The switch can take any suitable form so long as it is operable manually. In one preferred embodiment, once a switch has been activated, it remains activated until it is either de-activated manually or as a result of the controller de-activating the switch. In an alternative preferred embodiment, once the switch has been activated and has caused the controller to enable the information receiver and disable all other information receivers in the array, the switch becomes de-activated. In one preferred embodiment, the switch is in the form of a button. In a preferred embodiment, the button contains one or more lights such as LED lights which indicate whether the button has been activated or de-activated. This embodiment is particularly suitable when the switch remains activated. In one preferred embodiment, the button has a green LED light which lights when the switch has been activated. In a further preferred embodiment, the button has a red LED light which lights when the switch has been de-activated. It is further preferred that the button has both red and green LED lights. In a preferred embodiment, the button is located on the bezel. In a particularly preferred embodiment, the button is located on one corner of the bezel. It is particularly preferred that the button is located on the top left corner of the bezel. Each display additionally has an information receiver. The information receiver is typically in the form of an infra-red receiver. However, the skilled person would be aware that it is possible to have a receiver which can receive information from a remote controller by other means, such as by radio frequency such as Bluetooth or by wi-fi. Each information receiver is capable of being enabled or disabled. In order for the display devices to communicate with one another, it is essential that there is at least one connector which connects between the display devices in an array. The skilled person would be aware of different methods to connect the display devices together to permit communication. One preferred method is to connect the display devices in a daisy chain method, in which each display device in the array is connected in series. The skilled person would be aware of suitable connectors which would be suitable to connect the display devices in an array. In one preferred embodiment, the connector is at least one universal asynchronous receiver-transmitter (UART). This type of connector is particularly suited to connection in a daisy chain method. The apparatus has at least one controller which is configured to control the information receivers and on/off switches. The at least one controller is configured such that when an on/off switch on a display device is activated, the information receiver on that display device is enabled. At the same time, all other on/off switches in the array are de-activated and all other information receivers are disabled. It is preferred that each display device has a controller and that all of the controllers communicate via the at least one connector. The apparatus of the present invention is for use with at least one remote controller. In a preferred embodiment, the apparatus additionally comprises a remote controller. The remote controller is one which can communicate with the information receivers of the display devices. It is preferred that the remote controller can communicate with any of the display devices in the array of the multi-screen display. In a preferred embodiment, the remote control provides an infra-red signal which is received by an enabled infra-red receiver. activating a first on/off switch on a first display, wherein the information receiver of said first display device is enabled by sending a first command signal to the information receiver on the first display device and all other information receivers are disabled by sending a second command signal to the controllers on the other display devices; controlling the multi-screen display apparatus using a remote control which communicates with the multi-screen display apparatus via the information receiver of the said first display. In a second aspect, there is provided a method of controlling a multi-screen display of the first aspect comprising the steps of: In a preferred embodiment, when the first on/off switch is activated, all other on/switches are de-activated; sends a first command to the information receiver of said first display device to enable the information receiver; and sends a second command to a controller on each other display device in the array to disable the information receiver on each said other display device and optionally to de-activate the on/off switch on each said other display device. When the on/off switch is activated in a first display device, a first controller on the first display device: Where an information receiver is already disabled and/or the on/off switch is de-activated on any other display device, the information receiver remains disabled and the on/off switch remains de-activated. All features described in connection with any aspect of the invention can be used with any other aspect of the invention. Figure 1 shows a multi-screen display according to an exemplary embodiment of the present invention; Figure 2 shows a flow chart of the process of controlling the multi-screen display. Figure 3 shows a multi-screen display after operating the enabling/disabling mechanism according to an exemplary embodiment of the present invention. The invention will be further described with reference to the drawings in which: Figure 1 The invention relates to a multi-screen display apparatus. In , there is disclosed a multi-screen display apparatus 1, which is formed of four display devices 5 in an array. Each display device has a screen 10, a bevel 15, an on/off button 20, positioned on the top left corner of the bevel and an infra-red receiver 22 on the bottom middle of the bevel. On the rear of each display device 5 is a first UART port, UART0 25 and a second UART port, UART1 30. The ports are connected to each other in a daisy chain manner using UART cables 35. Each display device has a controller (not shown). When setting up the multi-screen display apparatus 1, the display devices 5 are attached to a support structure (not shown). The support structure can be a wall or a framework designed for receiving the display devices. The skilled person will be aware of suitable support structures. The display devices are connected to each other using the UART cables which pass from the UART0 port of one screen to the UART1 port of an adjacent screen. The first display device in the daisy chain is identified as the master display device, shown as 40. Each display device will typically have its own power supply (not shown). However, it is possible to connect the display devices together to use a single power supply. Figure 2 When the display devices are turned on, the infra-red receivers can be enabled or they can be disabled. The user then activates an on/off button on one of the display devices. The infra-red receiver of that display device is then enabled. That display device will now, in effect, become the primary display device which can be controlled by a remote controller. The process for controlling the multi-screen display is according to the flow chart of . An on/off button 20 on a first display device is pushed 50. A command is sent by the controller of the first display device to the infra-red receiver of first display device to enable the infra-red receiver 55. At the same time, a command is sent by the controller of the first display device to the controllers of the other display devices 60 to disable any infra-red receivers. The command is sent via the UART cables to all other display devices. In addition, the activated on/off button will de-activate 62. In an alternative embodiment, the activated on/off button will remain activated and the controllers will additionally deactivate any other on/off buttons. The multi-screen display is now set up so that only one information receiver is activated and all other information receivers are disabled. The multi-screen display can now be controlled by an infra-red remote control via the infra-red receiver on the first display device 65. All on/off buttons will be de-activated. In a preferred embodiment, the display device which has an activated information receiver will have an activated light, preferably an LED light, to indicate that it is active. It is preferred that this light is located in the on/off button. It is further preferred that the light is green. In an alternative embodiment, the green light additionally indicates that the on/off button is activated. In a further preferred alternative embodiment, the on/off button on each of the other display devices will have an activated red light to show that each of these is de-activated. Figure 3 As shown in , once a display device has been selected, in this case the bottom left screen, a remote control 110 is able to communicate with the display device, and therefore the multi-screen display apparatus via the infra-red receiver 22. The remote control cannot communicate directly with any other display devices. All communication between the remote control and other display devices is via the enabled screen. The controller of the enabled display device will then pass any information to other display devices via the at least one connector. Whilst the invention has been described with reference to a preferred embodiment, it will be appreciated that various modifications are possible within the scope of the claims. In this specification, unless expressly otherwise indicated, the word 'or' is used in the sense of an operator that returns a true value when either or both of the stated conditions is met, as opposed to the operator 'exclusive or' which requires that only one of the conditions is met. The word 'comprising' is used in the sense of 'including' rather than to mean 'consisting of'. No acknowledgement of any prior published document herein should be taken to be an admission or representation that the teaching thereof was common general knowledge in Europe or elsewhere at the date hereof.
[Clinical characteristics of dyspepsia in patients with diabetes mellitus type 2]. To estimate the prevalence of dyspepsia and to study its clinical manifestations and risk factors in patients with type 2 diabetes mellitus. One hundred and seven patients with type 2 DM and 33 with functional dyspepsia were examined. A clinical and laboratory study and testing were made to identify the symptoms of dyspepsia; dyspepsia-associated factors were studied. Dyspepsia was observed in 71.0% of the examined patients with type 2 DM. It may be attributed to organic gastrointestinal tract (GIT) diseases only in 42.3% of cases. In the type 2 DM patients, dyspepsia that could not be explained by organic GIT diseases was mainly manifested by a dyskinetic type while an ulcer-like type was prevalent in those with organic GIT diseases. In the patients with type 2 DM, dyspepsia that could not be accounted for GIT diseases was associated with the duration of carbohydrate metabolism disturbance, the presence of diabetic complications, Helicobacter pylori infection, and patient age. Some symptoms of dyspepsia (repletion and epigastric discomfort), which could not be explained by organic GIT diseases in patients with type 2 DM were associated with diabetic complications and carbohydrate metabolic parameters. Dyspepsia in type 2 DM was observed in 71% of cases; it can be due to organic GIT diseases in 42.3% and its association with digestive organ pathology was not revealed in 57.7%.
Promotion of civic space and enabling environment in EU external action is a key topic CONCORD works on. This new paper examines civil society at the heart of democracy and sustainable development and looks at the key components of civic space which are necessary to enable an environment where civil society can peruse and express basic rights. Civil society organisations can play an important facilitating role to make the voices of people audible. This paper targets civil society as well as EU institutions and Member States by building some relevant recommendations. Civil society is at the heart of democracy and sustainable development Civil society is essentially people coming together and organising themselves in the pursuit of common interests, which is a basic right of any human being. There are many different expressions of civil society, with multiple types of actors, roles and mandates. Forming organisations is both a right and a means of making people’s participation and commitment to change effective and sustainable. Civil society organisations can play facilitating roles by amplifying the voices of people facing marginalization and exclusion, by defending and asserting rights, and by demanding transparency and accountability. Key components of civic space and an enabling environment for civil society The restrictions of civic space in many countries are linked to an anti-democratic development globally that questions the universality of human rights. At the root of this are attempts by rulers to concentrate power and evade accountability to people. The democratic space is put at risk also in European countries (as demonstrated in CIVICUS Report) due to similar non-democratic, populist and nationalist trends. The closing of civic space has severe negative impacts on an inclusive and sustainable development. For an enabling environment for civil society, the rights to freedom of association and assembly, and other related fundamental freedoms and rights must be respected in:
https://concordeurope.org/blog/2018/03/13/civic-space-enabling-environment-paper/
GCHQ is one of the UK's three intelligence agencies. Their intelligence mission is to help protect the security of the UK and its citizens from external threats, such as terrorism, serious crime and military attack, and promote the economic wellbeing of the UK. GCHQ relies heavily on a strong cadre of linguists to support its mission and is the largest government employer of linguists in the UK. The dramatic decline in the number of students taking a language at degree level, and the closure of many university language departments, have had a serious detrimental impact on GCHQ's ability to recruit linguists with the required skills. GCHQ has therefore worked with a variety of organisations to promote the study of languages. Collaboration with GCHQ in the context of Creative Multilingualism will include the following: - Organisation of a workshop presenting case studies of exceptional language-learners as a starting point for exploring the highly creative cognitive processes involved in multilingualism. - Contribution to workshops on creating multilingual careers, and involvement in the Careers Focus Group. - Making internship opportunities available for undergraduates and postgraduates. - Collaboration on identifying ways in which community languages might be mapped, and on strengthening the provision of meaningful qualifications in community languages. - Participation in the Creative Multilingualism conferences. - Sharing GCHQ's expertise in running innovative outreach activities with schools.
https://www.creativeml.ox.ac.uk/about/partners/gchq/
In the Star Trek: The Next Generation episode The Measure of a Man (February 1989), a representative of the Federation seeks to dismantle and clone the android Data, a mission that ultimately brings up the question of whether artificial intelligence can be sentient and bestowed with human-like rights. Data ultimately avoids destruction after the council fails to find a way to prove that Captain Picard, a human, is sentient either. Pattern Recognition Mercifully, modern concepts of AI are a long way from looking and acting just like us. They’re much more likely to take the form of computers or pieces of code on a standard laptop. However, their applications in day-to-day life are growing. Functions like data-sorting, pattern recognition, and creating challenges in video games are about as close as we’ve come to an intelligent machine so far. Source: Pexels As AI becomes more mainstream, though, its uses will become more fantastic. This is pretty important given that current AI systems are already highly competent. For example, computers can assist human researchers with cancer detection. Mozziyar Etemadi’s AI is a sophisticated and efficient technology: back in 2019, a study determined that the system successfully identified early stages of lung cancer 94% of the time. If this level of efficacy was apparent a couple of years ago, it’s highly likely that further improvements will be made to enhance the technology even further. Another example of an algorithmic tool used in the present day is a state-of-the-art system called Beth, which is a skilled horse predictor that aids sports bettors when making picks. The service uses existing data sets regarding weather conditions, previous results, and odds, etc. to come up with a likely race winner. This advanced method is objective and empirical, giving bettors an educated edge when they make their selections so that they’re not relying solely on luck. These are just two of the many examples of AI in practice in the modern era and undoubtedly, there’ll be far more in the years to come. Living Machines Characters like Data, the Cylons in Battlestar Galactica, and the Geth in Mass Effect are frequently used in science fiction to explore concepts such as human overreach and whether we can own lifeforms that we have created, however intelligent they may be. In almost every scenario, our hubris turns our artificial allies against us, as their right to self-determination conflicts with our refusal to accept their sentience. Despite how limited current AI models are, there’s some evidence that we’ve taken our first steps on the path to living machines. According to The Guardian, court cases in South Africa and Australia have ruled in favor of an AI in a patent battle. In brief, in those two corners of the world, computers can now own anything they invent, like a song. The UK and USA will reportedly make their own decision on the topic in late 2021. Dreaming Of course, at such an early point in the development of AI, there’s no right or wrong answer. An article published in The Law Review in 2020 specified dreaming – that is, yearning for something – as endemic to humans and, therefore, a clear sign that a computer deserves rights. It might sound simplistic but an (unprompted) question as mundane as “I want a biscuit” could represent a seismic shift in how AI brains function. Source: Pexels Inevitably, AI may soon begin to resemble great apes in terms of their self-awareness. The late gorilla Koko understood basic grammar and asked for a kitten to look after in 1983. This request falls under the definition of AI sentience provided by the previous source. However, gorillas only have certain rights in Spain, which makes a mockery of our current understanding of sentience and just who or what deserves ‘human’ treatment. It may be that humans simply aren’t ready to share our planet with something just like us, even if we invented it.
https://www.tme.net/blog/ai-rights/
Warning: more... Fetching bibliography... Generate a file for use with external citation management software. The early Pleistocene marks a period of major transition in hominin body form, including increases in body mass and stature relative to earlier hominins. However, because complete postcranial fossils with reliable taxonomic attributions are rare, efforts to estimate hominin mass and stature are complicated by the frequent albeit necessary use of isolated, and often fragmentary, skeletal elements. The recent discovery of 1.52 million year old hominin footprints from multiple horizons in Ileret, Kenya, provides new data on the complete foot size of early Pleistocene hominins as well as stride lengths and other characteristics of their gaits. This study reports the results of controlled experiments with habitually unshod Daasanach adults from Ileret to examine the relationships between stride length and speed, and also those between footprint size, body mass, and stature. Based on significant relationships among these variables, we estimate travel speeds ranging between 0.45 m/s and 2.2 m/s from the fossil hominin footprint trails at Ileret. The fossil footprints of seven individuals show evidence of heavy (mean = 50.0 kg; range: 41.5-60.3 kg) and tall individuals (mean = 169.5 cm; range: 152.6-185.8 cm), suggesting that these prints were most likely made by Homo erectus and/or male Paranthropus boisei. The large sizes of these footprints provide strong evidence that hominin body size increased during the early Pleistocene. Copyright © 2013 Elsevier Ltd. All rights reserved. National Center for Biotechnology Information,
https://www.ncbi.nlm.nih.gov/pubmed/23522822?dopt=Abstract
Drought continues to plague northeast Kansas, but much of the rest of the state found relief in August and early September rainfall. K-State is expanding its network of weather stations to better monitor and record such information as precipitation, wind speed and soil moisture. Update (July 23): Agronomy e-Update article - Stressed corn: Formula for estimating corn yield potential Update (July 13): Conservation program specialist Rod Winkler of the Farm Service Agency announces that 43 counties in Kansas have now been released for emergency haying and grazing of Conservation Reserve Program acres, because of ongoing drought… producers in eligible counties can apply starting Monday. Update (July 11): K-State beef systems specialist Jaymelynn Farney talks about salvaging drought-stressed corn as cattle feed: in what form does that corn best serve as a forage feedstuff, what guidelines need to be followed in processing it, and what nutrient value it provides to the cow herd. - Agriculture Today audio (subscribe to the podcast) Update (July 10): Agricultural program specialist Blaine Rutherford of the Farm Service Agency covers the details of three USDA programs designed to assist livestock producers who are rebounding from various disasters over the past couple of years, including drought, wildfire and blizzards...the Livestock Forage Disaster Program, which provides compensation to producers who have suffered grazing losses due to drought; and the Livestock Indemnity Program, which provides benefits to producers who have lost livestock to adverse weather. - Agriculture Today audio (subscribe to the podcast) News Release - Study looks at cows’ adaptability to drought, heat stress K-State researchers have established testing guidelines for water intake, an important step that could one day help producers select cattle that are more resistant to drought and heat stress. Update (July 5): State horticulturist Ward Upham goes over the proper ways of watering drought-stressed landscape trees in mid-summer. - Agriculture Today audio; skip to the 33:02 mark (subscribe to the podcast) Update (July 3): K-State crop production specialist Ignacio Ciampitti talks about assessing the condition of corn stands stressed by drought and heat...he says that a thorough evaluation should be conducted before making decisions on whether to go ahead and take that corn crop to grain, or to salvage it as silage or forage. - Agriculture Today audio (subscribe to the podcast) Update (May 8): Providing adequate water to the cow herd this summer, in light of the drought and the shortage of pond and stream water - Agriculture Today audio (subscribe to the podcast) Update (May 7): Developing a drought management plan for cattle on summer grass, should the extremely dry weather continue (segment begins at the 11:29 mark in the episode) - Agriculture Today audio (subscribe to the podcast) Update (April 23): Two new articles were posted on the Extension Agronomy eUpdate site: - What tools are used to monitor and track drought? - How dry and windy has it been in Kansas during 2018? Kansas Governor Jeff Colyer on March 13 issued a drought declaration for all 105 counties in Kansas due to persistent dry conditions. All counties are at least in watch status, with many of the southwest, central and south-central counties in emergency status. The Kansas Water Office serves as the coordinating agency for drought response. More information on these and other resources and activities can be found on their web page: www.kwo.ks.gov Note: This is a different URL than has been used in the past, so users should update their bookmarks. K-State Research and Extension has an array of informational materials available to help Kansans deal with drought conditions. The College of Agriculture’s Agronomy eUpdate newsletter offers timely advice, and users can search through the extensive archives. K-State’s Kansas Climate website offers weekly maps and drought reports Following is a list of helpful publications that are available for download or hard-copy purchase from the K-State Research and Extension bookstore. K-State Research and Extension drought research Drought-tolerant corn hybrids (2017) Precipitation Trends and Changes in Drought (2017) Drought-Tolerant Trees for South-Central Kansas (2015) Rangeland Management Following Wildfire (2017) Efficient Crop Water Use in Kansas (2012) Research Information (this is a search on New Prairie Press on “drought”): Extension Materials:
https://www.kiowa.k-state.edu/crops-livestock/Drought.html
Many financial management professionals are responsible for complying with legal requirements for government business transactions. With this responsibility comes a need to understand the various aspects of Federal business activities, such as reimbursables, revolving funds, and user charges. You will learn how to properly apply the basic tenets of appropriations to your agency transactional work by examining and discussing the requirements of Chapter 12 from Volume 3 of the GAO Principles of Federal Appropriations Law (the Red Book) and other guidelines. Learning Objectives - Apply the three tests that determine the legal availability of appropriated funds - Describe the Economy Act and its requirements for interagency transaction payments and costs - Differentiate between services which may and may not be performed as interagency transactions - Describe and apply the account adjustment statute - Discuss the characteristics of revolving funds - Account for augmentation, impairment, and property depreciation issues for revolving funds - Describe and apply intragovernmental business rules and assisted acquisition policies and procedures - Determine the legality of and method for charging a user fee - Discuss the characteristics of Nonappropriated Fund Instrumentalities (NAFIs) Course Topics Appropriations Law Review - Sources of Appropriations Law - Legal Framework - Purpose Law - Time Principles - Amount Principles Interagency Transactions - Background - Who is Covered? - Fiscal Matters - What Work or Services May Be Performed? - Account Adjustment Statute and Other Interagency Authorities Revolving Funds - Concept and Definition - Impact on Congressional Control - Creating Revolving Funds - Receipts and Reimbursables - Types of Revolving Funds - Legal Considerations - Augmentation and Impairment - Property Management & Utilization - DoD Revolving Funds User Charges - Providing to Private Parties - The Concept of User Charges - Independent Offices Appropriation Act of 1952 (31 USC 483a) - Other Authorities - Disposition of Fees Nonappropriated Fund Instrumentalities (NAFIs) - NAFIs Defined - Sources of NAFI Funding - Transactions with Federal Agencies - Management of NAFIs - Sovereign Immunity Who should attend This course is designed for anyone familiar with the basic tenets of appropriations law who deals with interagency transactions (reimbursables and revolving funds) and other government businesslike activities (user charges).
https://coursalytics.com/courses/appropriations-law-for-revolving-funds-and-reimbursables-management-concepts
Nobody can doubt that the Manchester United youth ranks are packed with highly talented future stars – let me rephrase that, POTENTIAL future stars, which should guarantee ongoing success for years. Names like Paul Pogba and Ravel Morisson amongst others immediately come to mind while there are a swag of on loan youngsters which include Tom Cleverley, Danny Welbeck, Mame Diouf, Federico Macheda, Corry Evans and Richard De Laet. Sir Alex Ferguson left little doubt when he recently made clear that “They will come back into the first team squad and they will get plenty of games next season” when we asked about his plans. “They are part of the band of young players coming through at this club. They will all come back in” the boss continued. “At that point, we will then review our squad because that’s the important thing. But we will always put players out on loan. Cleverley has done very well, particularly in his spell at Watford and then at Wigan. He has improved in each case and he is going to be a top player.” “Welbeck has been fantastic too, it’s just unfortunate that he picked up a bad injury. But they will all be ready for next year.” Sir Alex also revealed that Senegalese striker Mame Biram Diouf will return from his stint with Blackburn as the loan deals have been beneficial for his fringe performers. “Mame has done well at Blackburn too and he’ll come back in” Ferguson emphasised “they’ve all done well.” “It proves we were right in putting them there in the first place” he explained “for them it’s that experience of being exposed to regular football that really brings them on so that they are ready to play for Manchester United.” The major doubt for Ferguson is the future of England Under 21 international Welbeck who has been a big hit at Sunderland with boss Steve Bruce thought to be keen on making the deal permanent. Sir Alex is determined to hang on to the 20 year old however even though Welbeck insists he will wait until the end of the season before deciding on his next move. “I’ve not really thought too much about what I’m going to do but I’ve really enjoyed my time at Sunderland” said the youngster “it has benefited me massively just to be around with the big boys week in, week out. I’m delighted with that but the end of the season will be the time to sit down and think about the future. I’m like anyone else” he confessed “I want to play every week. Football is my job. I like training hard and then playing in games but we will just see what happens in the summer.” Should Ferguson manage to hold on to all his young talent, they will join a squad of under 25 year olds like Javier Herandez, Nani, Anderson, Chris Smalling, Fabio, Rafael, Jonny Evans, Darron Gibson, Gabriel Obertan and Bebe with even Antonio Valencia and Wayne Rooney barely 26 by the start of next season. Granted some of these players may be moved on by Sir Alex by then but a young squad which will be the envy of every rival will remain at Old Trafford to carry on with the Ferguson youth legacy. It makes you wonder if anyone will ever dare repeat that never to be forgotten quote of “You’ll never win anything with kids” Will Ferguson’s youth policy continue to bring success for United?
https://www.trulyreds.com/20110326/ferguson-plans-yet-another-united-youth-dynasty/
as necessary to protect the rights, safety, or property of courierNet, its users, or others; this may include (for example) exchanging information with other organizations for fraud protection and/or risk reduction. courierNet uses "cookies” to store personal data on your computer. We may also link information stored on your computer in cookies with personal data about specific individuals stored on our servers. If you set up your web browser so that cookies are not allowed, you might not be able to use some or all of the features of our web site. to take customary precautions to guard against "malware" and viruses, for example by installing and updating suitable anti-virus software. Thank you for choosing courierNet as your delivery partner!
https://www.couriernet.co.uk/privacy-policy/
In her new exhibition at the Galerie Volker Diehl, internationally acclaimed artist Susan Hiller explores extinct or threatened languages and the erosion of meaning in indigenous systems of signs and images. This exhibition is thematically linked with the presentation of Susan Hiller's works at the 5th Berlin Biennial for Contemporary Art (5 April - 15 Juni 2008). The work in the exhibition centers around mysterious, archaic symbols Hiller discovered in various parts of the world. On her journeys through Ireland, France, North America and Australia, she compiled a photographic record of the traces left by prehistoric cultures engraved on rocks or in caves. Due to the extremely abstract nature of some of the images and our lack of knowledge about why they carved onto the rock, this collection of petroglyphs (images or patterns carved or engraved on rock surfaces) is presently regarded as indecipherable. The exhibited works are Piezo pigment prints which have been greatly enlarged and digitally modified by Hiller from small details in her photographs: a transformation process confronting the viewer with the magical and hallucinatory power of these weathered symbols. This is more than simply painstaking observation, it is also a highly personal meditation on lost meanings. The exhibition gives both visual and acoustic expression to Hiller's preoccupation with the loss of meaning in signs transmitted solely in a material form, as if they were empty shells without signification. Her „Last Silent Movie“ (2007), shown in a second version at the Berlin Biennale, can be regarded as complementary to the images. In front of a projected black screen, the viewer hears the voices of men, women and children, all speaking in strange languages. They sing songs, narrate stories or recite lists of vocabulary. Others lament the injustice of allowing languages to die and be forgotten, addressing their complaints directly to the viewer. In an uncanny way, Hiller's acoustic choreography takes up the issue of the process of historical extinction und the fleeting nature of cultural transmission. The exhibition title „Journey to the Land of the Tarahumaras“ evokes the trip made by Antoine Artaud, surrealist poet and playwright, to the secluded and little-known Tarahumaran people in the north of Mexico in 1936.
Spotlight on Ancient History Online Falvey patrons now have access to the online Oxford Encyclopedia of Ancient Greece and Rome which contains contributions from 500 authors. Entries cover the Bronze Age (3000 BCE) through the era of Emperor Justinian (600 CE). The Encyclopedia contains topical outlines on Rome and Greece, numerous illustrations, maps, and genealogical tables. Primary sources and annotated bibliographies of mostly English secondary titles are provided with the articles; most articles also include helpful cross-references. While the writers are usually authorities in their fields, their intended audiences are college students and educated laypersons. Additional online resources in the field of ancient history: - Oxford Dictionary of the Classical World Over 2,500 entries beginning with the first Olympic Games in 776 BCE and ending with the death of Marcus Aurelius (180 CE). The Dictionary “covers key aspects of ancient Greek and Roman life and literature…” - Oxford Companion to Classical Civilization Authoritative survey of ancient Greek and Roman history. - Oxford Encyclopedia of Ancient Egypt The Encyclopedia focuses on dynastic Egypt, but also includes some earlier material. More than 250 scholars contributed over 600 articles accompanied by bibliographies. - Cambridge Ancient History Covers ancient history from prehistory to late antiquity (3000 B.C.-600 A.D.). All 14 volumes can be searched simultaneously, individual chapters can be bookmarked or downloaded and cited references can be tracked via OpenURL, which will link to the full text in Falvey’s holdings or pre-fill an interlibrary loan form. - Cambridge History of the Byzantine Empire c. 500 – 1492 Written by a group of expert international Byzantine scholars, it “follow[s] the fortunes of the empire” chronologically from “The Earlier Empire c. 500 – c. 700” to “The Middle Empire c. 700 – 1204” and ends with “The Byzantine Lands in the Later Middle Ages 1204 – 1492.” These three parts are subdivided into chapters. Also included are a glossary, genealogical tables, lists of rulers, alternative place names, 52 maps and a bibliography. Did you know that Oxford Reference Online includes time lines of ancient Egypt, Greece and Rome? Each date and event listed on these time lines is linked to entries in relevant online Oxford reference titles. All titles are all available through the Library catalog. Please feel free to contact us with any questions or comments that you may have. Contributed by Alice Bampton. 0 Comments » No comments yet.
https://blog.library.villanova.edu/2010/05/17/spotlight-on-ancient-history-online/
The study programmes in choral and orchestra conducting allow for regular work with vocal/instrumental ensembles. The subject of conducting addresses the technical and communicative aspects of conducting orchestras, choirs and smaller ensembles. This is based on score analysis, instrument knowledge, intonation and ear training and rhythm exercises. Repertoires from different epochs are combined with collaborations with KMH's composition students and their teachers. Additional complement is four-part harmony, counterpoint, instrumentation, playing from scores and big band conducting. Studies in conducting or ensemble management occur both in the conducting programmes at the Bachelor and Master level and as an important part of the church music and teacher education programmes. Teachers in conducting Among the KMH conducting teachers you find: - B. Tommy Andersson – professor of orchestral conducting - Katarina Andreasson – visiting professor of musical interpretation - Glenn Mossop – senior lecturer in orchestral conducting - Mats Janhagen – senior lecturer - Fredrik Malmberg – professor of choral conducting - Mats Nilsson – professor of choral conducting - Cecilia Rydinger – professor of orchestral conducting and a number of hourly-paid lecturers. Composing, Conducting and Music Theory Department Contacts Composition, Conducting and Music Theory Directors of Studies composition: Peter Danemo Directors of Studies conducting and music theory: Anders Sjögren Staff at the Department of Composition, Conducting and Music Theory (Swedish) External link. The conducting students' exercise ensembles The KMH Vocal Ensemble is KMH's most qualified exercise ensemble and primarily serves as instrument for conducting students at Master level. It consists of between 8 and 16 singers, as required. The singers are salaried, most of them also sing in other elite ensembles such as the Swedish Radio Choir and the Eric Ericson Chamber Choir. The KMH Instrumental Ensemble consists of KMH students from other study programmes. The ensemble varies in size from about 10-12 musicians (most often) and up to a maximum of 25-30 musicians at any particular occasion, such as graduation concerts. Students may also be invited to conduct the KMH Chamber Choir and the KMH Symphony Orchestra. The ljudOljud Festival is the KMH students' festival for new art music. It also provides an opportunity to take part in the conducting students' graduation productions, usually at Master level and often in new music created by KMH's composition students.
https://www.kmh.se/in-english/about-kmh/kmhs-strengths/conducting.html
Unless your heart’s made of Duke coal, you’ve been mourning a fast growing list of dead rock stars in this current year of our Lord 2016. Perhaps they saw a shit storm a’ comin’ by way of our ever-more depressing political prospects this election and decided it was time to migrate to that VIP section of Rock and Roll Heaven in the sky. Nobody I’m close to hasn’t deeply felt the loss of David Bowie and Prince. Both were utter singularities of popular music, reshaping the sonic landscape of the last 45 years like few artists could ever hope to, much less as solo acts. Both warped genres of music and bended gender stereotypes of what musicians were allowed to create and who men were allowed to be. Bowie was a tragic loss, but his death didn’t effect me nearly as deeply as losing Prince last week. Maybe it was the fact he was 12 year’s Bowie’s younger, aligning his music into more of my upbringing. Bowie re-entered pop zeitgeist when I was in my early 20’s via art-schlock cinema soundtracks, but Prince shaped my pop sensibilities as a kid, and helped me and millions more learn what real fucking dance music is. So it was with bitter verve that I skimmed through my archives of thousands of cycling photos, finding hundreds from Bowie vs Prince mobile-music rides, part of Portland’s legendary annual Pedalpalooza festival.
http://rebelmetropolis.org/2016/04/
Jo's Cervical Cancer Trust is the UK's leading charity dedicated to those affected by cervical cancer and cell changes (abnormalities). The charity was established in 1999 by James Maxwell following the death of his wife Jo, aged 40, from cervical cancer. Since then we have provided advice and support to thousands of women and their families. We offer a range of online and face-to-face support and information including: information materials, a free helpline, online forum, national and regional support days and an ‘ask the expert’ service. Cervical cancer is one of the most common cancer amongst young women (under 35) in the UK and Europe. Two women a day in the UK will die from cervical cancer whilst over 3,000 women are diagnosed each year. In addition, some 220,000 a year are told they may have a cervical abnormality that may require treatment. Thanks to the NHS Cervical Screening and HPV vaccination programmes cervical cancer is a largely preventable disease. However, for those affected, the impact of cancer on a woman's life and that of her family cannot be overstated. This is an exciting time to join the charity. In recent years awareness of our work and cervical cancer has grown significantly with annual income from £288k to £1.8m. The staff team has also significantly grown to 23 enabling us to reach more women than ever before. Over the past few years our work has been recognised a number of times including winning a prestigious GSK IMPACT Award, Best Communications Campaign at the Third Sector Excellence Awards and a Plain English Osborne Memorial Award for our website, we have also achieved Investing in Volunteers accreditation. Overview of the role The post holder will have the opportunity to help the charity make a real difference by providing excellent administrative support to the Head of Finance and Corporate Services. You will be working across the teams and undertake a range of administrative functions including general administrative duties and finance support. The person should be highly organised and have at least two years of administrative experience. The role will sit in the Finance and Corporate Services Department. It is a crucial role in sustaining and growing the charity’s income, and the person who fills this role should be comfortable with a range of administrative tasks. Overall To provide administrative support for the Head of Finance and Corporate Services To apply for this role please send a CV and a covering letter to Julie Bradley, Head of Finance and Corporate Services Applications without a covering letter will not be considered. Closing date for application: 5pm on the 30th April 2021 Virtual Interview date: Friday 7th May 2021 Jo’s Cervical Cancer Trust is the only UK charity dedicated to women and their families affected by cervical cancer and ce... Read more The client requests no contact from agencies or media sales.
https://www.charityjob.co.uk/jobs/jo-s-cervical-cancer-trust/administration-assistant/740213?tsId=2
Terms and Conditions of Sales: This document constitutes an offer by Casey Architectural Lighting, LLC (“Seller”) to provide the products described herein (the “Products”) to the buyer to which this offer is addressed (“Buyer”). Seller’s agreement to provide the Products is expressly conditioned on the Buyer’s assent to all of the terms and conditions set forth herein, notwithstanding any language in Buyer’s purchase order, if one exists, or other writing or oral representation. Any terms, conditions, negotiations or understandings which are not contained in this document shall have no force or effect unless made in writing and signed by Seller and Buyer. This document constitutes the final expression of the terms between Seller and Buyer regarding the Products and is a complete and exclusive statement of those terms. Seller’s representatives are without authority to change, modify or alter the terms of this document. Governing Law and Forum: This contract shall be governed by and construed according to the internal laws of the State of Missouri. Any disputes, claims or controversies arising under or relating to this contract shall be determined by binding arbitration and shall be administered by the American Arbitration Association (“AAA”) in accordance with AAA rules and procedures. The arbitration shall be conducted by a single, neutral arbitrator selected by mutual agreement of the parties or, if the parties cannot reach an agreement, by the AAA under its selection procedures. The arbitration shall take place in Festus, Missouri. Judgment on any arbitration award rendered by the arbitrator may be entered in any court of competent jurisdiction. Acceptance: Buyer shall be deemed to have made an unqualified acceptance of this offer and the terms and conditions herein on the earliest of the following to occur: (a) Buyer’s payment of any amounts due to Seller for the Products; (b) Seller’s delivery of the Products; (c) failure by Buyer to notify Seller to the contrary within ten days of receipt of this document or (d) any other event constituting acceptance under applicable law. Payment Terms: Payment terms, for credit approved by Seller, are NET 30 days from the date of invoice. A late payment charge of the highest of the following: (a) 2% of the remaining balance per month; (b) $20 per month. The late payment charge may be added to outstanding balances after 30 days from date of invoice. Buyer will be responsible for payment of all expenses, including attorney’s fees, incurred by Seller in the collection of any invoices not paid by due date. Prices: All orders are subject to prices and terms of sale in effect on the date of shipment and are subject to change without notice. All price quotations expire 180 days from the date of quotation, unless otherwise specified. All “Hold for Release” orders expire 90 days from the date of the original hold status, unless otherwise specified. Prices do not include federal, state or local taxes of any nature. All prices are for products -less lamps unless otherwise stated in the buyer-approved order specifications. Transportation Terms: Freight will be prepaid and allowed to any shipping destination within the continental United States or Canada for orders over $5,000. See chart below for freight charges on orders $5,000 and less. This freight policy applies only to shipments where Seller selects the method of transportation and the routing of the shipment. Requests for premium freight service (such as air freight and lift gates) must be authorized and approved by us in writing prior to shipment. Buyer will bear all related charges for premium freight service including normal prepaid freight costs. Lift gate service must be requested upon quote request submission. Seller, unless specifically stated otherwise, may await completion of the entire order before shipment, or may make partial shipments at its sole discretion. Partial shipments at Buyer’s sole discretion may incur a freight charge even if the total order is over $5,000. - Less than $1,000 $50 Freight - Freight $1,001 -$5,000 10% of the gross order pre taxes - Freight greater than $5000 will be custom quoted Shipping Dates: Acknowledged shipping dates are an approximation of the ship date and shall not be deemed a guaranteed date. Seller shall not be responsible for any damages, penalties or labor chargebacks resulting from delayed shipments or from its inability to ship by the acknowledged shipping date. Time for delivery shall not be of the essence. Force Majeure: Seller shall not be responsible for delay in delivery or failure to fill orders or other default or damage where such has been caused by an act of God, war, major disaster, terrorism, third-party criminal acts, insurrection, riot, flood, earthquake, fire, strike, lockout or other labor disturbance, delay by carriers, shortage of fuel, power, materials or supplies, operation of statutes, laws, rules or rulings of any court or government, demand for goods exceeding Seller’s available supply or any other cause beyond Seller’s control. In the event of any delay in delivery, failure to fill orders or other default or damage caused by any of the foregoing, Seller may, at its option and without liability, prorate its deliveries, cancel all or any portion of the contract and/or extend any date upon which performance is due hereunder. Cancellation/Change Orders: All cancellations on any released order must be made in writing and subject to approval by Seller. No custom product may be cancelled after release of order. Cancelled standard product released orders will be subject to a cancellation charge for any costs incurred including product engineering, submittal drawings, administrative expenses, work performed or materials ordered. Any released order placed on hold for more than fourteen (14) days may also be subject to cancellation charges. All changes to the quantity or specification of fixtures on any released order must be requested in writing and are subject to approval by Seller. Such changes may be subject to applicable change order fees. Catalog and Price Sheets: Seller’s catalog, price sheets and other publications are maintained as sources of general information and are not quotations or offers to sell. Seller has the right to correct, delete, or change information at any time without notification. Product Specification Changes: All product specifications either contained in Seller’s catalog, Website, promotional literature, or variation product drawings are subject to change without notice to Buyer and without creating liability to Seller. Product Adaptability: All fixtures will be furnished to the standard specifications as indicated in the catalog unless Seller is notified in writing by Buyer of exceptions required. Any cost incurred to change material that required special modification to meet job site adaptability must be borne by the Buyer. Custom Product: All custom product orders require an approved drawing by the specifier and/or project owner. Product lead time begins after receipt of approved drawings and order once deemed to be acceptable for manufacture by Seller. Variation product will require a 50% non-refundable prepayment prior to release. Return of Goods: No material may be returned without written authorization from the factory. Only standard product, in new and resalable condition, will be considered for return authorization. Returned goods are subject to a restocking charge. Final credit will be determined after receipt, inspection, and acceptance of returned goods at the factory. No credit will be issued for damaged goods, or for unauthorized returns. No material will be accepted for credit more than 90 days from the invoice date. The Buyer must pay all return shipping charges. Custom or other non-standard products are not returnable. Risk of Loss: All sales are F.O.B. Seller’s factory, Festus, Missouri. The risk of loss shall pass to the Buyer upon delivery by Seller to the carrier at Seller’s plant in Festus, Missouri. All claims for damage or loss in transit must be made by Buyer directly to common carriers. Damage in transit or disputes with carriers regarding damaged product does not relieve Buyer’s obligation to timely pay the full amount of Seller’s invoice. Remedy: Seller’s sole and exclusive obligation under this warranty (and Buyers’ sole and exclusive remedy) shall be, upon prompt written notice by Buyers during the warranty period of any breach, to either, at Seller’s option, repair or replace without charge, F.O.B. Seller’s facility, any defective Product or part thereof expressly warranted herein by Seller against defects and found by Seller in its sole discretion to be defective and covered by this warranty. SELLER SHALL NOT BE LIABLE TO BUYERS, OR TO ANYONE CLAIMING UNDER BUYERS, FOR ANY OTHER OBLIGATIONS OR LIABILITIES, INCLUDING, BUT NOT LIMITED TO, OBLIGATIONS OR LIABILITIES ARISING OUT OF BREACH OF CONTRACT OR WARRANTY, NEGLIGENCE OR OTHER TORT OR ANY THEORY OF STRICT LIABILITY, WITH RESPECT TO THE PRODUCTS OR SELLER’S ACTS OR OMISSIONS OR OTHERWISE. This warranty covers only replacement or repair of defective Products or parts thereof at Seller’s main facility and does not include the cost of field service travel and living expenses, labor, inspection, removal or installation of new Products or parts or normal maintenance. Seller will not reimburse Buyers for any expenses incurred by Buyers in repairing, correcting or replacing any defective Products, except for those incurred with Seller’s prior written permission. LIMITATION ON DAMAGES: IN NO EVENT SHALL SELLER BE LIABLE FOR INCIDENTAL, COMPENSATORY, PUNITIVE, CONSEQUENTIAL, INDIRECT, SPECIAL OR OTHER DAMAGES. SELLER’S AGGREGATE LIABILITY WITH RESPECT TO A DEFECTIVE PRODUCT AND THIS CONTRACT SHALL BE LIMITED TO THE MONIES PAID TO SELLER FOR THAT DEFECTIVE PRODUCT. DISCLAIMER OF OTHER WARRANTIES: SELLER AND BUYERS AGREE THAT THE EXPRESS WARRANTIES IN THE LIMITED WARRANTY SECTION ARE EXCLUSIVE AND IN LIEU OF ALL OTHER WARRANTIES (INCLUDING WITHOUT LIMITATION ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE). SELLER HEREBY DISCLAIMS AND EXCLUDES ALL OTHER WARRANTIES. Any oral or written description of the Products is for the sole purpose of identifying the Products and shall not be construed as an express warranty. Prior to using or permitting use of the Products, Buyers shall determine the suitability of the Products for the intended use and Buyers shall assume all risk and liability whatsoever in connection therewith. Buyers agree that Seller has no post–sale duty to warn Buyers or any other party about any matter. Shipment Damage: Seller assumes no responsibility for damaged freight to any destination, other than Canada. Buyer shall inspect each carton for evidence of damage before accepting shipment. If damage is concealed, Buyer shall immediately cease unpacking and notify the carrier representative. For shipments to Canada, Buyer shall immediately notify Seller of any shipment damage. Other Claims: All claims against Seller other than valid warranty claims, including claims for shortages and errors, must be directed in writing to Seller within ten (10) days of Seller’s delivery. Failure to give such notice shall constitute unqualified acceptance and a waiver of all such claims by Buyer. Severability and Waiver: The invalidity of any provision or clause of this contract shall not affect the validity of any other provision or clause hereof. Seller has the right to correct clerical or similar errors relating to price or any other term shown in this contract. The failure of either party to insist, in any one or more instances, upon performance of any term, covenant or condition of this contract shall not be construed as a waiver or relinquishment or any right granted hereunder or the future performance of such term, covenant or condition.
http://caseyarchitecturallighting.com/resources/terms-conditions/
Can anyone tell me the most reactive metal on earth? | | Can anyone tell me the most reactive metal on earth? Sodium; it reacts readily with water. Lithium reacts even more readily with water.Originally Posted by CircularlyPolarized Right, forgot about lithium. Are you sure about that? Because the reactivity of the alkali metals in Group 1 increases as you go down the column. For example, Rubidium is more reactive in water than Sodium is. Just going with the reactivity of the alkali metals, I'd say Francium might be the most reactive metal, but I don't know for sure.Originally Posted by DivideByZero thanks for yr answer, so what about the second column?Originally Posted by Chemboy The second column is the alkaliNE earth metals. They're also very reactive (including with water), but not quite as much, probably because they possess a filled orbital and subshell in their valence shell...Originally Posted by icu cool thanks, but why do some metal react to water like sodium and some dont?? usually it depends on the relative stability of the product and reaction. and the activation energy of the reaction. if the product is more stable than the reactants a reaction will usually occur. In this case we say the reaction is thermodynamically unstable. However in some cases the reaction activation energy (energy required to make the reaction happen) is too high, this means the reactants are kinetically stable. so the reaction will not occur or happen slowly. this is why rusting is such a slow process. Iron + water + air -------> iron hydroxide high activation energy so happens slowly wow, thanks heaps for clearing it out :-D Off the top of my head I can't think of anything more highly reactive than the actinoids and lanthanoids. These are known elements, but what about stuff in the heart of the sun? umm :? i dont know thanks Dunno about the actinides and lanthanides, but I'd suspect that in the heart of the Sun, energy levels are too high to allow for chemical reactions. Nuclear only, is my guess.Originally Posted by DrCWho Haven't you heard? The Sun is made of solid iron, or calcium ferrite. http://www.thesurfaceofthesun.com/The surface crust of the sun is mostly made of iron. It is likely however that the surface varies in iron content from one part of the crust to another. Parts of the surface may look much like the fragment above, while other regions along the surface may contain more iron and look like the fragments below Ooooooh. You had me going for a bit. At first glance I'd say it isn't a spoof, but a conspiracy theory site.Originally Posted by Bunbury Thanks for that. Actually both Doppler IR readings and a lot of math concerning the equation of state indicate there are cooler areas of the sun. Check the SOHO site (not the "iron sun" site). Imagine how warped time would be inside the sun. the surface gravity is 28 G's. Time is slower inside the star. How much slower? In some zones closer to the core, it is 100,000 years behind us. Any elements produced in those areas would not reach the earth for quite some time depending on how many billions of years it would take for any traces to escape that gravity zone. Naturally that is quite a stretch of the imagination. Actinides and Lanthanides are the "rare earth" metals including uranium, plutonium, and all that. Last time I check U235 was the most reactive heavy metal we know as of now. Isn't gravity greatest at the surface, and decreases towards the core? Then time should be slowest on the surface and increase as you move either up or down.the surface gravity is 28 G's. Time is slower inside the star. With one proviso, though: in a non-solid object, if the density increases closer to the core, then the overall force due to gravity can increase too.Originally Posted by Bunbury Still, at the very center the force of gravity must be zero, so the gravity profile from surface to center might increase then decrease. There should be a maximum at some distance below the surface.With one proviso, though: in a non-solid object, if the density increases closer to the core, then the overall force due to gravity can increase too. That's what I would guess too - unless, of course, it has a micro-black-hole at it's centre...Originally Posted by Bunbury It's density based, true, but not necessarily solids. Dense liquids seem more gravitic than fluffier stuff. At the core of any solid created by spinning is a void or a comparative one. There's a strongest layer and this is the heart of that gravity. Francium is one of the most reactive metals. Not sure about THE most (probably is), but certainly of the alkali metals it is. In fact it's so reactive, it reacts explosively with common amounts of water vapor in the air. For that reason it has to be stored in oil....even then it eventually reacts away.Originally Posted by Chemboy Interesting......... but not quite correct. The Fr-Isotope with the longest half-life is 223Fr with exactly 22 MINUTES untill half of it has decayed. The shortest is something in the MILLISECOND range. It is formed as a intermediate of the Actinium- or Neptunium- decay. And in real life it is produce by firing protoms on Thorium. I'd like to see some of it stored under oil. Quite some Tcherencow radiation I assume. So no, there is no Francium stored under any circumstances in a lab. The overall amount of Francium in the Earth's crust is estimated to be 30 grams.In fact it's so reactive, it reacts explosively with common amounts of water vapor in the air. For that reason it has to be stored in oil....even then it eventually reacts away. My apologies, chemisty never was my strong point I didn't realise Francium was actually radioactive, Perhaps I was thinking of Ceasium? Wiki has alot of interesting information about Francium (surprisingly) and I was reading through the article....apparently at any point in time there is no more than 30g of Francium existing naturally in the entire Earth's crust! I had to check the top post to be certain wwe weren't asking about what element reacts most violently with water. That wasn't asked. As for reactions without any added energy, i.e. fusion of hydrogen, then I still side with uranium as the most highly reactive of the known elements. It decays without any help. That is how Beckerel discovered radioactivity, when it exposed some film in a desk drawer beneath it. Since this is a chemistry forum, one can only assume the OP was asking about chemical reactivity. This is nothing to do with nuclear physics. In nuclear physics the term is 'radioactivity' not 'reactivity'.Originally Posted by DrCWho Also, fusion of hydrogen or any other kind requires an input of energy...it doesn't happen spontaneously. Why? because in order for nuclei to fuse, the nuclear strong force must be greater than the electrostatic repulsion between nuclei. For this to happen, the nuclei need to be very close...and energy is required to overcome the electrostatic repulsion. Nuclear fission also requires a small amount of anergy to take place, namely the firing of alpha particles. Not to mention the fact that Uranium isn't the most radioactive. The shortest half-life isotope of Uranium is 68.9 years (U-232). As mentioned just a few posts above the longest lasting Fr isotope is 22 minutes. Wake up, Doc. The point being made is that the periodic table defines a sufficient amount of data to deduce that the higher reactive materials are in the actinoids. Semantics of radioactivity vs. reactivity are really moot when we think of chemotherapy and moreso nuclear reactions. Still picking at the "little" picture, are we, Harold? Go back to sleep. Dr.CWho DrcWho, yes the periodic table classifies elements according to their subatomic structure, and the heaviest elements become radioactive because there is simply too much concentrated like-charge in the nuclei to hold itself together. Indeed we do get an enormous amount of energy out of these nuclear reactions. However I think it is important to note the difference between a nuclear reaction and a chemical reaction, not because I'm nit-picking, but because the mechanisms are quite different, and should be classified as such. They are both 'reactions' of sorts (so is the force stopping you fall to the middle of the Earth, and so is this reply, if you look at it like that). A nuclear reaction involves interactions/behaviour of the Nuclei of atoms, whereas a chemical reaction is only concerned with the interactions/sharing/behaviour of valence sheel electrons of the atoms, to from various types of bonds between atoms. A nuclear reaction also converts small amounts of mass into large amounts of energy, as given by E=mc<sup>2</sup>, and as seen in nuclear bombs/ fission reactors. In a chemical reaction however, mass is conserved....which is what the principle of balancing equations is based on....moreover nuclear structures of atoms are preserved, which allows us to say that the amount ,and types, of reactants used up in a chemical reaction, is equal to the amount and types of products produced....which is why we can balance equations.
http://www.thescienceforum.com/chemistry/8291-reactive-metal.html