content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Images captured by Harvard researchers often blur the boundary between art and science. From high-powered microscopes to technology that can render biological tissue transparent, new tools are revealing the world in unexpected and compelling ways, expanding our understanding while showcasing unique beauty.
You can see the world in a biofilm, or the universe in a neural network. Jellyfish, seahorses, and turtles fluoresce in the ocean depths, while deadly diseases shimmer virulently under a microscope.
When viewed under the right conditions, the ordinary becomes extraordinary. | https://news.harvard.edu/gazette/story/2018/01/science-photos-capture-world-in-different-light/ |
Innovation Requires Focus on Similarities Not Differences
When striving for innovation, it’s important to be selective as to how you look at the problems or potential choices in front of you. It is by identifying the unseen elements in these criteria that unique solutions are found. When seeking distinction, you need to move beyond the obvious answer, and dig a little deeper.
Most people have an easier time identifying the differences between unrelated objects than their similarities. This is because it takes less effort for our minds to notice contrasts than it does commonalities. When asked to compare a saw mill with a vacuum cleaner, for example, most people could respond quickly and provide a long list of differences. When asked to find similarities between a saw mill and vacuum cleaner, their responses take longer and their lists are shorter.
The more effort you put into finding the resemblance between things, the easier they are to see. One way to do this is through analogies. Using analogies helps bridge the commonalities between unrelated objects when you compare different parts and characteristics, potential applications, and the essence of their purpose – their “job” or what they actually do. Sometimes the commonalities are small, but clearly visible. Other times, they are subtle, yet logical when thought about.
Take a cyclonic separator at a local sawmill as an example. It uses centrifugal force to suck sawdust from the air. When James Dyson saw this he began asking questions. Upon investigation, he learned that saw mills shared a similar problem as a vacuum cleaner. This connection between shared problem and an existing solution became the foundational principle to his unique vacuum cleaner.
To innovate a solution, he followed a three step process, which you could also use any time you are looking for creative, breakthrough ideas. 1. Define the problem and trace its root cause. 2. Driven by analogical thinking, investigate across domains where a similar problem and solution exists. 3. Transform the solution to apply to your specific situation.
1. Define the problem and trace its root cause.
The starting point to any solution is determined by the way its problem is defined. The way we word the problem statement could point us in the right direction, or amiss. The key to solving problems is the way you think of it, because it indicates where to investigate a solution.
Dyson started with a problem, which resulted in a solution that transformed the industry. He
noticed that his Hoover clogged quickly then lost suction. When opening the bag to investigate, he noticed a layer of dust inside, clogging the fine material mesh and preventing the machine working properly. The vacuum only worked well with a fresh bag but lost suction over time.
He realized that the answer wasn’t better filtration, which was what everyone else was working on, but instead, the effective separation of dust and air. Dyson realized filtration represented a tradeoff (efficient filters clogged), which gave him reason to reframe the problem at a slightly higher level of abstraction. The inclination to look for solutions within the same domain as the problem results in predictable and common outcomes. This is the place most people start, but it is not where the most successful people end. Once you learn how to properly define and frame a problem, it becomes part of your natural tendencies to generate innovative ideas for your business.
2. Driven by analogical thinking, investigate across domains where a similar problem and solution exists.
During Dyson’s visit to the sawmill, he noticed how sawdust was removed from the air by a 30-foot high industrial cyclone that spun dust out of the air by centrifugal force—to expel waste. Dyson learned that centripetal separators are a typical method of collecting dirt, dust and debris in industrial settings. When he applied the analogy between vacuum cleaners and air filtration in a saw mill, he hypothesized the same principle might work, on a smaller scale, in a vacuum cleaner.
Source: Art Markman, Smart Thinking. Perigee.
Analogies can provide invaluable creative insights and simplify new, complex problems in terms of familiar ones. They can trigger breakthrough ideas which often result from transferring problem solutions from one industry or domain to another.
3. Transform the solution and apply to your specific situation.
Dyson realized that the way cyclonic separation removed sawdust from the air in a saw-mill could be reapplied. This train of thought allowed him to connect the saw-mill and vacuum cleaner, and ultimately deliver the Dyson Vac. He reasoned that a vacuum cleaner that could separate dust by cyclonic action and spin it out of the airstream would eliminate the need for both bag and filter.
Source: Wikipedia
Dyson didn’t invent cyclone particle separation, but he was the first to put it into a vacuum cleaner. The Dual Cyclon™ vacuum cleaner, which has cyclonic separation principles, allows them to function without a bag and stops the clogging issue.
What Dyson ultimately accomplished is amazing, but the impetus that sparked his innovation is similar to what triggers all of our explorations for a solution – a problem, a need, an unresolved issue and an unarticulated but visible hole. The path he took to solve his challenge was unconventional, but the reason he even started down this path is shared by everyone in search of an answer.
To consistently find fresh and creative solutions practice looking for common characteristics, attributes, and elements across disparate domains. Radical innovations are spawned by the interplay of different ideas and domains that don’t usually belong together, through connectivity and conversation.
Source: Innovation to the Core. | https://www.paradigm-il.com/innovation-requires-focus-on-similarities-not-differences/ |
The physical, mental, and social components of health are all intimately interconnected, and each one contributes to overall wellness. The physical component encompasses things like exercise and nutrition; keeping the body strong and healthy is essential for maintaining vitality and preventing disease. The mental component refers to things like stress management and positive thinking; a calm and focused mind is key to achieving peace of mind and emotional balance. The social component encompasses things like relationships and community involvement; strong social ties provide support and foster a sense of belonging. When all three components are in harmony, it leads to a state of complete physical, mental, and social well-being.
What is Health
There is no one-size-fits-all definition of what health is, but there are some general characteristics that are usually included in any discussion of the topic. What is Health? Most people would agree that health includes physical, mental, and emotional well-being. In other words, it encompasses not just the absence of disease or infirmity, but also a state of overall vitality and wellness. Mental health, in particular, is often seen as an important component of health, as it can impact everything from our ability to cope with stress to our ability to make healthy choices. Ultimately, what matters most is how we feel physically, mentally, and emotionally; if we feel good overall, then we can consider ourselves healthy.
Health is often thought of as the absence of disease, but it is so much more than that. Health is a state of complete physical, mental, and social well-being. It is not just the absence of disease or infirmity. TRUE health requires a holistic approach that takes into account all aspects of our lives. To be truly healthy, we must pay attention to our physical, mental, emotional, and spiritual well-being. This means eating a healthy diet, getting regular exercise, getting adequate sleep, managing stress, and having fulfilling relationships. When we are balanced and whole in all these areas, we can achieve true health.
Physical Health
Being physically healthy is not just about working out at the gym or eating healthier foods, although those are important factors. Physical health is a state of overall well-being that encompasses both physical and mental health. To be physically healthy, you should exercise regularly, eat a balanced diet, get enough sleep, and take care of your physical appearance. You should also check with your doctor regularly to make sure that you are in good physical health. Being physically healthy requires making healthy choices on a daily basis and being mindful of your physical needs. Taking care of your physical health is essential for living a long and happy life.
Being physically healthy is one of the most important aspects of a person’s life. It not only affects a person’s ability to participate in activities and sports but also their overall quality of life. There are many different factors that contribute to physical health, including diet, exercise, and genetics.
Eating a balanced diet and getting enough exercise are two of the most important things that people can do to maintain their physical health. genetics also plays a role in physical health, as some people are more predisposed to certain conditions than others. However, even if someone has less than ideal genetics, they can still take steps to improve their physical health. Overall, physical health is essential for a person’s wellbeing and should be a priority for everyone. | https://thewdmedia.com/health/summarize-how-the-components-of-health-are-related-to-wellness/ |
FDC is closing at 7:30 pm Tuesday, January 9th
Early Dance classes are on!
7:30 pm acro class please come to 6:30 pm class tonight.
NO Advanced Ballet/Lyrical class tonight.
We are taking these precautions today due to the weather forecast. The temperatures will be near freezing later this evening, and we want our FDC Family – students, teachers, and staff – to be safe.
Schedule for Tuesday 1/9/18:
4:15 pm – Boys Hip Hop
5:15 pm – Intermediate Hip Hop
5:30 pm – Beginner Acro
6:15 pm – Beginner Tap (substitute teacher)
6:30 pm – Intermediate & Teen Acro (6:30 and 7:30 classes consolidated)
7:30 pm – STUDIO CLOSED
Please be very careful in the parking lot – we have salted, but it’s still slippery!
We’ll miss seeing you at class tonight!
Please stay safe and warm!
As always, per the studio handbook, you may make up today’s classes by taking another class of the same or similar level any day of the week in the next month. It’s a great opportunity to try a different teacher or a different style of dance. Just let the front desk know when you are taking a make-up class. | https://www.fireworksdance.com/1681-2/ |
More than three years have passed since the Independent Review of the Mental Health Act, which made a series of recommendations to the UK Government to overhaul outdated legislation which allows people with mental health problems to be held against their will (‘sectioned’) in certain circumstances.
At a virtual conference, Mind and Race on the Agenda, sponsored by Garden Court Chambers, explored the urgent need for Mental Health Act reform and how we achieve racial equity within mental health services, hearing from people with their own experience of mental health problems who have spent time in hospital while sectioned under the Mental Health Act during the pandemic.
Mind and Race on the Agenda are making the case for what we need in terms of Mental Health Act reform:
Rheian Davies, Head of Legal at Mental Health Charity Mind says:
“A recent worrying rise in detentions further confirms the urgent need for fully funded reform of the Mental Health Act, to make sure anyone who is experiencing a mental health crisis and is a risk to themselves is treated in a safe and therapeutic environment. NHS data showed that nearly 5000 people were given a community treatment order (CTO) in December 2020.
“Structural racism continues to pervade the Mental Health Act. Black and Black British people are still far more likely to be detained under the Act, restrained against their will, and be more likely to be re-admitted to hospital without getting the right support. When someone is experiencing a mental health crisis, they may be suicidal, self-harming, or in psychosis, and feeling very frightened or distressed. At the very least, their loved ones should expect that they will be kept safe, treated with dignity, and receive the care they need by the services which are designed to protect them. Part of this is making sure that people can make decisions about their care as part of standard clinical practice. To see racial equity within mental health services there must be a heightened commitment to antiracism, which addresses systemic biases in how people are treated and challenges institutional racism head-on.”
Maurice McLeod, Chief Executive of Race on the Agenda says:
“There was a lot of energy at the conference because inequality in mental health care is such an important issue. There were lots of people with lived experience of the system, as service users, carers, or mental health practitioners. This meant a wide range of different opinions were expressed. But the agreement (which was quite noticeable) was that things are bad and are likely to be made worse, or at least not improved, by this new Act.
“Along with Mind, ROTA will continue to work for a mental health care system based on value and respect for all and which is accessible to those who need support.”
22-year-old Hannah is Black and White British and lives in London. Hannah has been diagnosed with borderline personality disorder (BPD). Hannah says:
“I was last restrained in April 2021. Using restraint and restraint techniques is dehumanising, especially given that you’re meant to be in a place of safety, and it feels like you’re being physically punished for being unwell, with no control over your care. Rather than focussing on verbal de-escalation and sitting down with you, getting on your level, and asking how you can help, staff rely on calling the restraint team in, and once that happens there isn’t much you can do or say to stop it from happening. Sometimes there are six people who pin you to the floor. This doesn’t help you when you’re unwell, it makes things worse. When I’ve been in hospital, I have spent time on mixed-sex wards, and I notice the over-representation of Black men and women in hospital. Black men are most likely to be restrained from my experience. People from non-minority backgrounds don’t seem to be restrained as much, staff would spend longer verbally de-escalating with them.
“I have seen it from both sides as I used to work as a forensic recovery support worker, based in the community. I’ve received training on restraint and medication. The training isn’t person-centered the people carrying out the restraint training try to make it as impersonal as possible, but I think this is unsafe.
“There is also a huge staffing problem with vacancies and a reliance on agency staff – this means people are not able to build respect or trust with staff – which can be hard when you’re really unwell. There needs to be more funding for mental health services to make sure hospitals are actually safe.”
Marcia Rigg, Activist, and sister of Sean Rigg a musician and producer, who died in police custody in 2008 says:
"They keep saying lessons have been learned but the only lessons they've learned is how to get away with killing Black men."
Mental health practitioner, commissioner, and black survivor research activist, Colin King says: | https://www.mind.org.uk/news-campaigns/news/reform-of-the-mental-health-act-must-come-now-if-we-are-to-see-an-end-to-structural-racism-within-mental-health-services/ |
Hymenocallis is a wonderful genus of bulbous amaryllids…native mostly to the US, Mexico, and Central America. Hymenocallis (spider lilies) are an easy-to-grow moisture-lover that are a reliable perennial wildflower in the garden. Spider lilies are a tough, low maintenance plant which makes it perfect for rain gardens.
In the wild many Hymenocallis (spider lilies) often grow in or near water or, in a seasonally flooded woodland. However, most hymenocallis perform just as well in an average garden soil. Hymenocallis produce unusual white, spider-like, nocturnally fragrant flowers that are large enough to see from quite a distance. Hymenocallis is definitely a “gotta have it” plant. try growing your spider lily next to dahlia, buddleia, sarracenia, sabatia, or hibiscus.
Note: The bulb is enormous! You need at least a 5 gallon container.
Details
Genus: Hymenocallis (hy-men-oh-KAL-is) (Info)
Species: speciosa (spee-see-OH-suh) (Info)
Category: Bulbs
Height:
12-18 in. (30-45 cm)
18-24 in. (45-60 cm)
24-36 in. (60-90 cm)
Spacing:
12-15 in. (30-38 cm)
15-18 in. (38-45 cm)
18-24 in. (45-60 cm)
Hardiness:
USDA Zone 10a: to -1.1 °C (30 °F)
USDA Zone 10b: to 1.7 °C (35 °F)
USDA Zone 11: above 4.5 °C (40 °F)
Sun Exposure:
Sun to Partial Shade
Danger:
All parts of plant are poisonous if ingested
Bloom Color:
White/Near White
Bloom Time:
Late Summer/Early Fall
Mid Fall
Late Fall/Early Winter
Foliage:
Evergreen
Smooth-Textured
Other details:
Average Water Needs; Water regularly; do not overwater
Soil pH requirements:
6.1 to 6.5 (mildly acidic)
6.6 to 7.5 (neutral)
7.6 to 7.8 (mildly alkaline)
Patent Information:
Non-patented
Propagation Methods:
By dividing rhizomes, tubers, corms or bulbs (including offsets)
From seed; sow indoors before last frost
Seed Collecting: | https://www.sunnyvalegarden.com/flowers/lily-spider/ |
This is Part 5 of my ongoing reviews of movies featuring Sylvester Stallone Getting Framed and Sent To Prison.
Escape Plan
(2013)
Directed by Mikael Håfström
Starring Sylvester Stallone, Arnold Schwarzenegger, Jim Caviezel
Rating: ******
4/6
Sylvester Stallone has worked hard all his life,
And has earned rather than robbed.
Thus, I’m happy to announce
That he has landed his ideal dream job.
In many of the movies that he has made,
His character ends up in prison.
Sometimes he breaks out.
Sometimes he’s let out.
Sometimes he leaves and he’s missin’.
Once he’s characters are free,
They seldom go back to the slammer,
At least not in the very same film.
They might wait for the sequel to stammer.
Well Sly’s character in this film,
A guy named Ray Breslin,
Works for the FBI,
And always get sent to prison.
He gets paid to go in, he gets paid to break out,
With a fake past that’s always quite checkered.
In spite of the fact that he’s always in jail,
He does not have a criminal record.
His excuse for this work
(An excuse is what it is)
Is to test each prison for security holes.
When he finds one, he leaves and comes back with his boss,
This time as Authority roles.
He’ll say if you fix this he will not be able
To break out the same way again.
So he leaves and they fix it, perhaps just in time
To receive him in their prison again.
All is going well for Sly
Till he is approached by a stranger.
The man wants him to try and break out of his jail,
Assuring him he’ll be in no danger.
Sly jumps at the chance, especially since
He had not even seen it before.
When he’s told it’s inescapable,
His interest is piqued even more.
What he doesn’t know yet
Is that he’s been framed,
So his friends at the FBI
Won’t start a search to go looking for him,
Even if he might die.
Stallone wakes up in a fancy new prison,
And he’s told that he’ll never get out.
Happy, he can’t believe his great luck,
And he begins to look about.
This prison cost billions of dollars
And is filled with VIPs.
Instead of being run by the State,
It is owned and run privately.
Where is this prison? Stallone doesn’t know,
So he searches around for some buds.
He meets an Arnold Schwarzenegger with punier muscles.
Sly is more muscular for once.
Arnie tells him he’ll help him Escape.
All they need is a Plan.
Stallone’s chest swells up as he realizes
That Arnold has asked the right man.
They do some conspiring and Stallone sees his chance.
He climbs up a ladder to freedom.
Up at the top he opens a latch,
And sees he’s only part-way to his freedom.
He finds himself on the top of a ship
That’s smack-dab in the middle of the ocean.
The entire prison is attached to this ship,
Hidden under the waves of the ocean.
A bit disappointed, yet bowled over with awe,
He climbs back down to his cell.
He’s now in need of a better plan,
And a lot more assistance as well.
If you haven’t yet guessed it, this prison warden
Is a man of diabolical evil.
He’ll do what it takes to keep Ray Breslin in.
He’s played by Jim Caviezel.
Though it takes most of the movie to find a way out,
Ray does, with the cons in the joint.
They had managed to contact outside allies,
And succeeded, more to the point.
Stallone clears his name, and the warden gets his
…And they’d live happily ever after,
If it had not been successful enough for another two films.
Might the third one be a disaster?
I’m giving this film a four out of five.
I’ll review Chapter Two next week,
But between you and I, I truly believe
That this trilogy, in this film, hit its peak. | https://articlesinrhyme.com/escape-plan/ |
Davidson Missouri W/Solving the HPP in vivo
Using the Hin/hixC flipping mechanism, we are developing a bacterial computer which solves a specific mathematical problem, the Hamiltonian Path problem.
The Hamiltonian Path Problem
A Hamiltonian Path is a trip through a directed graph which visits each node exactly once. A graph may have multiple Hamiltonian Paths, only one, or even none. The problem asks the following: given a graph with a designated starting point and an endpoint, does it contain a Hamiltonian path?
We solve our problem by transforming E. coli cells with specially engineered plasmids.
Designing a Plasmid
Our plasmid consists of reporter genes and hixC sites. hixC sites are placed within the coding regions of our reporter genes. The reporter genes are joined in such a way as to represent a graph. Each reporter gene represents a node, and the connection of two different reporter gene halves together without any hixC sites in between represents an edge.
Such a plasmid design allows us to flip the edges of the graph into all possible permutations. Each permutation represents a potential path through the graph; permutations with all the proper phenotypes can be selected for. This system therefore allows for the detection of computation, as solutions to the Hamiltonian Path problem will manifest themselves via the reporter genes.
Developing Nodes
We represent the graph's nodes with reporter genes. In order to allow for flipping, we must insert hixC sites within the coding regions of our reporter genes. We call this process gene splitting. The central issue with gene splitting is that an additional 13 amino acids are added within the resulting protein. More often than not, we would expect these amino acids to prevent the protein from functioning. If our reporter gene tolerates a hixC insertion, and still functions as a reporter properly, then we can use it as a node on our graph.
Initiating Flipping
After a plasmid has been constructed with the the reporter genes in a scrambled order, flipping can be initiated by co-transformation with a plasmid containing the Hin protein. The initiation of gene flipping commences computation. Eventually, some gene portions may flip into orientations which are solutions to the Hamiltonian path problem.
Detecting a Solution
The primary method for seeing if there is a solution is by screening for all correct phenotypes. For example, if some cells do not have antibiotic resistance, or if they do not exhibit a particular color, then we know they have not computed a solution to the problem. Our computer constructs are all designed to use the T7 RNA polymerase promoter. This allows us to initiate transcription as a separate event from flipping upon co-transformation with a separate vector containing the gene for the T7 RNA polymerase. Another advantage of using this promoter and polymerase is its supposed greater processivity. Larger graphs require the transcription of more genes; typically, most promoters only promote through a few. Although we have not tested more than two genes with this promoter, we expect that this system permits greater transcriptional power.
Although phenotypic screening is our primary means of verifying for solutions, there exists the possibility of a false-positive solution. In this case, all genes have their second portion immediately following their first. Yet the resulting path will be illogical: it will contain a "teleportation," which means that, in order to travel the path, it would be necessary to move between two nodes without following an edge. Go here for more information on false positives.
The potential for false-positives thus requires another way of verifying solutions. The length of a solution, in terms of base-pairs, is always known. It is the sum of the lengths of all split genes. Furthermore, the first and last nodes are constant, as the first one is not flippable and the last node is the transcriptional terminator. These facts mean that PCR can be used to verify solutions. Primers can be designed from the first and last node, and running PCR products on a gel will give the lengths of the amplified DNA. If any segment has the correct length then we know there is a solution. | https://openwetware.org/wiki/Davidson_Missouri_W/Solving_the_HPP_in_vivo |
These procedures set out the requirements of the Public Finance Act who may have Bank Accounts and the operation of same within the University.
Definitions
Cashiers Office - Cashiers Office Financial Services Division
Policy Content
Introduction
The Public Finance Act requires:
'all money received by [the university] shall, as soon as practicable after it has been received, be paid into the bank account of the [University]. Section 24(2).
To achieve this the University operates a number of bank accounts here in New Zealand as well as Australia and the United States of America.
Who may have a bank account
In general, individual departments do not require bank accounts. In some special circumstances a separate bank account may be appropriate.
All bank accounts require the express approval of the Director, Financial Services prior to opening. This applies to all accounts intended for University or University related purposes.
Where staff are unclear whether an activity is University related or not they should seek guidance from the Financial Services Division Treasury Accountant.
Alternatives to a separate bank account include imprest accounts, cash floats and credit card or EFTPOS. Application, including the circumstances, should be forwarded to the Financial Services Division Treasury Accountant for consideration.
Reconciliation of Bank Accounts
The Cashiers Office is responsible for ensuring all accounts are regularly reconciled on a timely basis.
- main bank account - weekly
- USD currency bank account held onshore in NZ - weekly
- overseas bank accounts - monthly
- imprest bank accounts - minimum quarterly, all at year end 31 December
Imprest Accounts
Several imprest accounts are maintained for specific operations requiring access to a local banking facility. For example the Christchurch and Wellington Schools of Medicine.
The imprest account facilities allow the holder of the account to draw cheques, limited by the level of the imprest balance, which are reimbursed as per University policy from the University main account.
Holders of Imprest Accounts are required to operate these accounts according to the specific instructions issued when the Imprest accounts are opened. | https://www.otago.ac.nz/administration/policies/otago025555.html |
What House of the Dragon and Rings of Power reveal about our society.
By Edwardo Pérez
Popular culture tends to proceed along two paths, and often simultaneously: one that reflects society and one that influences society. Our current cultural moment is steeped in medieval fantasy, with shows like HBO’s House of the Dragon and Amazon’s Rings of Power leading the way, offering an interesting metaphor for where our society stands.
It’s not insightful to say that we’re polarized, it’s axiomatic. What might be more revealing is to understand not that we’re polarized but that we are at war, in a medieval sense, laying siege to one another in a real-world game of thrones, heeding Cersei Lannister’s observation to Ned Stark: “you either win or you die, there is no middle ground.”
We can call it a civil war and we can perhaps point to various incidents seen in the past few years and call them skirmishes or trial runs. Yet, returning to popular culture and our obsession with medieval fantasy, I suggest that House of the Dragon and Rings of Power don’t just symbolize our war, with House of the Dragon showing us who we are and Rings of Power showing us who we could be, they crystalize the stakes we’re fighting for—because it’s not just a matter of who sits on a throne (a Targaryen or Sauron) it’s a matter of what happens to those who survive when the war is over.
It should be noted that both shows embrace inclusive casting and both shows have been criticized for it, which says more about the critics than it does about the shows. But what’s more significant is how each show’s narrative reflects and instructs our current society—because seeing ourselves in a television show isn’t just about seeing our skin color or our gender, it’s also about seeing our values (and our hopes and dreams … for those of us who still have them).
For Christopher Prendergast, representation “is both historically and conceptually foundational for our thinking about literature and culture.” And Prendergast notes at least two ways of understanding representation—as re-presenting something and as standing for something.
Similarly, as Matthew Potolsky notes, the concept of mimesis, which generally means imitation (or representation), “so defines our way of thinking about art, literature and representation […] that we rely on the concept even if we have never heard of it or do not know its history.”
As Potolsky explains, “mimesis describes the relationship between artistic images and reality: art is a copy of the real,” a definition Potolsky admits only scratches the surface of what mimesis means—because mimesis isn’t just representation, it’s description, it’s connection, and it’s historically situated. In Potolsky’s view, “From its very origins in Greek thought, mimesis connected ideas about artistic representation to more general claims about human social behaviour, and to the ways in which we know and interact with others and with our environment,” adding that “The ability to create and be moved by works of art, [Plato and Aristotle suggest], is an essential part of what it means to be human.”
So what does it mean for our current medieval cultural moment? What are we re-presenting? What are we trying to connect? Why are we moved by authors like Martin and Tolkien? And, in comparing House of the Dragon and Rings of Power, what aspect of reality is each show copying? Or, what does each show stand for?
In my viewing, and I say this with much admiration for the man from Santa Fe, Martin’s narrative isn’t timeless, nor is it particularly inspiring. Yet, it does reflect (perhaps too accurately, along with shows like The Handmaid’s Tale) our current cultural moment. Perhaps this is because Martin’s narrative, for all it’s fantasy elements, is more grounded in the muck of human life, whereas Tolkien clearly exists in the realm of fantasy.
For example, House of the Dragon focuses on one house—Targaryen—and it’s clearly divided. Plagued by infighting, incest, and a complete lack of vision for the future, its narrative reveals how our society is stuck within itself. As the saying goes, we can’t see the forest for the trees because we’re only focused on our tree, our house. Indeed, the concept of society almost seems evil to us, as if loving our neighbor (or at least accepting them and their differences) equates to loss.
So, in our focus on winning, we only see our perspective, we only advocate for what we believe, and we will only accept our way of doing things. House of the Dragon doesn’t even change locations and explore Westeros or Essos. It stays focused on King’s Landing and on House Targaryen (because no one else really seems to matter). This is the bleak reality House of the Dragon imitates.
By contrast, Rings of Power tells several stories in several locations, across different points in time (similar to The Witcher’s first season narrative, which also resonates with our current society). Galadriel seems to be the main protagonist, yet the other characters (and races of Middle Earth inhabitants) aren’t insignificant. Because for J.R.R. Tolkien, every character is integral to the story.
George R.R. Martin’s characters are also significant, especially the ones who might otherwise be dismissed (such as dwarfs and bastards and little girls). Yet, House of the Dragon seems like a cultural step backward. Milly Alcock’s Rhaenyra is a formidable dragon rider, but she’s also a cup bearer—and it says something that Alcock’s Rhaenyra is recast midway through the first season (though Emma D’Arcy is excellent).
What this suggests is that House of the Dragon really isn’t interested in developing a strong female character. Alcock and D’Arcy might be on the posters, but in a narrative steeped in patriarchy, it’s just a ruse. The narrative doesn’t work to undermine patriarchy or reveal any flaws because it doesn’t believe patriarchy is flawed.
Like Margaret Atwood, who has claimed that nothing in The Handmaid’s Tale hasn’t already happened at some point in history (even U.S. history), Martin has also based his Westeros-set fantasy on actual history.
As Martin explained during a panel at San Diego’s 2022 Comic Con, “I get inspiration from history, and then I take elements from history and I turn it up to eleven,” adding “Game of Thrones is […] based very loosely on the War of the Roses. [House of the Dragon] is based on an earlier period in history called the Anarchy.” As Martin concludes, “I don’t think Westeros is particularly more anti-woman or more misogynistic than real life and what we call history.”
Perhaps Martin is correct. If so, then he is clearly imitating the real by revealing human behavior. However, in terms of history (or the progress of history, if it is supposed to progress at all), this is a step backward—and perhaps for art, too. Because Martin isn’t showing us our potential, he’s showing us our flaws.
I base this on the belief that while art might be mimetic, for art to truly move us, it needs to move beyond mere representation and imitation. For example, Mozart could be criticized for giving us a four-hour opera about a barber who gets married (instead of an opera about some Greek god or brave king). Yet, The Marriage of Figaro transcends the setting and characters (and the politics of a stratified society) to reveal the profound nature of human love.
Game of Thrones almost did this, because there were many profound moments in its eight-season run on HBO. Yet, as its disappointing final season revealed, nothing in the narrative ever really mattered. There was no enduring tale to look back on. Just small moments scattered throughout a narrative that ultimately went nowhere.
This is the difference in Tolkien. There are many small moments, and they all add up to create a timeless tale of love and fellowship.
So why is anyone watching House of the Dragon?
Perhaps it’s because some people like their history turned up to eleven. Perhaps it’s because real is where we’re at. Perhaps it’s because the step backwards that House of the Dragon takes is a step in the direction some in our society want to move toward. For this perspective, it’s not backward, it’s restorative. This is where the medieval notion of hierarchy and heredity and kings speaks to current attitudes regarding fascism, authoritarianism, and nationalism—even the symbolism of building a literal wall around America’s borders (which is what most medieval castles and cities have) suggests a kingdom rather than a democracy.
Nothing against prequels, but it also says something that HBO would rather look backward and focus on the house that mattered least, rather than look forward and craft a series that speaks to the future. Really, what is west of Westeros?
This is what makes the Rings of Power prequel so culturally different than House of the Dragon, because the period Amazon’s show focuses on is the period when every culture came together in an alliance to defeat Sauron.
Yes, evil endured because Isildur kept the ring, and then Deagol and Smeagol found it, and then Bilbo found it, and it didn’t get destroyed until Frodo and Sam took it to Mount Doom. But the point of Rings of Power and of Lord of the Rings is that it takes an alliance to defeat evil. It takes everyone doing their part to combat the forces that seek to destroy the world and rule its ashes.
And this is what makes Tolkien’s history different from Martin’s.
Martin’s history is real—because yes, humanity’s done some bad things (things that don’t need to be turned up to eleven). Tolkien’s history is mythical—it borrows from mythology and from various cultural traditions but Tolkien’s characters aren’t perfect (Frodo keeps the ring, too!), yet in a time when a Civil War II or a World War III could break out at any moment, when the rights of American citizens are being taken away, when democracy itself is being threatened from within, and when history books are being rewritten or banned, I don’t want to be reminded how bad we are (and I’m sorry, it might be historical, but incest and female violence, and marrying children, isn’t something that needs to be turned up to eleven).
It might sound simple and naïve, but I want to see good triumph over evil again. If there’s any parallel to history I want to be reminded of, it’s that the last time the world came together to fight a common enemy that enemy was defeated.
But maybe Martin (and Atwood) has a point, because, like Isildur, we might’ve cut the ring from Sauron’s hand, but then we held on to it … and it’s turned us into Gollum, into a creature of a country at war with itself.
Maybe what we all need is to find our Sam and remember not just that “there is some good in this world,” but that eventually “even darkness must pass.”
Edwardo Pérez is a Professor of English, speculative fiction writer, critical thinker, and possible Loki variant.
References
Bergeson, Samantha. “George R.R. Martin: ‘House of the Dragon’ Is as ‘Anti-Woman’ as History, Not ‘More Misogynistic Than Real Life.’ IndieWire.com. 25 July 2022.
Potolsky, Matthew. Mimesis. Routledge. 2006.
Prendergast, Christopher. The Triangle of Representation. Columbia University Press, 2000. | https://andphilosophy.com/2022/09/26/what-house-of-the-dragon-and-rings-of-power-reveal-about-our-society/ |
Maybe Marc Mayer should stop giving interviews. Every time he opens his mouth, the director of the National Gallery of Canada simply gets himself in more trouble, demonstrating a breathtaking lack of understanding of what it means to head up a large public institution.
As every day passes, the scandal of how Mayer managed to sell off one of two Chagall paintings in the National Gallery’s collection with the promise of getting nothing in return (except a pile of cash and a stain on its reputation), is becoming ever clearer.
It is a sad tale of how the ego of one man has hijacked our national gallery, allowing it to secretly sell off one of its most valued works — one of only two Marc Chagall paintings in its collection — by manipulating the country’s export control system and ignoring the museum’s own rules and the policies of the leading museum organization in North America. | https://ipolitics.ca/news/its-not-about-the-chagall-its-about-the-david-and-mayer-was-played |
0001 This application claims priority of U.S. Provisional Application Ser. No. 60/072,356 filed Jan. 23, 1998.
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
0002 The subject invention relates an anti-fungal preparation for the control of fungal diseases in plants, more specifically, to alkaline extracts of Inula which are highly active in controlling diseases caused by fungi in crop plants.
0003 Extracts of plants which are members of the Inula species are effective against infections of plants caused by a variety of fungi. These extracts are typically prepared by dipping freshly cut Inula shoots in an organic solvent or by agitating freshly cut or dried Inula shoots in an organic solvent, removing the solvent to form a paste, and then dissolving the paste in an organic solvent or in water, possibly with an additive. Alternatively, suspensions of Inula can be prepared by grinding dried Inula shoots into a fine powder, adding an emulsifier, and then suspending the mixture in water. In both cases, the resultant preparation is then applied to plants resulting in the control of a wide variety of fungal diseases. Extracts of suspensions of Inula plants are effective at low concentrations, in the range of fractions of a single percent of extract, such that dilute concentrations have excellent fungal-control properties.
Inula viscosa
Inula graveolens
0004 The plants which are the basis of these fungicidal extracts and suspensions are and (Family Compositae), perennial weeds widespread in the Mediterranean Basin.
0005 Methods of preparing aqueous extracts from various parts of the Inula plant are well known in the literature. Additionally, organic extracts of the Inula plant are also well known in the art, e.g., U.S. Pat. No. 5,837,253. However, the prior art indicates that aqueous extracts of Inula shoots are poorly effective against fungal diseases of crop plants whereas extracts made with organic solvents are highly effective anti-fungal agents.
Inula viscosa
Inula graveolens
Inula helenium
Inula viscosa
Inula graveolens
0006 Methods have also been described for using organic solvents to extract Inula plants, but these are clearly distinguished from that disclosed in U.S. Pat. No. 5,837,253. Two of the prior art methods involved contacting the whole Inula plant, or the aerial parts thereof, with an organic solvent either by maceration of the plant in the organic solvent or by percolation of the solvent through the plant. Furthermore, U.S. Pat. No. 4,254,112 to Debat et al., (hereinafter referred to as Debat) describes the preparation of extracts of and using whole Inula plants which have been dried and ground and organic solvents, by using a Soxhlet apparatus. The yield of the paste obtained by this method was approximately 1.75-4%. U.S. Pat. No. 5,176,193 to Honerlagen et al. (hereinafter referred to as Honerlagen) describes a process for preparing a partial extract from roots of which involves contacting the plant material with an organic solvent, adding a drying agent to the solution to remove the water, removing the drying agent, and then distilling the dried organic phase. By contrast, the method disclosed in U.S. Pat. No. 5,837,753 disclosed either briefly dipping the leaves and stems of the shoots of or into an organic solvent or shaking the freshly cut or dried and ground leaves and stems of the shoots in an organic solvent for thirty minutes, and then evaporating the solvent to form a paste. The yield obtained by this method can be as much as 30%, in contrast to the low yields known in the literature and described above.
Phytopathologia Mediterana,
Inula viscosa
0007 The medicinal properties of Inula extracts in humans are well known. For example, Debat disclosed the anti-microbial activity of extracts of Inula for use in human beings. However, the fungicidal effects of Inula extracts have only been demonstrated on fungi growing in Petri dishes or on post-harvest of fruits. For example, Qasem et al. (34:7-14, 1995) demonstrated that the growth of certain fungi in Petri dishes was inhibited by aqueous extracts of as well as by dried plant material added directly to the fungal growth media. By contrast, the method of the present invention uses Inula extracts prepared with alkaline aqueous solvents used against fungal infections of crop plants themselves.
0008 Clearly, although Inula extracts have been shown to have fungicidal activity in the Petri dish (in vitro) and on plant (in vivo), the methods of preparation for these extracts have not been sufficient for large scale use directly on crop plants and have had other serious disadvantages. The true effectiveness of these extracts against fungal infections of plants is, therefore, unknown. Furthermore, there is a clear need for better methods to prepare Inula extracts. Qasem et al. (Ibid, page 13, 1995) concluded: The diversity and the methodology of extraction and the differences in the results obtained . . . increased the need for developing more efficient, convenient, and cheaper methods of extraction to facilitate more extensive utilization of fungicidal extracts, especially if greater quantity of extracts must be prepared for large-scale production.
0009 Thus, there is a widely recognized need for and would be highly advantageous to have a method or methods for preparing extracts and/or suspensions of plants of Inula species which would facilitate the large-scale use of these extracts and suspensions which would simplify their preparation and use, be highly effective in controlling fungal infection in plants, as well as controlling fungal infections in crop plants.
0010 According to the present invention, there is provided a method for preparing an aqueous extract from Inula species which comprises contacting shoots and/or portions thereof with an alkaline aqueous solvent to form a solution and debris, and removing the debris from the solution.
0011 There is also provided a method for protecting plants against fungal infection comprising preparing a fungicidal extract of Inula species by contacting shoots and/or portions thereof with an alkaline aqueous solvent to form an extract solution and debris, and applying a fungicidally effective amount of the fungicidal extract to a plant for protecting the plant against fungal infection.
0012 There is also provided in accordance with the present invention, a method for preparing a fungicide derived from Inula species which comprises combining a substantially powdered form of Inula shoots and/or portions thereof with a solid chemical to form a mixture which upon dissolution of the mixture in an aqueous solvent, forms an alkaline aqueous solution which can be directly applied to plants to prevent fungal infection.
0013 Additionally, also in accordance with the present invention, there is provided an alkaline anti-fungal composition which comprises Inula shoots and/or portions thereof and a compound which when mixed with an aqueous solvent forms an alkaline solution, whereby the composition can be directly applied to plants to prevent fungal infection.
0014 Accordingly, the subject invention provides a method for unexpectedly producing an anti-microbial extract from Inula plants which is not only active in vitro against fungi but also is active against diseases caused by fungi in crop plants while being safe to apply to the crop itself.
0015 The present invention provides a method for preparing an extract from Inula species including the steps of contacting shoots and/or portions thereof with an alkaline aqueous solvent to form a solution and debris and then removing the debris from the solution.
0016 Preferably, the portion and/or portions of the Inula plant which are utilized in the present invention are the leaves and stem of the upper, younger parts of the shoots, and the upper part of the shoot extending from about 20-40 centimeters from the tip of the shoot. The flowers themselves are not used. As used herein, the term shoot is used to define the leaves and stem of the shoot of the Inula plant. In the methods of the present invention, the shoots or portions thereof can be either freshly cut or may be dried prior to the addition of the alkaline aqueous solvent.
0017 The alkaline aqueous solvent can include any compound or compounds which alone or in solution have a pH which is greater than about seven such as an inorganic base or salt thereof.
0018 Preferably, the alkaline aqueous solvent includes at least one of amino compound. The amino compound can include an ammonium compound, organic amines and/or heterocyclic amines. The organic amines can include compounds such as ethylamine, ethylenediamine, diaminopropane, diethanolamine, triethanolamine, and butylamnine. Heterocyclic compounds can include compounds such as piperazine and piperidine.
0019 The removal of the debris from the solution can be accomplished by filtering the debris from the solution utilizing a screen such as a 100 micron m (micron) sieve or other suitable filtering devices known to those skilled in the art.
0020 If dried shoots and/or portions thereof are utilized in the method of the present invention, the dried shoots and/or portions thereof can be ground, by various means known to those skilled in the art, to form a powder.
0021 In an embodiment of the invention, fresh Inula shoots are dipped in the alkaline solution for an appropriate period of time, typically for approximately 0.2-5 minutes. The plant material is then discarded and the solution, which may be colored, obtained therefrom is screened through a filter such as a 100 micron sieve and can be applied, as is, for spraying crop plants.
0022 In another embodiment, fresh shoots are first air dried at 30-40 C. for period of time sufficient to dry the shoots, typically approximately 1-2 days and the dried shoots then dipped in the alkaline solution for a period of time which can be approximately 1-10 minutes. The plant material is discarded and the solution (colored) obtained can be filtered through a filter or sieve and then utilized, as is, for spraying crop plants.
0023 In another embodiment, dried shoots obtained by air drying as described immediately above can be ground and then passed through a metal sieve (i.e., 2 mm). The ground plant material can then be shaken in an alkaline solution for 1-10 minutes, screened through a filtering device such as a 100 micron sieve, and the colored liquid obtained therefrom can be utilized for spraying crop plants.
0024 In yet another embodiment, dried and ground plant material as immediately described above, can be placed in a mortar and is milled to less than 100 micron-sized particles to obtain a fine powder. The powder is then mixed with an alkaline solution and can be sprayed, as such, onto the crop plants.
0025 In another embodiment, dried powder which is ground to less than 100 micron-sized particles is milled with crystallized cellulose (Avicel PH-101, Fluka) and is then mixed with the alkaline solution and sprayed directly onto crop plants.
0026 In another embodiment, a dried powder which has been milled to less than 100 micron-sized particles is milled with a surfactant such as Vercoryl-S, diatomaceous earth, or sodium dodecyl sulfate and is then mixed with the alkaline solution and is sprayed directly onto the crop plants.
0027 In another embodiment, dried Inula shoots ground to less then 100 micron-sized particles are mixed with a solid chemical, which upon dissolution in water, produces an alkaline solution. The solid chemical can be any of the compounds described above for the alkaline solution including an imidazole, dibasic ammonium phosphate, Trizma-base (Sigma) either with or without the addition of an inert surfactant formulation. The powder mixture is then mixed with water to form an anti-fungal agent and is sprayed directly onto crop plants. In this form, the anti-fungal agent can be prepared and/or sold as a dry mix which, when hydrated, forms an anti-fungal composition which can be easily applied to plants. In this form, the costs of shipping and/or transporting the anti-fungal material can be reduced since the water would only be added just prior to use/application to plants.
4
2
4
4
0028 In another embodiment, the dried and ground Inula of particle size less than 100 microns can be mixed with (NH)HPO(dibasic ammonium phosphate) and be suspended in water to which NHOH is added. This solution can then be sprayed directly onto crop plants.
0029 According to the present invention, there is also provided a method for protecting plants against fungal infections by the steps of (a) preparing a fungicidal extract of Inula species by contacting shoots and/or portions thereof with an alkaline aqueous solvent to form an extract solution and debris and (b) applying a fungicidally effective amount of the fungicidal extract to a plant for protecting a plant against fungal infection. As defined herein, a fungicidally effective amount includes such an amount that is capable of preventing, inhibiting, and/or killing fungus in or on a plant.
0030 Solutions or emulsions containing the Inula extract, or the Inula suspension, are sprayed onto the upper leaf surfaces of various crop plants by well known techniques for the control of fungal plant infections. The Inula extracts of the present invention can be used to control fungal plant infections caused by fungi including, but not limited to, Oomycetes, Ascomycetes, Basidiomycetes, and Fungi imperfecti classes.
Phytophthora infestans, Pseudoperonospora cubensis, Plasmopara viticola, Sphaerotheca fuliginea, Cladosporium cucumerinum, Erysiphe graminis, Uromyces appendiculatus
Botrytis cinera
0031 The method and fungicidal extracts of the present invention are particularly suitable for use against fungi of the Oomycetes, Ascomycetes, Basidiomycetes and Fungi imperfecti classes including but not limited to , and and in crops including, but not limited to, grapevines, tomato, wheat, barley, tobacco, potatoes, onions, cucurbits, beans and crucifers.
0032 Also according to the present invention, there is provided a method for preparing a fungicide derived from Inula species which includes combining a substantially powdered form of Inula shoots and/or portions thereof with a solid chemical to form a mixture which upon dissolution of the mixture and an aqueous solution, forms an alkaline aqueous solution which can be directly applied to plants to prevent fungal infection. Fungicides prepared by this method are described above and in the Example section below.
0033 Also in accordance with the present invention, an alkaline anti-fungal composition of Inula shoots and/or portions thereof and a compound which when mixed with an aqueous solvent forms an alkaline solution which can be directly applied to plants to prevent fungal infection is disclosed. The compounds which can be mixed with an aqueous solution to form an alkaline solution are described above and in the Examples section below.
0034 The invention of the present invention is illustrated below in the following Examples which describe the preparation and use of Inula extracts and suspensions against fungal infections in plants.
0035 To test the efficacy of these extracts and suspensions, experiments were performed in which plants were sprayed using a fine glass atomizer with either Inula extract or with pure solvent as a control for the Inula extracts, with either Inula extract and emulsifier or with an emulsifier solution as a control for the emulsified Inula extracts, and with either Inula suspension or with water or emulsifier solution as a control for the Inula suspensions. Treated and control plants were then inoculated with a crop-respective fungal pathogen. After an incubation period, the extent of the infection was measured. Unless otherwise stated, percentage protection from the disease due to the treatment with the Inula extract or suspension was calculated as:
0036 The following experimental data illustrate the utility of the fungicidal compositions of the present invention.
EXAMPLES
Example 1
Example 2
Example 3
Example 4
Example 5
Example 6
Example 7
Example 8
Example 9
Example 10
Example 11
Example 12
Example 13
Example 14
Example 15
Example 16
Example 17
Example 18
Example 19
Example 20
Example 21
Example 22
Example 23
Example 24
Example 25
Example 26
Example 27
Example 28
Example 29
0037 Methods:
crop plant
pathogen
disease
Tomato
<highlight><italic>Phytophthora infestans</italic></highlight>
late blight
Potato
″
″
Cucumber
<highlight><italic>Pseudoperonospora cubensis</italic></highlight>
downy mildew
Melon
″
″
Wheat
<highlight><italic>Erysiphe graminis tritici</italic></highlight>
powdery mildew
Cucumber
<highlight><italic>Sphaerotheca fuliginea</italic></highlight>
″
Melon
″
″
Tobacco
<highlight><italic>Perenospora tabacina</italic></highlight>
downy mildew
Grapes
<highlight><italic>Plasmpara viticola</italic></highlight>
″
Tomato
<highlight><italic>Botrytis cinerea</italic></highlight>
gray mold
Cucumber
″
″
Tomato
<highlight><italic>Cladosporium fulvum</italic></highlight>
leaf mold
0038 The crop plants and pathogens used for inoculation are described in the following list.
P. infestants, P. cubensis, P. tabacina, P. viticola, B. cinera
C. fulvum
E. graminis
S. fuliginea
0039 Inoculation with and was done by spraying a spore suspension in distilled water onto the upper leaf surfaces of the treated (and the control) plants. Inoculated plants were kept in a dew chamber at 18-20 C. in the dark for 16-20 hours and then in a growth chamber at 20 C. with 12 hours photoperiod. Inoculation with and was done by blowing spores over the treated (and control) plants. Inoculated plants were then kept in a growth chamber as above.
0040 Disease records were visually estimated in the inoculated plants at 3-13 days after inoculation, depending on the crop and disease. Percentage leaf area occupied with disease symptoms or fungal colonies was recorded and given in the results section.
% Diseased leaf
area
powdery mildew
Extract
late blight in potato
in wheat
control untreated
94
63
original (pH 12.7)
15
24
diluted:2
 9
25
diluted:4
10
30
diluted:8
 8
50
original (neutralized to pH 7.2)
 5
12
diluted:2
94
18
diluted:4
95
25
diluted:8
95
30
0041 Activity of dipping extract of fresh Inula shoots in 0.1 N NaOH for ten minutes on disease development in crop plants.
0042 50 g fresh weight shoots were dipped in 250 ml of 0.1 N NaOH for ten minutes. Half of the extract was sprayed (pH 12.7) after various dilutions and the other half was neutralized with HCl to pH 7.2 and then sprayed after various dilutions. Late blight and powdery mildew were inoculated one day after spray and disease records taken after four and eight days, respectively.
3
Treatment
Diseased leaf area
% Protection
untreated control
 98
—
NH<highlight><subscript>4</subscript></highlight>OH
8%
100
 0
(&equals; 2% aqueous NH<highlight><subscript>3</subscript></highlight>)
4%
100
 0
2%
100
 0
1%
100
 0
Inula in NH<highlight><subscript>4</subscript></highlight>OH
8%
 10
90
4%
 20
80
2%
 50
50
1%
 88
12
0043 Activity of dipping extracts of fresh Inula shoots in ammonium hydroxide (containing 25% NHby weight) for ten minutes on late blight development in potato.
4
4
4
3
4
3
4
3
4
Phytophtera infestants
0044 60 g fresh weight shoot were dipped in 250 ml NHOH solution for ten minutes. Extracts were sprayed after various dilutions onto potato plants and inoculated with two days later. Disease was recorded four days post inoculation. NHOH solutions of corresponding concentration were also sprayed for comparison. The % NHOH throughout the Examples, where appropriate, refers to % from a liquid containing 250 g NHper liter. For example, 8% NHOH means 8 ml of a solution (containing 25% NH) per 100 ml water. To express % NHOH as % NH, should divide by 4. Note: NHOH was not phytotoxic.
4
% blighted leaf area
3 d - old extract
NH<highlight><subscript>4</subscript></highlight>OH conc., %
fresh extract
1 d - old extract
a
b
untreated control
100
100
100
75
 1
 23
 63
 25
23
 2
 5
 13
 23
 1
 4
 8
 18
 8
11
 8
 8
 10
 25
24
16
 3
 10
 5
 6
0045 Efficacy of Inula extracts, made by dipping fresh shoots in NHOH for ten minutes, in the control of late blight in potato (a) and powdery mildew in wheat (b).
4
P. infestants
E. graminis
0046 One Inula shoot (10 g fresh weight) was dipped in 50 ml of NHOH of various concentrations for ten minutes and the extract sprayed onto potato plants one or three days later. Plants were inoculated with or one day later and disease records taken seven days post inoculation.
% diseased leaf area
downy
powdery
downy
storage
late blight
mildew in
mildew
mildew in
NH<highlight><subscript>4</subscript></highlight>OH
period,
in potato,
melon
in wheat
grapes
conc., %
days
5 d
6 d
7 d
10 d
control
1
98
81
100
50
untreated
0.25
38
15
50
20
0.5
15
4
13
15
1.0
8
1
1
5
control
9
98
50
untreated
0.25
69
38
0.5
13
13
1.0
13
nd
control
18
75
untreated
0.25
nd
0.5
0
1.0
0
0
60
95
0.25
38
0.5
21
1
18
0047 Activity, after storage, of fresh shoot Inula extract made with ammonium hydroxide against fungal diseases of crop plants.
4
0048 100 g fr. w. shoot were shaken for ten minutes in 1 L of NHOH. Plant material discarded and the extract was sprayed onto the crop plants. ndnot done.
% Diseased leaf area
downy
powdery
powdery
late blight in
mildew in
mildew in
mildew in
potato
cucumber
cucumber
wheat,
solvent
4 d
6 d
6 d
8 d
untreated control
83
88
88
88
water
18
5
75
63
KOH 0.1N
88
4
75
63
NaOH 0.1N
63
28
50
25
NH<highlight><subscript>4</subscript></highlight>OH 1.4%
1
8
50
13
NH<highlight><subscript>4</subscript></highlight>OH 7%
3
4
25
15
(NH<highlight><subscript>4</subscript></highlight>)<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>4 </subscript></highlight>0.1M
0.3
0
50
3
(1.3%)
K<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>4 </subscript></highlight>0.1M
23*  
3
88
20
Acetone
8
3
25
5
0049 Activity of aqueous or acetone extracts made from dry crushed shoots of Inula against fungal diseases of crop plants.
0050 1 g dry crushed shoots were shaken for thirty minutes in 50 ml of the solvent, screened (100) and sprayed onto the crop plants. Plants were inoculated one day after spray. *phytotoxic
% diseased leaf area
pow-
downy
dery
late
late
mildew
mildew
powdery
blight in
blight in
in cu-
in
mildew
solvent,
tomato
potato
cumber
wheat
in melon*
conc.
pH
4 d
6 d
8 d
11 d
14 d
None
—
88
100
100
100
180
(NH<highlight><subscript>4</subscript></highlight>)<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>4</subscript></highlight>
7.9
25
14
16
18
150
1.32% (0.1M)
NH<highlight><subscript>4</subscript></highlight>OH
10.97
25
22
28
15
55
0.7% (0.1M)
(NH<highlight><subscript>4</subscript></highlight>)<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>2 &plus;</subscript></highlight>
NH<highlight><subscript>4</subscript></highlight>OH,
mixed, 0.1M
9 + 1
8.25
29
5
27
15
80
7.5 + 2.5
8.6
31
13
16
3
100
5 + 5
9.0
11
6
6
0
40
2.5 + 7.5
9.4
20
0
11
1
25
1 + 9
9.8
16
2
16
8
20
water
6.2
75
80
58
75
180
acetone
—
0
16
11
8
130
0051 Activity of dry crushed Inula shoots extracted with ammonium hydroxide and ammonium phosphate (dibasic) against fungal disease in crop plants.
4
0052 1 g crushed dry shoots were shaken for five minutes in 50 ml of solvent, screened and sprayed. Inoculation took place three hours after spray. *Number of fungal colonies per plant. Extracts were used six days after preparation. The molarity of NHOH is based on molecular weight of 35.
Potato late blight
cucumber downy
solvent, conc. and
4 d
mildew 6 d
pH
% blighted leaf area
lesions/plant
control untreated
94
125
ethylamine 0.7%
15
 5
(pH 12.3)
ethylenediamine 0.6%
50
 4
(pH 11.95)
0053 Activity of crushed dry Inula shoots extracts made with aqueous solutions of ethylamine and ethylenediamine against fungal diseases of crop plants.
0054 1 g dry crushed shoots of Inula were shaken for five minutes in 50 ml of the aqueous solvent, screened and sprayed onto the plants. Plants were inoculated one day after spray.
% infected leaf area
late blight in tomato
powdery mildews in
solvent and conc.
6 d
wheat 11 d
untreated control
88
75
ethylamine, 1%
0
38
ethylenediamine, 0.9%
0
38
ammonium hydroxide, 1%
1
20
(0.25% NH<highlight><subscript>3 </subscript></highlight>in water)
2-amino-2-methylpropanole
25
nt
(AMP) 0.9%
acetone
0
23
0055 Activity of alkaline extracts or acetone of fresh Inula shoots against disease development in crop plants.
0056 25 g fresh shoots of Inula were dipped for ten minutes in 250 ml of the solvent, and the extracts sprayed onto crop plants. Inoculation took place three hours after spray.
% infected leaf area
powdery
late blight in
mildews in
First solvent
Second solvent
tomato, 6 d
wheat, 11 d
untreated control
88
75
NH<highlight><subscript>4</subscript></highlight>OH, 1%
—
1
20
acetone
—
0
23
NH<highlight><subscript>4</subscript></highlight>OH, 1%
acetone
1
25
acetone
NH<highlight><subscript>4</subscript></highlight>OH, 1%
38
75
0057 Sequential extraction of fresh Inula shoots with acetone and ammonium hydroxide and the activity of the extract against plant disease.
0058 25 g fresh Inula shoots were dipped for ten minutes in the first solvent. Then washed with water, blotted dry and dipped for ten minutes in the second solvent. Extracts were sprayed onto the crop plants before inoculation.
fungal colonies
bacterial colonies
extraction made with
per dish
per dish
no extract, control
75
30
ethylamine, 1%
7
30
ethylene diamine, 0.9%
10
40
ammonium hydroxide, 1%
12
15
acetone (positive control)
4
0
0059 Antimicrobial activity, in vitro, of alkaline extracts of fresh Inula shoots.
0060 0.5 ml extract (see Example 8) was pipetted onto a 9 cm diam petri dish containing 10 ml Potato Dextrose Agar. Dishes were exposed to aerial contamination for ten minutes. Dishes incubated at 25 C. for four days until data were collected.
4
2
4
4
g dry shoots
blighted leaf area
per 50 ml solvent
%, 4 days
untreated control
88
solvent control
88
0.1
75
0.2
63
0.4
25
0.6
25
0.8
18
1
14
2
3
0061 Dose-dependent activity of alkaline extracts made from dry crushed Inula shoots with 1:1 mixture (pH 9.0) of 0.1M (1.32%) (NH)HPOand 0.1M (0.7%) NHOH, against late blight in tomato.
0062 0.1-2 g dry crushed shoots were shaken for five minutes in 50 ml of the solvent mixture, screened and sprayed. Inoculation took place three hours later.
% diseased leaf area
solvent
Inula extract
solvent control
untreated control
81
—
piperazine hydrate 0.05M
3
81
(1%) pH 11.3
piperazine hydrate 0.1M
3
81
(2%) pH 11.3
triethanolamine 0.1M
23
81
(1.59%) pH 10.3
0063 Activity of aqueous alkaline extracts made from dry crushed Inula shoots against late blight in tomato.
0064 1 g dry crushed shoots was shaken in 50 ml of the solvent for one hour, screened and sprayed. Plants were inoculated three hours after spray and disease was recorded four days later.
piperazine hydrate
% diseased leaf area
conc., %
tomato
potato
0  
91
95
0.06
18
25
0.12
11
25
0.25
4
25
0.50
18
44
1.00
0
75
2.00 (= 0.1M)
8
75
0065 The effect of concentration of piperazine hydrate on the activity of Inula extracts against late blight in tomato and potato.
0066 1 g dry crushed Inula shoots was shaken for one hour in 50 ml of piperazine solutions, screened and sprayed. Inoculation was done three hours after spray and disease recorded five days after inoculation.
% diseased leaf area
Tomato late
cucumber downy
wheat powdery
Treatment
blight, 4d
mildew, 6d
mildew, 10d
none (control)
88
88
50
tetraethylene 1%
63
31
50
(pH 11.2)
piperidine 1%
88
94
25
(pH 12.0)
Inula in tetraethy-
25
47
50
lene 1%
Inula in piperidine 1%
25
1
13
0067 Efficacy of tetraethylene or piperidine aqueous solutions on extraction of antifungal components from dry shoots of Inula.
0068 1 g dry crushed Inula shoots was shaken for ten minutes in 50 ml of the solvent, screened and sprayed. Inoculation was done three hours after spray.
% diseased leaf area
downy
powdery
powdery
mildew
mildew
mildew
in cucumber
in cucumber
in wheat
solvent
6d
11d
8d
untreated control
75
100
100
Trizma-base ®
20
13
3
(Sigma) 1%
piperazine hydrate 1%
18
38
38
piperadine 1%
5
25
18
imidazole 1%
0
0
0
acetone
2
25
25
(positive control)
0069 Activity of aqueous alkaline or acetone extracts made from Inula shoots against mildews in cucumber and wheat.
0070 1 g dry crushed leaves of Inula was shaken for ten minutes in 50 ml of the solvent, screened and sprayed. Inoculation was done three hours after spray.
lesions
sec-butyl-
per plant
% diseased leaf area
amine
late blight in
late blight
powdery mildew
conc., %
potato 3d
tomato 4d
cucumber 13d
wheat 7d
0
130
88
88
100
0.06
60
63
14
23
0.12
0
25
14
0
0.25
5
8
9
15
0.5
0
15
15
3
1.0
2
3
9
5
(pH 11.5)
0071 Efficacy of sec-butylamine in extracting antifungal components from dry Inula shoots.
0072 1 g dry crushed Inula shoots was shaken for ten minutes in 50 ml of sec-butylamine, screened and sprayed. Inoculation was done three hours after spray.
% diseased leaf area
late blight
late blight
powdery mildew
Treatment
tomato, 5d
potato, 5d
wheat, 8d
none
81
100
69
Imidazole only
0.12% pH 9.55
95
50
63
0.25% pH 9.70
88
50
50
 0.5% pH 9.86
69
25
23
  1% pH 9.95
50
18
25
Inula extract in
imidazole
0.12%
30
5
0
0.25%
20
18
18
 0.5%
30
30
0
 1.0%
30
15
0
Inula in acetone
5
0
3
0073 Efficacy of imidazole in extracting antifungal component from dry Inula shoots.
0074 1 g of dry crushed Inula shoots was shaken in 50 ml of imidazole for ten minutes, screened and sprayed. Inoculation was done three hours after spray.
0075 Composition of a 50 WP formulation of Inula shoots and its activity against fungal plant diseases.
0076 Composition:
0077 5 g dry Inula shoot powder
0078 2.5 g imidazole
Activity
% diseased leaf area
g product per 50 ml
late blight
late blight
powdery mildew
water
pH
tomato 5d
potato 5d
wheat 13d
0
—
98
100
38
0.25
8.20
75
75
25
0.5
8.21
38
63
13
0.75
8.22
31
25
0
1
8.23
23
18
0
1.25
8.24
20
20
0
1.5
8.25
15
13
0
2
8.25
1
10
0
0079 2.5 g inert carriers and surfactants (Sandoz)
0080 Composition of a 50 WP formulation of Inula shoots and its activity against fungal plant diseases.
0081 Composition:
0082 5 g dry Inula shoot powder
0083 3.75 g imidazole
Activity
% diseased leaf area
g product per 50 ml
late blight
late blight
powdery mildew
water
pH
tomato 4d
potato 5d
wheat 9d
0
—
95
81
38
0.25
8.28
75
69
25
0.5
8.29
63
25
0
0.75
8.32
38
15
0
1
8.33
25
13
0
1.25
8.35
21
13
0
1.5
8.36
13
18
0
2
8.37
6
8
0
0084 1.25 g inert carriers and surfactants (Sandoz)
0085 Composition of 45 WP formulation of Inula shoots and its activity against fungal plant diseases.
0086 Composition:
0087 5 g dry Inula shoot powder
0088 5 g imidazole
Activity
% diseased leaf area
g product per 50 ml
late blight in tomatoes
water
pH
4d
0
—
75
0.25
8.18
75
0.5
8.23
50
0.75
8.28
50
1
8.29
38
1.5
8.30
25
2
8.38
 3
0089 1 g inert carriers and surfactants (Sandoz)
0090 Composition of 50 WP formulation of Inula shoots and its activity against fungal plant diseases.
0091 Composition:
0092 5 g dry Inula shoot powder
0093 2.5 g dibasic ammonium phosphate
% diseased leaf area
Activity
late
late blight
downy mildew
powdery
g product per
blight in
in potato,
in cucumber,
mildew in
50 ml water
pH
tomato, 4d
6d
6d
wheat, 9d
0
—
98
98
50 
75
0.1
7.33
75
93
13 
75
0.2
7.44
75
93
8
50
0.4
7.46
63
38
3
50
0.6
7.46
63
30
1
25
0.8
7.46
18
23
3
23
1
7.46
23
20
0
20
1.5
7.46
23
18
0
18
0094 2.5 g Avicel P-101 (Fluka)crystalline cellulose
0095 Composition of 50 WP formulation of Inula shoots and its activity against fungal plant diseases.
0096 Composition:
0097 5 g dry Inula shoot powder
0098 2.5 g Trizma-Base (Sigma)
Activity
% diseased leaf area
g product per 50 ml
late blight
late blight in
powdery mildew
water
pH
tomato, 3d
potato, 5d
in wheat, 8d
0
—
95
95
75
0.2
8.55
88
95
50
0.4
8.62
88
93
50
0.6
8.67
38
69
25
0.8
8.68
23
38
25
1
8.70
30
25
25
1.5
8.72
23
25
25
2
8.74
25
25
25
0099 2.5 g Avicel PH-101 (Fluka)
0100 Composition of 50 WP formulation of Inula shoots and its activity against fungal plant diseases.
0101 Composition:
0102 5 g dry Inula shoot powder
Activity
% diseased leaf area
g product per 50 ml
late blight in
late blight in potato
powdery mildew
water
pH
tomato, 4d
lesions/plant 3d
4d
in wheat, 7d
0
—
95
>500 
88
88
0.2
7.42
38
200 
69
38
0.4
7.45
25
180 
69
38
0.6
7.45
23
50
25
23
0.8
7.45
20
40
25
13
1
7.46
 3
20
20
13
2
7.47
 1
 5
 8
 3
0103 5 g dibasic ammonium phosphate
Percent
Alkaline
Other
Formula
a-i
agent
pH
component
Inula leaves (27%)
25
none
6.8
Zeofree 80 (60%)
Polyfon F (3%)
Synfactant (10%)
Inula leaves (25%)
25
amines (10%)
7.9
Zeofree 80 (62%)
Polyfon F (3%)
Monoamine 779 (10%)
Inula leaves (25%)
12.5
triethanolamines
8.5
Zeofree 80 (95%)
Stepsperse DF500 (10%)
Monoamine 779 (20%)
Triethanolamine (50%)
Inula leaves (25%)
25
(NH<highlight><subscript>4</subscript></highlight>)<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>4 </subscript></highlight>(25%)
7.5
Zeofree 80 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
25
(NH<highlight><subscript>4</subscript></highlight>)<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>4 </subscript></highlight>(25%)
8
Hubersorb 600 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
25
(NH<highlight><subscript>4</subscript></highlight>)<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>4 </subscript></highlight>(25%)
8
Hubersorb 600 (40%)
diammonium phosphate (25%)
Stepan DF 500 (10%)
Inula leaves (25%)
25
(NH<highlight><subscript>4</subscript></highlight>)<highlight><subscript>2</subscript></highlight>HPO<highlight><subscript>4 </subscript></highlight>(25%)
8
Hubersorb 600 (24%)
diammonium phosphate (25%)
Stepan DF 500 (5%)
40% Tdet 09 on Zeolex 7A (5%)
0104 Composition of alkaline wettable powder formulations of Inula used to control plant diseases.
% infected leaf area 6 days
Conc. % a-i
Formulation
0
0.25
0.5
1.0
Inula leaves (27%)
100
100
100 
100 
Zeofree 80 (60%)
Polyfon F (3%)
Synfactant (10%)
Inula leaves (25%)
 50
25
38
Zeofree 80 (62%)
Polyfon F (3%)
Monoamine 779 (10%)
Inula leaves (25%)
 25
25
18
Zeofree 80 (95%)
Stepsperse DF500 (10%)
Monoamine 779 (20%)
Triethanolamine (50%)
Inula leaves (25%)
100
69
50
Zeofree 80 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
100
50
20
Hubersorb 600 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
 50
20
 0
Hubersorb 600 (40%)
diammonium phosphate (25%)
Stepan DF 500 (10%)
Inula leaves (25%)
100
88
25
Hubersorb 600 (24%)
diammonium phosphate (25%)
Stepan DF 500 (5%)
40% Tdet 09 on Zeolex 7A (5%)
0105 Late blight in potato.
% infected leaf area 4 days
Conc. % a-i
Formulation
0
0.25
0.5
1.0
Inula leaves (27%)
95
88
75
38
Zeofree 80 (60%)
Polyfon F (3%)
Synfactant (10%)
Inula leaves (25%)
19
15
 8
Zeofree 80 (62%)
Polyfon F (3%)
Monoamine 779 (10%)
Inula leaves (25%)
18
 1
 0
Zeofree 80 (95%)
Stepsperse DF500 (10%)
Monoamine 779 (20%)
Triethanolamine (50%)
Inula leaves (25%)
75
63
25
Zeofree 80 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
75
63
25
Hubersorb 600 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
50
38
 9
Hubersorb 600 (40%)
diammonium phosphate (25%)
Stepan DF 500 (10%)
Inula leaves (25%)
75
38
19
Hubersorb 600 (24%)
diammonium phosphate (25%)
Stepan DF 500 (5%)
40% Tdet 09 on Zeolex 7A (5%)
0106 Late blight in tomato. Suspensions were used 100 hours after preparation.
% infected leaf area 6 days
Conc. % a-i
Formulation
0
0.25
0.5
1.0
Inula leaves (27%)
100
63
38
38
Zeofree 80 (60%)
Polyfon F (3%)
Synfactant (10%)
Inula leaves (25%)
38
38
10
Zeofree 80 (62%)
Polyfon F (3%)
Monoamine 779 (10%)
Inula leaves (25%)
20
20
13
Zeofree 80 (95%)
Stepsperse DF500 (10%)
Monoamine 779 (20%)
Triethanolamine (50%)
Inula leaves (25%)
50
30
30
Zeofree 80 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
44
13
13
Hubersorb 600 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
44
 8
 8
Hubersorb 600 (40%)
diammonium phosphate (25%)
Stepan DF 500 (10%)
Inula leaves (25%)
75
63
44
Hubersorb 600 (24%)
diammonium phosphate (25%)
Stepan DF 500 (5%)
40% Tdet 09 on Zeolex 7A (5%)
0107 Downy mildew in cucumber.
% sporulating leaf area 8 days
Conc. % a-i
Formulation
0
0.25
0.5
1.0
Inula leaves (27%)
97
60
 5
 0
Zeofree 80 (60%)
Polyfon F (3%)
Synfactant (10%)
Inula leaves (25%)
25
25
20
Zeofree 80 (62%)
Polyfon F (3%)
Monoamine 779 (10%)
Inula leaves (25%)
50
25
15
Zeofree 80 (95%)
Stepsperse DF500 (10%)
Monoamine 779 (20%)
Triethanolamine (50%)
Inula leaves (25%)
70
15
 0
Zeofree 80 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
60
20
20
Hubersorb 600 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
50
25
20
Hubersorb 600 (40%)
diammonium phosphate (25%)
Stepan DF 500 (10%)
Inula leaves (25%)
80
80
50
Hubersorb 600 (24%)
diammonium phosphate (25%)
Stepan DF 500 (5%)
40% Tdet 09 on Zeolex 7A (5%)
0108 Downy mildew in grapes.
% infected leaf area 8 days
Conc. % a-i
Formulation
0
0.25
0.5
1.0
Inula leaves (27%)
50
50
25
13
Zeofree 80 (60%)
Polyfon F (3%)
Synfactant (10%)
Inula leaves (25%)
25
13
 0
Zeofree 80 (62%)
Polyfon F (3%)
Monoamine 779 (10%)
Inula leaves (25%)
25
13
 0
Zeofree 80 (95%)
Stepsperse DF500 (10%)
Monoamine 779 (20%)
Triethanolamme (50%)
Inula leaves (25%)
38
19
13
Zeofree 80 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
38
25
13
Hubersorb 600 (25%)
diammonium phosphate (25%)
Reax M100 (5%)
Kaolin (20%)
Inula leaves (25%)
30
25
 0
Hubersorb 600 (40%)
diammonium phosphate (25%)
Stepan DF 500 (10%)
inula leaves (25%)
25
25
 5
Hubersorb 600 (24%)
diammonium phosphate (25%)
Stepan DF 500 (5%)
40% Tdet 09 on Zeolex 7A (5%)
0109 Powdery mildew in wheat.
0110 In view of the teachings presented herein, other modifications and variations of the present inventions will be readily apparent to those of skill in the art. The foregoing discussion, and description are illustrative of some embodiments of the present invention, but are not meant to be limitations on the practice thereof. It is the following claims, including all equivalents, which define the scope of the invention.
0111 Any patents or publications mentioned in this specification are indicative of the levels of those skilled in the art to which the invention pertains. These patents and publications are herein incorporated by reference to the same extent as if each individual publication was specifically and individually indicated to be incorporated by reference.
0112 One skilled in the art will readily appreciate that the present invention is well adapted to carry out the objects and obtain the ends and advantages mentioned, as well as those inherent therein. The present examples along with the methods, procedures, treatments, and specific compositions described herein are presently representative of preferred embodiments, are exemplary, and are not intended as limitations on the scope of the invention. Changes therein and other uses will occur to those skilled in the art which are encompassed within the spirit of the invention as defined by the scope of the claims. | |
Q:
VBA Custom Property Conundrum
There is a question on VBA that i have asked persistently on Stack. I am willing to go into great pains and lengths to find the answer. Be aware it may look silly and childish but it's a tricky snide question and almost everyone misses the answer consistenly.
According to my books on VBA (Bill Jelin - VBA Macros Microsoft Excel 2010) when we are creating a custom object we open a class module. The properties of the custom objects are variables declared Private or Public. This seems extremely illogical for me!!! I will illustrate in the picture below why.
Simply it's Range("A1:A4")
A very simple Sub for explanation purposes (you can see it clearly bellow)
Sub dd()
Dim i As Integer
Dim Top As Range
Set Top = Range("A1:A4")
i = Top.Count
MsgBox i
End Sub
Count property "counts" and returns the number of objects in the collection
Alright hold that childish example in your mind for a minute and proceed bellow...
Now lets say we are creating a custom object in VBA so we open a Class Module and name it clsEmployee. Now the object has 4 properties, according to the book, so we are declaring them like variables inside the class module:
Public EmpName as String
Public EmpID as String
Public EmpRate as Double
Public EmpWeeklyHrs as Double
There is also a method so we type her in the Class module
Public Function EmpWeeklyPay as Double
EmpWeeklyPay = EmpRate * EmpWeeklyHrs
End Function
Now if we go to a normal module reference and instantiate the object by typing Employee the Intellisense window...
...shows us these procedures and functions
But how would you create a custom property like Count? As you can see in the graphic example in the first picture the Count property engages in some sort of logic steps and counts the cells parsing them one by one in the collection and returns the number 4 in the MsbBox. It can make only sense that these logic steps are in fact somehow hard-coded in the machine. You cannot declare that kind of property in the Class module by simply typing:
Dim Count as Integer
according to the absurd axiom in the book which says:
Properties are variables that can be declared Private or Public.
It would also be very revealing the fact that Count Property is NOT being equaled with anything in the code in picture. That means Count property is not a "straw" property it needs some logic to parse the cells in the Range("A1:A4") and say there are 4 cells. I just cannot see how i would create such a custom object with by typing in the Class module: Dim Count as Integer
How you would create in custom objects properties like Name, Value or Count without some procedures to tell the compiler what to do by just typing 'straw' declaration in the Class module?
A:
I am not going to start a fight against the author of the book you're reading (in fact, I have not read that particular book). It has received rather positive reviews so I think the real source of the problem is you - misunderstanding some concepts.
Table of contents of your book
Now, are you missing a page? :P How did you get from Using a Custom Object (p 498) to Collections (p 501) without seeing/reading page 499 about Properties?
Well, anyways
creating a custom object we open a class module.
This is very poorly worded. I am not a book writer but I have read many programming books and I have never seen a professional actually teach using such poor wording. To me, someone who has some programming experience this sentence clearly makes no sense. The concept of that sentence is crucial to learning about classes, class modules etc and you should make sure you understand every single word in it along with the meaning.
What you should have done before actually posting on StackOverflow is called research.
Everyone occasionally reads something that is either unclear or can't get a full understanding of it. What you do in such cases is fire up your browser and do you own research on the topic. Read about the same thing from multiple sources and I am sure you'll get to understand it at some point. Also, never rely on one particular book, as most of authors always say something along these lines: "do more research on your own because if I were to talk about every single details about this or that this book would have to be another 1000 page long".
See CPearson's Introduction to Classes.
How to use the Implements in Excel VBA
Inheritance for VBA code in MS Access
Now,
The properties of the custom objects are variables declared Private or
Public.
While this is technically correct, it's worth pointing out that not only variables are properties of classes. Variables are one type of class property - which I am going to try to convince you it's better called members.
When you get to learn about classes - you need to be able to distinguish the difference in meaning of terminology. You need to know what words like class, class Property, member, function, variable, collection, access modifiers, inheritance, polymorphism, object, class instance, and many more refer to.
Count property "counts" and returns the number of objects in the
collection
Great, how did you know that? Range.Count Property - another good tip is to visit the MSDN Developer's reference and look at the definitions for objects your working with. Not every single class is well described on MSDN but it gives you some basic info to get you going. If you there is something else you need, again go to google and research.
Now lets say we are creating a custom object in VBA so we open a Class
Module and name it clsEmployee.
Creating a custom object in VBA surely refers to a custom object module not to confuse with a custom object instance. VBA Project's custom objects are UserForm, Module (ref standard module), and Class Module. Those are object modules. Adding a class module it's like adding your own blueprint for an model you want to instantiate( your own data type to store some information the way you design in that blueprint). There is a difference between adding an object module and creating an objects instance...
Now the object has 4 properties,
according to the book, so we are declaring them like variables inside
the class module:
This has always been a bit tricky for beginners to understand.. I guess it's that some people confuse members with properties. I am not going to go into detail on this one as Jon Skeet already has explained (research!!). It's essential to be able to tell the difference between the terminology you're using.
When working in VBA, it is really easy when you treat everything in your class as class members. So class members are variables, properties (let/set/get), functions, procedures, types, enums, external dlls declarations, events (which are functions). As you can see instead of calling everything class properties I call them class members. Then the confusion of the context in which you use the word Property is gone. a Property is now a Let/Set/Get type of thing and is a member of a class.
But how would you create a custom property like Count?
Again, what is .Count? If you're a bit familiar with VBA you already know if not what do you do? You research
Returns a Long value that represents the number of objects in the
collection.
Great. Which member generally returns things? a Function? Yep, so what does it return? a Long value. What is that value representing? the number of objects in the collection.
Why is one called a Collection and the other Class. You should know on top of you head what the difference between them is. Do you? What is it?
How would you create a .Count function in your own class? This is quite advanced. You need to understand everything else up to that point to be able to do that yourself an not just copy-paste code without actually understanding what is going on. Things like Enumerator, Interfaces, IUnknown are involved and you do not understand those terms. What do you do again? Research.
.Count is a common property always implemented on Collections. You have got a class but you do not have a Collection member in your class nor your class is a Collection itself.
Research leads me to » Implementation of a custom collection.
PS: I have purposely not linked to one external site which explains a very important keyword used multiple times in this answer.... You should figure out by yourself which one that is - Ill be awaiting your feedback :)
Hope this helps.
| |
Q:
Unable to create a non reactive RenderPlot object with dynamic names in R
I want to create a plotOutput object, which is dynamically created.
I've created dynamic objects to render different plots, they have different "Data" passed so the plot will vary.
The renderPlot function is then saved in Graph1, Graph2, Graph3 and so on how many ever times i is created. Then the UI element "w" has the plotOutput of Graph1, Graph2 and so on.
But when I call "w" The latest Graph is rendered and overwritten in all the objects of w.
Is there any other way to do it?
output[[paste0("Graph",i)]]<-{ renderPlot({ggplot2(Data,aes(x=xxval,y=yval)+geom_point() }
w<-plotOutput(paste0("Graph",i),height=200,width=300)
A:
you want to use the function insertUI for this. And I thank you - I have finally found a use-case where you have to put the output within an observer. Here is a working example
library(ggplot2)
shinyApp(
ui = fluidPage(
column(
width = 3,
actionButton(
inputId = "newGraph",
label = "add Graph"
),
selectInput(
inputId = "xAxis",
label = "x-axis",
choices = colnames(mtcars)
),
selectInput(
inputId = "yAxis",
label = "y-axis",
choices = colnames(mtcars)
)
),
column(
width = 9,
id = "graph_wrapper"
)
),
server = function(input, output,session) {
observeEvent(input$newGraph,{
insertUI(
selector = '#graph_wrapper',
where = "beforeEnd",
ui = plotOutput(
outputId = paste0("plot",input$newGraph)
))
xxval = input$xAxis
yval = input$yAxis
output[[paste0("plot",input$newGraph)]] = renderPlot({
ggplot(mtcars,aes_string(x=xxval,y=yval))+geom_point()
})
})
})
)
Hope this helps!
| |
National Museum in Warsaw
On 30th May 2016, the National Museum in Warsaw and the Institute of Archaeology of the National Academy of Sciences of Ukraine signed an agreement enabling the start of a three-year archaeological campaign (with a possible extension) on the site of the ancient city of Olbia as part of the Ukrainian “Olbian Archaeological Expedition” headed by Dr. Hab. Alla Buiskikh.
The first season was devoted to a reconnaissance of the site and conducting the relevant surveys (including geophysical ones) on the area designated for the Polish mission, as agreed with the Ukrainian side. It also marked the beginning of excavation works in the selected location. The area is adjacent to the Ukrainian trench, which has been explored for many years. Consequently, it may be assumed that the long-term results of our excavation works will bring similar results, i.e. uncovering the site of a former Roman fortress which, between 7th and 3rd centuries BC, formed a significant part of the Greek colony. The strategic aim of the mission is to explore the small plateau located in the eastern part of ancient Olbia, about half of which is occupied by the Ukrainian trench. The main task of the Polish mission is to examine the rest of it, which, thanks to a joint analysis of research results in Polish and Ukrainian trenches, should significantly enrich our knowledge about this part of the ancient city in the future. The second and third campaign backed this assumption and brought the first major research success: a confirmation of the hypothesis that until the end of the 4th and perhaps also in the early 5th century, Olbia was inhabited by representatives of the Chernyakhov Culture.
Conservation activities carried out by a separate conservation mission will be conducted in parallel to archaeological excavations, like in the case of excavations at Tyritake in Crimea. Preparatory work took place in 2018, and the mission is scheduled to start working in 2019. It will be aimed at protecting our archaeological activity so as to enable us to present its results to all interested parties, including tourists visiting Olbia.
The model cooperation between Polish and Ukrainian archaeologists, the promising results of the first three missions and an extension of project financing by the Ministry of Culture and National Heritage have all contributed to the fact that the solemn signing of an agreement prolonging the NMW’s archaeological mission at Olbia for the coming 6 years will take place on 4th December 2018.
Thereby, the National Museum in Warsaw continues the traditions of over 60 years of its archaeological activity in Ukraine, began by Professor Kazimierz Michałowski in the Crimean Myrmekion and continued first with the archaeological mission at Tyritake in the Crimea, headed by Dr Alfred Twardecki, Curator of the Collection of Ancient and East Christian Art, and now, under the same leadership, in the city of Olbia at the mouth of Dnieper and Boh rivers.
The Polish-Ukrainian archaeological cooperation within our project not only invokes the glorious traditions of previous archaeological expeditions of the NMW, but also creates an opportunity to acquire extremely interesting relics of the Greco-Roman civilization and establish an important research centre devoted to the archaeology and history of the northern coasts of the Black Sea. | http://blackseaproject.iaepan.edu.pl/en/mission-olbia-2016-2018 |
Power is associated by many people with electricity. Knowing that power is the rate of energy use or energy conversion, what is the expression for electric power ? Power transmission lines might come to mind. We also think of lightbulbs in terms of their power ratings in watts. Let us compare a 25-W bulb with a 60-W bulb. (See [link] (a).) Since both operate on the same voltage, the 60-W bulb must draw more current to have a greater power rating. Thus the 60-W bulb’s resistance must be lower than that of a 25-W bulb. If we increase voltage, we also increase power. For example, when a 25-W bulb that is designed to operate on 120 V is connected to 240 V, it briefly glows very brightly and then burns out. Precisely how are voltage, current, and resistance related to electric power?
Electric energy depends on both the voltage involved and the charge moved. This is expressed most simply as , where is the charge moved and is the voltage (or more precisely, the potential difference the charge moves through). Power is the rate at which energy is moved, and so electric power is
Recognizing that current is (note that here), the expression for power becomes
Electric power ( ) is simply the product of current times voltage. Power has familiar units of watts. Since the SI unit for potential energy (PE) is the joule, power has units of joules per second, or watts. Thus, . For example, cars often have one or more auxiliary power outlets with which you can charge a cell phone or other electronic devices. These outlets may be rated at 20 A, so that the circuit can deliver a maximum power . In some applications, electric power may be expressed as volt-amperes or even kilovolt-amperes ( ).
To see the relationship of power to resistance, we combine Ohm’s law with . Substituting gives . Similarly, substituting gives . Three expressions for electric power are listed together here for convenience:
Note that the first equation is always valid, whereas the other two can be used only for resistors. In a simple circuit, with one voltage source and a single resistor, the power supplied by the voltage source and that dissipated by the resistor are identical. (In more complicated circuits, can be the power dissipated by a single device and not the total power in the circuit.)
Notification Switch
Would you like to follow the 'Concepts of physics' conversation and receive update notifications? | https://www.jobilize.com/online/course/7-11-electric-power-and-energy-by-openstax?qcr=www.quizover.com |
O'Hare Ground Transportation
Like any other airport, O'Hare is not located in downtown Chicago, so you will need transportation from O'Hare airport to the Chicago Loop or whatever your final destination might be. You have a lot of options: Taxis, Limousines, Buses, Shuttles and Vans, Rental Cars or rail transportation. All of these O'Hare transportation options are convenient and accessible.
Most providers offer fixed rates for transport between Chicago O'Hare and downtown Chicago or other Illinois cities. Furthermore, complimentary shuttles operate on a regular basis between O'Hare Airport and nearby hotels, and even downtown hotels. Free shuttles also operate between O'Hare long-term parking lots and the airport. | http://airportczar.com/ohare/ground-transportation |
114 Wis.2d 346 (1983)
338 N.W.2d 322
STATE of Wisconsin, Plaintiff-Respondent,
v.
Joe Edward WHEATON, Defendant-Appellant.
No. 82-1374-CR.
Court of Appeals of Wisconsin.
Submitted on briefs July 7, 1983.
Decided July 26, 1983.
*347 For the defendant-appellant the cause was submitted on the brief of Charles W. Giesen and Eisenberg, Giesen, Ewers & Hayes, S.C. of Madison.
For the plaintiff-respondent the cause was submitted on the brief of Bronson C. La Follette, attorney general, and Pamela Magee-Heilprin, assistant attorney general.
Before Gartzke, P.J., Bablitch, J. and Dykman, J.
DYKMAN, J.
Defendant appeals from his conviction for possession of cocaine with intent to deliver in violation of sec. 161.41(1m)(b), Stats. He argues that no probable cause existed for his arrest or for the issuance of a search warrant to search his suitcase. He also claims that the trial court lacked jurisdiction to impose sentence because no judgment of conviction was entered pursuant to sec. 972.13, Stats.,[1] prior to sentencing and that the *348 trial court abused its discretion by sentencing him to three years' imprisonment. We affirm the trial court's denial of defendant's motion to dismiss due to an illegal arrest and to suppress evidence due to an insufficiently supported search warrant. We reverse and remand for sentencing because we conclude that the trial court lacked jurisdiction to sentence defendant. We do not reach the issue of whether the trial court abused its discretion in sentencing defendant.
An unnamed police informant told Department of Justice agent Schultz that a drug transaction would occur on February 8, 1980, at the Ramada Inn in Madison. Schultz observed Daniel Skaff and an individual, later identified as defendant, enter a car in the Ramada Inn parking lot. After defendant left the Inn, Schultz saw Skaff approach another unidentified police informant. Soon afterwards, that informant gave Schultz some white powder which he had obtained from Skaff. Schultz field tested the powder and determined that it was cocaine. The informant indicated that he had made drug purchases from Skaff in the past. Skaff told the informant that one of his suppliers was "Joe" who would be coming to La Crosse via public transportation with more controlled substances in the early morning hours of March 1st.
La Crosse police officers checked train, bus and plane schedules into La Crosse and determined that the only *349 public transportation arriving in La Crosse during the early morning hours of March 1st was an Amtrak train. Several police officers went to the Amtrak station to meet the 3:53 a.m. train. Schultz identified defendant as he left the train as the individual he saw with Skaff in Madison. A La Crosse police officer approached defendant and said "Joe." Defendant turned around, and he was arrested. The police officers did not have a warrant for his arrest.
Defendant was searched and two grams of a white substance, which was field tested and determined to be cocaine, were found in his boot. A search warrant was obtained to search the suitcase defendant was carrying. After opening the suitcase, the officers found eleven ounces of cocaine, having a street value of between $19,000 and $50,000.
The trial court denied defendant's motions to dismiss for an illegal arrest and to suppress the cocaine as a result of an insufficiently supported search warrant. Defendant was convicted after trial to the court on stipulated facts. He was sentenced to three years' imprisonment on May 27, 1981, but the judgment of conviction was not filed until January 8, 1982.
PROBABLE CAUSE TO ARREST
Defendant claims that the officers who arrested him without a warrant lacked probable cause to do so. When the facts are undisputed, as they are in this case, probable cause to arrest is a question of law which we review independently on appeal. State v. Drogsvold, 104 Wis. 2d 247, 262, 311 N.W.2d 243, 250 (Ct. App. 1981).
To make an arrest without a warrant, the police officer must have evidence that would lead a reasonable officer *350 to believe that defendant probably committed an offense. State v. Welsh, 108 Wis. 2d 319, 329, 321 N.W.2d 245, 251 (1982). It is only necessary that the information available to the officer leads him or her to conclude that guilt is more than a possibility. Id. at 329-30, 321 N.W.2d at 251. That conclusion may be based on hearsay information. Id. at 330, 321 N.W.2d at 251.
Both defendant and the state rely on the two-pronged test from Aguilar v. Texas, 378 U.S. 108, 114-15 (1964), for assessing the truthfulness and reliability of hearsay information used to establish probable cause: Aguilar requires the officer to specify (1) the underlying circumstances from which he or she concludes that the informant is reliable, and (2) the reliability of the underlying circumstances or manner in which the informant obtained his or her information. State v. Cheers, 102 Wis. 2d 367, 395, 306 N.W.2d 676, 688 (1981).
In Illinois v. Gates,___ U.S. ___, 51 U.S.L.W. 4709, 4716 (1983), the Supreme Court abandoned the Aguilar test:
[W]e conclude that it is wiser to abandon the "two-pronged test" established by our decisions in Aguilar and Spinelli. In its place we reaffirm the totality of the circumstances analysis that traditionally has informed probable cause determinations.... We are convinced that this flexible, easily applied standard will better achieve the accommodation of public and private interests that the Fourth Amendment requires than does the approach that has developed from Aguilar and Spinelli. [Footnote omitted.]
Under the circumstances, the police had sufficient information to reasonably conclude that defendant was committing a crime and that the informants working with them were reliable and had obtained their information in a reliable manner. The officers were working with Department of Justice agent Schultz, who obtained his information from two police informants. One informant *351 told Schultz of an intended sale of drugs between defendant and Skaff at the Ramada Inn on February 8, 1980. Schultz observed the encounter between Skaff and defendant, thus corroborating the informant's information. The other informant contacted Skaff and purchased cocaine from him. The informant also told Schultz that Skaff told him that he obtained the cocaine from a man named "Joe" and that "Joe" would be coming by public transportation to La Crosse in the early morning hours of March 1st with drugs to sell.
When defendant got off the 3:53 a.m. train on March 1st, which was the only public transportation arriving in La Crosse in the early morning hours, Schultz identified him as the man he saw with Skaff at the Ramada Inn.
The information provided by one of the informants was verified independently by Schultz when he saw defendant and Skaff meet at the Ramada Inn. The second informant had provided information in the past which led to arrests. This establishes that he was a reliable informant. State v. Paszek, 50 Wis. 2d 619, 629, 184 N.W.2d 836, 842 (1971).
Reliability of information is established when the informant's otherwise hearsay story of cocaine possession by defendant is corroborated by the fact that defendant, matching the informant's description, was recognized by agent Schultz at the time and place predicted by the informant. Id. at 630, 184 N.W.2d at 842.
[3]
Under the totality of the circumstances, the police officers had probable cause to arrest defendant without a warrant. The trial court did not err by denying defendant's motion to dismiss due to an illegal arrest.
PROBABLE CAUSE FOR SEARCH WARRANT
Defendant contends that Lieutenant Dunham's affidavit in support of the search warrant used to search *352 his suitcase was insufficient under Aguilar, supra, and did not establish probable cause. As we noted above, the Aguilar analysis is no longer to be used in determining the validity of search warrants. In reviewing the sufficiency of an affidavit on which a search warrant was based, we are confined to the record established before the magistrate at the time the warrant was issued. Scott v. State, 73 Wis. 2d 504, 508, 243 N.W.2d 215, 217 (1976). A magistrate's determination of probable cause should be paid great deference by reviewing courts. Spinelli v. United States, 393 U.S. 410, 419 (1969).
The task of the issuing magistrate is simply to make a practical, common-sense decision whether, given all the circumstances set forth in the affidavit before him [or her], including the "veracity" and "basis of knowledge" of persons supplying hearsay information, there is a fair probability that contraband or evidence of a crime will be found in a particular place. And the duty of a reviewing court is simply to insure that the magistrate had a "substantial basis for ... conclud[ing]" that probable cause existed. [Citation omitted.]
Gates, ___ U.S. at ___, 51 U.S.L.W. at 4716. The facts recited above were included in Lieutenant Dunham's affidavit. The magistrate had sufficient reliable information, under the circumstances, to determine that probable cause existed to believe that controlled substances were contained in defendant's suitcase.
Defendant complains that the affidavit does not sufficiently detail the manner of testing used by the officers in determining that the white powder found in defendant's boot was cocaine. The affidavit states that a field test was done on the substance and a positive test result for cocaine was obtained. Elaborate specificity is not required in the drafting of an affidavit for a search warrant. Scott, 73 Wis. 2d at 510, 243 N.W.2d at 218. The affidavit gave the magistrate sufficient information to *353 determine that cocaine was found on defendant's person when he was searched after his arrest.
[4]
The magistrate correctly determined that probable cause existed to support the warrant to search defendant's suitcase. The trial court did not err by denying defendant's motion to suppress the evidence obtained in the search.
JURISDICTION TO SENTENCE
Finally, defendant argues that the trial court did not have jurisdiction to sentence him on May 27, 1981, because it failed to enter a judgment of conviction prior to sentencing pursuant to sec. 972.13, Stats. The state argues that the trial court entered the judgment of conviction nunc pro tunc on January 8, 1982, and the sentencing was therefore valid as if the judgment had been entered the day sentencing took place.
[5]
Construction of a statute is a question of law which we review independently on appeal. Revenue Dept. v. Milwaukee Brewers, 111 Wis. 2d 571, 577, 331 N.W.2d 383, 386 (1983). We agree with defendant that the trial court lacked jurisdiction to sentence him under sec. 972.13, Stats.
Section 972.13, Stats., explicitly states that "upon a judgment of conviction the court shall either impose or withhold sentence...." Without such a judgment of conviction, a trial court cannot impose sentence. In Spiller v. State, 49 Wis. 2d 372, 378, 182 N.W.2d 242, 245 (1971), the supreme court stated:
[T]he new Criminal Code, sec. 972.13, Stats., now provides expressly for a formal judgment of conviction to be entered upon a verdict of guilty, a finding of guilty, or a plea of guilty, or no contest. Therefore, the sentence, *354 if one is imposed, must be imposed upon a "judgment of conviction." [Footnote omitted.]
[6]
A judgment of conviction was not entered at the time defendant was sentenced. It was not entered until almost eight months after the trial court sentenced defendant. The trial court did not have jurisdiction to sentence defendant because it was not sentencing him "upon a judgment of conviction" as required by sec. 972.13, Stats. We reverse defendant's sentence of three years' imprisonment and remand for sentencing only. Having determined that the cause must be remanded for sentencing, we do not reach the question of whether the trial court abused its discretion by sentencing defendant to three years imprisonment.
By the Court.Judgment affirmed in part, reversed in part and cause remanded for further proceedings consistent with this opinion.
NOTES
[1] Section 972.13, Stats., states in pertinent part:
(1) A judgment of conviction shall be entered upon a verdict of guilty by the jury, a finding of guilty by the court in cases where a jury is waived, or a plea of guilty or no contest.
(2) Except in cases where ch. 975 is applicable, upon a judgment of conviction the court shall either impose or withhold sentence and, if the defendant is not fined or imprisoned, the defendant shall be placed on probation as provided in s. 973.09. The court may adjourn the case from time to time for the purpose of pronouncing sentence.
(3) A judgment of conviction shall set forth the plea, the verdict or finding, the adjudication and sentence, and a finding as to the specific number of days for which credit is to be granted under s. 973.155. If the defendant is acquitted, judgment shall be entered accordingly.
(4) Judgments shall be in writing and signed by the judge or clerk.
...
| |
In terms of overall gaming performance, the AMD FX-8100 is massively better than the Intel Pentium G3250 3.2GHz when it comes to running the latest games. This also means it will be less likely to bottleneck more powerful GPUs, allowing them to achieve more of their gaming performance potential.
The Pentium G3250 3.2GHz was released over a year more recently than the FX-8100, and so the Pentium G3250 3.2GHz is likely to have better levels of support, and will be more optimized for running the latest games.
The FX-8100 has 6 more cores than the Pentium G3250 3.2GHz. With 8 cores, the FX-8100 is much less likely to struggle with the latest games, or bottleneck high-end graphics cards when running them.
The FX-8100 has 6 more threads than the Pentium G3250 3.2GHz. Both CPUs have one thread per physical core.
Multiple threads are useful for improving the performance of multi-threaded applications. Additional cores and their accompanying thread will always be beneficial for multi-threaded applications. Hyperthreading will be beneficial for applications optimized for it, but it may slow others down. For games, the number of threads is largely irrelevant, as long as you have at least 2 cores (preferably 4), and hyperthreading can sometimes even hit performance.
More important for gaming than the number of cores and threads is the clock rate. Problematically, unless the two CPUs are from the same family, this can only serve as a general guide and nothing like an exact comparison, because the clock cycles per instruction (CPI) will vary so much.
The Pentium G3250 3.2GHz and FX-8100 are not from the same family of CPUs, so their clock speeds are by no means directly comparable. Bear in mind, then, that while the Pentium G3250 3.2GHz has a 0.7 GHz faster frequency, this is not always an indicator that it will be superior in performance, despite frequency being crucial when trying to avoid GPU bottlenecking. In this case, however, the difference is probably a good indicator that the FX-8100 is superior.
Aside from the clock rate, the next-most important CPU features for PC game performance are L2 and L3 cache size. Faster than RAM, the more cache available, the more data that can be stored for lightning-fast retrieval. L1 Cache is not usually an issue anymore for gaming, with most high-end CPUs eking out about the same L1 performance, and L2 is more important than L3 - but L3 is still important if you want to reach the highest levels of performance. Bear in mind that although it is better to have a larger cache, the larger it is, the higher the latency, so a balance has to be struck.
The FX-8100 has a 7680 KB bigger L2 cache than the Pentium G3250 3.2GHz, which means that it, at worst, wins out in this area, and at best, will provide superior gaming performance and will work much better with high-end graphics cards.
The maximum Thermal Design Power is the power in Watts that the CPU will consume in the worst case scenario. The lithography is the semiconductor manufacturing technology being used to create the CPU - the smaller this is, the more transistors that can be fit into the CPU, and the closer the connections. For both the lithography and the TDP, it is the lower the better, because a lower number means a lower amount of power is necessary to run the CPU, and consequently a lower amount of heat is produced.
The Pentium G3250 3.2GHz has a 42 Watt lower Maximum TDP than the FX-8100, and was created with a 10 nm smaller manufacturing technology. What this means is the Pentium G3250 3.2GHz will consume significantly less power and consequently produce less heat, enabling more prolonged computational tasks with fewer adverse effects. This will lower your yearly electricity bill significantly, as well as prevent you from having to invest in extra cooling mechanisms (unless you overclock).
The Pentium G3250 3.2GHz has an on-board GPU, which means that it will be capable of running basic graphics applications (i.e., games) without the need for a dedicated graphics card. The FX-8100, however, does not, and you will probably have to look for a dedicated card if you wish to use it at all.
For in-depth GPU comparisons with the Intel HD Graphics Desktop (Haswell), click on the following GPU overview comparison icon (visible throughout Game-Debate), and choose a GPU from the list to compare against:
On-board GPUs tend to be fairly awful in comparison to dedicated cards from the likes of AMD or Nvidia, but as they are built into the CPU, they also tend to be cheaper and require far less power to run (this makes them a good choice for laptops). We would recommend a dedicated card for running the latest games, but integrated GPUs are improving all the time and casual gamers may find less recent games perform perfectly acceptably.
|CPU Codename||Haswell||Zambezi|
|MoBo Socket||Socket 1150 / H3 / LGA1150||Socket AM3+|
|Notebook CPU||no||no|
|Release Date||20 Jul 2014||30 Nov 2011|
|CPU Link||GD Link||GD Link|
|Approved|
|CPU Cores||2||vs||8|
|CPU Threads||2||vs||8|
|Clock Speed||3.5 GHz||vs||2.8 GHz|
|Turbo Frequency||-||vs||3.1 GHz|
|Max TDP||53 W||vs||95 W|
|Lithography||22 nm||vs||32 nm|
|Bit Width||64 Bit||vs||64 Bit|
|Max Temperature||72°C||vs||70°C|
|Virtualization Technology||no||vs||no|
|Comparison|
|L1 Cache Size||128 KB||vs||384 KB|
|L2 Cache Size||512 KB||vs||8192 KB|
|L3 Cache Size||3 MB||vs||8 MB|
|Max Memory Size||-||vs||-|
|Memory Channels||-||vs||2|
|ECC Memory Support||no||vs||no|
|Comparison|
|Graphics||Intel HD Graphics Desktop (Haswell)|
|Base GPU Frequency||650 MHz||vs||-|
|Max GPU Frequency||1250 MHz||vs||-|
|DirectX||11.1||vs||-|
|Displays Supported||-||vs||-|
|Comparison|
|Package Size||-||vs||-|
|Revision||-||vs||-|
|PCIe Revision||-||vs||-|
|PCIe Configurations||-||vs||-|
|Performance Value|
|Mini Review||Pentium G3250 3.2GHz is a budget processor based on the 22nm, Haswell architecture. |
It offers 2 Physical Cores (2 Logical), clocked at 3.2GHz and 3MB of L3 Cache.
Among its many features, Virtualization is activated.
The processor integrates very weak Graphics called Intel HD Graphics Desktop (Haswell), with 10 Execution Units, initially clocked at 350MHz and that go up to 1150MHz, in Turbo Mode which share the L2 Cache and system RAM with the processor.
Both the processor and integrated graphics have a rated board TDP of 54W.
It offers average performance. This means it will become a bottleneck in some demanding applications.
|FX-8100 is a high-end CPU based on the 32nm Bulldozer architecture. |
It offers 8 Physical Cores (8 Logical), initially clocked at 2.8GHz, which may go up to 3.1GHz and 8MB of L3 Cache.
Among its many features, Turbo Core and Virtualization are activated and the clock multiplier is unlocked, meaning it can be overclocked easily.
The processor DOES NOT integrated any graphics. and has a rated board TDP of 95W.
It is a powerful Octa Core whose performance is good. It's thus capable of running most applications smoothly without any problem. | https://game-debate.com/cpu/index.php?pid=2134&pid2=882&compare=pentium-g3250-3-2ghz-vs-fx-8100 |
We return yet again to the gritty and dark world of the Black Company, where bands of mismatched soldiers battle against the odds with dark sorcerers and many are only out for their own gain.
At the end of The White Rose some characters split up. In Shadow Games we followed one group, in The Silver Spike (1989), Glen Cook puts his attention to the other characters. The Silver Spike was published between Shadow Games and its sequel Dreams Of Steel, but I follow the order of the omnibus edition The Books Of The South, which is also preferable as Shadow Games and Dreams Of Steel should be read in one go. In Shadow Games some vague hints were given about the events in The Silver Spike, so it is a nice discovery to find out what it was about.
Like the other novels in The Books Of The South, Cook has several viewpoints in the story, although he sticks to a single first person narrator. In this case it is odd, because he is no Annalist, recording the events of the Black Company. Why Cook chose to do so I don’t know, but in the greater context he shouldn’t have. It just gives a odd feeling.
As we are used with Cook, there is much story in the book and the events are darker and moodier than before. It is also a much more straightforward and predictable story. There are some twists but they are not that impressive.
In his previous books Cook managed to present some strong and defined characters, but here there is no time or space to do so. Perhaps this is caused by the many viewpoints, which leave the reader less time to get into the characters. With the dramatic events that unfold it doesn’t leave that much impact.
The behaviour and actions of the characters felt sometimes odd to me, especially when one can compare some to their abilities in the previous books. Some act surprisingly weak while others show far greater skills.
Overall this is the weakest book I have read by Glen Cook. The story is still entertaining and original, but it lacks strength, has a number of minor flaws and doesn’t manage to grab hold of the reader as well as the others did, partially because he doesn’t manage to flesh out the characters sufficiently. For a fan of the Black Company this book is still a must-read, but it is a fairly stand-alone story in comparison to the other Books Of The South. I will still recommend it as it is still a better than average fantasy novel. | http://www.essord.net/2011/01/21/glen-cook-the-silver-spike/ |
514 F.Supp.2d 1172 (2007)
MOBILE HI-TECH WHEELS, Plaintiff,
v.
CIA WHEEL GROUP, Defendant.
No. CV 04-09514 SVW (RZx).
United States District Court, C.D. California.
March 20, 2007.
*1173 *1174 *1175 *1176 Edward R. Schwartz, Christie Parker & Hale, Pasadena, CA, for Plaintiff.
Duncan M. Palmatier, S.J. Christine Yang Law Offices, Fountain Valley, CA, for Defendant.
ORDER DENYING DEFENDANT'S MOTION FOR A NEW TRIAL OR JUDGMENT AS A MATTER OF LAW [164]
STEPHEN V. WILSON, District Judge.
I. INTRODUCTION
This was a patent infringement case brought by Plaintiff Mobile Hi-Tech Wheels against Defendant CIA Wheel Group. Both companies manufacture high-end wheels and rims. Plaintiff alleged that one of Defendant's wheels infringes Patent D501,173 (Vehicle Front Face) ("'173 Patent"), which was issued on *1177 January 25, 2005 to Plaintiff. The '173 patent is a design patent for a vehicle-wheel front face.[1] On February 9, 2006, the Court entered summary judgment in favor of Plaintiff that the '173 was valid, finding that genuine issues of material fact existed as to the substantial similarity of the accused infringing wheel to Plaintiffs '173 patent and as to the '173 patent's point of novelty.[2] (Order Granting in Part and Denying in Part Plaintiffs Motion for Summary Judgment, Feb. 9, 2006.) The Court found that the '173 patent was presumptively valid and that Defendant had failed to overcome this presumption of validity. (Id.)
On October 17, 2006, counsel began opening arguments in the trial. However, the Court declared a mistrial after it became apparent that issues concerning the Figures in the '173 patent needed to be resolved. Specifically, the originally issued '173 Patent contained a set of inconsistent figures. Figure 1 was a perspective view of the vehicle-wheel front face and did not contain lines representing a solid surface behind the apertures. (Id.) However, Figure 2 was a front elevational view of the design and it did contain lines representing a solid surface behind the apertures. Whether the '173 Patent was construed to claim a solid surface behind the apertures was potentially dispositive on the question of infringement because the accused device lacked a solid surface behind its apertures.
On October 27, 2006, the Court issued an Order clarifying the scope of the '173 Patent, granting Plaintiffs motion to exclude evidence regarding the validity of the '173 Patent, dismissing Plaintiffs unfair competition claim, and granting Defendant's motion to exclude evidence regarding the alleged infringement of a different patent. (Order Clarifying Patent Figures, Oct. 27, 2006.) With regard to the inconsistency in the figures, the Court ordered "that Figure 1 in the '173 patent be interpreted to include the corrected Figure 1, which has lines representing a solid surface behind the apertures." (Id. at 15.)
A second trial began on November 7, 2006. Prior to submission of the case to the jury, Defendant moved for judgment as a matter of law (JMOL) and for a new trial pursuant to Rule 50(a). (Vol III Tr: 105:18-107:18.) Defendant argued that the motion should be granted because the patent was invalid and unenforceable (Vol III Tr: 105:25-106:20.) and because the Court improperly mixed issues of claim construction with infringement. (Vol III Tr: 107:4-14.) The Court deferred ruling on Defendant's Rule 50(a) motion and submitted the case to the jury. The jury returned a verdict of infringement and awarded Plaintiff $300,000 in damages based on lost royalties.[3]
Defendant has now filed a renewed motion for JMOL pursuant to Rule 50(b), or in the alternative, a new trial pursuant to Rule 50(b) and Rule 59(a). Defendant argues that a new trial or JMOL is warranted for five reasons: (1) the '173 Patent was invalid and unenforceable as a matter of law; (2) the Court erred in carving out the functional elements; (3) the Court properly mixed issues of claim construction and infringement; (4) the evidence was *1178 insufficient, as a matter of law, to support infringement; and (5) the evidence was insufficient, as a matter of law, to support a royalty of $48.25/wheel. For the reasons discussed below, Defendant's motion is DENIED.
II. STANDARD FOR A MOTION FOR A JUDGMENT AS A MATTER OF LAW OR NEW TRIAL
Defendant renews its motion for judgment as a matter of law pursuant to Rule 50(b), or in the alternative, a new trial pursuant to Rule 50(b) and Rule 59(a). Although this is a patent case, the Court applies Ninth Circuit law for procedural issues not unique to patent law such as motions for judgment as a matter of law or a new trial. Sulzer Textil A.G. v. Picanol N.V., 358 F.3d 1356, 1363 (Fed.Cir.2004).
A. Motion for Judgment as a Matter of Law or in the Alternative, a New Trial Pursuant to Federal Rule of Civil Procedure 50
Rule 50(a) provides that a party may move for judgment as a matter of law "at any time before the case is submitted to the jury." Fed.R.Civ.P. 50(a)(2). The Court may grant the motion "if a party has been fully heard on an issue during a jury trial and the court finds that a reasonable jury would not have a legally sufficient evidentiary basis to find for the party on that issue." Fed.R.Civ.P. 50(a)(1), "Because the district judge lacks the authority to resolve disputed issues of fact under those circumstances, judgment as a matter of law is appropriate only if no reasonable jury could find for a party on that claim. This necessarily means that the court must draw all reasonable evidentiary inferences in favor of the non-moving party." Ritchie v. United States, 451 F.3d 1019, 1022-1023 (9th Cir.2006). See also Graves v. City of Coeur D'Alene 339 F.3d 828, 838 (9th Cir. 2003) ("Judgment as a matter of law is proper if the evidence, viewed in the light most favorable to the nonmoving party, permits only one reasonable conclusion."); Murphy v. F.D.I.C, 38 F.3d 1490, 1495 (9th Cir.1994) ("[w]e are required to sustain a judgment based on a jury verdict if it was supported by . . . such relevant evidence as reasonable minds might accept as adequate to support a conclusion.") (internal quotation marks omitted).
"If the court does not grant a motion for judgment as a matter of law made under [Rule 50(a)], the court is considered to have submitted the action to the jury subject to the court's later deciding the legal questions raised by the motion. The movant may renew its request for judgment as a matter of law by filing a motion no later than 10 days after the entry of judgment or if the motion addresses a jury issue not decided by a verdict no later than 10 days after the jury was discharged. The movant may alternatively request a new trial or join a motion for a new trial under Rule 59." Fed.R.Civ.P. 50(b).
The procedural prerequisite that a party move for JMOL pursuant to Rule 50(a) prior to submission of the case to a jury in order to renew its motion for JMOL after trial is a strict requirement. See Farley Transp. Co. v. Santa Fe Trail Transp. Co., 786 F.2d 1342, 1346 (9th Cir. 1986) ("the requirement that [a JMOL] motion be made at the close of all the evidence is to be strictly observed"). Thus, the failure to move for a JMOL prior to submission of the case to the jury precludes a party from bringing a renewed motion for JMOL after trial. Janes v. Wal-Mart Stores Inc., 279 F.3d 883, 886-887 (9th Cir.2002); see also Savino v. C.P. Hall Co., 199 F.3d 925 (7th Cir.1999) (failure to move for JMOL prior to submission of the case to the jury constitutes waiver of the argument post-trial); Queenie, Ltd. v. Nygard Intern., 321 F.3d 282 (2d Cir. 2003) (same); Neely v. American Family *1179 Mut. Ins. Co., 930 F.Supp. 360 (N.D.Iowa 1996) (same); Taber Partners I v. Insurance Co. of North America, Inc., 917 F.Supp. 112 (D.Puerto Rico 1996).
B. Motion for a New Trial under Rule 59
Rule 59(a) provides that "A new trial may be granted to all or any of the parties and on all or part of the issues . . . in an action in which there has been a trial by jury, for any of the reasons for which new trials have heretofore been granted in actions at law in the courts of the United States." Fed.R.Civ.P. 59(a). "The authority to grant a new trial . . . is confided almost entirely to the exercise of discretion on the part of the trial court." Allied Chemical Corp. et al. v. Daiflon, Inc., 449 U.S. 33, 36, 101 S.Ct. 188, 66 L.Ed.2d 193 (1980).
A new trial may be granted if "the verdict is contrary to the clear weight of the evidence, or is based upon evidence which is false, or to prevent, in the sound discretion of the trial court, a miscarriage of justice." Graves v. City of Coeur D'Alene 339 F.3d 828, 839 (9th Cir.2003); see also City Solutions, Inc. v. Clear Channel Communications 365 F.3d 835, 843 (9th Cir.2004) ("A new trial is warranted where the verdict is contrary to the clear weight of the evidence and the verdict results in the miscarriage of justice."); United States v. 4.0 Acres of Land 175 F.3d 1133, 1139 (9th Cir.1999) ("The trial court may grant a new trial, even though the verdict is supported by substantial evidence, if the verdict is contrary to the clear weight of the evidence, or is based upon evidence which is false, or to prevent, in the sound discretion of the trial court, a miscarriage of justice.'") (quoting Oltz v. St. Peter's Community Hosp., 861 F.2d 1440, 1452 (9th Cir.1988)). However, "a district court may not grant or deny a new trial merely because it would have arrived at a different verdict." United States v. 4.0 Acres of Land, 175 F.3d 1133, 1139 (9th Cir.1999) (citing Wilhelm v. Associated Container Transp. (Australia) Ltd., 648 F.2d 1197, 1198 (9th Cir.1981)).
III. DISCUSSION
Defendant argues that a new trial or JMOL is warranted for five reasons: (1) the '173 Patent was invalid and uneforceable as a matter of law; (2) the Court erred in carving out the functional elements; (3) the Court improperly mixed issues of claim construction and infringement; (4) the evidence was insufficient, as a matter of law, to support infringement; and (5) the evidence was insufficient, as a matter of law, to support a royalty of $48.25/wheel.
A. The '173 Patent Was Not Invalid and Unenforceable as a Matter of Law
Plaintiff introduced into evidence the originally issued version of the '173 Patent at trial. (Tr. Exh. 36.) The original version of the '173 Patent contains four figures depicting the claimed design. Figure 1 is a perspective view of the vehicle-wheel front face and does not contain lines representing a solid surface behind the apertures. (Id.) Figure 2 is a front elevational view of the design and it does contain lines representing a solid surface behind the apertures.[4] (Id.) Thus, from the face of the originally issued patent, the drawings showed two different designs one without a backplate and one with a backplate.
The Court determined that the inconsistency between Figures 1 and 2 was a *1180 clerical error that was correctable. (Order Clarifying Patent Figures, Oct, 27, 2006.) The Court ordered "that Figure 1 in the '173 patent be interpreted to include the corrected Figure 1, which has lines representing a solid surface behind the apertures." (Id. at 15.) Defendant argues that the Court erred in finding the inconsistency was correctable as a clerical error and therefore the Patent was invalid for indefiniteness.
1. History of the '173 Patent
On April 28, 2004, Plaintiff sent a design patent application for the '173 patent to the Commissioner for Patents. (Palmatier Decl. Ex. 3 at 1.) The application contains the figures at issue depicting the wheel design. (Id. at 7-9.) Figure 1 does not include lines representing a solid surface behind the apertures. (Id. at 7.) Figures 2 and 3 do contain lines representing a solid surface behind the apertures. (Id. at 8-9.)
On June 29, 2004, the Patent Examiner objected to the drawings in the application. (Id. at 12-13.) The Examiner explained:
The drawings are objected to in that the shade lines indicating a solid surface shown in the five oval apertures and the five v-shaped apertures in Figures 2-3 are not shown in Figure 1 that shows no solid structure behind the apertures. Each element of the drawings must be consistently shown among the views. Correction of the drawings is required.
(Id. at 13.) (emphasis in the original)
In response to the Patent Examiner's objections, Plaintiff filed an amendment on July 2, 2004. Plaintiff requested that the Examiner "substitute the enclosed and corrected Figure 1 for the corresponding drawing submitted with the application." (Id. at 18.) The correct Figure 1 Plaintiff submitted contained lines representing a solid surface behind the apertures. (Id. at 20.)
Despite Plaintiff's amendment, on January 25; 2005, the Patent issued by the PTO erroneously contained the original Figure 1, which does not contain lines representing a solid surface behind the apertures. (Id. at 2.)
On June 3, 2005, Plaintiff filed a Request for Certificate of Correction which asked the PTO to correct its erroneous inclusion of the original Figure One. Plaintiff explained that Figure One in the patent should have contained shaded lines representing a solid backplate:
A correction certificate, or if necessary, a corrected patent, is requested to substitute a corrected drawing of Figure 1 (copy attached) as submitted with applicant's Amendment of July 2, 2004, responsive to the Examiner's entirely correct requirement in an office action of June 29, 2004. The original incorrectly shaded version of Figure 1, as submitted with the application, was apparently inadvertently used in the issued patent.
(Ex. 36 at 32.) However, on October 9, 2006, Plaintiff filed a second Request for Certificate of Correction with the PTO. Plaintiff asserted that its previous statements and first Correction Request were mistaken. Plaintiff explained that the claimed invention should never have included the solid surface feature as part of the claimed design. (Ex. 36 at 38-39.) The following chart chronicles the set of various figures included in the '173 Patent:
EVENT FIGURE 1 FIGURE 2 FIGURE 3
Initial Application for the '173 Patent No backplate Backplate Backplate
*1181
PTO objects to the application and instructs Backplate Backplate Backplate
Plaintiff to make the drawings consistent.
Plaintiff submits the following figures:
PTO commits a clerical error and issues the No backplate Backplate Backplate
'173 Patent based on the set of drawings
contained in the initial application:
LAWSUIT FILED in March 2005
Plaintiff files for certificate of correction in Backplate Backplate Backplate
June 2005 and submits the following figures:
Plaintiff files a second certificate of correction No backplate No backplate No backplate
in October 2005 and submits the following
figures:
2. Correction of the Clerical Error
A threshold issue is whether the Court may consider Plaintiffs subsequent certificates of correction to the '173 Patent. The Federal Circuit has held that "A certificate of correction is only effective for causes of action arising after is was issued." Southwest Software, Inc. v. Harlequin Inc., 226 F.3d 1280, 1294 (Fed.Cir. 2000). Plaintiff filed this lawsuit prior to filing either of the certificates of correction. As a result, neither of the correction requests are to be given effect. Id. Instead, the Court must consider the '173 Patent as it existed at the filing of the lawsuit. As a result, the '173 Patent at issue contains inconsistent depictions of the claimed design: Figure 1 does not include lines representing a solid surface behind the apertures, while Figure 2 and 3 do contain lines representing a solid surface behind the apertures.
Faced with this inconsistency, the Court had to determine whether the inconsistency was the result of a clerical error, and if so, whether the Court had the power to correct the clerical error. With respect to utility patents, a district court has the power to correct minor typographical and clerical errors. See I.T.S. Rubber Co. v. Essex Rubber Co., 272 U.S. 429, 47 S.Ct. 136, 71 L.Ed. 335 (1926); Novo Indus. L.P. v. Micro Molds Corp., 350 F.3d 1348, 1357 (Fed.Cir.2003).[5] The Federal Circuit has limited a district court's power to correct a utility patent to situations where "(1) the correction is not subject to reasonable debate based on consideration of the claim language and specification and (2) the prosecution history does not suggest a different interpretation of the claims." Id. Defendant contends that the Court improperly applied both prongs of the Novo test.
Both parties made two assumptions by briefing whether the Court improperly applied the Novo test: (1) that the Court has the power to correct clerical errors in design patents, and (2) any correction to a design patent must be guided by the Federal Circuit's holding in Novo. These questions appear to be issues of first impression. The Court cannot locate any cases correcting an error in a design patent, and thus the Court also cannot locate any case applying Novo to a design patent. Despite the absence of any caselaw, the Court believes that the rationale for correcting clerical errors in utility patents equally applies to the context of design patents.[6] Assuming that the Court *1182 can correct such errors, it can find no reason why the requirements of Novo should not similarly apply to corrections to a design patent. In adopting the Novo standard, the Court recognizes that Novo's language cannot be literally applied. For example, Novo requires the Court to consider the "claim language and specification." In contrast to utility patents, the scope of a design patent is based on what is shown in the application drawing. In re Mann, 861 F.2d 1581, 1582 (Fed.Cir.1988). Therefore, the first prong of the Novo test must obviously be adapted to focus on the drawings rather than the claim language and specification.
Having concluded that a clerical error in design patent may be corrected if the Novo requirements are satisfied, the Court must first address the threshold issue of whether the inconsistency in the '173 Patent was a clerical error.
i. The Inconsistency between Figures 1 and Figure 2 Was a Clerical Error
The issuance of the '173 Patent with inconsistent figures was clearly a result of a clerical error. From the face of the patent, it is clear that there is an error because there is an inconsistency in the shading of Figures 1 through 3.
Plaintiffs original patent application contained inconsistent figures. On June 29, 2004, the Patent Examiner objected to this set of drawings on the grounds that Figure 1 and Figure 2 were inconsistent. In response, Plaintiff submitted a corrected Figure 1 which contained lines representing a solid surface. Rather than issue a patent containing the corrected Figure 1, (containing lines representing a solid surface) the patent office issued a patent containing the original Figure 1 (without lines). Thus, the Patent Office mistakenly issued the '173 Patent containing the set of drawings to which it had objected on June 29 rather than issuing the Patent with the corrected drawings.
Having established that there was a clerical error, the Court must apply the two prongs of the Novo to determine whether the error may be corrected. Novo, 350 F.3d at 1357.
ii. The Correction Is Not Subject to Reasonable Debate
Under the first prong of the Novo test, the Court must examine whether "the correction is not subject to reasonable debate." 350 F.3d at 1357. In its October 27 Order, this Court held that "the correction to the '173 patent is not subject to reasonable debate because no other correction is conceivable." However, Defendant contends that there is a reasonable debate concerning how the inconsistency in the Figures of the '173 Patent should be corrected.
In Novo, the alleged error involved claim 13 of a patent for window blinds. The relevant part of claim 13 stated "stop means formed on a rotatable with said support figure." Id. at 1352. Novo contended that Claim 13 contained a typographical error and suggested that it be corrected by either deleting the words "a rotatable with" or "with said." The district court agreed that there was a clerical error, and instructed the jury that the word "a" should be read as "and." Id. at 1353. The Federal Circuit held that the alleged error was not apparent "from the face of the patent." Id. at 1357. The Court noted that Novo had suggested two different interpretations of claim 13, and the Court had adopted a third interpretation. Id. The Court also explained that the prosecution history did not shed light *1183 on "what correction is necessarily appropriate or how the claim should be interpreted." Id. at 1358.
In contrast to Novo, where the contest ed phrase was subject to various possible corrections which would affect the interpretation of the patent, Figure 1 is only subject to one reasonable correction: the inclusion of the Figure 1 submitted in response to the PTO objection. In Novo, the district court had to speculate how to correct the alleged error. In contrast, no speculation is required in order to resolve the inconsistency in the '173 Patent. In light of the PTO's erroneous inclusion of a set of figures to which it had previously objected and the Plaintiff's submission of an amended Figure 1, the only reasonable correction is to construe the Patent to include the amended Figure 1. In other words, this is the rare case in which the manner of the PTO's error is clearly documented and the record presents the Court with only one method of correction.
Although none of the cases applying Novo are particularly useful because they involve utility patents, Hoffer v. Microsoft Corp., 405 F.3d 1326, 1331 (Fed.Cir.2005) presents the most analogous circumstances. In Hoffer, claim 22 of the patent referred to a dependent claim 38. Id. However, the patent lacked a claim 38, and thus the reference to claim 38 in claim 32 was unclear. Id. Although the district court found that the PTO was responsible for the error, the district court held that "it was powerless to correct the error." Id.
The Federal Circuit reversed, observing that "a patent should not be invalidated based on an obvious administrative error." Id. Applying Novo, the Federal Circuit first held that "[t]his error in dependency of claim 22 is apparent on the face of the printed patent." Id. The Federal Circuit then stated that "the [correction] is apparent from the prosecution history" and this "view is not contradicted by the prosecution history."[7]Id.
Just as the erroneous reference to a nonextant claim 38 was apparent on the face of the patent in Hoffer, the inconsistency in the drawings was apparent on the face of the '173 Patent. As discussed above, the inconsistency is only subject to one reasonable correction. Therefore, the correction is not subject to reasonable debate. Having satisfied the first prong of Novo, the Court must next analyze whether the prosecution history of the '173 suggests a different interpretation.
iii. The Prosecution History Does not Suggest a Different Interpretation of the Claims
The second, prong of Novo requires the Court to examine whether "the prosecution history does not suggest a different interpretation of the claims." Novo, 350 F.3d at 1357. Defendant raises two arguments regarding the second prong of the Novo analysis: (1) the correction is subject to reasonable debate due to the Plaintiff's Requests for Certificate of Corrections,[8] and (2) the Court's alleged failure to apply the second prong in Novo.
*1184 1. Plaintiffs Requests for Certificate of Correction
First, Defendant asserts that correction is subject to reasonable debate due to the Plaintiffs requests for certificate of corrections. Specifically, Plaintiff first requested that the '173 Patent be corrected to include the Figure 1 with shaded lines so that all of the Figures contained shaded lines.[9] However, four months later Plaintiff submitted a second request asking the PTO to instead correct Figures 2 and 3 so that none of the Figures contained shaded lines. Defendant argues that the correction must be subject to reasonable debate if the Plaintiff has taken inconsistent positions.
Defendant's argument lacks merit for two reasons. First, under Southwest, any subsequent certificates of correction cannot be considered. Although neither Southwest nor Novo expressly prohibited the Court from examining requests for certificates of correction, consideration of the certificates would contradict the Federal Circuit's rationale for not considering requests for correction.
Second, even if the Court considered Plaintiff's requests for certificates of correction, these requests do not establish that the correction is subject to a reasonable debate. Instead, Plaintiffs inconsistent requests for correction merely reflect Plaintiffs inartful trial strategy. Specifically, the attorney who prosecuted the patent, Russell Palmer, applied for the first certificate of correction after noticing the inconsistency in the '173 Patent so that Figure 1 was corrected to contain a solid metal backplate. Apparently unbeknownst to Palmer, Plaintiffs trial attorney was meanwhile arguing that the inconsistency in the '173 Patent be construed so that the design was interpreted not to contain a solid metal backplate.[10] Only weeks before trial, Plaintiffs trial attorney discovered that Palmer had applied for the certificate of correction. Realizing that the application for correction undermined his argument that the design does not include a backplate, Plaintiff applied for a second correction in attempt to disclaim the first request for a correction.
Clearly, Plaintiffs changing positions regarding the applications for" certificate of correction were driven by trial strategy rather than genuine confusion over the scope of the claimed design.[11] While Plaintiff's second request for a certificate of correction was disingenuous and may have contained misrepresentations, it does not demonstrate that a reasonable debate exists. As a result, even if Plaintiffs applications for certificates of correction are considered, the applications do not demonstrate a reasonable debate about the correction to the clerical error nor does such prosecution history suggest a different interpretation.
2. The Court's Alleged Failure to Apply the Second Prong of Novo
Defendant argues that the Court misapplied Novo because the Court failed to examine whether the prosecution history *1185 of the '173 Patent suggests a different interpretation of the claims in its October 27, 2006 order. At best, this argument is a misreading of the Court's prior order.
In the Court's October 27, 2006 order, the Court first acknowledged the two steps test of Novo. (Order Clarifying Patent Figures, Oct. 27, 2006, at 5.) After analyzing the first Novo prong, the Court proceeded to apply the second prong:
Second, the prosecution history does not suggest a different interpretation of the claim. Instead, the prosecution history is unambiguous that the '173 patent would have contained the corrected Figure 1 but for the PTO's error. Therefore, correction of the '173 patent to include the corrected Figure 1 with the lines is proper under Novo.
(Order Clarifying Patent Figures, Oct. 27, 2006, at 6.) Thus, the record clearly reflects that the Court did not fail to examine the prosecution history of the '173 Patent.
It is possible that Defendant's argument that the Court failed to examine the prosecution history stems from Defendant's disagreement over the Court's treatment of Plaintiffs requests for certificates of correction. However, as discussed above, even if the applications are considered, the Court finds that the applications do not suggest a different interpretation.
As a result, the Court did not err in determining that the inclusion of the original Figure 1 was a clerical error and properly applied the two-step Novo analysis. The error in the '173 Patent was properly corrected by interpreting Figure 1 to include lines representing a solid surface and Defendant is not entitled to a new trial or JMOL on the grounds that the '173 Patent was invalid and unenforceable as a matter of law.
B. The Court Did Not Err in Carving Out the Functional Elements
Outside of the presence of the jury, the Court heard testimony concerning the functionality of the backplate, (Vol. II Tr: 11:4-37:19; 38:1-45:22.), and heard arguments from counsel. (Vol. II Tr: 45:24-49:20.) The Court concluded that the backplate was functional and addressed the jury concerning the issue of functionality:
The question you will have to decide is whether the plaintiffs patent is infringed by defendant's product, that is, Exhibit 24. And you've heard a lot of discussion about this back plate on the plaintiff's patent. I am telling you that in comparing the plaintiffs patent to the defendant's wheel, Exhibit 24, you're not to consider the back plate. In other words, the back plate is not for you to consider. You're just to consider the other aspects of the patent as compared to the product.
(Vol. II Tr: 52:4-12.)
Defendant argues that it was legal error for the Court to "carve out" or exclude the functional features of the '173 Patent from the infringement analysis. (Def.'s Mot. At 18.) Defendant contends that to exclude features from the claim of a design patent, "those features must be shown, if at all, in broken lines." (Id.) Defendant's interpretation of patent law is mistaken. While ornamental features can only be excluded from the claim of the design patent through the use of broken lines, functional features must be excluded regardless of whether those features are disclosed through broken lines.
In Read Corp. v. Portec, Inc., 970 F.2d 816, 825 (Fed.Cir.1992), abrogated on other grounds by Markman v. Westview Instruments, Inc., 52 F.3d 967, 975 (Fed.Cir. 1995), the Federal Circuit held that "Where . . . a patented design is composed *1186 of functional as well as ornamental features, to prove infringement a patent owner must establish that an ordinary person would be deceived by reason of the common features in the claimed and accused designs which are ornamental." Applying this rule to its infringement analysis, the Federal Circuit compared "the similarity of the ornamental features of the [accused] device and the patented design." Id. at 826. This rule exists because "A design patent protects the nonfunctional aspects of an ornamental design as shown in the patent." Elmer & HTH Inc. v. ICC Fabricating, Inc., 67 F.3d 1571, 1577 (Fed. Cir.1995) (citing KeyStone Retaining Wall Sys., Inc. v. Westrock, Inc., 997 F.2d 1444, 1450 (Fed.Cir.1993)).
The Court interprets Read to require district courts to exclude functional elements of the claimed design from the infringement analysis. See also Unidynamics Corp. v. Automatic Prods. Int'l, Ltd., 157 F.3d 1311, 1323 (Fed.Cir.1998) ("In determining this overall similarity in design, the ordinary observer must be deceived by the features common to the claimed and accused designs that are ornamental, not functional."). However, Defendant asserts that the Court may only exclude functional features if those features are depicted with broken lines in the patent drawings. Defendant's assertion results from a misreading of several Federal Circuit cases. Although select quotations from these cases seemingly support Defendant's interpretation, a closer examination of these cases reveals that Defendant's position completely lacks support in the caselaw.
First, Defendant quotes Elmer & HTH, Inc. v. ICC Fabricating, Inc., 67 F.3d 1571 (Fed.Cir.1995) in support of its argument. In Elmer, the Federal Circuit reviewed the district court's denial of ICC's JMOL that it did not infringe the design patent at issue. Id. at 1575. The patent claimed an "ornamental design for a vehicle top sign holder, as shown and described." Id at 1577. The design for the sign included "triangular vertical ribs and an upper protrusion." Id. On appeal, the Plaintiff contended that the vertical ribs and upper protrusion were functional rather than ornamental features. Id. The Federal Circuit observed that "HTH could have omitted these features from its patent application drawings. HTH did not do so, however, and thus effectively limited the scope of its patent claim by including those features in it." Id.
Defendant refers to this quotation in support of its proposition that functional features cannot be excluded unless the exclusion is contained in the drawings through the use of broken lines. However, Defendant's interpretation of Elmer is mistaken because the Federal Circuit concluded the vertical ribs and upper protrusion were ornamental features rather than functional features. Id. ("The claimed design, as indicated above, is limited to a vehicle sign having, inter alia, triangular vertical ribs and an upper protrusion. ICC's sign lacks these ornamental features.") As a result, the Federal Circuit merely held that ornamental features, namely the ribs and protrusion, could not be excluded from the infringement analysis because these ornamental features were not excluded from the patent application drawings. Thus, Elmer did not address the exclusion of functional features.
Similarly, Defendant asserts that in Door-Master Corp. v. Yorktowne, Inc., 256 F.3d 1308, 1313 (Fed.Cir.2001), "the defendants argued that certain features of the patent were functional and should be excluded from [sic] scope of the claimed design . . . [and][t]he Federal Circuit held that features not shown in broken lines are part of the claimed design." (Def.'s Mot. at 17.) Door-Master involved patents for *1187 doors and door frames. Defendant Yorktowne urged the court to construe the patent claims so that the rear features of the patent were not part of the protected design. Id. at 1313. First, the Court noted that the patentee had not shown the rear features in broken lines which would have excluded the features from the patented design. Id. Even though Defendant represents that the failure to show features in broken lines should be the end of this Court's inquiry, the Federal Circuit did not end its inquiry with this observation. Instead, the Federal Circuit next analyzed whether the rear features were functional. Id. Having concluded that the rear features were not functional, the Court finally concluded that "the rear features are proper bases for design protection in the [patent]." Id.
Thus, similar to Elmer, Door-Master involved ornamental features rather than functional features. Door-Master merely held that ornamental features could not be excluded from the infringement analysis if such ornamental features were not excluded from the patent application. Moreover, the Federal Circuit's consideration of whether the features were functional after noting that the features were not depicted with broken lines demonstrates that functional features can be excluded even if such features are not depicted with broken lines. Specifically, the Federal Circuit's analysis' of whether the features were functional would have been irrelevant if the failure to depict the features with broken lines were sufficient to preclude exclusion. Therefore, the Federal Circuit's two-step analysis in Door-Master contradicts Defendant's theory.
Defendant similarly relies on Contessa Food Prods., Inc. v. Conagra, Inc., 282 F.3d 1370 (Fed.Cir.2002) in support of its argument that functional elements can only be excluded through the use of broken lines. In Contessa, the Federal Circuit stated that "in the `ordinary observer' analysis, the patented design is viewed in its entirety, as it is claimed. If features appearing in the figures are not desired to be claimed, the patentee is permitted to show the features in broken lines to exclude those features from the claimed design, and the failure to do so signals inclusion of the features in the claimed design." Id. at 1378 (internal citations omitted). Viewed in isolation, this statement seemingly supports Defendant's position. However, similar to Elmer and Door-Master, the Federal Circuit's analysis in Contessa involved ornamental features rather than functional features. Specifically, the Federal Circuit criticized the district court for failing to consider "the ornamental appearance" of certain features of the accused product in comparing the product to the patented design. Id. The Federal Circuit explained that "all of the ornamental features illustrated in the figures must be considered in evaluating design patent infringement." Id. Thus, in the quotation from Contessa which Defendant cites, the word "features" refers to ornamental features rather than functional features. As a result, Contessa merely reinforces the holdings of Elmer and Door-Master that ornamental features can not be excluded from the infringement analysis if such ornamental features were not excluded from the patent application. Contessa did not involve functional features, and therefore does not support the proposition that functional features can only be excluded through the use of broken lines.
Finally, Defendant cites L.A. Gear, Inc. v. Thom McAn Shoe Co. et al., 988 F.2d 1117 (Fed.Cir.1993) for the somewhat different proposition that "A design is considered in its entirety and not by individual elements." (Def.'s Mot. At 16.) While Defendant's statement is accurate in the context of determining the validity of *1188 the design patent, L.A. Gear does not address the issue 4 whether a design should be considered in its entirety when engaging in an infringement analysis. In L.A. Gear, the defendants asserted that the patent at issue was invalid because the design was functional.[12]Id. at 1123. In arguing that the design was functional, the defendants argued that each element of the patented design has a utilitarian purpose. Id. The Federal Circuit observed that "the utility of each of the various elements that comprise the design is not the relevant inquiry." Id. The Federal Circuit recognized that although individual elements serve functional purposes, that "does not mean . . . [that] the combination of these elements into the patented design is dictated by primarily functional considerations." Id. As a result, the Federal Circuit concluded that the design was primarily ornamental and that the patent was not invalid on the ground of functionality. Id. at 1123-24. Thus, the rule from L.A Gear applies to a validity analysis, but L.A. Gear is silent on how the Court should conduct an infringement analysis. As a result, L.A. Gear does not suggest that the Court erred in excluding the functional elements from the infringement analysis.
Defendant's argument that functional features can only be excluded by broken lines finds no support in the caselaw, and few cases explicitly state that Read compels a district court to exclude functional elements from an infringement analysis. However, the handful of courts to have addressed this precise issue support this Court's approach. For example, in Sunbeam Prods., Inc. v. Wing Shing Prods. (BVI) Ltd., 311 B.R. 378 (2004), the district court explained that to evaluate infringement, "the original claimed design, as a whole as encompassed by the ornamental features but not the functional features is compared against the improved or allegedly infringing design, also as a whole." See also Black & Decker (U.S.) Inc. v. Pro-Tech Power Inc., 26 F.Supp.2d 834, 859 (E.D.Va.1998) (criticizing an expert's methodology of employing "a side-by-side comparison of the functional as well as nonfunctional differences between the two saws, instead of evaluating the overall visual impression created by the ornamental features of each product standing alone.").
In sum, Defendant's claim that the Court can only exclude functional features if those features are shown in broken lines finds no support in the caselaw. While ornamental features can only be excluded from the claim of the design patent through the use of broken lines, functional features must be excluded regardless of whether those features are disclosed through broken lines. Therefore, the Court did not err in excluding the functional feature of the '173 Patent.
C. The Court Did Not Improperly Mix Issues of Claim Construction and Infringement
Defendant argues that the Court must grant a new trial because the Court improperly mixed issues of claim construction and infringement before the jury.
While the Court did not construe the '173 Patent prior, to trial,[13] delaying claim construction until trial is not error because "the district court has considerable latitude in determining when to resolve issues of claim construction." CytoLogix *1189 Corp. v. Ventana Medical Systems, Inc., 424 F.3d 1168, 1172 (Fed.Cir.2005); see also Vivid Technologies, Inc. v. American Science & Engineering, Inc., 200 F.3d 795, 803 (Fed.Cir.1999) ("the stage at which the claims are construed may vary with the issues, their complexity, the potentially dispositive nature of the construction, and other considerations of the particular case."); Sofamor Danek Group v. DePuy-Motech. Inc., 74 F.3d 1216, 1221 (Fed.Cir. 1996) (holding that the timing of claim construction is within the trial court's discretion). The only limitation on the district court is that the patent claims must be construed before the jury is instructed so that the Court can explain the scope of the claims to the jury. See Exxon Chem. Patents v. Lubrizol Corp., 64 F.3d 1553, 1555 (Fed.Cir.1995).
When a district court does not construe the patent prior to trial, the Federal Circuit has held that it is improper for the jury to hear argument and testimony concerning claim construction:
[B]y agreement the parties also presented expert witnesses who testified before the jury regarding claim construction, and counsel argued conflicting claim constructions to the jury. This was improper, and the district court should have refused to allow such testimony despite the agreement of the parties. The risk of confusing the jury is high when experts opine on claim construction before the jury even when, as here, the district court makes it clear to the jury that the district court's claim constructions control.
CytoLogix, 424 F.3d at 1172.
Defendant argues that the Court's refusal to construe the patent prior to trial made it difficult for Defendant to devise a trial strategy and prejudiced Defendant. Defendant also contends that issues of claim construction and infringement were improperly mixed before the jury, first during the Court's "surprise interruption" of Defendant's opening statement, and later during Plaintiffs elicitation of testimony on claim construction from one of Plaintiffs experts.
1. The Court's Decision to Delay Resolution of Claim Construction Did Not Prejudice Defendant
Defendant contends that the Court's refusal to construe the patent prior to trial made it difficult for Defendant to devise a trial strategy. For example, Defendant argues that it did not know whether to focus its defense on the backplate or other dissimilarities between the '173 Patent and Defendant's design. This argument lacks merit for two reasons. First, the Court has substantial discretion in determining when to resolve issues of claim construction. See CytoLogix, 424 F.3d at 1172; Vivid Technologies, 200 F.3d at 803; Sofamor Danek, 74 F.3d at 1221. Based on consideration of multiple factors, including the lack of complexity of the claim, court resources, and availability of the witnesses, this Court deferred resolving the issue of claim construction until trial.
Second, even if it were error to delay resolving the issue of whether the backplate was functional or ornamental, it was harmless error because Defendant was not prejudiced. Federal Rule of Civil Procedure 61 provides that a motion for a new trial should not be granted based on harmless error:
No error in either the admission or the exclusion of evidence and no error or defect in any ruling or order or in anything done or omitted by the court or by any of the parties is ground for granting a new trial or for setting aside a verdict or for vacating, modifying, or otherwise disturbing a judgment or order, unless refusal to take such action appears to the court inconsistent with substantial *1190 justice. The court at every stage of the proceeding must disregard any error or defect in the proceeding which does not affect the substantial rights of the parties.
Fed.R.Civ.P. 61. "In other words, a new trial is not justified if an error was harmless." Casumpang v. International Longshore & Warehouse Union, Local 142, 411 F.Supp.2d 1201, 1214 (D.Hawai'i 2005). The party asserting the error had the burden of proving that substantial rights were violated by the alleged error. Howard v. Gonzales, 658 F.2d 352 (5th Cir.1981); Sam Miller Bag Co. v. Burlington Northern, Inc., 641 F.2d 607 (8th Cir.1981); Creekmore v. Crossno, 259 F.2d 697 (10th Cir.1958).
Defendant has failed to show that substantial rights were violated because no prejudice resulted from the delay in claim construction. Although Defendant implies that it was forced to conduct the entire trial without knowing how the Court would resolve the backplate issue, the Court resolved the issue at an early point in the trial. Following opening statements and testimony from one witness, Rick Pruden, the Court heard evidence on claim construction outside the presence of the jury. First, the Court heard testimony from Arthur Hale, Jr., (Vol. II Tr: 11:4-37:19.), and Paul Kim (Vol. II Tr: 38:1-45:22.) concerning the functionality of the backplate. The Court then heard arguments from counsel for both parties. (Vol. II Tr: 45:24-49:20.) The Court recessed to reflect on the testimony and arguments. When court resumed, the Court ruled that the backplate was functional. (Vol. II Tr: 49:25.) The jury was then brought back in, and the Court addressed the jury concerning the issue of functionality:
The question you will have to decide is whether the plaintiff's patent is infringed by defendant's product, that is, Exhibit 24. And you've heard a lot of discussion about this back plate on the plaintiff's patent. I am telling you that in comparing the plaintiffs patent to the defendant's wheel, Exhibit 24, you're not to consider the back plate. In other words, the back plate is not for you to consider. You're just to consider the other aspects of the patent as compared to the product.
(Vol. II Tr: 52:4-12.)
Defendant subsequently cross-examined all of Plaintiff's other witnesses (besides Pruden) and presented its own case-in-chief. Thus, from an early point in the trial, Defendant had notice that it should focus on dissimilarities between the '173 Patent and Defendant's design other than the backplate because the backplate was excluded from the infringement analysis. It is disingenuous for Defendant to suggest that its trial strategy was hampered by uncertainty where Defendant knew the backplate was a non-issue before (1) cross-examination of all but one of Plaintiff's witnesses, and (2) presentation of its own case-in-chief, and (3) closing arguments. Moreover, to the extent that Defendant claims it was precluded from questioning Pruden about the backplate, no prejudice resulted because ultimately the backplate was a non-issue for the infringement analysis. As a result, Defendant has failed to demonstrate that substantial rights were violated even assuming that the delay in resolving the claim construction issue constituted error.
2. The Court's "Surprise Interruption" of Defendant's Opening Statement
Prior to selecting a jury, the Court held a hearing with the parties "to make sure that both sides understand the parameters of the trial and the rulings." (Vol. 1 Tr: 4:12-14.) The Court explained that "there is the question of whether the backplate is ornamental or functional." (Vol. 1 Tr:5:23-24). The Court explained *1191 that whether the backplate is ornamental or functional is ("for the court to decide, and at the appropriate time, the court will make that decision and inform the jury.") (Vol. 1 Tr:5:24-6:1.)
During Defendant's opening statement, Defendant's counsel described the ordinary observer test for infringement. (Vol. 1 Tr:45:5-21.) Defendant's counsel explained that "it's going to be up to you to try to decide, according to the testimony you've heard, whether an ordinary observer would regard the Fatal wheel that we sell as substantially the same as the patented design." (Vol. 1 Tr: 45:8-11.) This was a valid description of the ordinary observer test.
However, Defendant's counsel proceeded to emphasize that the '173 Patent depicted a solid surface behind the wheel, while Defendant's Fatal Wheel lacked such a solid surface:
[Plaintiffs product has a] solid surface behind these holes. So that is going to be the focus of a lot of your deliberations in this case . . . And you're going to hear the witnesses say, well, the Fatal wheel doesn't have any solid surface behind these holes. There's no dispute there. And you will have to come to the conclusion, can somebody see a wheel that's a normal wheel with holes in it and get confused with a spinner design that has a solid surface behind it and think they're the same thing. That's what this case is about. Could someone, an ordinary observer, make that sort of confusion. And that's where you're going to have to go in your deliberations.
(Vol. 1 Tr: 45:2-21.)
At this point, the Court was compelled to interject. The Court had previously warned counsel that the question of whether the backplate is ornamental or functional remained undecided and the court would make that decision at the appropriate time. By emphasizing the backplate was the crucial part of the infringement analysis, Defendant risked prejudicing the jury's view of the '173 Patent and the Fatal Wheel before the Court instructed the jury on how to apply the ordinary observer test. Given this risk, the Court was compelled to comment on the backplate to mitigate any prejudice:
Let me just interrupt for a moment because I think it may be important to clarify something, and this is not to take issue at all with counsel, because what he is saying, I think, is correctly previewing the defense side of the case. But ultimately, a decision will have to be made as to whether this so-called solid-part in back of the wheel, the backplate, is functional or a design. And that's something that the court, not you, will have to decide at some point. If the court decides that the backplate is functional, then the fact that there is a backplate on plaintiffs patent and not on the alleged infringing design will not be something that you will consider in comparing the patent with the infringing product. If on the other hand the court decides that the backplate is not functional, that is, it is part of the design, then, as Mr. Palmatier has explained, that will be something that you will have to consider in determining whether there is substantial similarity.
(Vol. 1 Tr: 45:22-46:15.)
Defendant contends that the Court's instruction that "[Defendant's] principal noninfringement defense could later be barred . . . made it impossible for [Defendant] to defend itself without prejudice." (Def.'s Mot. at 25.) However, the Court's statement did not prejudice. Defendant in any conceivable manner because the Court correctly stated the law, and the instruction was consistent with the subsequent jury instructions.
*1192 Defendant's objection to the statement appears to derive from a concern that the Court improperly mixed claim construction and infringement analysis through this comment. However, the record demonstrates that the Court's comments did not involve claim construction. While the Court recognized that the claim construction would determine whether the backplate were functional, the Court's instruction was directed at the question of infringement. Specifically, Defendant's comment that the backplate "is what this case is about" improperly suggested that the infringement analysis should focus on the backplate. This was an improper statement of law because the Court had not yet determined whether the backplate would be included in the ordinary observer test. As a result, a preliminary instruction regarding infringement was necessary to mitigate any prejudice caused by Defendant's statement.[14] Therefore, this limited instruction did not constitute the improper mixing of claim construction and infringement because the instruction focused solely on infringement.
3. Plaintiffs Elicitation of Testimony on Claim Construction
Defendant asserts that the Court erred in permitting Plaintiff to elicit testimony on the subject of claim construction before the jury.
i. Pruden's Single Comment Does Not Rise to the Level of CytoLogix
Plaintiffs first witness[15] was Rick Pruden. Pruden is a vice president for Plaintiff and created the design that resulted in the 173 Patent. During the direct examination, Plaintiffs counsel elicited testimony from Pruden concerning the backplate:
Q: You said that [Plaintiff's] floater spinner wheel has a backplate or back surface behind the vehicle wheel front surface?
A: Yes. This design and any other spinner or floater.
Q: Okay. Is there a purpose to it? Why do you use that?
A: When we first developed a spinner or a floater, we were very concerned about children putting their finger in there in a driveway and spinning it, actually cutting their fingers off, and that has happened sir.
[Defense Counsel]: Objection
The Court: What ground?
[Defense Counsel]: This is a question of law for the court.
The Court: Overruled. You can proceed.
A: Thank you, sir. So we put a solid surface behind the design to ensure that we don't have somebody losing a finger.
(Vol. I. Tr: 62: 22-63:13.)
Defendant asserts that this comment by Pruden constituted the presentation of *1193 claim construction issues before the jury necessitating a new trial. However, under CytoLogix a single comment does not constitute improper presentation of claim construction warranting a new trial.
In CytoLogix, both parties presented expert witnesses who testified before the jury regarding claim construction. The Federal Circuit explained that "the conflicting expert views as to claim construction created confusion and may have led to a verdict of infringement with respect to the asserted claims of the [patent] that was not supported by substantial evidence under the district court's claim construction." 424 F.3d at 1173.
The present case is distinguishable from CytoLogix in two respects. First, this Court did not permit multiple experts to testify regarding claim construction. In fact, it is arguable whether Pruden's comment should be construed as claim construction testimony because Pruden did not testify about how he believed the claim should be construed. Instead, Pruden discussed a function of the backplate. While the comment relates to claim construction, it differs substantially from an expert opinion concerning how a patent should be construed.
Second, Pruden's comment could not have created confusion and created a verdict of infringement that was not supported by substantial evidence. In CytoLogix, the conflicting expert claim constructions may have confused the jury when it attempted to apply the district court's claim construction. In contrast, no such confusion could have existed in the present case because Pruden's comment was consistent with the Court's subsequent claim construction. As a result, Pruden's comment could not have caused the jury to reach a verdict of infringement which was' not supported by substantial evidence. Therefore, under CytoLogix, a single comment does not constitute improper presentation of claim construction warranting a new trial.
ii. Even If the Isolated Comments Were Improper, the Error Was Harmless
Even if Pruden's comment constituted the improper presentation of claim construction, its admission is harmless error in light of the Court's ruling that the backplate was functional. As explained above, an error is harmless unless it affects the substantial rights of the parties. Fed.R.Civ.P. 61. The party asserting the error had the burden of proving that substantial rights were violated by the alleged error. Howard, 658 F.2d 352; Sam Miller Bag Co., 641 F.2d 607; Creekmore, 259 F.2d 697.
Defendant has failed to show that substantial rights were violated by the admission of Pruden's statement. As previously explained, Pruden's statement concerning the functionality of the backplate was consistent with the Court's subsequent claim construction. In contrast to CytoLogix, where jurors were potentially confused by differing claim constructions, there was no risk of confusion in this case because the jurors were only exposed to a single claim construction. In addition, any potential confusion was mitigated by the Court's previous instruction to the jury that it was solely the Court's duty to construe the claim. See (Vol. 1 Tr: 45:22-46:15.)
Defendant has failed to point to any other potential prejudice resulting from Pruden's comment. Therefore, Defendant has failed to meet its burden of demonstrating that substantial rights, were violated. "[A] new trial is not justified if an error was harmless." Casumpang, 411 F.Supp.2d at 1214. Even if admission of Pruden's comment constituted error, a new trial is not warranted because the error was harmless.
*1194 In sum, neither the delay in claim construction until trial, nor the Court's interruption of Defendant's opening statement, nor the admission of Pruden's comment concerning the functionality of the backplate constitute error warranting a new trial.
D. The Evidence Was Not Insufficient to Support Infringement
Defendant argues that the evidence was insufficient, as a matter of law, to establish infringement. (Def.'s Mot. at 20.) Defendant asserts that several of Plaintiff's witnesses identified differences between the '173 Patent and Defendant's device including the convex versus concave shape of the wheels, the number of simulated rivets, and the size of the apertures, spikes and center cap. (Id.) Defendant contends that such small differences compel a finding of non-infringement as a matter of law.
Defendant's argument that it is entitled to JMOL on infringement pursuant to Rule 50(b) was waived due to Defendant's failure to move for JMOL pursuant to Rule 50(a) prior to submission of the case to a jury. See Farley, 786 F.2d at 1346; Janes, 279 F.3d at 886-887 (9th Cir.2002). However, a new trial may be granted if "the verdict is contrary to the clear weight of the evidence," Graves, 339 F.3d at 839 and there is no requirement that a motion for a new trial be made prior to submission of the case to the jury. Therefore, the Court will analyze whether the verdict of infringement was contrary to the clear weight of the evidence for the purpose of determining whether Defendant is entitled to a new trial.
1. Legal Standard for Infringement of a Design Patent
In determining whether an accused design infringes a design patent claim, a court must compare the patented design to the accused design. This comparison involves two tests, both of which must be satisfied in order to find infringement. The first is the "ordinary observer" test, which "requires comparison of the two designs from the viewpoint of the ordinary observer to determine whether the patented design as a whole is substantially the same as the accused design." Lawman Armor Corp. v. Winner International, LLC, 437 F.3d 1383, 1384 (Fed.Cir. 2006). The second test is the "points of novelty" test, under which a court must determine whether "the accused design appropriates the novelty which distinguishes the patented design from the prior art." Contessa, 282 F.3d at 1377(citing Litton Systems, Inc. v. Whirlpool Corp., 728 F.2d 1423, 1444 (Fed.Cir.1984)). Infringement of a design patent is a question of fact. Catalina Lighting. Inc. v. Lamps Plus, Inc., 295 F.3d 1277, 1287 (Fed.Cir.2002).
i. Step 1: Ordinary Observer Test
In applying the ordinary observer test, the Supreme Court held that "if, in the eye of an ordinary observer, giving such attention as a purchaser usually gives, two designs are substantially the same, if the resemblance is such as to deceive such an observer, inducing him to purchase one supposing it to be the other, the first one patented is infringed by the other." Gorham Co. v. White, 81 U.S. 511, 528, 14 Wall. 511, 20 L.Ed. 731 (1871). To apply the test correctly, the Court must not break the patented design into its individual ornamental elements but instead should examine the patented design as a whole. Amini Innovation Corp. v. Anthony California, Inc., 439 F.3d 1365, 1371 (Fed.Cir.2006). Exact identity between the patented design and the accused design is not required. Brooks, 393 F.3d at 1383.
*1195 ii. Step 2: Points of Novelty Test
The points of novelty test requires proof that the accused design appropriates the novelty which distinguishes the patented design from the prior art. Litton Sys., Inc. v. Whirlpool Corp., 728 F.2d 1423, 1444 (Fed.Cir.1984). If the accused product does not contain the novelty, there can be no infringement as a matter of law even if the ordinary observer test is satisfied.
Plaintiff contended that the point of novelty in the design was the "spoke outer ends having a deep inward v-cut with an oval cut inwardly from the v-cut." Defendant contended that the plaintiff's design has two points of novelty: (1) "a solid surface shown in the five oval apertures and the five v-shaped apertures," and (2) "see through v-shaped openings in the inwardly directed radial spikes."
2. Application of the Infringement Test
Defendant correctly asserts that several of Plaintiff's witnesses identified differences between the '173 Patent and Defendant's device. Even if the Court disagreed with the jury's verdict, "[t]he court is not free to set aside a verdict merely because it would have ruled differently, or believes that the jury should have drawn different inferences and conclusions." Maxwell v. J. Baker. Inc., 875 F.Supp. 1371, 1378 (D.Minn.1995). Instead, the Court is limited to analyzing whether "the verdict is contrary to the clear weight of the evidence," Graves, 339 F.3d at 839.
Having reviewed the record, the Court cannot conclude that the verdict is contrary to the clear weight of the evidence. The jury returned a special verdict form which asked the jury five questions. The first question asked the jury whether plaintiff "has proved by a preponderance of the evidence that defendant's accused FATAL wheel satisfies the ordinary observer test?" (Special Verdict Form, Nov. 13, 2006.) The jury answered yes. (Id.) The second question asked the jury whether plaintiff "has proved by a preponderance of the evidence that defendant's accused FATAL wheel satisfies the point of novelty test?" (Id.) The jury answered yes. (Id.) Preceding question three, the special verdict form contained the following instruction: "If you answered YES to BOTH questions 1 and 2, then Defendant's FATAL wheel infringes Plaintiffs '173 patent and you must answer YES to question 3. If you answered NO to EITHER question 1 or 2, then Defendant's FATAL wheel does not infringe Plaintiff's patent and you must answer NO to question 3." (Id.) (emphasis in original). Question three asked "Does Defendant's FATAL wheel infringe Plaintiffs '173 patent?" The jury answered yes. (Id.)
Evidence was presented at trial which supported the jury's findings that defendant's accused FATAL wheel satisfies the ordinary observer test and the point of novelty test. Plaintiffs witnesses Pruden and Hale both identified similarities between the '173 Patent and Defendant's design and testified that the similarities might result in consumer confusion. See (Vol. I. Tr. 66:9-68:17; 144:18-25 Pruden testimony); (Vol. II. Tr. 142:16-143:2.) (Hale testimony). Plaintiffs witnesses Pruden, Hale, and Palmer also provided testimony supporting a jury finding that Defendant's wheel satisfied the ordinary observer test. See (Vol. I. Tr. 138-139; 146-147) (Pruden testimony); (Vol.II. Tr. 139-141.) (Hale testimony); (Vol. I. Tr. 161-162:.; Vol. II. Tr. 54-71.) (Palmer testimony). Thus, evidence was presented at trial supporting the jury's finding of infringement.
Defendant is correct in asserting that various witnesses identified differences between the wheels such as the number of *1196 simulated rivets and the sizes of the apertures and spikes, see, e.g., (Vol. I. Tr: 126:11-12, 121-126; Vol. II. Tr. 94:3-9, 150:12-15, 122-128, 149-163.). However, "Winder Gorham, the focus is on the overall ornamental appearance of the claimed design, not selected ornamental features." Elmer, 67 F.3d at 1578. As demonstrated by the testimony of Plaintiffs witnesses, as well as a side-by-side comparison of the '173 Patent and the accused device, there was a substantial visual similarity in overall appearance between the '173 Patent and accused device. Thus, despite differences in selected ornamental features, there was sufficient evidence for the jury to find infringement. As a result, the Court concludes that the verdict of infringement was not contrary to the clear weight of the evidence.[16]
E. The Evidence Was Not Insufficient to Support a $48.25/wheel Royalty
The jury awarded Plaintiff $300,000 in lost royalty damages. This award equals a royalty of $48.50 per wheel sold. Defendant argues that it is entitled to judgment as a matter of law on the royalty amount because "[t]he grossly large size of the jury's $300,000 award in comparison to MHT's admitted royalties makes the damage award unreasonable as a matter of law." (Def.'s Mot. at 24.)
Defendant's argument that it is entitled to JMOL pursuant to Rule 50(b) was waived due to Defendant's failure to move for JMOL pursuant to Rule 50(a) prior to submission of the case to a jury. See Farley, 786 F.2d at 1346; Janes, 279 F.3d at 886-887 (9th Cir.2002). However, a new trial may be granted if "the verdict is contrary to the clear weight of the evidence," Graves, 339 F.3d at 839, and there is no requirement that a motion for a new trial be made prior to submission of the case to the jury. Therefore, the Court will analyze whether the award of a $48.25/ wheel royalty was contrary to the clear weight of the evidence for the purpose of determining whether Defendant is entitled to a new trial on the issue of damages.
Plaintiffs witness, Art Hale, testified that Plaintiff had licensed one of its wheel designs for "like $75 a wheel." (Vol.II. Tr. 146:2-8.) Hale also testified that he would have tried to license the '173 Patent design to Defendant for between $50 and $100 a wheel. (Vol.II. Tr. 146:25-147:6.) Based on this testimony, Plaintiff argued that the jury should award a reasonable royalty between $50 and $100 per wheel. Although Plaintiffs royalty evidence was somewhat vague, the Court finds that there was sufficient evidence to support the jury's finding of a $48.25/wheel royalty. Therefore, the Court concludes that the jury's award of a $48.50/wheel royalty was not contrary to the clear weight of the evidence.
III. CONCLUSION
For the foregoing reasons, Defendant's motion for judgment as a matter of law or a new trial is DENIED.
IT IS SO ORDERED.
NOTES
[1] A "vehicle-wheel front face" is more commonly referred to as a customized or decorative wheel-rim.
[2] The Hon. Ronald S.W. Lew denied the motions for summary judgment. The case was subsequently reassigned to the Hon. Stephen V. Wilson on September 22, 2006.
[3] A special jury verdict was returned in favor of Plaintiff. The jury found: (1)(2)(3)(4)(5). (Special Jury Verdict in favor of Plaintiff, Nov. 13, 2006.)
[4] Figure 3 is an alternative embodiment of the design in which the front face of the wheel rim is rotatable with respect to the rim. (Id.) Figure 4 is a side elevational view of both embodiments. (Id.)
[5] The Supreme Court's decision in Essex precedes the enactment of 35 U.S.C. §§ 254 and 255. which provide for corrections of mistakes by the patentee. However, the Federal Circuit held that "nothing in the enactment of either section 255 or 254 suggests that Congress intended to overrule Essex or to deny limited correction authority to the district courts." Novo, 350 F.3d at 1355,
[6] In Essex, the Supreme Court justified correction of the clerical error by stating that the correction "is not in any real sense, a remaking of the claim; but is merely giving to it the meaning which was intended by the applicant and understood by the examiner." 272 U.S. at 442, 47 S.Ct. 136.
[7] Specifically, "The patent application as filed and as prosecuted contained independent claim 38 and dependent claim 39. During prosecution both claim 38 and claim 39 were allowed, but some earlier claims were cancelled. In preparation for printing, the examiner renumbered claim 38 as claim 21, and renumbered claim 39 as claim 22. However, the examiner did not make the corresponding change in the text of claim 22. Thus although claim 39 was renumbered as claim 22, the internal reference to claim 38 was not changed." 405 F.3d at 1331.
[8] While framed in the language of the first Novo prong, this argument actually falls within the second prong of the Novo test, because it relates to the prosecution history of the patent.
[9] In other words, Plaintiff asked the PTO to include the Figure 1 which Plaintiff submitted in response to the initial PTO objection.
[10] Plaintiff's attorney apparently wanted to argue that the design lacked a solid metal backplate because the presence of the backplate would likely make it more difficult to prove infringement under the ordinary observer test.
[11] Similarly, Defendant's argument that a reasonable debate exists is driven by strategic concerns rather than an objective evaluation of the '173 Patent. Specifically, Defendant does not want the patent corrected because it wants to utilize the inconsistencies between Figure 1 and Figure 2 to argue that the patent is invalid.
[12] "A design patent is directed to the appearance of an article of manufacture . . . If the particular design is essential to the use of the article, it cannot be the subject of a design patent." L.A. Gear, 988 F.2d at 1123.
[13] Specifically, the Court had not determined whether the solid backplate depicted in the '173 Patent was functional or ornamental prior to trial.
[14] Additionally, the Court notes that it is somewhat disingenuous for Defendant to object to this instruction because Defendant's deliberate conduct prompted the instruction. Throughout the litigation, Defendant repeatedly expressed displeasure, with the Court's decision to construe claim construction until trial, Defendant's counsel's comment that the backplate "is what this case is about," in disregard of the Court's admonition that it had not yet determined whether the backplate was functional or ornamental, appeared to be a deliberate attempt to cause another mistrial. Although Defendant's comments did not warrant a mistrial, an instruction was clearly necessary to mitigate any prejudice.
[15] Plaintiff first called Norberto Chavez for the sole purpose of authenticating defendant's wheel that he purchased and Plaintiff wished to admit as Exhibit 24. (Vol. I. Tr: 48:22-24.) Even though Chavez was sworn in, Chavez never testified because Defendant testified to the wheel's authenticity. (Vol. Tr: 49:1-3.) As a result, Chavez never testified. Therefore, the Court refers to Pruden as Plaintiff's first witness.
[16] Whether or not this Court would have arrived at a different verdict is irrelevant because "a district court may not grant or deny a new trial merely because it would have arrived at a different verdict." United States v. 4.0 Acres of Land, 175 F.3d 1133, 1139 (9th Cir.1999) (citing Wilhelm v. Associated Container Transp. (Australia) Ltd., 648 F.2d 1197, 1198 (9th Cir.1981)).
| |
A new study has found that the benefits of antipsychotic drugs outweigh the risks of any negative side effects. Photo by chuck stock/Shutterstock
May 5 (UPI) -- Columbia University researchers have found antipsychotic medications do not have negative long-term effects on patients with schizophrenia and other disorders.
Researchers from Columbia in collaboration with colleagues from the United States, Germany, The Netherlands, Japan, China and Austria found the benefits of antipsychotic medications are much greater than their side effects.
Antipsychotic medications are prescribed to alleviate the symptoms of psychosis and to prevent possible relapse. Concerns have been raised recently about possible toxic effects, which could negatively impact long-term outcomes.
So researchers set out to examine the safety and effectiveness of long-term antipsychotic use to treat schizophrenia.
"The evidence from randomized clinical trials and neuroimaging studies overwhelmingly suggests that the majority of patients with schizophrenia benefit from antipsychotic treatment, both in the initial presentation of the disease and for longer-term maintenance to prevent relapse," Dr. Jeffrey Lieberman, professor and chairman of psychiatry at Columbia University College of Physicians and Surgeon and director of the New York State Psychiatric Institute, said in a press release. "Anyone who doubts this conclusion should talk with people whose symptoms have been relieved by treatment and literally given back their lives."
The research revealed that delaying or withholding treatment was associated with poorer long-term outcomes.
"While a minority of patients who recover from an initial psychotic episode may maintain their remission without antipsychotic treatment, there is currently no clinical biomarker to identify them, and it is a very small number of patients who may fall into this subgroup," Lieberman said. "Consequently, withholding treatment could be detrimental for most patients with schizophrenia."
The study was published in the American Journal of Psychiatry.
| |
VIDEO: Rajul Pandya-Lorch explains food security means today. Recorded at authors’ workshop in Ottawa in October 2011. (English only)
Our understanding of agriculture and its links to food security has greatly evolved during the past half-century. Thinking in the 1950s and 1960s focused on agriculture as being simply a source of staple foods such as maize, wheat, and rice. Today it is viewed as the means to meet satisfy food security, including food availability, access, and human nutrition and health.
This goal is threatened by shocks, such as volatile food prices and financial crises, climate change and volatile weather, floods and earthquakes, and conflicts. Such shocks appear to have become more frequent and disproportionately affect poor countries, communities, and people, impacting their food and nutrition security.
Resilience in agriculture is hearty crops that thrive even in poor-quality soil and water. It is also farmer managing risks and rural families with secure livelihoods.
In response to this barrage of shocks, the international community is increasingly turning to the concept of resilience. Resilience is a systems-oriented way of helping people, communities, countries, and global institutions prevent, anticipate, prepare for, cope with, and recover from shocks. Not only to bounce back to where they were before, but become even better-off.
Applied to agriculture, resilience is understood in different ways. Resilient agriculture can be crops that are able to withstand weather variability and extremes, and thrive even with limited or low-quality soil and water. It can also be smallholder farmers having access to instruments for managing risks. And it can be rural families having access to diverse and nutritious diets, quality healthcare, and secure livelihoods. Essentially, resilience ensures that a one-off shock does not translate into long-term despair. Finally, resilience can be a global food system with efficient and well-regulated trade that can protect countries and regions from globalizing shocks.
As 2015 begins, and the world considers new Sustainable Development Goals to guide investment priorities and actions, the concept of resilience seems to offer a way not only to address the challenges raised by shocks, but also continue to transform agriculture in still more virtuous and useful ways. | http://www.developmentideas.ca/2015/01/resilience-in-agriculture/ |
Materials science and engineering (MSE) focuses on understanding the structure, properties and behavior of materials. Society demands new and improved materials with capabilities far superior to common metals, polymers and ceramics used in products such as high-speed transportation systems, surgical and dental implants, new generations of power plants and solid-state electronic devices in computer and communication technology. Both the development of new materials and the understanding of present-day materials demand a thorough knowledge of basic engineering and scientific principles, including crystal structure, elastic and plastic behavior, thermodynamics, phase equilibria, and reaction rates and physical and chemical behavior of engineering materials.
Materials scientists and engineers study phenomena that are found in many different engineering operations, from fracture behavior in automobiles to fatigue behavior in aircraft frames; from corrosion behavior in petro-chemical refineries to radiation-induced damage in nuclear power plants; and from the fabrication of steel to the design of semiconductors. Materials scientists and engineers are increasingly involved in developing the new materials needed to attain higher efficiencies in existing and proposed energy conversion systems. They will also play a central role in developing new technologies based on composites and high-temperature superconductivity.
The small size of the department allows students to get to know world-class researchers in an intimate setting and form tight-knit relationships with their peers while having all the resources of a large research university. Since materials science and engineering has such broad applications, undergraduate students in the department have the opportunity to study and collaborate with faculty and students in other engineering disciplines as well. The materials science and engineering program at UC Davis is accredited by the Engineering Accreditation Commission of ABET.
Contact an undergraduate advisor to learn about life at UC Davis and the many different paths you can take within the major.
Resources
Material Sciences and Engineering Degree Requirements: | https://mse.engineering.ucdavis.edu/undergraduate/materials-science-and-engineering-major |
Climate Change is a long term process where the earth's climate evolves due to many factors. Warming is the average temperature across the entire planet; local areas can have temporary periods where they get colder. Factors for climate change include effects from the Sun, ocean currents, naturally occurring weather patterns, effects from the biology itself on our planet - and from human activities as well.
The risk to us all is that human activities are increasing; the load we are putting on the atmosphere is getting worse each year, not better. The science has shown that it is already too late to avoid the part of climate change that we have caused; now we have to try to at least slow it down, and we have to learn to live in a warming world.
Computer models have become much more sophisticated. The same modeling techniques are used when scientists do other work in medicine, modeling nuclear explosions, and so on.
Warming temperatures will melt glaciers, the poles, and the ice of greenland resulting is rising sea levels.
Not all effects will be bad - as the poles melt, this will free up new, usable land.
Poor nations will suffer most; richer nations care less because their extensive resources maintain their quality of life.
To get a more detailed understanding of climate change, read the Wikipedia articles on Global Warming and a second article, on Climate Change. | http://www.manmadeclimatechange.com/blog/category/climate-scientists |
Star Trek may have told us that space is humanity’s final frontier, but plenty of uncharted hinterland remains unexplored within the human brain. And scientists at Oxford University recently discovered an area of the brain that contributes to make humans, well, human.
The walnut-sized area, nestled within the frontal cortex, is called the lateral frontal pole. It’s responsible for planning and decision-making and, according to the new findings, has no equivalent in the monkey brain. Researchers thus believe this brain region might be responsible for humans’ upper hand in tasks that require strategic planning, decision-making and multitasking.
Exploring the Brain
The researchers compared MRI images of humans’ and macaques’ ventrolateral frontal cortex, a region of the brain that controls language and complex thought processes. Surprisingly, they found that the region was wired up in much the same way between the species. But the striking difference was the lateral frontal pole.
Oxford senior researcher Matthew Rushworth explained the significance of the finding in a statement Tuesday:
“We tend to think that being able to plan into the future, be flexible in our approach and learn from others are things that are particularly impressive about humans. We’ve identified an area of the brain that appears to be uniquely human, and is likely to have something to do with these cognitive powers.”
The research team published its findings in the journal Neuron.
Battling Psychiatric Disease
Parts of the larger ventrolateral frontal cortex are implicated in conditions such as ADHD, drug addiction, and compulsive disorders. Language is affected when parts of the area are damaged due to stroke or neurological diseases.
Thus, a deeper understanding of this territory will help scientists learn more about the changes that occur in the brain due to disease and damage. Karl Zilles, a neuroscientist at the Institute for Neuroscience and Medicine in Germany, told The Guardian that the study is a significant step forward in the study of psychiatric disease: | https://www.discovermagazine.com/mind/brain-area-for-decision-making-and-planning-is-uniquely-human |
The Swordsmith Village Arc is Demon Slayer: Kimetsu no Yaiba‘s ninth arc. The arc began when Tanjiro traveled to the Swordsmith Village to replace his sword after Hotaru Haganezuka had had enough of repairing it.
Table of Contents
What is The Swordsmith Village?
Swordsmith Village is a hidden village where all swordsmiths live. To go to the settlement, a Demon Slayer must be transported by many Kakushi and Kasugai Crows while blindfolded.
It is unclear when the village was established, but the manga mentions that it had existed for approximately 300+ years before the story happened,
The village is home to the swordsmiths who make the Nichirin Swords for corps members, which is why it is hidden well inside the forest. To keep the location of the village secret, travelers must ride blindfolded while being piggybacked by multiple Kakushi. In addition to being a “workshop,” the area also has multiple hot springs that are used by swordsmen for their healing properties.
Many members of the village wear hyottoko masks to conceal their identities in order to protect themselves from being tracked.
Swordsmith Village Residents:
- Tecchin Tecchikawahara (Chief)
- Hotaru Haganezuka
- Kozo Kanamori
- Yoriichi Type Zero
- Kotetsu
- Tetsuido
Spoiler Alert
WARNING: The following contains spoilers for Demon Slayer: Kimetsu no Yaiba.
The Swordsmith Village Arc Story:
Two months after the death of Upper Rank 6, the story begins. After two months in a coma, Tanjiro awoke. After a few days of recovery, Aoi told that Hotaru Haganezuka was tired of repairing Tanjiro’s sword. Therefore, he will no longer repair it.
So Tanjiro travels to the Swordsmith Village with the help of Goto in order to replace his sword. As Tanjiros’ nose is so sharp, he is not only blind filled but also wears nose plugs made of plastic.
When he arrives, he is immediately taken to the village head, Tecchin Tecchikawahara. He informs Tanjiro that Hotaru has recently gone missing. He then takes Tanjiro to the village’s hot springs to assist his body to recuperate.
In the hot springs, he finds Mitsuri Kanroji, the love hashira, and Genya Shinazugawa, another demon slayer. After spending some time with Mitsuri, she informs him that there is a secret weapon concealed in the hamlet that strengthens individuals. Tanjiro momentarily considers what it is. After a short stroll through the woodland, he encounters the mist Hashira, Muichiro Tokito disputing with a child.
Yoriichi Type Zero
From afar, he notices that he is begging for a key and that he ends up beating the child. Tanjiro leaps in to stop the Hashira, but he is hit and faints as a result.
He awakens a few seconds later to hear that the youngster ended up handing Muichiro the key to force him to go. The key, he claims, is used to activate a doll known as Yoriichi Type Zero, which is used to train swordsmen since its might is greater than that of a person.
Muichiro trains with it and breaks it a few times, including severing one of its six limbs off. This devastates the youngster, Kotetsu. Tanjiro goes to train with the doll after soothing him, and Kotetsu offers to teach Tanjiro how to fight better.
Tanjiro, who has spent a lot of time practicing, accidentally slices the doll’s head off, revealing a 300-year-old sword. They each take out the sword, only to find it rusty from lack of usage for so long. Hotaru and Kozo Kanamori step in at this point, totally covered in muscle. Hotaru takes the sword from Tanjiro and says he’ll take care of the rust and that it’ll be his new weapon.
Upper Rank Appears
Tanjiro spends the night with Genya but he is summoned and ejected by Genya Shinazugawa. In the middle of bathing, a random swordsmith saw a vase and decided to inspect it. But it turned out it was a demon, Gyokko of Upper-Rank Five accompanied by Hantengu of Upper-Rank Four set off to destroy the village. Muichiro awakens Tanjiro and inquires about Kozo Kanamori’s whereabouts.
Hantengu, an Upper-Rank Four demon, appears, much to everyone’s surprise. While Tanjiro and the others are doing their own thing, Hantengu appears and causes mayhem. The struggle between Tanjiro Kamado, Nezuko Kamado, Genya Shinazugawa, and Mitsuri Kanroji versus Hantengu begins now.
Muichirou has blasted away, and while attempting to return and assist the others, he comes into Gyokko, a member of the Upper-Rank Five, tormenting the Swordsmiths. Muichiro Tokito versus Gyokko is another fight going on at the same time.
Battles & Events:
- Tanjiro Kamado, Nezuko Kamado, Genya Shinazugawa, and Mitsuri Kanroji versus Hantengu
- Muichiro Tokito vs. Gyokko
- Genya’s demonification skills are demonstrated.
- Muichiro and Mitsuri unlock their Demon Slayer Marks, while
- Nezuko becomes sun resistant.
FAQ
Will the Swordsmith Village Arc be in Demon Slayer Season 3?
Demon Slayer season 2 adapt the Entertainment District Arc of the manga; set in Yoshiwara’s red-light district. Currently, it is not officially announced, but if it does not become a movie, then this arc will definitely be a season 3.
Why this Arc will be a movie?
Swordsmith Village Arc would be better off as a movie because it would compensate for Zenitsu and Inosuke’s absences. Tanjiro’s friends and fellow demon slayers are not present throughout this arc of the manga.
In demon slayer, why does the swordsmith wear a mask?
Hyottoko masks are commonly worn by villagers in order to conceal their identities, so they can avoid being tracked. | https://animementor.com/demon-slayer/swordsmith-village-arc/ |
A settlement agreement is invariably the product of negotiations – sometimes straightforward; other times, highly protracted. Without prejudice (WP) privilege protects written communications made during those negotiations from being disclosed so that if the negotiations fail, those communications cannot be used against the parties later on during litigation.
If the negotiations succeed though, and a settlement agreement is concluded, that agreement is not covered by WP privilege (and the WP offer which led to the settlement also ceases to be privileged, because it forms part of the contract).
A recent case has now held that other WP communications also cease to be privileged if they are referred to in the settlement agreement.
In BGC Brokers v Tradition (UK) Ltd, the claimant settled with one of the co-defendants. The settlement agreement included a warranty and representation that the co-defendant had made full disclosure in certain communications between him and the claimant before the settlement agreement was concluded. The agreement also expressly provided that the communications retained WP privilege, although the parties could waive that privilege in future if the co-defendant breached a term of the agreement.
A redacted copy of the settlement agreement was supplied to the other defendants, but they sought inspection of the communications referred to in the agreement. This was resisted on the basis that those communications were covered by WP privilege.
What did the court decide?
The Court of Appeal found that those communications were not covered by WP privilege when they were incorporated (by reference) into the settlement agreement. Although the original communications remained privileged, when they were repeated in the settlement agreement the status of those communications "radically changed". That was because otherwise the claimant would be unable to sue the co-defendant for the separate potential claim of breach of warranty relating to the contents of those communications.
Comment
This decision might be said to be a continuation of the principles referred to above regarding the settlement offer and agreement. But statements made during a negotiation (which have not yet been proven to be false) might be damaging in a way that the amount of the settlement (which only reflects what the party was prepared to settle for and not what the value of the claim was) might not be.
This puts a party entering into a settlement agreement with only one co-defendant or co-claimant in a difficult position. That party will want to be able to sue the party it settled with if it turns out it only entered into the settlement on the basis of false statements made during the negotiations. But if those statements are referred to in the agreement itself, they will become disclosable to third parties in any future litigation with those third parties.
A balancing exercise will therefore need to take place, with a party weighing up how likely it is that it will want to sue over any false statements with how damaging the disclosure of those statements to third parties might be. | https://www.osborneclarke.com/insights/cautionary-tale-drafting-settlement-agreements/ |
For those who enjoy an active vacation, we have lots of suggestions in Napoli. Use our Travel Guide as a source of inspiration for planning your next adventure and browse through descriptions and route details of the most beautiful hikes.
2D 3D
Maps and trails
The 10 Most Beautiful hikes in Napoli
Hiking Route · CampaniaSentiero degli Dei
Premium content Difficulty moderate
9.4 km
4:00 h
694 m
1,300 m
The Sentiero degli Dei or the "Way of the Gods" is the most famous hiking trail on the Amalfi Coast and one of the most beautiful trails in Italy.
Hiking Route · ItalyTourist trail up Vesuvius
Premium content Difficulty easy
3.3 km
1:00 h
159 m
154 m
It is a must for tourists in the Gulf of Naples to climb Mount Vesuvius and look down into the vent. In good weather, the best view over the whole gulf with the islands of Capri and Ischia.
Hiking Route · ItalyAuf dem Weg der Götter
recommended route Difficulty moderate
10 km
5:30 h
734 m
1,154 m
Höhenwanderung hoch über dem Meer mit fantastischen Blicken auf die Küsten- und Berglandschaft von Praiano bis zur Insel Capri. Man wandert durch eine Felslandschaft und über schön geschwungenen Terrassen.
Hiking Route · ItalyAuf dem Vesuv
recommended route Difficulty easy
3.6 km
0:45 h
177 m
177 m
Bei dieser Kurzwanderung beeindrucken nicht nur die Blicke in den Vulkanschlund, sondern auch die Rundumsicht über den Golf von Neapel bis zu den Kuppen des Appenin.
Hiking Route · ItalyAmalfiküste, Pogerola - Agerola (bzw. Bomerano), Tag 5
recommended route Difficulty moderate
10.2 km
4:35 h
1,125 m
801 m
Pogerola - Amalfi Hafen - Lone - San Lazzaro - San Michele - Bomerano - Agerola
Hiking Route · ItalyAmalfiküste, Agerola - Positano (bzw. San Pietro), Tag 6, Sentiero Degli Dei
recommended route Difficulty easy
10.5 km
4:47 h
840 m
1,347 m
Agerola - Sentiero Degli Dei - Nocelle - Positano - San Pietro
Hiking Route · ItalyTermini - Sorrento, Amalfiküste Tag 8
recommended route Difficulty moderate
12 km
3:54 h
317 m
584 m
Termini - Monte San Constanzo - Massa Lubrense - Sorrento
Hiking Route · CampaniaDa Amalfi a Positano aggirando l'Altopiano di Agerola
recommended route Difficulty moderate
21.6 km
9:30 h
1,450 m
1,450 m
Monti Lattari e Costiera Amalfitana: Amalfi, Pogerola, Sentiero dei Castagneti di Tavernate, Ammarrata Imbarrata, Colle Sughero, Capo Muro, Caserma Forestale, Montepertuso e arrivo a Positano.
Hiking Route · CampaniaDa Positano a Sorrento passando per Punta Campanella
recommended route Difficulty difficult
36 km
13:00 h
2,100 m
2,250 m
Monti Lattari e Penisola Sorrentina: Positano, sentiero CAI 333a fino all’immissione nell’Alta Via dei Monti Lattari, Croce dei Due Golfi, Castello Colonna, Torca, Spiaggia di Recommone, Marina del Cantone, Monte San Costanzo, Punta Campanella, Termini e arrivo a Sorrento.
Hiking Route · ItalyTour zum Palazzo di Tiberio auf der Insel Capri
recommended route Difficulty moderate
8.6 km
3:45 h
472 m
472 m
Aussichtsreiche Rundwanderung durch schöne Gärten und malerische Villenviertel. Römische Relikte und ein imposanter Felsbogen an der wilden Felsenküste setzen dieser Tour die Krone auf.
Weren't able to find what you were looking for? | https://www.outdooractive.com/en/hikes/napoli/hikes-in-napoli/3494591/ |
This complex project offers numerous lines of interpretation. The house, sitting above many others in this Alpine hamlet, is a defining element in this composite landscape of buildings and nature.
The steep slope is a critical element in the design, but it is just one of numerous themes and comparisons that run through the complex. There is a return to the origins and characteristics of such Alpine constructions, with an interpretation of the relations between buildings in a mountain village. Layers of essential elements in the building are evident and part of the dynamic of place and living, tradition and current trends. This tall stone building adopts a consistent approach to material, becoming a reference point for the valley. It is a structure that lends itself to both recovering and revising how we live in a building. The
annex adjacent to the stone house is a truly complementary structure. Originally it was a haybarn - the tabià as it used to be called in the Alps -, but now it has been fully converted into a living unit, with its own specific traits, placed harmoniously next to the main house through the choices about size, shape and materials. The project focuses on and expands these intersections. The Gianìn house should be seen as a whole, made up of living spaces that gain meaning through harmonious juxtaposition. They are clearly different, but also draw on the same project design. The overall goal was to sensitively work with a wealth of content in developing mutual relationships between the buildings, and in skilfully integrating refurbishment, replacement and extension.
The main building is solid and sturdy, having
kept the original volume. It acts as a landmark in the landscape, with traditional stone practically prevailing over windows. The four floors are organised into two separate living units, with the necessary changes. Each of them is two floors, with independent entrances (for the lower apartment, the entrance is on the side; for the upper one - almost a loft - it faces the mountain). The functional division of the two apartments is almost a mirror image. On the lower level, the living area is on the ground floor, while in the other apartment the living area is on the top floor. Plentiful larch wood for the floors and the recovered beams gives the interior spaces a cosy feel.
The adjacent building is a single living unit, with its own clear character and emphasis on the materials used. It consists of three floors, with a narrow
rectangular plan, positioned at a slight angle to the main building.
The project defines distinctive elements: a very solid base, opening onto the valley to the south through a large glazed wall that offers a sweeping view of the landscape; a honeycomb structure made of larch wood on the southern façade, a visual allusion to the traditional haybarns used in the Alps; the seamless panelling with larch wood on the western façade that is broken up only by a few elongated diamond-shaped openings, to provide light for the windows behind.
Screens protect from the sun and filter light, creating interesting patterns in the interiors that are by and large dominated by the wood used for flooring, walls and stairs. The screened wall facing south hides a double height loggia that the living area and bedroom open
onto. For each of the three levels, with the long and narrow layout, the key room - be it the living room or the master bedroom - overlooks the valley, through the double height loggia or directly. The overhang, which is the loggia, offers shelter for the transition space between the outdoors and the ground floor, a small larch platform.
This complex displays strong expressive and interpretative values, with the clear mark of the integration between the natural and built landscape, in a truly sensitive design. | https://www.theplan.it/eng/webzine/italian-architecture/en-gian%C3%ACn-house |
Meanwhile, JLL is also in the process of selling a development parcel zoned for 32,000 square feet in NoHo, at 363 Lafayette St. The site allows for commercial space, but JLL's marketing materials suggest that a variance could be secured allowing for residential space to be built. The site is also a strong location for boutique office and retail space.
Lastly, the owner of a property on the Upper West Side at 200 Amsterdam Ave. has put it on the block with an asking price of more than $400 million. Zoning would allow for the tallest building in the neighborhood, a 388,000-square-foot, 600-foot residential tower. CBRE is marketing the property and notes that the tower enjoys protected views of Central Park.
By 2006, the synagogue had outgrown its original building, 200 Amsterdam Avenue, at West 69th Street. It struck a deal with American Continental Properties, a development company. They agreed to a land swap — 180 Amsterdam for 200 Amsterdam — under which the synagogue would gain a site for a new building, designed by CetraRuddy, and about $20 million to help finance the project. The developer would gain a site for a new apartment tower that would replace the old synagogue.
In odd contraption, Curious George-yellow and several stories high, raised some eyebrows when it appeared last week outside 200 Amsterdam Avenue, the former site of the Lincoln Square Synagogue. Since the synagogue moved a few hundred feet South, its old site has sat empty — and has increasingly become an eyesore — as locals await an expected development.
The machine, accompanied by a trough of dirty water, is the first evidence that construction is not far away. Contractors have told our tipsters that they are drilling to determine the bedrock’s depth, though they said they don’t know who is paying for the tests. Offices of the developer, the architects, and the zoning consultants have all either not yet responded, declined to comment, or said they “do not disclose” construction information.
Councilwoman Helen Rosenthal’s office also hasn’t responded to our inquiries. There are no active work permits for 200 Amsterdam Avenue – and any activity appearing to be construction-related must be reported to the Department for inspection, according to a communications rep at the Department of Buildings.
As such, details about the new building’s due date, its height (last we heard it could be 600 feet tall) and whether plans will be subject to public scrutiny, remain obscure.
However, what we do know is that if construction involves at least bedrock exploration, it’s likely the blueprint will not outline intentions for a two-story boutique or bodega. Bedrock drilling is typically reserved for skyscraper architecture, as a steel skeleton bored deeper in the earth ensures security for an otherwise wobbling height.
SJP Properties, in partnership with Mitsui Fudosan America, just closed on the purchase of a large development site at 200 Amsterdam Avenue, according to sources familiar with the transaction. Zoning allows for a 600-foot-high residential tower of nearly 400,000 square feet, and the partners intend to build luxury condominiums on the site.
When reached by phone late Thursday, SJP president Allen Goldman confirmed the purchase. He declined to comment on the purchase price, but sources familiar with the deal said it closed for close to $750 per buildable square foot, or nearly $300 million.
The condo project between West 69th and West 70th streets, Goldman said, will cater to New Yorkers and families from the suburbs looking to downsize and move into the city. The design, he added, would be “highly contextual with the architecture of the Upper West Side,” and the property boasts protected views of Central Park.
The seller, according to property records, was American Continental Properties. Founded by Daniele Bodini, the firm has substantial holdings in the neighborhood, and was represented in the deal by CBRE’s Darcy Stacom, Bill Shanahan and Paul Leibowitz. In January, CBRE began marketing the property, the former home of the Lincoln Square Synagogue, asking north of $400 million.
The 55-story project is slated to be the tallest building on the Upper West Side, a neighborhood where new condo product fetched an average price of $1,898 per square foot during the third quarter of the year, according to Halstead Property Development Marketing.
Manhattan–based SJP, led by Steven Pozycki, has developed over 25 million square feet of office and residential space since 1981. It recently sold a noncontrolling interest in 11 Times Square to Norges Bank.
Mitsui Fudosan America, the U.S. investment arm of Japanese development firm Mitsui Fudosan, paid more than $250 million in December for a large stake in Related Cos. 55 Hudson Yards. The firm’s other holdings in the city include 1251 Sixth Avenue at Rockefeller Center and 160 Madison Avenue.
Japanese lender Sumitomo Mitsui Trust Bank provided Steven Pozycki’s SJP Properties with a $160 million mortgage for a property on Amsterdam Avenue between West 69th and West 70th Streets on the Upper West Side in Manhattan, city records show.
Proceeds of the loan, which closed on Feb. 18, are being used to fund the acquisition of the 5,000-square-foot lot at 208 Amsterdam Avenue, also known as 200 Amsterdam Avenue. Mitsui Fudosan America—the U.S. investment arm of Japanese real estate firm Mitsui Fudosan Co.—and Mr. Pozycki’s real estate development firm scooped up the property for $275 million back in October 2015 from American Continental Properties, according to property records.
The new ownership is constructing a 51-story, 112-unit luxury residential condominium tower at the site, a spokeswoman for SJP confirmed, but would not comment further.
The structure of the old Lincoln Square Synagogue, which was built in 1965, is still on the Amsterdam Avenue site. The synagogue moved to its new location down the street at 180 Amsterdam Avenue between West 68th and West 69th Streets in 2013, according to its website.
Mr. Pozycki founded SJP in 1981 and currently has 20 buildings under management. In 2014, the firm completed The Modern, a 47-story, 900-unit rental building in Fort Lee, N.J. In Manhattan, SJP developed 45 Park Avenue, a 22-story, 106-unit luxury condo in Murray Hill, and the Platinum, a 43-story, 220-unit condo at Eighth Avenue and West 46th Street in the Theater District.
A representative for Mitsui Fudosan declined to comment, and a representative for Sumito Mitsui did not immediately respond to inquiries.
Just a mass model for a proposal in East Harlem along the waterfront. I forget the name but we have a thread I believe floating around here somewhere for it. Either that or its in the compilations but I remember seeing it. One of those numerous large scale housing projects thats floating in the pipeline. Similar projects planned for the Bronx and in Queens along the East River. It'll turn up eventually. The boom is so large that if it wasn't for recent news, something like 200 Amsterdam would of been lost. And its 600 feet too!
Quote:
Originally Posted by yankeesfan1000
Just never ends…. It's unbelievable.
I agree. If you want to get an idea of what ssp would look like if it was only NYC based for projects 15 floors or greater, look at the list at YIMBY forums.
For under construction, we have 184 threads of projects all 20 floors or greater. We have 426 proposals, all greater than 20 floors. Enough to fill probably this whole site with 20 plus pages of just construction and or proposals in each sub forum. The focus for that site is purely NYC, but it shows the need for compilations here. The boom is madness.
And the idea that a 600 or even 800 foot tower gets lost here is a testament to how much is going on. In a lot of cities, 600 feet is a big deal. Here, its forgettable.
Demolition of the old synagogue at 200 Amsterdam is proceeding slowly. The building is tightly sealed and there are asbestos removal warning signs posted on the building. So I assume it will be a while before the site is cleared and ready for new construction.
The lower blocks of the Upper West Side have given rise to a sprinkling of skyscrapers in recent years, from the Fordham redevelopment to 200 West 67th Street. And now, YIMBY has the reveal for 200 Amsterdam Avenue, which will rise 666 feet to its roof, becoming the tallest building on the Upper West Side.
The site originally held a synagogue,. It was acquired for $275 million in 2015 by SJP Properties and since then the developer has landed $160 million in financing from Mitsui Fudosan.
| |
Increasing temperatures under climate change are thought to affect individual physiology of fish and other ectotherms through increases in metabolic demands, leading to changes in species performance with concomitant effects on species ecology. Although intuitively appealing, the driving mechanism behind thermal performance is contested; thermal performance (e.g. growth) appears correlated with metabolic scope (i.e. oxygen availability for activity) for a number of species, but a substantial number of datasets do not support oxygen limitation of long-term performance. Whether or not oxygen limitations via the metabolic scope, or a lack thereof, have major ecological consequences remains a highly contested question. size and trait-based model of energy and oxygen budgets to determine the relative influence of metabolic rates, oxygen limitation and environmental conditions on ectotherm performance. We show that oxygen limitation is not necessary to explain performance variation with temperature. Oxygen can drastically limit performance and fitness, especially at temperature extremes, but changes in thermal performance are primarily driven by the interplay between changing metabolic rates and species ecology. Furthermore, our model reveals that fitness trends with temperature can oppose trends in growth, suggesting a potential explanation for the paradox that species often occur at lower temperatures than their growth optimum. Our model provides a mechanistic underpinning that can provide general and realistic predictions about temperature impacts on the performance of fish and other ectotherms and function as a null model for contrasting temperature impacts on species with different metabolic and ecological traits. | https://orbit.dtu.dk/en/publications/thermal-performance-of-fish-is-explained-by-an-interplay-between- |
Isolation and characterization of a DNA primase from human mitochondria.
A family of enzymatic activities isolated from human mitochondria is capable of initiating DNA replication on single-stranded templates. The principal enzymes include at least a primase and DNA polymerase gamma and require that rNTPs as well as dNTPs be present in the reaction mixture. Poly(dC) and poly(dT), as well as M13 phage DNA, are excellent templates for the primase activity. A single-stranded DNA containing the cloned origin of mitochondrial light-strand synthesis can be a more efficient template than M13 phage DNA alone. Primase and DNA polymerase activities were separated from each other by sedimentation in a glycerol density gradient. Using M13 phage DNA as template, these mitochondrial enzymes synthesize RNA primers that are 9 to 12 nucleotides in size and are covalently linked to nascent DNA. The formation of primers appears to be the rate-limiting step in the replication process. Replication of M13 DNA is sensitive to N-ethylmaleimide and dideoxynucleoside triphosphates, but insensitive to rifampicin, alpha-amanitin, and aphidicolin.
| |
“The Prime Mover” is a cute and amusing episode of The Twilight Zone. Though mostly unremarkable, this installment should be praised for utilizing comedic subject matter to teach a valuable life lesson.
Pros
By realistically conveying the desperation of a gambling addict, actor Dane Clark strengthens the credibility of an otherwise fantastic premise. Note that in addition to risking everything on a foolish bet, Ace repeatedly shuts out his fiancée and best friend, even going so far as to ignore Jimbo’s headaches (a consequence of using telekinesis too often) whenever money is at stake—a convincing, albeit disturbing, depiction of compulsive behavior.
Also excellent is the character of Jimbo, who serves as a compelling (if frequently ignored) moral compass for Ace. Similar to his performance on The Beverly Hillbillies, Buddy Ebsen portrayed Jimbo with a great deal of small-town charm, thereby allowing the audience to relate with him despite the implausible nature of his talent.
Cons
The levitation effects in this episode are a tad silly, at least by modern-day standards.
Analysis
A simple but commendable cautionary tale, “The Prime Mover” employs quirky humor in conjunction with science fiction elements to warn of the dangers of habitual gambling.
Concluding Comments
The first episode of The Twilight Zone to feature actress Christine White (the second being “Nightmare at 20,000 Feet”), “The Prime Mover” contains a worthwhile narrative for the whole family to enjoy. Nevertheless, the twist ending will hardly come as a surprise to the majority of viewers.
Overall Quality: 8/10
If you enjoyed this post, please enter your email address in the subscription box to stay tuned for more updates.
| |
NGO’s call for establishment of an international mechanism on loss and damage
Warsaw, Poland: Today, the organisations ActionAid, CARE and WWF released a report at the UN climate conference in Warsaw detailing the establishment of an international mechanism on loss and damage, which aims to inform parties who are discussing it right now.
According to the three organisations, progress has been painfully slow since the decision to include loss and damage in the global climate negotiations was taken in Cancun in 2010. But in Doha last year, parties took a major step towards considering the establishment of an international mechanism on loss and damage. Now it is time to fulfil the Doha decision. Tackling the Climate Reality, calls for parties in Warsaw to fulfil this promise.
“The experience of Philippines with Super Typhoon Haiyan is surely evidence that we are in the throes of an impending crisis. Thousands of people died and still suffer, despite the Philippines investing a lot in disaster preparedness and adaptation. The lack of serious attention to both mitigation and adaptation is pushing the world into the third era of climate governance, where the two pillars of adaptation and mitigation are no longer sufficient to respond to the challenge of climate change,” said Sven Harmeling, Climate Change Advocacy Coordinator of CARE International.
“We need to establish the international mechanism here in Warsaw to deal with the unprecedented challenges we are facing. The mechanism is not just about providing finance to recover from climate change impacts that cannot be adapted to. It is also about generating knowledge and finding new ways to deal with non-economic losses such as loss of biodiversity, indigenous knowledge, human mobility, cultural heritage, ancestral burial sites, and so on,” said Harjeet Singh, International Coordinator – disaster risk reduction and climate adaptation of ActionAid. “The report emphasizes the moral duty and legal obligation of developed countries to help tackle the climate reality,” Singh said.
“We are concerned about the lack of concerted action taken by developed countries to tackle climate change to date. We are also concerned about the future which might see a sharp increase in global temperature, with drastic consequences for poor people’s livelihoods and ecosystems. We are losing ground – in every way possible. This must be avoided through ambitious action on mitigation globally. Those who are the most responsible must take the lead role instead of behaving as if we had decades to act. We don’t have any time to lose,” said Sandeep Chamling Rai, WWF’s senior advisor for Adaptation Policy.
While the discussions tick along, climate change impacts are happening at a more rapid rate than ever, with grave consequences for the poorest and most vulnerable people, as they struggle to deal with lost lives, assets, livelihoods, as well as invaluable resources like entire eco-systems.
Collectively, we are calling for:
Governments meeting in Warsaw to establish an international mechanism to help deal with this unprecedented climate change loss and damage;
A Standing Body on loss and damage to be established and commence work immediately after COP19;
Operationalization of the international mechanism by COP21 in France, 2015; and
Developed countries parties to increase their mitigation ambition and support for adaptation immediately
| |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
0001 1. Field of the Invention
0002 The present invention relates to an SOI (silicon on insulator) structure wafer obtained by a method wherein an ion-implanted wafer is bonded to another wafer and a portion of the ion-implanted wafer is delaminated (separated) to provide an SOI wafer (called a smart-cut method). More particularly, the present invention relates to a method of fabricating an SOI wafer having an active SOI layer which is excellent in thickness uniformity, and an SOI wafer having an active SOI layer which is excellent in thickness uniformity.
0003 2. Description of the Related Art
3
2
1
2
4
1
1
2
a
h
b
a
c
d
e
f
g
h
0004 Recently, a method of fabricating an SOI wafer in which an ion-implanted wafer is bonded to another wafer and a portion of the ion-implanted wafer is delaminated to provide an SOI wafer (hereinafter, occasionally referred to as an ion implantation and delamination method) has attracted attention. In this method, as shown in FIGS. () to (), an oxide film is formed on the surface of at least one of two silicon wafers (FIG. 3()), which are a bond wafer to form an SOI layer and a base wafer to be a supporting substrate (FIG. 3()); hydrogen ions or rare gas ions are implanted into the bond wafer in order to form a fine bubble layer (enclosed layer) within the bond wafer (FIG. 3()); the ion-implanted wafer is superposed on the base wafer such that the ion-implanted surface comes into close contact with the surface of the base wafer via the oxide film (FIG. 3()); heat treatment is then performed to delaminate a portion of the bond wafer as a thin film with using the fine bubble layer as a delaminating plane (FIG. 3()); heat treatment is further performed to firmly bond the wafers to each other (FIG. 3()), which are then subjected to mirror polishing (FIG. 3()) to thereby obtain an SOI wafer (FIG. 3()) (See Japanese Patent Application Laid-Open (kokai) No. 5-211128).
1
2
0005 The above-mentioned method can be roughly classified into two methods depending on the wafer on which an oxide film is formed. In one of them, Method A, the oxide film is formed on the base wafer as shown in FIG. 3(A), and in the other of them, Method B, it is formed on the bond wafer as shown in FIG. 3(B). Method B wherein the oxide film is formed on the bond wafer in advance has been performed mainly.
0006 Because, the depth of ion implantation varies widely due to a channeling effect, when the oxide film is not formed on the bond wafer in which ions are to be implanted, and as a result, thickness uniformity of the SOI layer may be lowered.
0007The channeling effect means herein a phenomenon wherein ions implanted parallel to the crystal axis of the crystalline material pass zigzag between the atoms of the crystal. In that case, the deviation in the ion implantation depth is larger, compared to the case that the ions are implanted nonparallel to the crystal axis. The phenomenon is apt to occur particularly in a silicon wafer, since the surface thereof is processed in a certain orientation (for example, <100>). Accordingly, it is preferable to form the oxide film on the wafer to suppress the channeling effect in that case.
0008 Another reason why the oxide film should be formed on the bond wafer is that the oxide film previously formed on the bond wafer may suppress diffusion of impurities incorporated in the bonded surface (boron in atmosphere or metal impurities due to ion implantation) into the active layer (SOI layer), and therefore, degradation of crystallinity of the SOI layer and electronic characteristics can be prevented.
0009 When the channeling effect is not caused, deviation (standard deviation) of the ion implantation depth in the ion implantation and delamination method can be 0.4 nm. Namely, 31.2 nm can be achieved, so that almost all of ions can be implanted at an intended depth 1.2 nm. Accordingly, it is inferred that a super thin SOI wafer having good thickness uniformity of an intended thickness 1.5 nm or less can be obtained according to the ion implantation and delamination method.
0010 However, when the oxide film is formed on the bond wafer in which ions are to be implanted because of the above-mentioned reasons, there is a deviation also in the thickness of the formed oxide film, and the implantation depth of ions implanted in the silicon through the oxide film is also affected thereby.
0011 For example, when a thickness of a buried oxide layer of an SOI wafer needs to be 400 nm, a standard deviation in the thickness of the oxide layer will be 2.0 nm at the smallest under oxidizing condition in general mass-production. Even if the oxidizing condition is precisely controlled without considering productivity, is around 1.0 nm at the smallest. Accordingly, a thickness uniformity of an SOI layer of a conventional SOI wafer produced with forming an oxide film on a bond wafer is around an intended thickness 3 nm at the smallest.
0012 The present invention has been accomplished to solve the above-mentioned problems, and a major object of the present invention is to provide a method of fabricating an SOI wafer that has an SOI layer with significantly improved thickness uniformity, by holding an influence of deviation in thickness of an oxide film formed on a bond wafer in the SOI wafer on thickness uniformity of the SOI layer to the minimum, and the SOI wafer.
0013 To achieve the above mentioned object, the present invention provides a method of fabricating an SOI wafer in which a bond wafer to form a SOI layer and a base wafer to be a supporting substrate are prepared; an oxide film is formed on at least the bond wafer; hydrogen ions or rare gas ions are implanted in the bond wafer via the oxide film in order to form a fine bubble layer (enclosed layer) within the bond wafer; the ion-implanted surface is brought into close contact with the surface of the base wafer; and then heat treatment is performed to separate a thin film from the bond wafer with using the fine bubble layer as a delaminating plane to fabricate the SOI wafer having an SOI layer; and characterized in that deviation in the thickness of the oxide film formed on the bond wafer is controlled to be smaller than the deviation in the ion implantation depth.
0014 As described above, in the method of fabricating an SOI wafer in which an oxide film is formed on a bond wafer in advance, if the deviation in the thickness of the oxide film formed on the bond wafer is controlled to be smaller than the deviation in the ion implantation depth, the influence of the deviation in the thickness of the oxide film on the thickness uniformity of the SOI layer can be held to the minimum, and thus the SOI wafer wherein thickness uniformity of the SOI layer is improved can be fabricated.
0015 The term deviation herein means a standard deviation.
0016 To achieve the above mentioned object, the present invention also provides a method of fabricating an SOI wafer in which a bond wafer to form a SOI layer and a base wafer to be a supporting substrate are prepared; an oxide film is formed on at least the bond wafer; hydrogen ions or rare gas ions are implanted in the bond wafer via the oxide film in order to form a fine bubble layer (enclosed layer) within the bond wafer; the ion-implanted surface is brought into close contact with the surface of the base wafer; and then heat treatment is performed to separate a thin film from the bond wafer with using the fine bubble layer as a delaminating plane to fabricate the SOI wafer having an SOI layer; and characterized in that a thickness of the oxide film formed on the bond wafer is defined so that deviation in the thickness of the oxide film formed on the bond wafer may be smaller than the deviation in the ion implantation depth.
0017 As described above, in the method of fabricating the SOI wafer in which an oxide film is formed on a bond wafer in advance, when the thickness of the oxide film formed on the bond wafer is defined so that deviation in the thickness of the oxide film formed on the bond wafer may be smaller than the deviation in the ion implantation depth, the influence of the deviation in the thickness of the oxide film on the ion implantation depth can be held to the minimum, and thus the SOI wafer wherein thickness uniformity of the SOI layer is improved can be fabricated.
0018 Preferably, an oxide film is previously formed on the base wafer which is to be bonded to the bond wafer, and the thickness of the oxide film formed on the base wafer is defined so that it can form the buried oxide layer with a desired thickness in the SOI wafer together with the oxide film formed on the bond wafer.
0019 As described above, when the oxide film is previously formed on the base wafer, and the thickness of the oxide film formed on the base wafer is defined so that it can form the buried oxide layer with a desired thickness in the SOI wafer together with the oxide film formed on the bond wafer, the buried oxide layer having a desired thickness can easily be obtained, and thus problem of insufficient thickness of the oxide layer is not caused, and the influence of the deviation in the thickness of the oxide film of the bond wafer on the thickness uniformity of the SOI layer can be held to the minimum.
0020 The thickness of the oxide film formed on the bond wafer is preferably 10 to 100 nm.
0021 Although the deviation in the thickness of the oxide film and the deviation in the ion implantation depth vary depending on a used apparatus, conditions for ion implantation and oxidizing conditions for formation of the oxide film, in order to make the deviation in thickness of the oxide film smaller than the deviation in ion implantation depth when using an apparatus used in mass production, the thickness of the oxide film is preferably 100 nm or less. On the other hand, at least 10 nm of the thickness of the oxide film is necessary in order to prevent the channeling effect described above. Accordingly, the thickness of the oxide film is preferably 10 nm or more.
0022 The present invention also provides an SOI wafer produced by the above mentioned methods, wherein the thickness uniformity of the SOI layer is high even when the buried oxide layer is thick.
0023 The present invention also provides an SOI wafer produced by bonding two wafers according to the ion implantation and delamination method, which has a bonded surface in the buried oxide layer, or between the buried oxide layer and the base wafer. In the wafer, the thickness uniformity of the SOI layer is high as 1.5 nm or less. Accordingly, device characteristics of the device fabricated therefrom are improved, and freeness in designing of the device is large.
0024 As described above, according to the present invention, influence of the deviation in the thickness of the oxide film on the bond wafer on the deviation in the active SOI layer is small, even in the SOI wafer which requires thick buried oxide layer. Therefore, the SOI layer having the SOI layer with quite excellent thickness uniformity can be fabricated. Furthermore, device characteristics and freeness of the device design can be improved due to decrease of the deviation of the thickness of the SOI layer.
BRIEF DESCRIPTION OF THE DRAWINGS
1
a
i
0025 FIGS. ()-() is a flowchart showing an example of an SOI-wafer fabricating process according to the method of fabricating an SOI wafer of the present invention.
0026FIG. 2 is a graph showing a result of measurement of a deviation in a thickness of an oxide film and a deviation in an ion implantation depth, which are shown in the same graph. The line (a) shows a relation between the thickness of the oxide film and the deviation therein. The line (b) shows a relation between the ion implantation depth and the deviation therein.
3
a
h
0027 FIGS. ()-() is a flowchart showing an example of an SOI-wafer fabricating process according to an ion implantation and delamination method. (A) shows a method wherein an oxide film is formed on a base wafer. (B) shows a method wherein an oxide film is formed on a bond wafer.
DESCRIPTION OF THE INVENTION AND A PREFERRED EMBODIMENT
EXAMPLES
Example 1
Example 2
Example 3
Comparative Example
0028 The present invention will be further described below in detail, but is not limited thereto.
0029 In fabrication of the SOI wafer, formation of the buried oxide layer having a thickness necessary for the SOI wafer under general oxidizing condition for mass production may results in far larger deviation in the thickness of the oxide film formed in the wafer than the deviation in the ion implantation depth. Accordingly, the thickness uniformity of the SOI layer may be significantly affected thereby.
0030 Generally, the deviation in the thickness of a thicker oxide film is larger. Accordingly, the inventors of the present invention have thought of making the thickness of the oxide film formed on the bond wafer thin in order to make the deviation in the thickness of the oxide film smaller than the deviation in the implantation depth of ion implantation, and making up for a deficiency in the thickness of the buried oxide layer necessary for the SOI wafer by forming the oxide film on the base wafer, to obtain a buried oxide layer having a desired thickness in combination of the oxide film formed on the bond wafer and that formed on the base wafer.
0031 For example, when the upper limit of the thickness of the oxide film in the case that the deviation in the implantation depth achieved by an ion implanter used for fabrication of SOI wafer is 0.4 nm and the deviation in the oxide film formed on the bond wafer is 0.4 nm or less, is 100 nm, the thickness of the oxide film of 100 nm or less can be selected as the thickness of the oxide film formed on the bond wafer.
0032 In that case, when the thickness of the oxide film on the bond wafer is defined to be, for example, 40 nm, and the thickness of the buried oxide layer necessary for SOI wafer is 400 nm, the oxide film having a thickness of 40 nm can be formed on the bond wafer, in which ions are then implanted, and the resulting wafer can be bonded to the base wafer on which an oxide film having a thickness of 360 nm is formed.
0033 The relation between the deviation in the thickness of the oxide film and the deviation in the ion implantation depth is important for the present invention. Accordingly, the inventors of the present invention studied the deviation in the thickness of the oxide film and the deviation in the ion implantation depth.
0034 The deviation in the thickness of the oxide film was studied as follows. First, each of the oxide films having various thickness was actually formed on the wafer under a general oxidizing condition for mass production. Then, the standard deviation was determined from the thickness distribution in the surface as for each wafer. As a result, the relation between the thickness of the oxide film and the deviation in the thickness of the oxide film was revealed as shown in the line (a) of FIG. 2.
0035 The deviation in the ion implantation depth was studied as follows. First, a wafer having no oxide film was prepared in order to avoid the influence of the oxide film. Then, ions are implanted therein using an apparatus generally used, with inclining a implanting angle at several degree in order to avoid a channeling phenomenon. The resulting wafer was bonded to a wafer on which an oxide film is formed, followed by a heat treatment for delamination at about 500 C. to produce an SOI wafer. The thickness of the resulting SOI wafer was then measured to determine the distribution thereof in the surface. Plural wafers were fabricated with implanting ions therein at various implantation energy, and were determined as for the thickness distribution in the surface as described above. Thereby, the relation between the ion implantation depth and the deviation therein was revealed as shown in the line (b) of FIG. 2.
0036 Comparing the deviation in the thickness of the oxide film and the deviation in the ion implantation depth, it is revealed that the deviation in the thickness of the oxide film shown as black circles in the line (a) of FIG. 2 increases in proportion to increase of the thickness of the oixde film formed on the wafer. On the other hand, it is revealed that the deviation in the ion implantation depth shown as white circles in the line (b) of FIG. 2 does not change a lot, and is approximately in the range of 0.4 to 0.6 nm, even when the ion implantation depth increases.
0037 From the relations mentioned above, an appropriate thickness of the oxide film to be formed on the bond wafer can be defined.
0038 Namely, in the relation in FIG. 2 which shows the relation when using the apparatus and the condition generally used for mass production, the thickness of the oxide film formed on the bond wafer is appropriately 100 nm or less in order to make the deviation in the thickness of the oxide film smaller than the deviation in the ion implantation depth.
0039 When the thickness of the oxide film on the bond wafer is thinner, the deviation in the thickness of the oxide film is smaller, so that the influence of the deviation in the thickness of the oxide film on the ion implantation depth gets smaller. However, in order to prevent channeling effect which is one of the reasons why the oxide film is formed on the bond wafer, the thickness of the oxide film of at least 10 nm is necessary. Accordingly, when the SOI wafer is actually fabricated, the thickness of the oxide film formed on the bond wafer is preferably 10 to 100 nm.
0040 In that case, even when the deviation in the thickness of the oxide film and the deviation in the ion implantation depth are changed depending on the ion implanter or conditions such as the condition for formation of the oxide film, the deviations therein can be studied as described above, to make the deviation in the thickness of the oxide film smaller than the deviation in the ion implantation depth.
0041 The embodiment of the present invention will be further described below, referring a figure, but is not limited thereto.
0042FIG. 1 is a flowchart showing an example of an SOI wafer fabricating process according to a method of fabricating an SOI wafer of the present invention.
1
2
8
0043 In Step (a) of the ion implantationdelamination method shown in FIG. 1, two mirror wafers, namely a base wafer to be a base and a bond wafer to form an SOI layer , which are suitable for device specifications are prepared.
2
3
8
0044 In Step (b), the bond wafer is subjected to thermal oxidation so as to form on the surface thereof an oxide film having a thickness of 10 to 100 nm. As described above, if the thickness of the oxide film is in the range, the deviation therein can be smaller than the deviation in the ion implantation depth, so that thickness of the SOI layer can be made uniform.
1
5
5
9
3
3
0045 In Step (c), the base wafer is subjected to thermal oxidation so as to form on the surface thereof an oxide film . The thickness of the oxide film formed on the base wafer is defined so that it can provide a buried oxide layer having a desired thickness for the SOI wafer together with the oxide film formed on the bond wafer. If the desired thickness of the buried oxide layer for the SOI wafer can be obtained only by the thickness of the oxide film formed on the bond wafer, it is not necessary to form the oxide film on the base wafer. In that case, Step (c) is omitted.
2
4
0046 In Step (d), hydrogen ions or rare gas ions are implanted into one surface of the bond wafer having the oxide film formed on the surface thereof, in order to form a fine bubble layer (enclosed layer) which lies in parallel to the surface at a position corresponding to the mean depth of ion implantation. The implantation temperature is preferably 25-450 C.
1
2
3
3
5
0047 In Step (e), the base wafer is superposed on the ion-implanted surface of the bond wafer in which hydrogen ions or rare gas ions are implanted, via the oxide film , or via the oxide film and the oxide film , and they are brought in close contact with each other. When the surfaces of the two wafers are brought into contact with each other at ambient temperature in a clean atmosphere, the wafers are bonded to each other without use of adhesive or the like.
6
7
8
9
1
4
6
7
0048 In Step (f), there is performed a heat treatment for delamination in which the delamination wafer is delaminated from the SOI wafer (composed of the SOI layer , a buried oxide layer , and the base wafer ) at the enclosed layer . The heat treatment is performed at a temperature of about 500 C. or higher in an inert gas atmosphere so as to cause crystal rearrangement and bubble cohesion, and thereby the delamination wafer is delaminated from the SOI wafer .
7
0049 In Step (g), the SOI wafer is subjected to heat treatment at high temperature as a bonding heat treatment in order to improve bonding strength to a sufficient level, since the bonding strength of the wafers imparted in Steps (e) and (f), the bonding step and the delamination heat treatment step, is too low to use in a device process. Preferably, this heat treatment is performed, for example, in an inert gas atmosphere at 1050-1200 C. for 30 minutes to 2 hours.
0050 The Step (f) as a delamination heat treatment step and Step (g) as a bonding heat treatment step may be successively performed. Alternatively, a single heat treatment serving as both of Step (f) as a delamination heat treatment step and Step (g) as a bonding heat treatment step may be performed.
8
0051 In step (h), a mirror polishing process called touch polishing wherein a stock removal is very small is then performed to remove a crystal defect layer on a delaminated surface which is a surface of the SOI layer and improve the surface roughness.
7
9
8
0052 The SOI wafer of high quality having the buried oxide layer with a desired thickness and the SOI layer with high thickness uniformity can be produced (step (i)) through the steps described above.
0053 The following examples and a comparative example are being submitted to further explain the present invention. These examples are not intended to limit the scope of the present invention.
0054 Two silicon mirror wafers of conductive type p having a resistivity of 20 cm and a diameter of 150 mm were prepared. These wafers were processed through Steps (a) to (f) shown in FIG. 1 to delaminate a portion of the bond wafer, and thereby provide SOI wafers.
0055 The major process conditions for fabricating SOI wafers were as follows.
0056 1) Thickness of the oxide film on the base wafer: 350 nm;
0057 2) Thickness of the oxide film on the bond wafer: 50 nm;
0058 3) Deviation in the thickness of the oxide film on the bond wafer: 0.25 nm;
+
16
2
0059 4) Condition of ion implantation: H ions, implantation energy: 80 keV, implantation dose: 810/cm;
0060 5) Ion implantation depth: 700 nm (thickness of the SOI layerthickness of the oxide film on the bond wafer);
0061 6) Deviation in the ion implantation depth: 0.4 nm.
0062 In Example 1, the deviation in the thickness of the oxide film on the bond wafer was small as 0.25 nm, compared with the deviation in the ion implantation depth (0.4 nm). The thickness of the oxide film on the bond wafer was measured by spectral reflectance measurement at several thousands points in 2 mm pitch on the surface. The conditions were set so that the thickness of the buried oxide layer may be 400 nm.
e
f
2
0063 The two wafers were stacked under the above condition (FIG. 1()), and was subjected to the delamination heat treatment in a Ngas atmosphere, at 500 C. for 30 minutes (FIG. 1()).
0064 The deviation in the thickness of the SOI layer of the SOI wafer after the delamination step were determined to evaluate the thickness uniformity. The thickness of the SOI layer was measured by spectral reflectance measurement at several thousands points in 2 mm pitch on the surface.
0065 As a result, the deviation was 0.47 nm, and thus 3 was 1.41 nm. Accordingly, the thickness of the SOI layer is about 650 nm1.41 nm, which shows significantly improved thickness uniformity of the SOI layer, compared with the thickness uniformity of the conventional SOI wafer, the intended thickness 3 nm.
0066 Two silicon mirror wafers of conductive type p having a resistivity of 20 cm and a diameter of 150 mm were prepared. These wafers were processed through Steps (a) to (f) shown in FIG. 1 to delaminate a portion of the bond wafer, and thereby provide SOI wafers.
0067 The major process conditions for fabricating SOI wafers were as follows.
0068 1) Thickness of the oxide film on the base wafer: 360 nm;
0069 2) Thickness of the oxide film on the bond wafer: 40 nm;
0070 3) Deviation in the thickness of the oxide film on the bond wafer: 0.20 nm;
+
16
2
0071 4) Condition of ion implantation: H ions, implantation energy: 39 keV, implantation dose: 810/cm;
0072 5) Ion implantation depth: 340 nm (thickness of the SOI layerthickness of the oxide film on the bond wafer);
0073 6) Deviation in the ion implantation depth: 0.4 nm.
0074 In Example 2, the deviation in the thickness of the oxide film on the bond wafer is small as 0.20 nm, compared with the deviation in the ion implantation depth (0.4 nm). The thickness of the oxide film on the bond wafer was measured in the similar manner to that of Example 1. The conditions were set so that the thickness of the buried oxide layer may be 400 nm.
e
f
2
0075 The two wafers were stacked under the above condition (FIG. 1()), and is subjected to the delamination heat treatment in a Ngas atmosphere, at 500 C. for 30 minutes (FIG. 1()).
0076 The deviation in the thickness of the SOI layer of the SOI wafer after the delamination step was determined in the similar manner to that of Example 1.
0077 As a result, the deviation was 0.45 nm, and thus 3 is 1.35 nm. Accordingly, the thickness of the SOI layer is about 300 nm1.35 nm, which shows significantly improved thickness uniformity of the SOI layer, compared with the thickness uniformity of the conventional SOI wafer, the intended thickness 3 nm.
0078 Two silicon mirror wafers of conductive type p having a resistivity of 20 cm and a diameter of 150 mm were prepared. These wafers were processed through Steps (a) to (f) shown in FIG. 1 to delaminate a portion of the bond wafer, and thereby provide SOI wafers (provided that step (c) was omitted).
0079 The major process conditions for fabricating SOI wafers were as follows.
0080 1) Thickness of the oxide film on the base wafer: no oxide film;
0081 2) Thickness of the oxide film on the bond wafer: 50 nm;
0082 3) Deviation in the thickness of the oxide film on the bond wafer: 0.25 nm;
+
16
2
0083 4) Condition of ion implantation: H ions, implantation energy: 20 keV, implantation dose: 810/cm;
0084 5) Ion implantation depth: 180 nm (thickness of the SOI layerthickness of the oxide film on the bond wafer);
0085 6) Deviation in the ion implantation depth: 0.4 nm.
0086 In Example 3, the deviation in the thickness of the oxide film on the bond wafer was small as 0.25 nm, compared with the deviation in the ion implantation depth (0.4 nm). Since the conditions were set so that the thickness of the buried oxide layer may be 50 nm, the oxide film was not formed on the base wafer. The thickness of the oxide film was measured in the similar manner to that of Example 1.
e
f
2
0087 The two wafers were stacked under the above condition (FIG. 1()), and is subjected to the delamination heat treatment in a Ngas atmosphere, at 500 C. for 30 minutes (FIG. 1()).
0088 The deviation in the thickness of the SOI layer of the SOI wafer after the delamination step were determined in the similar manner to that of Example 1.
0089 As a result, the deviation was 0.47 nm, and thus 3 was 1.41 nm. Accordingly, the thickness of the SOI layer was about 130 nm1.41 nm, which shows significantly improved thickness uniformity of the SOI layer, compared with the thickness uniformity of the conventional SOI wafer, the intended thickness 3 nm.
0090 Two silicon mirror wafers of conductive type p having a resistivity of 20 cm and a diameter of 150 mm were prepared. A portion of the bond wafer was delaminated to provide an SOI wafer according to the conventional fabrication method shown in FIG. 3(B).
0091 The major process conditions for fabricating SOI wafers were as follows.
0092 1) Thickness of the oxide film on the base wafer: no oxide film;
0093 2) Thickness of the oxide film on the bond wafer: 400 nm;
0094 3) Deviation in the thickness of the oxide film on the bond wafer: 2.0 nm;
+
16
2
0095 4) Condition of ion implantation: H ions, implantation energy: 80 keV, implantation dose: 810/cm;
0096 5) Ion implantation depth: 700 nm (thickness of the SOI layerthickness of the oxide film on the bond wafer);
0097 6) Deviation in the ion implantation depth: 0.4 nm.
0098 In Comparative Example, the deviation in the thickness of the oxide film on the bond wafer was large as 2.0 nm, compared with the deviation in the ion implantation depth (0.4 nm). The thickness of the buried oxide film was 400 nm. The oxide film was formed only on the bond wafer, not on the base wafer. The thickness of the oxide film was measured in the similar manner to that of Example 1.
d
e
2
0099 The two wafers were stacked under the above condition (FIG. 3()), and is subjected to the delamination heat treatment in a Ngas atmosphere, at 500 C. for 30 minutes (FIG. 3()).
0100 The deviation in the thickness of the SOI layer of the SOI wafer after the delamination step were determined in the similar manner to that of Example 1.
0101 As a result, the deviation was 2.04 nm, and thus 3 is 6.12 nm. Accordingly, the thickness of the SOI layer is about 300 nm6.12 nm, which shows far inferior thickness uniformity of the SOI layer, compared with the intended thickness 1.5 nm which is an expected value from the deviation in the ion implantation depth 0.4 nm.
0102 The present invention is not limited to the above-described embodiment. The above-described embodiment is a mere example, and those having substantially the same structure as that described in the appended claims and providing the similar action and effects are all included in the scope of the present invention.
0103 For example, the process of fabricating the SOI wafer according to the present invention is not limited to that shown in FIG. 1. Other processes such as cleaning, heat treatment or the like can be added thereto. Furthermore, the order of the processes can be partly changed or omitted depending on the purpose.
0104 Furthermore, in the above description, it is mainly explained as for the case that the thickness of the oxide film formed on the bond wafer is made thin to make the deviation in the thickness of the oxide film formed on the bond wafer smaller than the deviation in the ion implantation depth. However, the present invention is not limited thereto. It is possible to make the deviation in the thickness of the oxide film smaller than the deviation in the ion implantation depth by modifying other conditions than the thickness of the oxide film. For example, it is possible to make the deviation in the thickness of the oxide film smaller than the deviation in the ion implantation depth by modifying other conditions for formation of the oxide film than the thickness of the oxide film. | |
Music is part of our daily lives and, for many people, it is indispensable. In these cases, it ends up being an escape valve and a great pleasure. Thus, bringing benefits to well-being and even providing relief from some tensions.
However, music is not only beneficial to adults. Otherwise, it can also be positive for children and babies. Understand better how it works:
Contents
- 1 What are the benefits of music for babies and children?
- 2 When can I put music for the baby to hear in the belly?
- 3 What kind of music to choose for the baby to listen to?
What are the benefits of music for babies and children?
Music is an intriguing art form and has been extensively researched in the fields of psychology and medicine.
Nowadays, it is known that music can move not only with sound perception, but also with several other areas of the brain – such as the motor area, for example.
With that in mind, it is not difficult to understand why music can bring some benefits to the development of babies and young children, is it not?
In this sense, some research shows that exposure to music helps in the activation of certain areas of the brain that assist in the child’s development. Therefore, music can not only be an art form, but also a real ally in baby’s growth!
In addition, it can be so beneficial for the child’s development that there are even children ‘s music classes , which help children to become familiar with this form of expression.
Some of the benefits that music can bring to babies and young children are:
Relax and sleep
Calm music helps anyone to sleep, including babies!
If the goal is to help the baby sleep, lullabies sung by the mother or the main caregivers are great options. This is because the mother’s voice has been heard since before the baby was born, and he is very familiar with it.
The caregivers’ voice always reassures the baby , as he knows they are people he trusts. So listening to the voice of a trusted person singing lullabies is a great recipe for a baby to sleep.
And some sounds of calm music (suitable for sleeping) can bring sound vibrations that refer to the uterus, leaving the baby feeling even more safe and comfortable.
Encourage play
Animated songs can stimulate games that assist in cognitive and motor development . However, it should be noted that the songs are not able to do all this work on their own.
For this, it is necessary that the caregivers are stimulating the baby too, making him clap his hands or feet with the rhythm of the music, for example, or singing along and teaching the baby to understand the rhythm of the music.
In this way, the baby gradually assimilates music into moments of pleasure and, even with exercises like this, there is an improvement in the affective bond between caregivers and the baby.
It is worth remembering that music also releases endorphins, a substance known as the “well-being hormone”, which promotes good feelings for children and babies.
Learn new words
Children’s programs are filled with repetitive music for one reason: to assist in language learning .
Do you know when a song sticks in your head and you can’t forget it at all? This happens in children too, which helps them to fix the words learned with children’s songs!
Thus, music not only amuses but also helps children learn to communicate, both through body expression (through dance, rhythmic movements, etc.) as well as through word learning.
Stimulating creativity and imagination
Music is a powerful tool for the baby to gain knowledge of the world, discovering new sounds and new ways of expressing itself, which in turn are the basis of imagination and creativity.
In this way, listening to music can also help the little one to increase his repertoire of behaviors to express what he feels.
Improvements in attention and memory
Some of the cognitive abilities that improve with musicalization are attention and memory.
When the child begins to have a sense of rhythm, for example, he stimulates these two cognitive abilities, which are necessary for him to be able to maintain the rhythm – either by listening, dancing, singing or playing an instrument.
Contact with logical-mathematical thinking
Although many people separate the art from the exact ones, in reality, several arts depend on logical-mathematical reasoning to be realized – music is one of them.
Composed of times, scales, tones and semitones, what exists behind the music is pure applied mathematics.
Therefore, understanding music is inevitably having contact with this type of logic, which can assist in the learning of mathematics and other exact sciences when the child grows up.
When can I put music for the baby to hear in the belly?
Hearing is the first meaning to be formed during pregnancy and, therefore, sound helps the baby’s development from the womb. Therefore, putting music for the baby to hear inside the belly can help to improve this sense even before birth.
The baby begins to listen between the 26th and 30th week of gestation , at which point it is possible to see him responding to the sounds he picks up in the environment. At this point, the mother is encouraged to talk to the baby, so that he gets used to her voice.
Although it is a little more difficult for the baby to hear the noise outside the mother, it is also possible to put music for him to hear.
Some mothers like to put songs and sing to create a bond with the baby, even they can associate these songs to the time of pregnancy, which can generate good memories of this stage of life.
What kind of music to choose for the baby to listen to?
The type of music to be played for the baby to hear depends on its purpose.
If you plan on making it comfortable, safe and relaxed, quiet music with soft instruments can be a good idea. Avoid songs with very high-pitched sounds, as such sounds tend to cause agitation (even in older children).
If you plan to play or dance with the baby, more upbeat music can be a good choice. It is not necessary for them to be children’s songs when the objective is to teach issues such as rhythm and dance, for example.
However, if you would like to introduce new words to your child and help them memorize them, then children’s songs that focus on expanding vocabulary are good alternatives.
Some examples of such songs are those that talk about animals , about nature , about everyday objects , among others. Thus, the child gradually acquires the vocabulary present in these songs and can improve speech.
Music can be a great ally during the development of babies and children, contributing to learning, motor skills and even social interaction
There are even many professionals focused on this line of research and work. So, if you want an even more complete and effective follow-up, it is worth having this support.
And keep following the Healthy Minute to have access to more content like this! | https://hickeysolution.com/music-for-babies-and-children/ |
4 TB is the amount of data that Intel projects will be generated by an autonomous motor vehicle. Considering the number of vehicles on the road, this represents a staggering amount of data.
How will data centers keep up?
- The first experimental version of Ethernet networking ran at 2.94 megabits per second (Mbps) in 1973.
- By the time it became an industry standard in 1982, its speed had increased to 10 Mbps.
- Fast Ethernet was introduced starting in the mid-1990 and ran at a rate of 100 Mbps
- Gigabit Ethernet offered 1 Gbps in the late 1990s, but it took many years for wide adoption because of the increased expense.
- 10 Gbps Ethernet was produced starting in the mid-2000s, but it is expensive and used mostly in specialized environments.
- Finally, 40 Gbps Ethernet has been under development for years. The Googles and Facebooks of the world are hoping that it will help to alleviate the bottlenecks they are feeling in their data centers.
Data, data everywhere and now our cars are looking to add to the pile. What a time we're having! | https://www.deepthought3.com/2017/05/4-tb-per-day.html |
How is AI changing the way we practise medicine?
Interviews about Medicine
Interviews about medicine, physiology, pathology, bacteria and viruses, pharmacology, food, hormones, neuroscience and psychology...
Featured
Changhuei Yang explains his design for a lensless microscope...
A new study has confirmed the long term benefits of taking statins to treat heart disease...
Lenses displaying emails before your eyes, flowing materials, stress on the mind and a night flowering orchid...
Looking at ways to reduce the cost of anti-venom...
Denis Burdakov explains what happens when you have food on the brain...
Ian Lipkin discusses the science behind the film Contagion which depicts the series of events that unfold with the...
A new biotechnology company called Medicago have developed a technique for quickly and cheaply producing vaccines using...
Looking at whether flu can trigger heart attacks in vulnerable people
A new target for Malaria vaccines, How seeing and paying attention to things uses separate parts of the brain and the...
As we enter “flu season” in the northern hemisphere, to help track the spread of seasonal flu here in the UK and...
Professor Chris Marshall discusses research on the Ras pathway and his hopes for personalised medicine making it to the...
The science surrounding cancer is multifaceted. It involves clinicians, chemists, geneticists, and even physicists....
Madhusudan Srinivasan discusses a new target for cancer drugs - blocking the repair of DNA...
Most cell types in our body are being constantly replenished, but we still get old. A sub population of cells are said...
This week's NewsFlash explores how smoking could pave the way for cocaine use, how our skin sees sunlight in order...
Simon Waddington explains how you could use gene therapy to treat certain disorders as early as in the womb...
Iain McNeish discusses how adenoviruses could be used to find and kill cancerous cells within the body...
Rob MacLaren explores how we can manipulate genes to restore vision in patients with inherited blindness...
Haemophilia is a disorder of blood clotting factors, leading to excessive bleeding in patients. To find out what it...
Maria Limberis explores how respiratory disorders such as Cystic Fibrosis can be targeted by gene therapy...
Kathy High explains how changing the expression of genes can help treat diseases such as Haemophilia...
Scientists have brought language and computer science to the kitchen to teach you a language whilst you're cooking...
The opening of the World's first spaceport, improving IVF success with genetic screening, New hope for a Malaria...
John Pickett discusses how plants can recruit insects to keep other pests at bay... | https://www.thenakedscientists.com/articles/interviews/medicine?page=89 |
Laura Zaroski is the vice president of management and employment practices liability at Socius Insurance Services. As an attorney with expertise in employment practices liability insurance, in addition to her role as a producer, Zaroski acts as a resource with respect to Socius’ employment practices liability book of business. She is available to assist with limits analysis and coverage or claims issues for existing and prospective insureds.
Zaroski came to Socius after being a partner in the Chicago office of O’Hagan Spencer. She was the head of the insurance coverage and claims management department at O’Hagan.
Throughout her legal career, Zaroski has represented various domestic insurance companies as well as London-based insurers as coverage and claims management counsel. She had a diverse practice and extensive experience developing and handling insurance programs. Zaroski specialized in the areas of employment practices, management liability, attorney malpractice, real estate professionals, cyber/privacy and miscellaneous errors and omissions policies. In addition to her claims and coverage work, Zaroski also served as counsel in various insurance insolvencies, liquidation proceedings and commutations.
As claims management and coverage counsel, Zaroski’s experience involved counseling clients in the drafting of policies, program creation, examining claim exposure, effective claims-handling techniques, litigation management and, most importantly, effective resolution and settlement negotiation techniques. Zaroski provided detailed claims review and liability analysis, counseled as to cost-effective defense strategies and negotiated favorable settlements for hundreds of cases nationwide. Zaroski has participated in countless mediations, settlement conferences and dispute resolution forums.
Zaroski is a frequent speaker regarding claims handling and risk management and has co-written several articles in EEO Update on the subject of employment law, including Addressing Employment Discrimination Complaints and Employment Practices Liability Insurance and the PLUS Journal. She is a certified mediator and has served as a volunteer mediator for the Center for Conflict Resolution. She is a member of the Insurance Associates, (a division of the Association of Lloyds’ brokers), the Professional Liability Underwriting Society and the American Bar Association.
Zaroski received her J.D. from the University of Toledo School of Law and holds a B.A. from Ohio State University. | https://www.insurancethoughtleadership.com/author/laurazaroski/ |
As your supply chain partner, Cornerstone Edge is focused on always building trust and delivering value. That’s one of the many reasons we’re part of the Collinear Alliance, to provide limitless supply chain resources. Sales and Operations Planning is a large piece of the supply chain puzzle, and we can provide that service thanks to our many partnerships. We sat down with one of our crew members, Jim Noblitt, to pick his brain on Sales and Operation Planning, and to discuss why it may be a valuable strategy for some organizations to implement.
WHAT IS SALES AND OPERATION PLANNING?
Sales and Operation Planning (S&OP) gathers input from an organization’s main functional areas, like sales, marketing, manufacturing, distribution, human resources, and finance to create a unified and effective business plan. This is how organizations can control inventory costs while simultaneously improving their service levels. It coordinates different areas of the business to meet customer demand with the appropriate level of supply. As Noblitt put it, “The whole idea behind S&OP is to enable upper management to do their job, providing them insight into their goals and to track how close they are to achieving those goals.”
S&OP is both strategic and tactical. Strategically, it offers insight into how demand may change in some geographies or for specific product lines impacting manufacturing, workforce, and supplier decisions. Tactically, the S&OP process creates a production plan that is approved by upper management, which is then used to create a master schedule and a material requirements plan (MRP). S&OP will vary by organization, but the general process can be used in almost every industry.
Read on for an overview of how Cornerstone Edge tackles S&OP with Noblitt’s expertise at the helm.
Step 1: Build the team & touch base often
S&OP is a process that requires time, patience, and collaboration. Creating a team and setting goals and expectations from the get-go is essential. Designate one team member as the S&OP process facilitator, they will manage the process from start to finish. Noblitt says the organization’s Master Production Scheduler is an ideal candidate; since they drive the production schedule, they’ll have insight into both sales and operational needs.
One of the more important aspects of S&OP is having preliminary meetings to ensure key stakeholders are on the same page. The project lead will meet with stakeholders and department heads to ensure all aspects of the organization are taken into consideration. In these preliminary meetings, the team as a whole can agree to a general plan outline. As Noblitt says, at this point, “Consensus is important, not necessarily the agreement.” With this consensus in place, the team can start the S&OP process.
When implementing S&OP initially, it’s best to utilize existing planning meetings when possible and to change the meetings to accommodate the new S&OP process. This accomplishes two things:
- It doesn’t add as many new meetings as would otherwise be done
- It replaces legacy processes that might otherwise continue, negating the internalization of the new process into the business
Step 2: Gather and manage data
The S&OP process starts with extensive data gathering. All the data you gather will be used for forecasting, one of the most important parts of the S&OP process. You’ll want to compile data about past sales and trends, and to include any internal and external factors that could impact sales, like industry changes, seasonality, customer behavior, supply chain disruptions, and competition. Past and anticipated future production performance is critical to completing the S&OP data model. With a good sales plan and production plan, the S&OP process will be a very effective tool for managing inventory or backlog and meeting the company business plan.
Accurate data gathering and management is critical. If you have inaccurate data, your forecasting will be off, which means the entire plan will miss the mark. It’s important to understand your forecast error, especially in determining how much inventory you need to reach a certain fill rate. The more inaccurate the data, the more inventory it’s going to take to reach your desired fill rate.
Step 3: Supply and demand planning
Once the data has been captured and forecasting has been completed, supply and demand planning can begin.
Demand planning includes:
- Validating forecasts
- Understanding sources of demand
- Accounting for variability
- Revising customer service policies
Supply planning includes:
- Determining inventory targets
- Establishing safety stock levels
- Setting production levels
- Implementing production methods
- Assessing the ability to meet demand by checking available capacity, inventory, and scheduling
Depending on the industry, the plan can look three, six, 12, or 18 months into the future, S&OP is always tailored to each organization’s needs. No matter how far into the future the plan looks, S&OP requires monthly meetings to allow stakeholders to see how the plan is progressing and to assess any pitfalls and areas for improvement to be addressed the following month. The point is to have a guide so that everybody on the team is working toward the same end goal. If something is not working, it’s easy to review the plan to see what needs to be changed.
Step 4: Reconciliation of Plans
Those monthly S&OP meetings include plan reconciliation, which entails sorting through supply-side issues to see if the sales plan can be accommodated and inventory and backlog objectives can be met. The team will also use this time to review the previous month’s supply performance and how they align with forecasting.
With constant checks and balances, management can take care of business. Noblitt says S&OP allows executives to run the business from an informed perspective, “It’s a good way to keep production consistent without breaking the bank or your employees.”
Step 5: Approve and release
At this point in the process, the team has met multiple times, has analyzed data and trends, and they have agreed to a general plan. Once the demand and supply plans are finalized, the result is presented to the executive team during the monthly Executive S&OP meeting. The goal is to leave that meeting with an approved demand and supply plan that can be executed by operations.
The challenges of Sales and Operation Planning
As a company-wide, recurring, and collaborative process involving multiple departments like finance, operations, marketing, and sales, coordination and communication can be especially challenging in S&OP, but there are other difficulties we cannot ignore.
- Ensuring data is accurate so that forecasting isn’t hindered
- Obtaining buy-in from top management from the start
- This is why having preliminary meetings is essential for your S&OP process to work
- Planning for the introduction of new products
- This also includes planning for the end of life of other existing products
- Transforming data into action items
And while all of this may sound intricate, Noblitt has one piece of advice, “DON’T OVER COMPLICATE IT.” If that sounds easier said than done, don’t worry, that’s why we’re here. Cornerstone Edge works with industry experts like Jim Noblitt to ensure you’re able to get the most out of your supply chain.
Sales and Operation Planning empowers organizations to look into the future at a macro level, to ensure you have what’s needed in the pipeline to be prepared for the future. It allows top management to reach into the business and run it with a data-backed approach. Companies that practice S&OP have much better control over how they use their resources and service their customers.
If you’re looking for a supply chain partner to help lower your inventories, manage your backlogs, meet your customer’s needs, improve your customer service, and more, Cornerstone Edge can help. Reach out to us today, and let’s see if we’re a fit. | https://cornerstone-edge.com/sales-and-operation-planning-the-cornerstone-method/ |
State of the art CAD/ CAM design studio.
A strong team of qualified and experienced designers. Flexibility in design creation to cater individual customer’s tastes and preferences. Latest trends from round the world used as inspirations for contemporary designs creation. | https://www.sartexquilts.co.uk/design-creation/ |
Temple Sinai is a vibrant, multi-generational Reform Jewish community. We are guided by tradition, grounded in the modern world, and infused with the sacred values of our faith. We are inclusive and demonstrate respect for the needs of all. Through worship, learning, and a concern for social justice, we strive to better ourselves, our community, and the world at large.
Our Jewish values embody the teaching that every human being is created in the image of God (b’tzelem Elohim). We therefore strive to hold ourselves to the highest standards of personal integrity, social responsibility, and human decency. When we behave ethically and hold ourselves accountable, Temple Sinai is a safe, welcoming, and sacred environment.
This values-based code of ethics sets forth the principles and expectations for adherence to standards of conduct for our clergy, congregants, staff, visitors, and guests, whether participating in a Temple Sinai activity that is in the building, online, or offsite.
Code of Ethics
Exemplify Holiness (K’dushah)
Temple Sinai welcomes all who wish to engage with our sacred community.
- We embrace everyone without regard to religious background, age, ability, race, ethnicity, nationality, gender, gender identity, sexual orientation, marital status, or socioeconomic status. '
- We strive to make all who participate in our community feel a sense of belonging with the expectation that their ideas and concerns can be openly stated and responded to with respect.
Honesty (Yosher)
Temple Sinai expects all who engage in our community to conduct themselves in an honest manner.
- We promote open and honest communication that allows for addressing differences constructively.
- We protect the confidentiality of privileged information, either about an individual or the synagogue, and do not disclose it without permission. For example, this includes personnel information such as employment status, compensation, and performance review, as well as personal information about an individual’s health, financial status, or family matters.
- We respect the efforts of others and do not take credit for their work.
- We recognize, respect, and protect the intellectual property rights of our synagogue and others. We obey copyright laws governing the use and distribution of published materials.
- We make decisions regarding synagogue-related matters with transparency, openness and accountability, unless confidentiality dictates otherwise. For example, it is especially important that we protect inadvertent and premature release of names of candidates for employment. This includes adhering to placement guidelines of the CCAR (Central Conference of American Rabbis), ACC (American Conference of Cantors), and ARJE (Association of Reform Jewish Educators) when hiring clergy.
Honor (Kavod)
Temple Sinai values acting with integrity.
- We act solely according to the synagogue’s best interest when acting on its behalf.
- We refrain from using one’s synagogue position for personal advantage or benefit. For example, we refrain from hiring or firing, rewarding or punishing staff or volunteers, and awarding or denying contracts based solely on personal considerations such as favoritism, nepotism, or bribery.
- We conduct financial matters related to synagogue involvement with complete honesty. For example, we refrain from financial impropriety in decisions regarding restricted, committed, and discretionary funds.
- We are bound by sacred obligation to uphold financial agreements made with the synagogue. If a change in personal circumstances occurs, we will inform those charged with managing synagogue finances and make appropriate arrangements.
- We conduct employment practices and related decision-making in an ethical and legal manner. We establish and enforce the appropriate policies and procedures to protect the employees of the congregation, such as fair employment policies, grievance reporting, and conflict resolution procedures.
Compassion (Rachamim)
Temple Sinai embraces the fundamental value of performing acts of lovingkindness (g’milut chasadim).
-
-
- We treat others with respect, dignity, fairness, and compassion.
- We refrain from derogatory speech, negative talk, gossip, and slander, whether in person or on social media.
- We oppose bullying, including any unwanted behavior that degrades, humiliates, or oppresses another.
Verbal, physical, or cyberbullying is never acceptable.
-
Justice (Tzedek)
Temple Sinai believes everyone entering our sacred space has the right to feel safe and respected, and that we are morally and ethically responsible for one another (kol yisrael areivim zeh bazeh).
- We do not tolerate sexual harassment, including unwelcome sexual advances, requests for sexual favors, and other verbal, physical, written, or visual conduct of a sexual nature.
- We do not tolerate acts or behaviors that exploit the vulnerability of another, take advantage of a power imbalance, compromise one’s moral integrity, or create an intimidating, offensive, abusive, or hostile environment.
- We strive to protect those who appear to be the victims of abuse or neglect, including spousal abuse, child abuse, verbal abuse, physical abuse, and other types of domestic violence.
If you have been exposed to or witnessed unethical behavior, please contact the Temple Sinai Executive Director or President for our reporting procedures. | https://www.templesinainola.com/codeofethics |
100,000 trees to be planted as part of trees and woodlands strategy
Sheffield is one of the greenest and most wooded cities in Europe and the greenest city in the UK. The city is proud of its rich variety of urban parks, woodland, countryside and other green spaces which are extremely popular destinations, attracting more than 25 million visits each year.
Sheffield’s reputation as an Outdoor City is rooted in its number of parks and proximity to the countryside and the city, using the internationally recognised iTrees method, can lay claim to having one of the highest urban tree canopy coverages in the UK.
Using iTrees data, the estimated 21.6% canopy cover of urban areas is more than the whole of the Greater London area which has only 14% urban canopy. The data also states that Sheffield has an estimated seven trees for every resident with Greater London and Edinburgh having only 1 tree per person.
At a time when local authorities are experiencing a period of great austerity, Sheffield City Council recognises its responsibility to maintain and invest in the city’s treasured trees and woodlands.
Following consultation with Sheffield residents in 2016, the council has worked with a number of partners to develop a 15 year strategy that sets out how it will accomplish its ambitious vision to provide outstanding, resilient and sustainably managed trees and woodlands which are rich, diverse, healthy, attractive, and of maximum benefit to the public and wildlife.
With 53 actions, under four overarching themes, the strategy focuses on People, Places, Environment and Sustainability, and Quality Standards and Resources.
Headline actions have been identified as the crucial driving factors for all activity over the next 15 years. These are
- We will protect, enhance and promote Sheffield’s trees and maximise their benefits in all parts of the city.
- We will increase visitor numbers and volunteering in woodlands that serve areas of Sheffield that have the lowest visitor numbers and the greatest health inequalities.
- We will plant at least 100,000 additional trees and replace trees on a 2 for 1 basis in our greenspaces and woodlands over the next 10 years.
- We will aim to achieve at least one new Green Flag woodland in the first 5 years of the strategy and bring all the council’s woodlands up to the Sheffield Quality Standard within 10 years.
Councillor Mary Lea, Cabinet Member for Culture, Parks and Leisure at Sheffield City Council, said:
Sheffield’s abundance of trees and woodlands are the city’s finest assets. They’re a big part of what makes Sheffield so wonderful and well-loved by residents and visitors.
We recognise our responsibility to provide rich, diverse, healthy and attractive green spaces across the city and the need to invest in our natural assets.
We have set out clear and achievable actions that will help us to realise this vision not only for the city’s trees and woodlands but also the people who live, work, study and play in Sheffield.
The plans we have developed will help to address health inequalities in Sheffield, by improving green spaces in areas of the city where increased activity and access to the outdoors will have the most impact on health and wellbeing.
Working with partners across a range of projects we plan to increase the city’s tree stock by more 100,000 over a ten-year period, making Sheffield undeniably the country’s leafiest city.
Trees in Graves Park, Sheffield
The strategy covers the entire city, from the inner city to the parts of the Peak District National Park that falls within the Sheffield boundary and looks after trees that are in the city’s woodlands, parks, cemeteries ,housing estates and schools. A separate plan will be developed over the next year for the 36,000 street trees in the city, in partnership with relevant groups.
In developing the trees and woodlands strategy the council has also completed Forest Research’s internationally recognised I-Tree Eco survey. The results have shown that Sheffield has the most trees per person and the highest percentage of urban tree cover in any of the UK’s nine core cities.
Both The University of Sheffield and Sheffield Hallam University have worked in partnership with the council in developing research to support and inform the strategy.
Dr Jill Edmonson, EPSRC Living With Environmental Challenge Fellow at The University of Sheffield, said:
We are working with Sheffield City Council on a number of projects to co-produce research to ensure the sustainability and resilience of the city's urban tree population, particularly against future climate change and pest and disease outbreaks. We look forward to continuing this partnership in the coming years, contributing to the protection of Sheffield's trees and woodlands.
Lynn Crowe, Professor of Environmental Management at Sheffield Hallam University, said:
It is good to see the full value of Sheffield’s trees and woodlands described so well, and the overall intentions to continue to manage, protect and enhance that resource. I hope we can continue to work on the strategy together and that there will be further opportunities for our students to become involved, through placements and research projects.
With all activity for the next 15 years planned under four key strategic themes, the council has identified how it will bring together the city’s people, places, resources, projects, partners and assets, maximising every opportunity for the benefit of the city’s trees and woodlands.
Projects such as the Sheffield and Rotherham Wildlife Trust Lakeland Landscape Partnership, which works closely alongside the council’s newly launched Building Better Parks Strategy, will allow a joined-up approach to maintaining and expanding on existing initiatives like Sheffield’s Outdoor City Run Routes and Community Forestry events.
The council will seek to engage with local people, looking to not only increase volunteering opportunities, but, with the intention of tackling health inequalities, increase participation in outdoor activity using natural green spaces as a form of recreation and physical exercise.
The council will share details of how people can get involved in activities across their communities.
To keep up with events and latest news follow @ParksSheffield on Twitter and Sheffield Parks and Countryside on Facebook.
The strategy is expected to be approved at the council’s Cabinet meeting on Wednesday 12 December. The report is available to read in full on the Council’s website. | https://sheffnews.com/news/trees-and-woodlands-plan |
In a complex and dynamic environment that profoundly transforms logical and competitive dynamics, corporate training faces a dual challenge: innovating itself in order to innovate the company. Indeed, it needs to deal with changes in the cultural, technological, social, organisational and economic landscape, thereby transforming its strategies and actions. What does innovating training mean? Where does the transformation and development process begin? It begins with people, those who manage the process of creation, organisation and dissemination of knowledge within the company. The trainer 2.0 category includes anyone actively involved in the process of sharing of knowledge: from requirements analysis, programming paths and resources, delivery through to monitoring and on-the-job support. To deal with, manage and drive change, a trainer has to evolve into 2.0. They must necessarily add to their skills. In this sense, the topic of digital skills becomes a priority. The minimum requirement, although not sufficient, for digital social learning practices is the dissemination of a “minimum standard of digital skills” possessed by everyone in the organisation, starting with the trainer. The trainer becomes the protagonist and driver of change through training 2.0, which is to say:
- continuous and pervasive
- sustainable, with a view to optimising resources and internal knowledge
- innovative from a multimedia point of view and more effective.
How does a trainer evolve? What steps need to be taken towards a more evolved and conscious role? Here they are in detail:
- become aware of change affecting the role of the trainer (from teacher to learning facilitator)
- acquire key digital tools for more effective management of the entire training process
- operate more effectively in the design of training programmes and the creation of content
- improve the delivery phase in the classroom, making the utmost use of the potential provided by the web and new technologies
- manage the post-classroom phase, with particular reference to the management of online communities
- promote a digital culture and self-study approach through training 2.0
- know how to convey new digital skills to all users via a cascade process.
The supporting digital skills can be grouped into four main categories: Skill 1: SEARCH FOR SOURCES AND CONTENT ON THE WEB How to quickly search for content, contacts, specialist sites and especially how to verify their validity. How to select, filter and adapt the sources for each specific need and every target. Skill 2: ORGANISE, CLASSIFY AND SHARE CONTENT This means being able to resort to the use of internal and external environments to sort and classify content. In addition, it becomes increasingly important to know how to design as part of a team, sharing projects and materials in co-working environments, with the objective of capitalising and re-using training content. Skill 3: CREATE ENGAGING CONTENT Facilitating learning means searching for and trying new languages ??and new approaches to training. The key digital skill that needs developing in this regard is an ability to search online for multimedia tools to develop high-impact communication resources that are enjoyable and engaging, even for very technical materials and disciplines. The new generation trainer, in fact, involves participants in the creation of digital content. Reuses the wealth of movies, pictures, training pills, already acquired in the company. Skill 4: MIXING AND GUIDING EVOLUTION TOWARDS DIGITAL TRAINING Activating blended paths means mixing resources, guiding the classroom towards a more experiential approach, less oriented towards delivery. The classroom does not disappear, but evolves and becomes the focal point of a more structured and articulated path, consisting of digital resources and periods of guided self-learning. In particular, it becomes essential to know how to manage the post-classroom phase using digital and social tools to ensure involvement and ongoing support. How? Through: | https://www.skilla.com/en/digital-skills-of-the-new-trainer-2-0/ |
Posted by: Saving Water SA (Cape Town, South Africa) – partnered with Water Rhapsody conservation systems – 12 Aug 2011
WWF has received numerous reports from aboriginal groups on the north-eastern coast of Australia of large numbers of sick, starving and dead turtles washing up on beaches. The reports come following the loss of sea grasses after Cyclone Yasi and floods hit the area back in February.
The increase in turtle deaths for April may be more than five times higher this year compared to the same time last year.
“If these numbers are accurate, then this is a shocking development for the Great Barrier Reef” said WWF’s Conservation on Country Manager Cliff Cobbo. “We urgently need clarification from the Queensland Government on how many turtles are being found dead along the Great Barrier Reef coast”.
Turtle hospitals in Townsville, Queensland are being overwhelmed with sick and starving animals and do not have the resources to handle the number of turtles expected to need emergency care over the next 18 months.
Some local aboriginal groups have been so concerned by what they are seeing they plan to suspend issuing hunting permits within their saltwater country.
CEO of the Girringun Aboriginal Corporation, Phil Rist, said large numbers of dead turtles and dugongs had been found in recent weeks and that strandings are occurring on a weekly basis.
Numerous threats
WWF believes recent extreme weather events like Cyclone Yasi and the Queensland floods, together with threats such as entanglement in fishing nets, water pollution and large-scale coastal developments have led to this increase in deaths.
“In the past turtles have been healthy enough to deal with extreme weather events, but the combined pressure of more fishing nets, declining water quality and associated disease, on top of the loss of critical habitats as a result of large coastal developments have all undermined their chances of survival,” Cobbo said.
WWF is calling on both sides of Queensland politics to commit to building greater resilience in populations of threatened marine species on the Great Barrier Reef through reforming net fisheries, reducing land-based pollution on the reef, and better managing large coastal developments.
WWF’s Global Marine Turtle Programme
Five of the seven species of marine turtle are classified as endangered or critically endangered by the International Union for Conservation of Nature and Natural Resources (IUCN).
WWF has been working on marine turtle conservation for nearly 50 years and has provided a Global Marine Turtle Strategy to outline WWF priorities for marine turtle conservation.
The benefits of saving marine turtles go far beyond simply protecting these remarkable species.
Conservation efforts will make fisheries more sustainable and provide benefits to small communities and with marine turtles becoming increasingly important as an ecotourism attraction, a live turtle is worth more than a dead turtle. | http://www.savingwater.co.za/2011/08/12/15/dead-turtles-wash-up-on-australian-beaches/ |
- Work with Back Office Support and Help Desk to troubleshoot problems in LMS related to training delivery, student accounts, and Course sharing with Audience types.
- Analyze student transcripts, correct student records, and adjust errors for Employees, Customers and Partner Empower Certifications.
- Resolve customer complaints, determine the cause of the problem, resolve customer issues, expedite problem resolution, and follow up to ensure resolution.
- Work with the PIC (Partner Interaction Center) Team to ensure Partner students for upcoming/completed training deliveries have accounts in LMS.
- Positive attitude, proactive, team player and a self starter. Able to work independently when required.
- Familiarity with Google Mail, IM, Sheets, Docs, etc. | https://www.monster.com.my/job-vacancy-hiring-for-x22-training-coordinator-x22-quess-corp-limited-penang-1-3-years-22382510.html |
We are committed to providing a top quality service for our customers, suppliers, funders and other business associates. However we appreciate that you might encounter frustrations within parts of the leasing process and at times our partners and / or ourselves might make an error that negatively impacts your experience. As a team we really want to take ownership and learn from these issue to improve our business and to turn around your experience into a more positive one. Because of this approach and also our regulatory obligations we aim to respond positively and quickly to all complaints.
We recognise that many customers concerns may be raised informally with our staff, and that these can often be resolved immediately or at least very quickly. We define an informal complaint as one that is both resolved quickly and is outside of the jurisdiction of the regulator (FCA). Examples can includes complaints that arent relating to the finance itself including supply or mechanical issues. It is important to note that these complaints are not eligble for escalation to the financial ombudsman service however customers can use the BVRLA conciliation service for disputes.
Resolve informal concerns in a satisfactory and timely manner.
Empower our staff to deal with the issue at first hand either verbally or over email.
Enable mediation between the complainant and the individual or company to whom the complaint has been referred (e.g. dealership or manufacturer).
Log all complaints so that we can improve our process and where possible remove such issues for future customers.
An informal approach to complaint handling is deemed appropriate only when it can be achieved. If concerns cannot be satisfactorily resolved informally, we will follow our formal complaints procedure including investigation via our designated complaints handler.
To make an informal complaint please click here.
We will not be able to resolve all complaints immediately and that some issues will be complex, requiring investigation to determine what has gone wrong within the process.
Provide clear instruction on our complaints procedure via our customer facing website.
Ensuring making a complaint is as easy as possible.
Treat each complaint as a clear expression of dissatisfaction with our service which calls for an immediate response.
Deal with all complaints promptly, politely and when appropriate, confidentially.
Respond in the right way - for example, with an explanation, an apology and if appropriate a financial contribution to ensure the customer is not out of pocket due to error.
Review each complaint and learn from them, use them to improve our service, and review annually our complaints policy and procedures.
Log all complaints and if a resolution is not achieved make sure the customer knows what options are available including the Financial Ombudsman and the BVRLA Services.
Lodge their complaint, in writing, either through the online facility at the bottom of this page, by e-mail or by letter to Gateway2Lease. Alternatively we can also take complaints over the phone.
Explain the issue as clearly and as fully as possible, including details of any prior communication or actions taken to date.
To be aware that Gateway2Lease may need to do a full review to enable us to respond appropriately.
To make a formal complaint via this website, please click here.
We recognise that many concerns may be raised informally by our customers e.g. over the phone and without stating that this issue is formally a complaint. These concerns can often be resolved immediately without a formal response in writing. To help customers understand our process we want to share our definition of an informal complaint as one that is in relation to a product or service that isn't provided by Gateway2Lease. For example where a vehicle gets delayed due to quality control checks. Another reason why we would deem a complaint as informal is where the complaint does not fall under the jurisdiction of the Financial Ombudsman Service.
Keep matters low-key with empowered, knowledgeable staff to deal with the issue at first hand.
An informal approach is appropriate when it can be achieved but if concerns cannot be satisfactorily resolved informally, then the formal complaints procedure should be followed.
We define a formal complaint as one where an eligible complainant expresses dissatisfaction towards a product or service provided by Gateway2Lease. These complaints also should fall under the financial ombudsman service jurisdiction.
Formal complaints - what are the steps and timescales?
The complaint is received by Gateway2Lease via our web form below, in writing, via email or via the telephone. Letters should be written for the attention of the Complaints Manager and our contact details are here.
You can expect your complaint to be acknowledged immediately when using our online facility, or within 5 working days from the complaint investigator at Gateway2Lease. If the complaint handler is able to send a final response within 5 working days you will just receive the final response letter. It is our aim at Gateway2Lease to acknowledge your complaint as soon as possible.
If the final response is accepted by the complainant then please jump to step 5.
If you have received an acknowledgement from us, the complaint investigator will resolve your complaint fully within four weeks or alternatively send a holding response if we have been unable to produce a final response within this timescale.
If you have received a holding response from us, the complaint investigator will aim to resolve your complaint fully within eight weeks or alternatively send a further holding response.
If the full resolution response has been issued by Gateway2Lease and this is accepted by the complainant then please jump to step 5.
Step 5 - what happens if the complainant does not accept the resolution?
At this stage the complainant has two options available. If the complaint is regarding an issue that is under the jurisdiction of the financial ombudsman service (FOS) then the complainant can write to the FOS and have them investigate the complaint on an indepenant basis. We will clasify your complaint write at the beginning of the complaint process and will be to give you details of eligibility and also the process regarding the FOS.
Where complaints fall outside of the FOS jurisdiction the complainant also has the option to get in touch with the BVRLA (trade body for rental and leasing). The BVRLA offer a conciliation service and as Gateway2Lease are an accredited member you have access to ask for an independant review.
If you would like to make a complaint about the service you have received from G2L then please fill out the form below. A designated complaint handler will be in touch with you regarding your complaint in line with our procedure noted above. | https://www.gateway2lease.com/complaints-process.php |
[QUEZON CITY, 16 August 2019] – Celebrating it's 32nd founding anniversary, the Department of Agriculture's Bureau of Agricultural Research (DA-BAR) has officially launched this year's Agriculture and Fisheries Technology Forum and Product Exhibition at the DA-BAR Grounds, Quezon City.
DA-BAR Director Dr. Nicomedes Eleazar, in his opening remarks, mentioned that the event is in line with the paradigm of DA Secretary Dr. William Dar, which is to modernize the Philippine agriculture through agripreneurship.
"There is a need for the (agriculture) sector to be modernized and industrialized, and one way to achieve that is to exploit the potential of R&D and make sure that mature technologies reach smallholder agriculture and create agripreneurs," said Dr. Eleazar.
In his keynote speech, DA Secretary Dr. William Dar highlighted the direction and vision of the Department under his stint.
"We envisioned a food secure Philippines, with prosperous farmers and fisherfolk. This is the 'new thinking', the center of development in agriculture is the farmers and fisherfolk," Dr. Dar said.
Likewise, the new secretary urged agencies to anchor their plans, programs, projects and activities toward the Department's vision and goals. He also stressed the need to have good data management system in the Department.
"Let us elevate our gain in terms of improving data management in all agencies," said the DA secretary.
"We are here to help this country grow our sector of agriculture, and the technologies that we generate are the engines of this growth on agriculture," Dr. Dar concluded.
Meanwhile, the event also highlighted the launching of the second edition of Dr. Dar's book titled ‘The Way Forward: Level Up Philippine Agriculture.’ The sequel places emphasis on harnessing research & development (R&D) for agriculture, and on creating agripreneurs.
"Through this book, I am optimistic that more and more individuals and organizations from government, private sector and civil society will join the growing movement to make Philippine agriculture a modern and vibrant sector, where technology is a major driver, more agri-based enterprises and jobs are created, smallholders and agripreneurs are resilient to the effects of climate change, and growth is inclusive to alleviate poverty," wrote Dr. Dar, the InangLupa Movement President.
The annual staging of the national technology forum seeks to showcase collaboration forge between and among agencies toward a common goal of improving the resiliency and productivity of the farmers and fisherfolk.
Series of seminars were laid out to feature research-generated technologies that will not only provide insights, but will also encourage the public to venture into livelihood and business opportunities.
The event, which ran from August 14-16, 2019, was participated by around 50 exhibitors from various R&D partner institutions such as the regional field offices of the Department of Agriculture, the Bureau of Fisheries and Aquatic Resources, along with state universities and colleges, international organizations, non-government organizations, and local government units.
BFAR Caraga, with the support of Regional Director Visa T. Dimerin and the active participation of training division Chief Anna Melissa M. Talavera and its regional staff, put up a booth in the exhibit area. The group displayed products derived from some of the Regional Bureau's trained organizations that venture fish processing and value-adding.
The training division chief also attended a series of seminars and product demonstration on processing technologies of various agricultural commodities such as coffee, batuan, soybean, jackfruit, and ginger to name a few. | https://caraga.bfar.da.gov.ph/WebsiteNavigation?id=0161a151-72a8-4bcd-88f8-03516a53a3a1&pageAction=contentFrame |
Chemistry GK Questions Quiz-36
Chemistry Multiple Choice Questions (MCQs) Quiz for State and UPSC Civil Services Examinations. Objective Questions on Chemistry for competitive examinations.
701. Which of the following is very reactive and kept in kerosene?
(1) Sodium
(2) Potassium
(3) Iodine
(4) Bromine
Answer:
701. (1) Sodium is a very reactive metal. It reacts vigorously with oxygen and water. A lot of heat is generated in this process. Therefore, it is stored in kerosene to avoid contacts between either atmospheric oxygen or water.
702. In the periodic table of elements, on moving from left to right across a period, the atomic radius
(1) decreases
(2) increases
(3) remains unchanged
(4) does not follow a definite pattern
Answer:
702. (1) The atomic radius is the distance from the atomic nucleus to the outermost stable electron orbital in an atom that is at equilibrium. It tends to decrease across a period from left to right. It usually increases while going down a group due to the addition of a new energy level (shell).
703. Vulcanized rubber contains sulphur
(1) 2%
(2) 3-5%
(3) 7-9%
(4) 10-15%
Answer:
703. (2) A vulcanized flexible tyre rubber contains about 3 –5% of sulphur whereas hard rubber (ebonite) contains about 32% of sulphur. The stiffness of vulcanized rubber depends on the amount of sulphur added.
704. Which of the following is a metallic ore ?
(1) Mica
(2) Quartz
(3) Feldspar
(4) Galena
Answer:
704. (4) Galena is the most abundant lead mineral. It is a metallic, lead-gray mineral with cubic cleavage and a distinctly high density. It belongs to the octahedral sulfide group of minerals with metal ions in octahedral positions.
705. The moderator used in a nuclear reactor is
(1) Uranium
(2) Radium
(3) Ordinary water
(4) Graphite
Answer:
705. (3) Light water (ordinary water) is used as the moderator in U.S. reactors as well as the cooling agent. It acts as the means by which heat is removed to produce steam for turning the turbines of the electric generators.
706. The chemical name of “Plaster of Paris” commonly used for setting broken bones is
(1) Calcium nitrate
(2) Calcium sulphate
(3) Calcium carbonate
(4) Calcium chloride
Answer:
706. (2) Plaster of Paris is the common name of Calcium Sulphate hemihydrate, with chemical formula:
CaSO 4.1/2H2O. Plaster of Paris is produced by heating gypsum to about 150°C.
707. The apparatus used to test acidity of aqueous solution is
(1) pH meter
(2) Ammeter
(3) Hygrometer
(4) Acidmeter
Answer:
707. (1) A pH meter is an electronic device used for measuring the pH (acidity or alkalinity) of a liquid. A typical pH meter consists of a special measuring probe (a glass electrode) connected to an electronic meter that measures and displays the pH reading.
708. Chemical formula of washing soda is
(1) Na2SO4.10H2O
(2) NaHCO3
(3) Na2CO3.10H2O
(4) Ca(OH)2
Answer:
708. (3) Washing Soda is essentially Sodium Carbonate, a sodium salt of carbonic acid (soluble in water). The molecular formula of washing soda is Na2CO3.10H2O. It is used as an agent to soften hard water. It reacts with the calcium and magnesium bonds present in the water, enabling the detergent to work.
709. Hydrochloric acid is also known as
(1) Galic acid
(2) Picric acid
(3) Muriatic acid
(4) Chloric acid
Answer:
709. (3) Hydrochloric acid was historically called acidum salis, muriatic acid, and spirits of salt because it was produced from rock salt and green vitriol and later from the chemically similar substances common salt and sulfuric acid. Hydrochloric acid is found naturally in gastric acid.
710. The inert gas used as beacon light is
(1) Kr
(2) Ar
(3) He
(4) Ne
Answer:
710. (4)Neon is used in neon discharge lamps and advertising signs because the neon lights are visible from long distances. Since the light of neon signs has a better penetrating power through fog and mist, the neon signs are also used in beacon lights for the safety of air and sea navigation.
711. The chemical name of baking soda is
(1) Sodium carbonate
(2) Sodium bicarbonate
(3) Sodium chloride
(4) Sodium nitrate
Answer:
711. (2) Sodium bicarbonate (NaHCO3) is also known as baking soda. It is a chemical leavening agent which is added to baked goods before cooking to produce carbon dioxide and cause them to ‘rise’.
712. Chemical name of common salt is
(1) Sodium Chloride
(2) Sodium Bicarbonate
(3) Sodium
(4) Sodium Oxide
Answer:
712. (1) Sodium chloride, also known as salt, common salt, table salt or halite, is an ionic compound with the chemical formula NaCl, representing equal proportions of sodium and chlorine. In the form of table salt, it is commonly used as a condiment and food preservative.
713. Which one of the following mineral does not contain oxygen ?
(1) Haematite
(2) Bauxite
(3) Cryolite
(4) Calcite
Answer:
713. (3) Cryolite (Na3AlF6, sodium hexafluoroaluminate) does not contain oxygen. It occurs as glassy, colorless, white-reddish to gray-black prismatic monoclinic crystals. Cryolite is used as an insecticide and a pesticide. It is also used to give fireworks a yellow color.
714. A non–electronic conductor is
(1) Iron
(2) Gas Carbon
(3) Copper Sulphate
(4) Mercury
Answer:
714. (*) Either the wording of the question is wrong or it doesn’t have a correct option. A non-conductor is a substance which does not allow the passage of electricity. As a general rule, all metals (Iron, Mercury, etc) are good conductors. Nonmetals are non-conductors, except for carbon in the form of graphite and the gas carbon. Copper Sulphate is a good electrolyte (a liquid which allows the passage of electricity. So all the options given in the question are good electrical conductors.
715. Which of the following will replace hydrogen from acids to form salts ?
(1) S
(2) Na
(3) Ag
(4) P
Answer:
715. (2) All acids contain hydrogen atom (s). Dilute acids react with some metals such as Sodium, Potassium, Calcium, iron, etc to form salts. Sodium replaces two hydrogen atoms from Sulfuric acid (H2SO4) to form a normal salt, Sodium Sulphate (Na2SO4). If only one atom of hydrogen is replaced by sodium, it forms an acid salt, Sodium Hydrogen Sulphate (NaHSO4).
716. Which of the following metals has least melting point ?
(1) Gold
(2) Silver
(3) Mercury
(4) Copper
Answer:
716. (3) The melting point of the given metals (in Celsius) are:- Gold: 1063; Silver: 961;Copper: 1083; Mercury: -38.86. Mercury is the only elemental metal known to melt at a generally cold temperature.
717. The gas produced in marshy places due to decomposition of vegetation is
(1) Carbon monoxide
(2) Carbon dioxide
(3) Sulphur dioxide
(4) Methane
Answer:
717. (4)Methane gas is a hydrocarbon gas largely composed of methane formed when organic material or vegetation decays in the absence of air. Naturally occurring methane is mainly produced by the process of methanogenesis. It is also known as Swamp Gas.
718. The chemical name of ‘‘Hypo’’ commonly used in photography is
(1) Sodium thiosulphate
(2) Silver nitrate
(3) Sodium nitrate
(4) Silver iodide
Answer:
718. (1) An emulsion of sodium thiosulfate is called hypo by photographers. It is used to stop development of exposed film. Thiosulfate converts undeveloped silver bromide grains in the film into water-soluble silver thiosulfate complexes that can be removed when the film is washed.
719. Carborundum is another name of
(1) Silicon carbide
(2) Silicon oxide
(3) Calcium carbide
(4) Calcium oxide
Answer:
719. (1) Silicon carbide, also known as carborundum, is a compound of silicon and carbon with chemical formula SiC. It occurs in nature as the extremely rare mineral moissanite. Silicon carbide powder has been mass-produced since 1893 for use as an abrasive.
720. Number of atoms present in one mole of a gas at STP is
(1) 6.023 × 1020
(2) 6.023 × 1023
(3) 6.023 × 10–23
(4) 6.023 × 10–20
Answer:
720. (2) A mole of a gas is the amount of a substance containing 6.023 x 1023 atoms. This is known as
Avogadro’s number. 1 mole contains the same number of particles as there are in 12 g of carbon-12
atoms by definition. 12 g of carbon-12 atoms = 6.022 x 1023 carbon atoms.
यह भी देखे : | https://www.nationalgk.com/2021/01/chemistry-gk-questions-quiz-36.html |
Responders Supporting Responders!
The Kentucky Community Crisis Response Board (KCCRB) would like to introduce you to the Kentucky Emergency Services Peer Support team (KESPS). KESPS provides the entire spectrum of services from pre-incident training, acute crisis response, and post incident support to emergency services personnel across the Commonwealth.
KCCRB is a state agency, consisting of a board of directors (17 members) and an administrative office (5 staff persons), that manages the KESPS. The team consists of fire fighters, emergency medical services, search and rescue, and dispatch personnel who are trained, credentialed, and on-call to respond to critical incidents and provide Psychological First Aid and peer support in Kentucky.
First responders are trained to use tactical strategies and skills in crisis situations to protect lives and property. Through extensive coursework and field experience they develop the skills to perform the required tasks in a traumatic situation, often without long-lasting impacts. However, one particularly “bad” run or the cumulative effect of several traumatic incidents can overwhelm normal coping mechanisms for first responders of all ages and experience.
At the core of being a first responder is helping others during traumatic situations. As an EMS responder you experience physical and psychological stressors from long shifts, high call volumes, sleep deprivation and low pay associated with your career. Additional stressors, such as runs involving children, mass casualty incidents, or runs involving a personal connection, can exacerbate stress reactions. Support from other EMS providers in addition to critical incident stress management services is critical to mitigate the impacts of traumatic incidents or cumulative stress.
The purpose of the KESPS team is to provide critical incident stress management services during the acute phase following a critical incident. Peer support in providing these services can prevent the destructive effects of emotional trauma, job-related stress, and to accelerate recovery. In the absence of support services,
stress reactions can negatively impact an individual’s performance, career, health and personal relationships.
KESPS is a specialized strike team within the Kentucky Community Crisis Response Board. KCCRB recruits, trains, and credentials experienced emergency services personnel to be peer members of the statewide KESPS team. The team receives training in providing multi-component critical incident stress management (CISM) interventions, and suicide awareness and assessment training.
If you would like more information on becoming a member of the KESPS team or training opportunities for your agency, please contact our office at 502-607-5781 or visit our website at
https://kccrb.ky.gov/crt/Pages/KESPS.aspx
Download a brochure
HERE
.
New NHTSA Video Explains the Importance of EMS Data Collection and Use
The NHTSA Office of EMS recently released a two-minute video that shows how EMS data is used to improve EMS systems and patient care at the local, state, and national levels.
It's important that every member of the EMSC community understand the vital role that data and information can play in improving the safety and effectiveness of EMS. It's the frontline providers caring for people every day who generate and collect this information - and the better they understand how it benefits their patients and communities, the better the quality of the data.
Your copy should address 3 key questions: Who am I writing for? (Audience) Why should they Creating a culture of science and data in EMS takes a concerted effort by all of us. Please share the video and message about data in order to reach the broader EMS workforce across the nation.
You can find the video on
EMS.gov
or
YouTube
.
Articles of Interest
Prehospital Pain Management: Disparity By Age and Race
, Hilary A. Hewes, Mengtao Dai, N. Clay Mann, Tanya Baca & Peter Taillac (2017): Prehospital Emergency Care, DOI: 10.1080/10903127.2017.1367444
IMPORTANCE: Historically, pain management in the prehospital setting, specifically pediatric pain management, has been inadequate despite many EMS (emergency medical services) transports related to traumatic injury with pain noted as a symptom. The National Emergency Services Information System (NEMSIS) database offers the largest national repository of prehospital data, and can be used to assess current patterns of EMS pain management across the country.
CONCLUSIONS: Documentation of pain as a symptom and pain treatment continue to be infrequent in the prehospital setting in all age groups, especially young children. There appears to be a racial disparity with Black patients less often treated with analgesics. The broad incorporation of national NEMSIS data suggests that these inadequacies are a widespread challenge deserving further attention.
Download the full article
HERE
.
P
r
ehospital Administration of Epinephrine in Pediatric Anaphylaxis – A Statewide Perspective
,
Leslie M. Cristiano, Brian Hiestand, Jason W. Caldwell, W. Adam Gower, Antonio R. Fernandez, Katherine Gilbert & James E. Winslow (2018):
Prehospital Emergency Care
,
DOI: 10.1080/10903127.2017.1376137
Objective: Timely administration of epinephrine is critical in the treatment of anaphylaxis. This study sought to determine the frequency of administration of epinephrine by EMS providers caring for pediatric patients in the prehospital setting.
Conclusion: There are missed opportunities for prehospital administration of epinephrine in pediatric patients with anaphylaxis. Very young children (age < 10) had increased odds for not receiving epinephrine.
Abstract available
HERE
.
Evidence-Based Guidelines for Fatigue Risk Management in Emergency Medical Services,
P. Daniel Patterson
, PhD, NRP,
J. Stephen Higgins
, PhD,
Hans P. A. Van Dongen
, PhD,
Daniel J. Buysse
, MD,
Ronald W. Thackery
, JD,
Douglas F. Kupas
, MD, et al.,
Prehospital Emergency Care
,
DO
I:
10.1080/10903127.2017.1376137
“Fatigue is widespread in EMS and is not isolated to one type of EMS operation or category of EMS clinician. The administrators of EMS organizations are tasked with creating shift schedules and mitigating threats to safety. Unfortunately, these administrators are not equipped to address fatigue in the workplace, in part because they have no guidance on how to manage fatigue in the workplace,” said Daniel Patterson, Ph.D., lead author, assistant professor of emergency medicine at the Pitt School of Medicine, and active paramedic clinician. “Operating an ambulance is dangerous and fatigue can threaten safe operation of the vehicle,” said Patterson. “Aside from driving, most of the work EMS clinicians do is patient care, and fatigue can have negative consequences for decision-making abilities and overall performance. The outcomes of fatigue can be devastating for EMS personnel and their patients.”
Patterson and his team of two-dozen co-investigators and staff reviewed more than 38,000 pieces of literature, completed seven systematic literature reviews, including three meta-analyses. Investigators synthesized the quality of the evidence for a panel of experts, who used this information to create evidence based guidelines for fatigue risk management.
"Evidence Based Guidelines for Fatigue Risk Management in Emergency Medical Services” are now available at
THIS LINK
and all companion
materials, including background information, systematic reviews, evidence tables, and expert commentaries can be freely accessed at
THIS LINK
Download the NASEMSO Fatigue Infographic
HERE
.
Click here to subscribe to KID STUFF!
Upcoming Conferences, Meetings,
Educational Opportunities
Bound Tree University Classroom
Free Online CEUs
Bound Tree University offers free online CEUs for EMTs and Paramedics. The courses have been accredited by EMS1 Academy, a CAPCE accredited organization.
They offer two pediatric courses: Pediatric Shortness of Breath and Safe Transport of the Pediatric Patient, along with 8 other classes.
Save the date for the third annual meeting of the Kentucky Pediatric Emergency Care Coalition (KPECC), a voluntary and collaborative effort to improve emergency medical care for children. We need everyone, from our children’s hospitals to our community and critical access hospitals, along with other partners, working together so that we can improve the care our children received when it matters most.
Join us as we work together to raise the bar on pediatric readiness in the ED, to include pediatric metrics in our QI programs, to increase capacity and disaster preparedness to address pediatric issues, and ultimately…to decrease morbidity and mortality for ill and injured children.
We would like to see every hospital join the Kentucky Pediatric Emergency Care Coalition at our third annual meeting on February 21, 2018, in Lexington, KY.
February 21, 2018
9 am to 4 pm @
The Hilary J. Boone Center
500 Rose Street
Lexington, KY
No registration fee!
(but pre-registration is required)
Who should attend?
Every hospital is invited to participate. ED Nurse Managers, ED Medical Directors or Physicians, and providers working with QI Programs and/or Trauma Programs would be excellent representatives, but anyone with a special interest in emergency pediatric care is welcome.
More info to come:
We are still finalizing some of the meeting details but we wanted you to know now so you can save the date! An agenda and registration information will be available soon
.
Please let us know if you would like to be added to the contact list for this meeting!
Contact:
Morgan Scaggs
859-256-3573
[email protected]
Register Now - Teaching Mass Casualty Triage: Implementing the new MUCC Instructional Guidelines
EMS Focus webinar hosted by NHTSA’s Office of EMS on February 7 at 1pm EST
Mass casualty incidents usually don't obey jurisdictional boundaries, with responses often involving multiple agencies, regions and even states. Several years ago, to help ensure consistency when responding to these incidents, a group of experts created the Model Uniform Core Criteria for Mass Casualty Incident Triage, or MUCC. While not a system of triage itself, MUCC created a standard set of guidelines that all mass casualty systems should follow. Upon the recommendations of the National EMS Advisory Council and the Federal Interagency Committee on EMS, instructional guidelines were then developed
to help EMS educators teach the basics of MUCC during initial and continuing education for all levels of EMS personnel.
In this webinar, you'll hear from Dr. E. Brooke Learner, a former EMS field provider and researcher at the Medical College of Wisconsin who served as lead investigator for the development of MUCC; Kandra Strauss-Riggs with the National Center for Disaster Medicine and Public Health, which partnered with NHTSA to develop the new instructional guidelines; and Leaugeay Barnes, an EMS educator who piloted the use of the instructional guidelines. EMS educators and training officers, state regulators and anyone interested in the medical response to major incidents won't want to miss this chance to learn more about improving coordination during these incidents.
Click here to register!
Download this infographic and other safety tip sheets at
Safe Kids Worldwide
.
Contact Info for KY EMS for Children
A federal and state partnership grant held by the KY Board of EMS
Morgan Scaggs
KYEMSC Project Director
[email protected]
118 James Court, Ste. 50, Lexington, KY 40505
(859) 256-3583
Ideas or submissions for future editions are welcome!
Previous issues can be found on our website
HERE
. | https://myemail.constantcontact.com/KID-STUFF---a-newsletter-from-KY-EMS-for-Children.html?soid=1123159534045&aid=c8vaAX_423A |
About Reo's Kitchen & Catering Caterers
Why choose Reo's Kitchen & Catering?
Japanese food is one of the most popular cuisines in the world and for good reason. Based on “rules of five,” traditional Japanese cooking, or washoku, emphasizes variety and balance. This is achieved through the use of five colors (black, white, red, yellow, and green), five cooking techniques (raw food, grilling, steaming, boiling, and frying), and five flavors (sweet, spicy, salty, sour, and bitter). These principles can be found even in a single meal of one soup and three sides paired with rice, 一汁三菜 (ichiju-ju, san-sai). With its aesthetic of beautifully presented food and the use of fresh, high-quality seasonal ingredients, it's no wonder that Japan's cuisine is so delicious and so highly prized by people around the world. If you're looking to expand your knowledge of Japanese food, here are ten of the best traditional Japanese dishes. | https://caterersnearme.com.au/reo-s-kitchen---catering |
.
Download the Study Guide
1 Student Essay
12 Encyclopedia Articles
...and more
Study Pack
The
Endangered species
Study Pack contains:
Encyclopedia Articles
(12)
Endangered Species
1,435 words, approx. 5 pages
Endangered Species An endangered species is one that is likely to become extinct throughout all or part of its geographic range unless steps are taken to prevent its loss. Many of the species currentl...
Read more
Endangered Species, Measuring
1,761 words, approx. 6 pages
Endangered Species, Measuring The U.S. Endangered Species Act (ESA) is one of the most important and controversial legislative acts in recent years. This law requires the use of specific measures to p...
Read more
Endangered Species
1,952 words, approx. 7 pages
Endangered Species An endangered species is a species that is in immediate danger of becoming extinct. The designation of endangered to a species means that there is still time to save it but once it ...
Read more
Extinction and Endangered Species
4,853 words, approx. 17 pages
Extinction and Endangered Species Earth is a biosphere, a globe richly supplied with different types of living organisms, including animals, plants, fungi, and bacteria. Living organisms are named and...
Read more
Endangered Plants and Ecosystems
15,334 words, approx. 52 pages
Endangered Plants and Ecosystems Well over half the threatened and endangered species listed with the U.S. Fish and Wildlife Service are plants. There are a total of 714 threatened and endangered flow...
Read more
Endangered Mammals
8,851 words, approx. 30 pages
Endangered Mammals The majority of threatened and endangered mammals are imperiled for the same reasons as other biological species—habitat destruction, pollution, competition with invasive spe...
Read more
Endangered Species
551 words, approx. 2 pages
Endangered Species Some species adapt to natural changes in their environment such as climate change and increased competition from other species. The two to four million plants and animals that exist...
Read more
Endangered Species
1,114 words, approx. 4 pages
Endangered Species An "endangered species" under United States law (the Endangered Species Act ) is a creature "in danger of extinction throughout all or a significant por...
Read more
Rare Species
149 words, approx. 1 pages
Rare Species A species that is uncommon, few in number, or not abundant. A species can be rare and not necessarily be endangered or threatened, for example, an organism found only on an island or one ...
Read more
Endangered Species
19,790 words, approx. 66 pages
Protecting endangered species is both a scientific and a political challenge. Scientists differ on how many species are heading for extinction, and therefore whether the world faces a crisis of extinc...
Read more
Endangered Species
18,254 words, approx. 61 pages
IN BRAZIL, FARMERS clearing land for planting crops are destroying the habitat of the golden lion tamarin, a South American monkey, driving it to the edge of extinction. In India, poachers ruthlessly ...
Read more
Endangered Species
36,417 words, approx. 122 pages
“As Congress continues to mull over sweeping changes in the Endangered Species Act and the Wise Use movement continues to fight reintroduction, the future of federal intervention on behalf of ra...
Read more
Essays & Analysis
(1)
Saving Endangered Species
649 words, approx. 3 pages
It's true that many, perhaps most, species have become extinct as a result of natural process rather than human interference. After all, compared to the existing time of the planet, human history is t...
Read more
Download the Study Pack
BookRags
About BookRags
|
Customer Service
|
Terms of Service
|
Copyright 2021 by BookRags, Inc.
FOLLOW BOOKRAGS: | http://www.bookrags.com/Endangered_species/ |
How can you show citizenship in your community?
How can you show citizenship in your community?
Be a law-abiding citizen in the community, with scouts, at school, and in church, and always strive to improve the community with a happy attitude. Chart the organization of your local or state government. Show the top offices and tell whether they are elected or appointed.
What does citizenship mean in a community?
A citizen is a participatory member of a political community. Citizenship is gained by meeting the legal requirements of a national, state, or local government. A nation grants certain rights and privileges to its citizens. In return, citizens are expected to obey their country’s laws and defend it against its enemies.
How do you complete citizenship in the community merit badge?
Include information about the history, cultures, and ethnic groups of your community; its best features and popular places where people gather; and the challenges it faces. Stage your presentation in front of your merit badge counselor or a group, such as your patrol or a class at school.
What does it mean to be a good citizen BSA?
Good citizens care about other people. Good citizens have respect for other people. Good citizens are responsible for what they do and do not do. Good citizens are brave enough to do the right thing. Have the Cub Scouts each make a poster showing things that they can do to be a good citizen.
What are your rights as a citizen?
They guarantee rights such as religious freedom, freedom of the press, and trial by jury to all American citizens. First Amendment: Freedom of religion, freedom of speech and the press, the right to assemble, the right to petition government. Second Amendment: The right to form a militia and to keep and bear arms.
What are the obligations of citizenship?
Every U.S. citizen must obey federal, state and local laws, and pay the penalties that can be incurred when a law is broken. Paying taxes. All citizens must pay taxes in one form or another, including federal, state, local, Social Security, property and sales taxes.
Why is citizenship important to the community?
Active Citizenship supports democratic cooperation that is based on the acceptance of universal human rights and the rule of law, values diversity and includes the whole community.
How many service hours do you need for citizenship in the community merit badge?
eight hours
The most involved is either volunteering at least eight hours with a local charitable organization, or creation and delivery of a public presentation, both of which will require some real effort.
What is the most important right of a citizen?
The freedom to vote was ranked as the most important human right in five of the eight countries. The United States values free speech as the most important human right, with the right to vote coming in third. Free speech is also highly valued in Germany: its citizens also see this as most important.
What does citizenship in the community?
What citizenship in the community means. The link between a person living in a community and the community; it is associated with the right to live and work in the community and to participate in the political life of the community.
What does it mean to be a good citizen Boy Scouts?
Cub Scout #1 – As a good citizen I will try to be helpful and kind. Cub Scout #2 – I will strive to take a good care of all property and practice safety and health rules. Cub Scout #3 – I will practice thrift and good work habits. Cub Scout #4 – I will show a respect for authority. I will be honest and dependable.
Why do you think citizenship is defined as membership in a community?
What does citizenship mean to a person?
The definition of citizenship is the status of being a citizen, along with the rights, duties and privileges of being a citizen. An example of citizenship is someone being born in the United States and having access to all the same freedoms and rights as those already living in the US.
What are the rights of Citizenship?
However, there are certain rights that are only granted to U.S. citizens, including the right to vote, to apply for federal employment, to run for elected office, to obtain a U.S. passport and to not be denied re-entry into this country.
What are the obligations of Citizenship?
Respect and obey federal, state, and local laws. Respect the rights, beliefs, and opinions of others. Participate in your local community. Pay income and other taxes honestly, and on time, to federal, state, and local authorities.
What is the importance of good citizenship?
A good citizen is a person who understands and fulfills their rights and duties within their society. One of the many benefits of being a good citizen is promoting a sense of belonging. When you do your job well, it creates a sense of community. An important part of being a good citizen is obeying the law of the land.
What is the role of the citizen in the community and the nation and as a member of the world community?
At a world level they are found in the Universal Declaration on Human Rights, one of the first links between the international system and the individual. Citizens have responsibilities as well. They are expected to vote, pay taxes, obey the law, and perform voluntary public service like serving on juries.
What is citizenship short answer?
What is citizenship answer short answer?
How do you answer citizenship?
A person is or becomes a United States citizen by birth within the 50 States, the District of Columbia, or by naturalization. Select “Yes, I am a U.S. Citizen” if you meet this criteria. | https://stockingisthenewplanking.com/how-can-you-show-citizenship-in-your-community/ |
The United Arab Emirates should be on every traveler’s must-see list due to its tall structures, luxurious hotels, luxury retail malls, and breathtaking beachfront. Some of the best hotels and resorts in the world may be found in the UAE, which is a wonderful historical gallery. This area draws tourists in addition to these sky-touching structures with the help of its mosques, galleries, and—most considerably artificial islands.
While everyone looks forward to visiting and experiencing this “exclusive holiday location,” if you look into its parks, oceans, and deserts in more depth, you will be enchanted by its lovable nature, rich history, and distinct culture. The Burj Khalifa, the Sharjah Heritage Museum, the Fujairah Fort, and the Al Ain Oasis are just a few places where you can witness hidden gems in the UAE. This nation has a thrillingly adventurous side, but it’s also great for a holiday, a family vacation, or even a getaway with friends.
The best Things to Do in Abu Dhabi like kayaking, hiking, zip lining, and mountain biking are among the sports available in the mountains, deserts, and seas. The gulf, which is home to a diverse array of marine life, and nature reserves provide you the chance to witness some rare kinds of plants, animals, and birds, respectively.
1. Jebel Ali
An unusual hidden gem in the UAE is Jebel Ali. It is a port that is situated outside of Dubai, making it ideal for people who want to enjoy both this port and Dubai. You may cycle, drive, or even hike to the top of Jebel Hafeet, the second-highest peak in the UAE, where you can see the lush vegetation in all its splendour. This location in Al Ain gives you a view of both the Omani border and the vastness of Al Ain. You may also visit the nearby museums, forts, and tombs while you’re here, so it’s not only a panoramic view you’ll be getting from this free access location.
You can go there whenever you want because it is open all day. There are other nearby attractions, including Bollywood Parks and Legoland. In addition to them, Jebel Ali Beach is one of the most unique locations in the United Arab Emirates and offers a peaceful experience and loads of Indoor Activities in Dubai.
2. Umm al-Quwain
The nicest gardens and water parks, a lovely shoreline, and a range of museums and other cultural events can all be found in Umm al-Quwain, a small coastal town in the United Arab Emirates. One of the top destinations in the UAE for family travel, make sure to check out Dreamland Aqua Park and UAQ National Museum while you’re here.
3. Sir Bani Yas
The largest uninhabited island in the United Arab Emirates is known as Sir Bani Yas. It was formerly one of the best natural reserves in Arabia and continues to be a haven for a wide range of plants and animals today. Here, you may go on safaris, animal viewing excursions, bird watching excursions, mountain biking excursions, snorkelling excursions, and kayaking excursions.
4. Kalba
This small town offers a serene shoreline, melodious creeks that trickle, and a wide area of mangroves. It’s one of the best hidden gems in the UAE to observe wildlife. Many bird species use the lesser-known paradise of Kalba as a nesting and migration habitat. You may readily recognise a white-collared kingfisher here, so keep an eye out for one.
5. Ajman
Ajman, which is among the best destinations to visit in the UAE at night, provides a more laid-back atmosphere than Abu Dhabi and Dubai. It’s a hidden gem compared to the larger bustling cities. After a day of sightseeing, coffee shops, shopping centres, and multicuisine restaurants provide the ideal setting for relaxing.
6. Zabeel Park
One of the best leisure areas Dubai has to offer is Zabeel Park. It is lushly green and close to the city centre, making it accessible to those who are unsure of the roads or instructions. It is located adjacent to the Jafiliya Metro Station. Come on a hot weekend and splash around in the waters to cool off.
The park features a playground, an amphitheatre, and barbecue areas. So bring some meat to grill, let the kids play on the playground, and take in the atmosphere of the amphitheatre. While you’re here, you may also visit the Dubai Garden Glow, which is close by.
7. Abra Ride
Going to Dubai means you’ll always be searching for some shade or a cool area to hang out because it’s a place that is always hot. Get aboard the Abra Ride at Bur Dubai if you want to beat the heat. It’s a simpler method of cooling off without having to travel very far to the beaches. It’s one of our favorite hidden gems in the UAE.
8. Al Fahidi Historical Neighbourhood
You may get a feel for the ancient Dubai as you stroll through these streets. It is directly across from the metro station at Bur Dubai. Although Al Fahidi still retains its iconic 20th-century architecture, the way that life is conducted there intensifies the feeling that one has been transported to a completely different era. You’ll discover that the community is still at the centre of life here. There is no admission charge and it is always accessible, but be sure to attend when you will have time to tour the adjacent museums and stores.
9. Hatta Pools
If you’ve ever wanted to be surrounded by pristine, lush nature, come here. The Hatta Pools, which are located in Hatta, can be visited at no cost at all. You’ll need to rent a car to get here, but the trek is well worth it for what you’ll get in return, and you’ll be more off the beaten path. The gritstone outcroppings are surrounded by emerald-green water that is immaculately pristine. Learn about the vibrant, well-preserved culture. If you want to learn more about Hatta, there is a heritage village along the path. Always keep a copy of your Emirates ID and other forms of identification on hand.
10. Sheikh Saeed Al Maktoum’s House
Due to the fact that it was formerly the residence of a past ruler of Dubai, this location will enable you to gain an in-depth understanding of Dubai’s history. Al Shindaga is where you may find this magnificent collection of artefacts because the house has been turned into a museum. However, unlike other museums, the remodelling hasn’t rendered the location sterile; rather, it has preserved its old-world charm. It’s more off the beaten path making it a beautiful hidden gem in the UAE. | https://www.the-backpacking-site.com/off-the-beaten-path/top-10-hidden-gems-uae/ |
Draft Agenda:
8:00-8:30 am: Registration
8:30-9:30 am: Keynote Session, with Scott Braden
9:30-9:45 am: Break
9:45-10:15 am: Q & A with Scott Braden
10:15-11:15 am: Breakout Sessions
11:15-12:15: Lunch on your own
12:15-1:15 pm: Breakout Sessions
1:15-2:45 pm: Closing Session, with Matt Brown
Breakout Session Options:
- Adverse Childhood Experiences (ACES) with April Flagg
- Promethean Activpanel Training with RSU#39 staff
- PE/Health Presentation with Evan Graves
- Suicide Prevention Training with MSAD#1 staff
- First Responders in the Classroom with MSAD#1 nursing staff
- Stress Management with staff from County Physical Therapy
About the keynote and closing speakers:
Scott Braden has been in the educational trenches for over twenty years. He is credentialed in the state of California as a public school teacher and administrator. Scott also has postgraduate degrees in History and Educational Leadership. He is currently a secondary principal and resides in Visalia, CA.
In 2010, Scott published the book, Win Their Hearts… Win Their Minds. The inspirational book has become a manifest for educators to be dream makers in their students’ lives.
Most educators today struggle with being asked to do so much and with so little. The feel overwhelmed, underappreciated, inadequate and exasperated. They are being asked to inspire students when they themselves struggle to be inspired. They are being asked to connect with students when the current generation of your people is so disenfranchised, guarded and unyielding. Thus, Scott Braden is committed and dedicated to inspiring, equipping and empowering educators in personal growth, student connectedness and positive school climate.
Having traveled nationally and internationally as a motivational and inspirational speaker, Scott’s greatest joy in inspiring people to find purpose, life and vitality.
Scott helps educators identify the right keys to structure success for students — academically, socially and emotionally. Educators, seasoned and new to the profession, will leave with new approaches and strategies, an increased understanding of student self systems and excitement for connecting with their students.
Matt Brown, Founder of Autism Safety Education & Training (ASET), Retired Federal Law Enforcement Officer, Autism Safety Trainer & Parent
Matt Brown is a retired 25 year veteran of law enforcement who, for the past 13 years, has trained over 72900 police officers, firefighters, dispatchers and other first responders, as well as educators and other community members, on preventing, recognizing and responding to crisis situations involving persons on the autism spectrum. His combination of experience as both a seasoned law enforcement officer and the proud father of a child on the autism spectrum, provides him with the credibility needed to tackle this challenging issue, and inspire communities to begin autism safety programs in their local areas. His is also the owner of ASET – Autism Safety Education & Training (www.aset911.com), which is providing this much needed training nationwide since 2012. | http://cacepartnership.org/event/cace-day-2018/ |
GE Clinical Information Stations Vulnerable To Hacking, FDA Warns
Federal health officials indicate certain GE monitoring stations used by healthcare clinicians could be vulnerable to hacking events, such as silencing critical alarms, which may increase the risk of patient injury or death.
The FDA issued a cybersecurity safety communication on January 23, warning certain GE Healthcare servers used to monitor vital patient information contain vulnerabilities, which could be exploited by hackers that could cause harm to patients.
The warning involves GE Healthcare Clinical Information Central Stations and Telemetry Servers, primarily used in health care facilities for monitoring and displaying patient information, such as temperature, heartbeat, blood pressure and other critical vitals from a central location within the facility.
Did You Know? Millions of Philips CPAP Machines Recalled
Philips DreamStation, CPAP and BiPAP machines sold in recent years may pose a risk of cancer, lung damage and other injuries.Learn More
According to the FDA, hackers could remotely take control of these GE devices to silence critical alarms, generate false alarms, and interfere with other monitors connected to the GE device. This could result in a delay of emergency medical intervention, endangering patients’ lives.
In November 2019, GE Healthcare issued an Urgent Medical Device Correction informing customers of the vulnerabilities and provided instruction on where to find the software updates and patches for the impacted devices. GE recommended hospitals reduce their vulnerabilities by keeping the network connecting the patient monitors separate from the rest of the hospital network.
GE strongly encouraged hospital facilities to use firewalls, segregated networks, virtual private networks, network monitors, or other technologies that minimize the risk of remote or local network attacks.
Cybersecurity threats in the medical field have been a growing concern over the last few years, as vulnerabilities to healthcare organizations’ record systems and medical devices have surfaced.
Since 2014, the U.S. Department of Homeland Security (DHS) has been actively investigating at least two dozen cases of suspected cybersecurity flaws in medical devices and hospital equipment. According to DHS, if preventative actions to strengthen the medical field’s cybersecurity issues are not taken, hackers could exploit these vulnerabilities and put patients in serious risk.
Medtronic has faced multiple cybersecurity vulnerabilities across several devices in recent years. In June 2019, Medtronic issued a recall of the Medtronic MiniMed 508 pump and MiniMed Paradigm series insulin pumps due to cybersecurity flaws which could allow hackers to wirelessly connect to both the patient’s blood glucose meter and monitoring system and change insulin delivery settings and alter glucose level data.
In October 2018, Medtronic issued an Urgent Medical Device Correction to physicians, notifying them that more than 34,000 implantable pacemakers were vulnerable to hacking. Medtronic disconnected the devices from internet access for software updates as a result.
The FDA has been working on a framework for cybersecurity threats across the medical field since 2013, and the need for additional protection has only become more of a necessity with the increased number of incidents. In 2015 alone, the healthcare industry had more data breaches than in the previous six years combined, compromising more than 113 million medical records.
Previous medical device hacking demonstrations have dated back to 2012, when researchers at a RSA security conference in San Francisco in 2012, were able to hack medical devices such as insulin pumps from up to 300 feet away. The demonstration further showed how hackers could remotely take control of the insulin devices, allowing them to deliver lethal doses of insulin to patients without any notification.
0 Comments
More Top Stories
3M has been ordered to pay an Army veteran $77.5 million, with the majority being paid as punitive damages to punish the company for reckless behavior.
A wrongful death lawsuit filed by the parents of a baby girl who died at only five days old says her fatal case of necrotizing enterocolitis was caused by Similac and Enfamil infant formula products.
A Nebraska man says he developed Parkinson's disease while working as a licensed applicator of Paraquat for nearly 20 years. | https://www.aboutlawsuits.com/ge-hospital-station-hacking-warning-167062/ |
The COVID-19 situation in North Hastings has prompted the Town of Bancroft to close some facilities.
The Town will be closing the public washrooms at Millennium Park to ensure the safety of the community. They say this decision is done out of an abundance of caution. They say will reassess the situation in the new year.
Town staff also asks residents to keep health and safety in mind this year and visit the Hastings Prince Edward Public Health website for information about gathering restrictions. | https://www.mybancroftnow.com/54184/news/town-of-bancroft-close-public-bathrooms-at-millennium-park/ |
Intracellular neutral Lipid Droplets, their associated PAT proteins, and insulin resistance.[unreadable] [unreadable] [unreadable] Summary:[unreadable] [unreadable] [unreadable] [unreadable] Ectopic accumulation of lipid droplets in liver and muscle correlates with insulin resistance. Recent evidence indicates that lipid droplets are specialized organelles participating in lipid metabolism conferred by the activities of the lipid droplet-associated PAT protein family (Perilipin, ADRP, and Tip-47). Their occurrence at droplet surfaces suggests a role in lipid droplet biogenesis or metabolism. The functions of ubiquitously distributed ADRP and Tip47 remain unknown, but recent data suggest that they protect lipids from lipases. To determine the function of ADRP and Tip-47, we have down-regulated these two PAT proteins using siRNA treatment of AML-12 mouse liver cells. The absence of ADRP and Tip-47 at the surface of these lipid droplets was confirmed by immunocytochemistry, and no other PAT protein was identified at the surface of the lipid droplet. Lack of ADRP and Tip-47 resulted in a strong phenotype. When these cells were incubated in presence of 400 M of oleic acid, lipid droplet morphology was drastically altered, lipid droplet size increased by up to 10 fold and total number of lipid droplets per cell decreased by 50%. Lipid metabolism also was found perturbed: lipolysis rate increased by 3 fold. While NEFA uptake was not altered, incorporation of NEFA in the cellular triglyceride fraction was decreased by 50%. Further, the insulin signaling pathway was assessed by Akt phosphorylation in response to physiological insulin concentrations and found to be strongly attenuated in these cells p<0.001 as revealed by western blotting using Anti-phospho Akt antibodies. Other components in the insulin signaling pathway were similarly attenuated. In conclusion, our data support an important structural role for ADRP and Tip47 as surfactant proteins at the surface of the lipid droplet, packaging lipid in smaller units, protecting lipid droplet against endogenous lipase and facilitating triglyceride formation. These activities may have a role in the development of insulin resistance by liver tissue when lipid droplet accumulation occurs. [unreadable] [unreadable] Fatty acids are stored primarily as triacylglycerols (TAG) in intracellular lipid droplets, which are coated with member of the PAT protein family, which include the two broadly expressed proteins, ADFP and TIP47, and in tissue that oxidize fatty acids, LSDP5 as well. To date no cell devoid of PAT proteins has been reported. To determine the consequence of an absence of any PAT protein, we down-regulated the PAT proteins of AML12 liver cells with si mRNAs for ADFP and TIP47. Down regulation of either of these alone had not effect on lipid deposition or lipolysis, but the simultaneous down-regulation of both led to greatly increased droplet size and greatly increased lipolysis of stored TAG. This resulted in highly increased insulin resistance, as determined by attenuated phosphorylation of akt in response to insulin. Similarly, phosphorylation of a number of components of the insulin signaling pathway was altered. The rightward shift in the insulin dose-response curve was approximately 1-2 orders of magnitude, and the lipolytic rate mediated by ATGL was increased by nearly 3-fold. The insulin resistance was reversed upon down-regulation of the lipase, ATGL. Such data suggest that the unfettered release of Fatty acids into the cytosol was responsible for the insulin resistance.[unreadable] [unreadable] In conclusion, the data above suggest an important role of the PAT proteins is to sequester fatty acids as TAG in lipid droplets. Absent any PAT protein, the TAG are no longer protected from lipase action; consequently the fatty acids engage in a futile cycle of deposition in TAG, which are hydrolyzed and their Fatty acids rapidly released to the cytosol. These Fatty Acids render the cell resistant to insulin. A ms. describing these results is under revision at the J. Biological Chemistry.[unreadable] [unreadable] To assess the importance of PAT proteins in animal metabolism, the knock-out of any single PAT proteins is unlikely to yield productive information, because it is now known that the elimination of a single PAT proteins, such as ADFP, provokes the up-regulation of a compensatory PAT protein, such as TIP47. In muscle, it is likely that a loss of ADFP would elicit and up-regulation of LSDP5/OXPAT. To this end, we are producing mice with knock-outs of multiple PAT proteins, some total knock-outs and others, tissue-specific knock-outs.
| |
Subotnik, R. F., Olszewski-Kubilius, P., & Worrell, F. C. (2015). Nurturing the young genius. Scientific American, 23, 60-67.
The authors discuss the importance of "fast-tracking talent" -- recognizing abilities, providing opportunities, and fostering the psychological strengths that are necessary for the successful development of talent.
Scheibel, S. (2012). Academic acceleration: Is it right for my child? Parenting for High Potential, 1(7).
This article covers a number of topics related to acceleration, and provides parents advice on how to advocate for acceleration if they think it is a good fit.
Rogers, K. B. (2010). Academic acceleration and giftedness: The research from 1990 to 2008, A best-evidence synthesis. In N. Colangelo, S. Assouline, D. Lohman, & M. A. Marron (Eds.), Proceedings of the 2008 Wallace Symposium poster session on academic acceleration. Iowa City, IA: The University of Iowa.
The full proceedings are available here.
Colangelo, N., & Assouline, S. (2009). Acceleration: Meeting the academic and social needs of students. In L. Shavinina (Ed.), International Handbook on Giftedness (pp. 1085-1098). Amsterdam: Springer Science and Business Media.
The highly acclaimed publication A Nation Deceived: How Schools Hold Back America's Brightest Students is the foundation for this chapter on academic acceleration. The chapter includes a comprehensive discussion of the research supporting the benefits of academic acceleration. Finally, a case study of the decision-making process, which remains difficult for parents and educators - despite the extensive research supporting the benefits of acceleration - is presented as an application of the information provided by the chapter.
Gross, M. U. M. (2008). Musings: "Hasten slowly" - Thoughtfully planned acceleration. Understanding Our Gifted, 20(2), 6-8.
Acceleration is one of the best researched interventions for gifted students. The author is an advocate of acceleration. However, advocating for the thoughtful, carefully judged employment of a procedure with well researched effectiveness does not imply approval of cases where the procedure is used without sufficient thought--especially where it is used in violation of the very safeguards that research has shown to be necessary for its optimal effectiveness. The author sometimes comes across cases where parents have argued repeatedly and forcefully for acceleration in situations where it has been, quite clearly, inappropriate for their child. Giftedness, by itself, does not indicate that acceleration is desirable; everyone has to look at the whole child, not only his intellectual capacity. The author offers a list of guidelines for acceleration that should be followed when schools or parents consider advancement for and intellectually/academically gifted student. She asks schools and parents to use acceleration with the thought, care, and respect that it demands. They should hasten gifted children's progress through school, but they should not "hurry" it.
Walker, S. Y. (2008). Advancement and acceleration: What is it? Understanding Our Gifted, 20(2), 3-5.
"A Nation Deceived" (2004) documents the benefits of acceleration for gifted children. Supported by this groundbreaking research, acceleration has come into focus on the national scene. Our society seems concerned with making education "fair." What we need to realize is that fair does not mean the same for all. In fact, that would be very "unfair." Fair is giving each child what he needs at the appropriate time. When the gifted child goes unrecognized and is made to do age appropriate work that she has already mastered in previous years, the child is tied down, devalued, and unrecognized. Acceleration attempts to tailor the curriculum to meet the needs of the student. It is a way of honoring what is already known and building upon it. This article offers a menu of acceleration and advancement options. Which strategy is offered and which works depends on the school philosophy, the teacher, the student, the parents, and the available resources.
Woelfel, K. (2005). Successful intervention: It takes time. Principal, 85(2), 18-21.
Successful interventions for at-risk students extend and redefine learning time to improve achievement. This article describes five programs -- Promoting Academically Successful Students (PASS), Academic Acceleration Academy, Knowledge Is Power Program (KIPP), Middle Grade Acceleration Program (M-GAP), and a flexible credit plan -- that employ strategies to give struggling students the additional time they need for intensive instruction.
Brody, L. E., & Benbow, C. P. (2004). Accelerative strategies: How effective are they for the gifted? In L. E. Brody (Vol. Ed.) & S. M. Reis (Series Ed.), Essential readings in gifted education: Vol. 3. Grouping and acceleration practices in gifted education (pp. 57-67). Thousand Oaks, CA: Corwin Press.
This resource is part of a 12-volume National Association for Gifted Children series designed for educators. This particular volume collects the research on grouping and acceleration as academic interventions, and the article by Brody & Benbow examines the effects of specific accelerative options.
The NAGC policy statement deals with acceleration, an issue that impacts the education of gifted and talented students. It concludes opportunities must be offered to all children. Accordingly, highly able students with capability and motivation to succeed in placements beyond traditional age/grade parameters should be provided the opportunity to enroll in intellectually appropriate classes and educational settings.
Shoplik, A.L. (2004). Tips for Parents: Acceleration and the Profoundly Gifted. Retrieved March 30, 2008, from GT-CyberSource Article Library.
Ann Lupkowski Shoplik, Ph.D., Director of the Carnegie Mellon Institute for Talented Elementary Students at Carnegie Mellon University, conducted a seminar for parents of academically talented students who were interested in acceleration. Included are some of the points discussed during the seminar.
Viadero, D. (2004). Report urges acceleration for gifted students. Education Week, 24(5), 5.
Feldhusen, J. F. (2003). Precocity and acceleration. Gifted Education International, 17(1), 55-58.
Precocious kids have the motivation and the ability to surge ahead of what is normative for their ages and grade levels. Many first and second graders learn to read at levels in the reading curriculum that are typical for third to fifth graders. Some surge ahead in math too but not as many as get ahead in reading. To get ahead precocious kids need access to advanced material, and that is easier to do in reading than in math. Brief contact without formal instruction often is all precocious kids need to learn and master advanced material.
Olszewski-Kubilius, P. (2003). Is your school using best practices for instruction of gifted students? Talent, Winter(1), 3-4.
Review of the talent search model, ability grouping, acceleration, and curriculum compacting.
Cross, T. L. (2002). Putting the well-being of all students (including gifted students) first. Gifted Child Today, 25(4), 14-17.
This article examines how schools can ensure the well-being of gifted children. It discusses the benefits of acceleration and critiques the practice of cooperative learning. The need to challenge gifted students in highly systematic and informed ways, wherein learning takes place just within intellectual reach, is urged.
Lewis, G. (2002). Alternatives to acceleration for the highly gifted child. Roeper Review, 24(3), 130-133.
This reprinted article originally appeared in 1984 in Roeper Review, 6(3), 133-136. Presents case studies of a male and a female preschooler (both aged 5 yrs 9 mo [Stanford-Binet Intelligence Scale IQs 159 and 158+, respectively]) enrolled in a university summer program to show that acceleration is not enough to meet the needs of such children. It is concluded that assessment, flexible scheduling, and counseling are required for successful programs for children with advanced intellectual gifts. A comment on this article by a group of guest editors is appended.
Vialle, W., Ashton, T., Carlon, G., & Rankin, F. (2001). Acceleration: A coat of many colours. Roeper Review, 24(1).
This article discusses three research projects conducted in New South Wales, Australia that explore different forms of acceleration and the resistance of educational practitioners to utilize acceleration as an intervention for gifted students.
Stanley, J. C. (2000). Helping students learn only what they don’t already know. Psychology, Public Policy, and Law, 6(1), 216-222.
Benbow, C. P. (1998). Acceleration as a method for meeting the academic needs of intellectually talented children. In J. VanTassel-Baska (Ed.), Excellence in educating gifted and talented learners (pp. 279-294). Denver, CO: Love Publishing.
This is a chapter in a book that discusses characteristics and needs of gifted learners, as well as acceleration, grouping, and gifted program development.
DeLacy, M. (1996). Acceleration of gifted students: A background paper created for the Portland Public School District Talented and Gifted Advisory Committee. [On-line].
Benbow, C. P., & Stanley, J. C. (1996). Inequity in equity: How "equity" can lead to inequity for high-potential students. Psychology, Public Policy, and Law, 2(2), 249-292.
Over the past three decades, the achievement of waves of American students with high intellectual potential has declined as a result of inequity in educational treatment. This inequity is the result of an extreme form of egalitarianism within American society and schools, which involves the pitting of equity against excellence rather than promoting both equity and excellence; anti-intellectualism; the "dumbing down" of the curriculum; equating aptitude and achievement testing with elitism; the attraction to fads by schools; and the insistence of schools to teach all students from the same curriculum at the same level. In this article we provide recommendations for creating positive change-recommendations that emphasize excellence for all, that call for responsiveness to individual differences, and that suggest basing educational policies on well-grounded research findings in psychology and education. Educational policies that fail to take into account the vast range of individual differences among students-as do many that are currently in use-are doomed to be ineffective.
McBride, R. E., & Stuessy, C. (1996). Taking stock and creating a vision: A middle school community takes the first steps toward creating an accelerated school. Education Canada, 36(3), 20-24.
Accelerated schools strive to bring at-risk students into the educational mainstream and perform at grade level through acceleration rather than remediation. Describes four steps to initiate the accelerated process and how a Texas middle school involved all members of the school community in implementing the first two steps, taking stock and forging a vision.
Passow, H. A. (1996). Acceleration over the years. In C. P. Benbow & D. J. Lubinski (Eds.), Intellectual talent: Psychometric and social issues (pp. 93-98). Ames, IA: Iowa State University of Science and Technology.
Discusses the history of and present-day issues in educational acceleration of gifted students.
Lynch, S. J. (1994). Should gifted students be grade advanced? (Report). Reston, VA: Council for Exceptional Children.
Tomlinson, C. A. (1994). Middle school and acceleration: Guidance from research and the kids. Journal of Secondary Gifted Education, 5(4), 42-51.
This article examines available literature on a variety of options for accelerated learning in middle school. Different forms addressed include concurrent enrollment, guided independent study, combined enrollment, out-of-school acceleration, self-paced instruction, grade skipping, and differentiated or advanced class enrollment. A list of questions for educators and parents to ask in examining a student's accelerated learning options is provided.
Witham, J. H. (1994). Acceleration: Does it happen more frequently for gifted students in private or public schools? Paper presented at the Annual Meeting of the American Educational Research Association, New Orleans, LA.
As part of a larger study on differences between public and private schools in the education of gifted students, this study examined use of acceleration as an educational approach. The paper notes that although the weight of research evidence strongly supports the position that acceleration is a highly effective intervention technique with intellectually gifted students, many educators have negative attitudes toward this approach. This study examined programs in 23 private and public schools that serve gifted students. Directors and teachers were surveyed, school documents were analyzed, and classrooms were observed to see the extent that acceleration was used. Questions were asked on early entrance, skipping grades, use of texts and materials beyond grade level, different content, and faster-paced classes. Results suggest that the private schools had more flexibility to set standards on acceleration. However, the overall frequency concerning acceleration of skipping classes (25.9 percent) and starting school earlier (43.5 percent) reported by both public and private schools was quite low. Accelerated texts and materials were found much more frequently than skipping grades or early entrance (public, 76.1 percent; private, 76.9 percent). Teachers in both types of schools strongly (92 percent) believed they offered a fast-paced classroom to gifted children.
Benbow, C. (1992). Progress in gifted education - everywhere but here! Gifted Child Today, 15, 2-8.
This article discusses the fact that most gifted students still are not being challenged appropriately for their abilities. Acceleration is suggested as a very good option that would be available to all gifted students, no matter where they are from. It is discussed in detail throughout the article.
NAGC, (1992). Acceleration position paper. Washington, DC: National Association for Gifted Children.
Rogers, K. B., & Kimpston, R. D. (1992). Acceleration: What we do vs. what we know. Educational Leadership, 50(2), 58-61.
Rogers, K.B. (1992). A best-evidence synthesis of research on acceleration options for gifted students. Retrieved April 2, 2008, from GT-CyberSource Article Library.
The research on 12 forms of acceleration was synthesized using Slavin's "best-evidence synthesis" procedure. The Effect Sizes for academic, socialization, and psychological outcomes were calculated for each study containing adequate data, then averaged across all studies pertaining to each accelerative option. Of the 314 studies located covering the years from 1912-1988, only 81 studies provided enough data for calculating Effect Sizes. Significant academic effects were found for all but three options: Concurrent Enrollment, Advanced Placement, and Combined Accelerative Options. In general, the research showed no substantial positive or negative socialization and psychological effect differences for most forms of acceleration. However, two significant positive socialization Effect Sizes were found for Grade Skipping and Mentorships; likewise, two significant positive psychological adjustment effects were found for Concurrent Enrollment and Mentorships.
Southern, W. T., & Jones, E. D. (1992). The real problems with academic acceleration. Gifted Child Today, 15(2), 34-38.
This article identifies problems commonly attributed to acceleration for gifted students. Specific student concerns (such as friendships) and administrative concerns (such as difficulties in awarding course credits) are addressed. Five suggestions are made to help districts plan for providing accelerative options.
Benbow, C. (1991). Meeting the needs of gifted students through use of acceleration. In M. C. Wang, M. C. Reynolds, & H. J. Walberg (Eds.), Handbook of special education: Research and practice, Vol. 4: Emerging programs. (pp. 23-36). New York: Pergamon Press.
The chapter provides a rationale for why programming for the gifted is needed and then describes what acceleration entails, the practical benefits of acceleration, and educators' skepticism about its use. The chapter details the theoretical underpinnings of acceleration as a program option for the gifted; explores whether results from empirical investigations bear out the positive theoretical predictions regarding use of acceleration; covers both those studies examining academic benefits and those that focus on social and emotional development; and closes with several suggestions for practice and research.
Hoffman, S. G. (1989). What the books don't tell you about grade skipping. Gifted Child Today, 12(1), 37-39.
A parent who is also an educator describes her concerns about her gifted daughter's lack of challenge in school in spite of accelerated activities. After the student skipped a grade, other concerns resulted, such as the impact on academic adjustment, social adjustment, peer acceptance, motivation, gaps in skills, etc.
Coordinators of gifted education, school psychologists, principals, and teachers (554 respondents) were surveyed concerning their attitudes toward early admission and acceleration. Though negative reactions were weak along some dimensions, practitioners from each category expressed consistently conservative sentiments toward the value of acceleration and viewed the process as potentially hazardous.
Elkind, D. (1988). Mental acceleration. Journal for the Education of the Gifted, 11(4), 19-31.
Use of the term "acceleration" to describe interventions to enhance children's intellectual potential is inappropriate, as the term cannot be justified from the standpoint of mental measurement, mental growth, genetics, or education. Maximizing a child's potential through creation of stimulating environments is recommended rather than concentration on early attainment of skills.
Howley, C. B. (1987). It's controversial, but "acceleration" could bring gifted kids up to full speed. American School Board Journal, 174(6), 32-33, 40.
The article discusses acceleration for gifted students as a relatively cheap, highly effective method rarely used in public schools. Recent research supports both grade skipping and acceleration in selected subjects, depending on a particular student's interest, ability, and maturity. Two sidebars highlight the Gessell Institute's curriculum enrichment alternative and a successful Baltimore acceleration program.
Willis, W. G. (1987). Retention/promotion decisions: Selective use of data? Perceptual and Motor Skills, 64, 287-290.
Investigated the use of psychometric data (the Goodenough-Harris Drawing Test, Prereading Phonics Inventory, and First Grade Screening Test) to facilitate retention/promotion decisions for 40 kindergartners and 18 1st graders. Results suggest that members of decision-making teams may use data selectively and that recommendations to retain or promote may be subject to bias.
Howley, C. B., & Howley, A. A. (1985). A personal record: Is acceleration worth the effort? Roeper Review, 8(1), 43-45.
Parents of three gifted children describe their advocacy that has resulted in procuring appropriate education for their children by acceleration despite school opposition.
Kulik, J. A., & Kulik, C. L. C. (1984). Synthesis of research on effects of accelerated instruction. Educational Leadership, 42(2), 84-89.
A meta-analysis of 26 studies shows that accelerated gifted students outperform students of the same age and ability who are not accelerated and achieve as well as equally gifted older students in the higher grades. Correlational studies suggest that accelerates are equally successful later in life.
Kulik, J. A., & Kulik, C. L. C. (1984). The effects of accelerated instruction on students. Review of Educational Research, 54(3), 409-425.
Results from a meta-analysis of 26 controlled studies on the effects of accelerated instruction on elementary and secondary school students are presented. The examination performance of accelerates surpassed the performance of equivalent age and intelligence nonaccelerates and equaled the performance of same-grade but older, talented nonaccelerates.
Paulus, P. (1984). Acceleration: More than grade skipping. Roeper Review, 7(2), 98-100.
The definition of acceleration for gifted students is expanded to include early entrance, partial acceleration,compressing curricula, advanced courses, and mentors and tutors. Popular theories about the social and emotional harm to accelerants are disproved.
Williams, M. (1984). Diamond in the rough: A story of acceleration. Gifted Child Today, 33, 21-23.
A talented and gifted instructor discusses the background and effects of deciding to accelerate a gifted seven-year-old into the fourth grade. The move was accomplished with special attention to transition stages and resulted in the child's successful emotional and academic adjustment.
Benbow, C. P., & Stanley, J. C. (1983). Opening doors for the gifted. American Education 19(3), 44-46.
Curriculum must be adapted to match the ability and developmental stages of the academically gifted. The Study of Mathematically Precocious Youth at Johns Hopkins University determined that curriculum flexibility, not change, is the best approach.
This chapter discusses early college entrance for young gifted students. It recognizes that no alternatives seem to be ideal, but it explores some of the positive aspects of rapid acceleration. Assumptions that are commonly made in the US educational system are examined and the University of Washington's Early Entrance Program is discussed in detail.
Horne, D. L., & Dupuy, P. J. (1981). In favor of acceleration for gifted students. Personnel & Guidance Journal, 60(2), 103-106.
The article reviews the advantages and disadvantages of two types of programs for intellectually gifted students, enrichment and acceleration. A number of studies on this issue are cited, and it is concluded that acceleration is preferable. It challenges the student as much as enrichment, is less expensive, and is helpful to students whose families move often. The claimed social damage to accelerated students has not been substantiated. Accelerants achieve more in school and in life, and their mental health, social life, and family adjustment compares favorably with the average.
Cohn, S. J., George, W. C., & Stanley, J. C. (1979). Educational acceleration of intellectually talented youths: Prolonged discussion by a varied group of professionals. In W. C. George, S. J. Cohn, & J. C. Stanley (Eds.), Educating the gifted: Acceleration and enrichment (pp. 183-238). Baltimore: John Hopkins University Press.
This is a chapter in a book chronicling the "revised and expanded proceedings" of the 9th Annual Hyman Blumberg Symposium on Research in Early Childhood Education. The book addresses the acceleration vs. enrichment debate that arose when Julian C. Stanley founded the Study for Mathematically Precocious Youth (SMPY) at Johns Hopkins University. This chapter discusses the benefits of acceleration by comparing it to 4 types of enrichment.
American Educational Research Association (1977). Educational acceleration of intellectually talented youths: Prolonged discussion by a varied group of professionals. Presented at the American Educational Research Association Symposium on Educational Acceleration of Intellectually Talented Youths, New York, NY.
Provided are 17 papers presented at the American Educational Research Association's (AERA) 1977 Symposium on Educational Acceleration of Intellectually Talented Youths. Following introductory comments by H. James are entries with the following titles and authors: "Educational Acceleration of Intellectually Talented Youths-The Gifted and the Creative: Acceleration or Enrichment?" (R. Havighurst); "Acceleration-Simplistic Gimmickry" (M. Gold); "A.E.R.A. Symposium on Intellectually Talented Youth" (H. Robinson, et al.); "Educational Acceleration of Intellectually Talented Youths" (S. Daurio); "Selection of Appropriate Criteria and Comparison Groups for Use in the Evaluation of Educational Provisions for the Gifted and Talented" (A. Branch); "Acceleration- A Varied Approach" (E. Kearney); "Acceleration and Enrichment for the Gifted in New York City Public Schools" (V. Ehrlich); "A Possible Economic Correlation of Acceleration for the Individual and for Society" (D. Jackson); "Super Students, Average Schools" (S. Anderson); "Acceleration and the Excellent Mathematical Reasoner" (W. George); "Sexism, Democracy, and the Acceleration Versus Enrichment Controversy" (L. Fox); "The Acceleration/Enrichment Debate-”Basic Issues" (D. Keating); "Educational Acceleration of Intellectually Talented Youths-The Mathematical and Physical Sciences" (E. Gibb); vSome Reflections on the Acceleration-Enrichment Controversy" (A. Anastasi); "Brief Paper for Symposium on the Educational Acceleration of Intellectually Talented Youth" (J. Stark); and "Acceleration Versus Enrichment- The Tenth Rule of Three Cubed" (A. Kurtz).
Stanley, J. C. (1973). Accelerating the educational progress of intellectually gifted youths. Educational Psychologist, 10, 133-146.
Contends that aptitude and achievement tests designed for much older students are invaluable for finding extremely high ability at younger ages. Results of the first two years of the Study of Mathematically and Scientifically Precocious Youth are examined to show that considerable educational acceleration is not only feasible but also desirable for gifted young people who are eager to move ahead. Skipping school grades, taking college courses part-time, studying in special courses, and entering college early are inexpensive supplements to regular school practices. The usual in-grade, non-accelerative "enrichment" procedures often recommended for intellectually gifted children are not advocated. An heuristic overview of the main assumptions and findings of the study thus far is presented.
This interview with a premier scholar in the area of academic acceleration offers an interesting perspective on the historical use of acceleration, as well as current research and practice. | http://www.accelerationinstitute.org/Resources/Bibliography/Bibliography.aspx?ID=20 |
# My Love on You
"My Love on You", also referred to as "Love On You", is a song recorded by Romanian recording artist Anda Adam for her studio album, Amo (2013). It was released for digital download on 26 November 2009, while a digital remix EP containing remixes of the songs from DJs from different countries was also made available for purchase. The track reached commercial success, eventually peaking at number one in Turkey and at number seven on the native Romanian Top 100. According to the Romanian Year-End Chart from 2010, "My Love on You" was broadcast overall at least 6.000 times in Romania that year.
## Critical reception
The critical reception for the song was mostly positive, with music critics praising Adam's voice performance and the track's instrumentation.
## Music video
### Background
The official music video for "My Love on You" was shot on January 15, 2010 at the Atlantis Studios in Bucharest, Romania by Iulian Moga.
### Synopsis
The clip opens with Adam lying in a dark room and a light reflecting on her. Following this, she is shortly seen in a transparent box and dancing with her female and male backup dancers in a green room. Cut scenes for that scene portray her sitting on a motocycle. Subsequently, Adam is seen again inside the steamy box from the beginning, where she is sweating and trying to escape. Upon her escape, the music video ends with the opening scene.
## Track listings
Digital download
"Love On You" (Radio Edit) – 3:22
Digital remix album
"Love On You (Extended Version)" – 5:26 "Love On You (Radio Edit)" – 2:22 "Love On You (Zrecords Remix -Romania-)" – 5:49 "Love On You (Pat Farell Remix -Switzerland-)" – 6:37 "Love On You (DJ Pantelis Remix -Greece-)" – 5:52 "Love On You (DJ Aslam Remix -Egypt-)" – 5:29 "Love On You (Ghony & Aslam Remix-Egypt-)" – 6:35 "Love On You (Ian Sanchez Remix -Spain-)" – 6:40 "Love On You (OJA. Sen & DJ Ashish B Remix -United States-)" – 3:04 "Love On You (DJ Mert Hakan Remix -Turkey-)" – 5:05
Digital remix EP
"My Love On You - Radio Edit" – 3:20 "My Love On You - Short Radio Version" – 2:39 "My Love On You - Remix" – 5:48 "My Love On You - Extended Version" – 5:32 | https://en.wikipedia.org/wiki/My_Love_on_You |
A copy of the testimony submitted today to the Hawaii House Committee on Water and Land in support of HB 837, which would help shut down the illegal trade in ivory currently decimating elephants across Africa.
Full Article
November 05, 2014
A Fraction of Global Military Spending Could Save the Planet’s Biodiversity, Say Experts
Only One in Four Protected Areas is Well Managed Gland, Switzerland, 6 November 2014 – A fundamental step-change involving an increase in funding and political commitment is urgently needed to ensure that protected areas deliver their full conservation, social and economic potential, according to an article published today in Nature by experts from Wildlife Conservation Society, the University of Queensland, and the IUCN World Commission on Protected Areas (WCPA). The paper, The performance ...
Full Article
September 18, 2014
Research Yields a Game Changer for Improving Understanding of Ebola and Great Apes
Fecal screening detects Ebola antibodies in wild great apes, suggests some apes survive exposureTo see VIDEO, CLICK HERE. NEW YORK (September 18, 2014) – A group of international scientists have developed a new method to study Ebola virus in wildlife. The Wildlife Conservation Society (WCS)-led research, published today in the journal PLOS Neglected Tropical Diseases, describes the use of fecal samples from wild great apes to identify populations likely to have been exposed to the virus. This re...
Full Article
August 05, 2014
WCS Statement on Public-Private Partnership Agreement on National Parks Management Signed with Republic of Congo
WASHINGTON, D.C. (August 5, 2014) – In a ceremony timed with the U.S.-Africa Leaders Summit, the Wildlife Conservation Society (WCS) and the Republic of Congo signed a Public-Private Partnership agreement on management of the Nouabalé-Ndoki National Park. This document officially establishes the Ndoki Foundation which will have management authority over the Park. John Robinson, WCS Executive Vice President for Conservation and Science issued the following statement:“On behalf of the Wildlife ...
Full Article
April 24, 2014
Two Western Lowland Gorillas Born at Wildlife Conservation Society’s Bronx Zoo
Newborn gorillas make debut as Bronx Zoo marks the beginning of the summer seasonFirst gorillas born at Bronx Zoo in eight yearsB-roll download: Bronx Zoo Gorilla Babies April 2014.movYouTube:https://www.youtube.com/watch?v=tgCHVLyLDYY Bronx, NY – April 24, 2014 – Two western lowland gorillas were born at the Wildlife Conservation Society’s Bronx Zoo. These are the first gorillas born at the Bronx Zoo since 2006. The Bronx Zoo’s Congo Gorilla Forest is now home to 20 gorillas – the largest group...
Full Article
March 24, 2014
Good News for Great Ape
The Cross River gorilla is one of the world’s largest gorillas and also the rarest, but recently conservationists have made important achievements to help protect this species.
Full Article
March 20, 2014
World’s Rarest Gorilla Gets New Roadmap for Survival
Local and international support crucial to continued protection for Cross River gorilla according to revised conservation action plan NEW YORK (March 20, 2014)—In spite of the continued threats of poaching and habitat destruction, future prospects for the world’s rarest gorilla have improved but are still dependent on continued local and international partnerships, according to a new action plan published by the IUCN SSC Primate Specialist Group and the Wildlife Conservation Society, and produce...
Full Article
March 20, 2014
The Wildlife Conservation Society To Hold 6th Annual WCS Runfor the Wild At the Bronx Zoo
Annual 5k run/walk is dedicated to WCS’s 96 Elephants Campaign WCS Run for the Wild 2014 will raise funds to save elephants from the worst poaching crisis in two decades96 elephants are killed every day in AfricaRegistration open at www.wcsrunforthewild.orgEvent date:Saturday, April 26, 2014at the Bronx ZooBronx, N.Y. – March 20, 2014 – The Wildlife Conservation Society is dedicating the 6th annual Run for the Wild to saving elephants from the worst poaching crisis in two decades. Wildlife suppo...
Full Article
January 22, 2014
Alarming Analysis: One Quarter of Sharks and Rays Face Extinction
As overfishing pushes more and more shark and ray species to the brink, WCS is increasing its commitment to the conservation of these fish and their relatives over the next 10 years.
Full Article
January 22, 2014
Media Statement: IUCN and Sharks
Bronx, New York (January 22, 2014) -- The following statement was issued today by Dr. Cristián Samper, President and CEO of the Wildlife Conservation Society: "The Wildlife Conservation Society expresses its alarm at the new findings released yesterday by IUCN, the International Union for Conservation of Nature, indicating the heightened threatened status of the world’s sharks, rays, skates and chimeras, the cartilaginous fishes.“A global analysis of the conservation status of the 1,041 specie... | https://programs.wcs.org/newsroom/News-Releases/articleType/CategoryView/CategoryID/197/currentpage/5.aspx |
RELATED APPLICATIONS
The contents of Japanese Patent Application No. 2019-094541, and of International Patent Application No. PCT/JP2020/019770, on the basis of each of which priority benefits are claimed in an accompanying application data sheet, are in their entirety incorporated herein by reference.
BACKGROUND
Technical Field
Description of Related Art
Certain embodiments of the present invention relate to a cryogenic device and a cryostat.
A low-boiling gas recondensing device which uses a cryocooler and in which a cold body of the cryocooler is thermally coupled to a heat transfer ring without being in contact with a heat transfer ring in order to facilitate the attachment and removal of the cryocooler has been known in the related art. A gap of a constant interval is formed between the cold body and the heat transfer ring. The heat transfer ring is attached to a container for liquefied low-boiling gas. The cold body cools the heat transfer ring through the gap. As a result, the container for liquefied gas is cooled.
SUMMARY
According to an aspect of the invention, a cryogenic device includes: a hermetic container; a cryocooler that includes a mounting portion mounted on the hermetic container, a connecting part extending from the mounting portion into the hermetic container in an axial direction of the cryocooler, and a cooling stage attached to the connecting part and disposed in the hermetic container; and a member to be cooled that is disposed in the hermetic container with a gap, which allows heat to be exchanged, between the cooling stage and the member to be cooled. The cooling stage includes a cold fin that extends toward the member to be cooled in a direction perpendicular to the axial direction of the cryocooler. A fin receiving groove recessed in the direction perpendicular to the axial direction of the cryocooler is formed in the member to be cooled, the fin receiving groove extends in the axial direction of the cryocooler, and the member to be cooled receives the cold fin in the fin receiving groove with the gap.
According to another aspect of the invention, a cryostat includes the above-mentioned cryogenic device.
Any combination of the above-mentioned components, and aspects in which the components or expressions of the invention are substituted with each other between a method, a device, a system, and the like are also effective as the aspects of the invention.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
is a schematic diagram showing a cryogenic device according to an embodiment.
FIG. 2
FIG. 1
is a schematic cross-sectional view of the cryogenic device shown in taken along line A-A.
FIG. 3
is a schematic cross-sectional view showing another embodiment.
DETAILED DESCRIPTION
In the recondensing device, the gap formed between the cold body and the heat transfer ring is also a passage for evaporated low-boiling gas. The flow of low-boiling gas may include contaminants or particles, such as fine particles generated due to the liquefaction or solidification of the gas itself. Since the gap is extremely narrow, the particles may be accumulated in the gap. As a result, there is a problem that the particles clog the gap and obstruct the flow of gas.
It is desirable to provide a cryogenic device and a cryostat that reduce the risk of clogging of a gap formed between a cooling stage and a member to be cooled.
Embodiments of the invention will be described in detail below with reference to the drawings. The same or equivalent components, members, and processing in the description and the drawings will be denoted by the same reference numerals and the repeated description thereof will be appropriately omitted. The scale and shape of each part to be shown are conveniently set to facilitate the description, and are not interpreted in a limited way as long as not particularly mentioned. The embodiments are exemplary and do not limit the scope of the invention at all. All features to be described in the embodiments and combinations thereof are not necessarily essential to the invention.
FIG. 1
FIG. 2
FIG. 1
FIG. 2
100
100
100
is a schematic diagram showing a cryogenic device according to an embodiment. is a schematic cross-sectional view of the cryogenic device shown in taken along line A-A. shows a positional relationship between components of the cryogenic device in a plane perpendicular to an axial direction C of a cryocooler.
100
100
10
102
10
104
102
10
In this embodiment, the cryogenic device is applied to a cryostat that has a function to recondense a refrigerant. The cryogenic device includes a cryocooler , a hermetic container in which the cryocooler is installed, and a member to be cooled that is disposed in the hermetic container and is cooled by the cryocooler .
10
100
The refrigerant is, for example, helium. Accordingly, helium gas is recondensed into liquid helium by the cryocooler . However, the cryogenic device can also use other appropriate refrigerants, such as nitrogen.
102
102
10
10
102
10
102
The hermetic container is adapted to keep the airtightness of an internal space. In this embodiment, the hermetic container includes an opening portion which is formed in, for example, a top plate or the other wall surface thereof and on which the cryocooler is to be mounted. A low-temperature section of the cryocooler is inserted into the hermetic container through this opening portion, and a room-temperature section of the cryocooler is attached to the opening portion. The hermetic container is also used as a vacuum container that keeps an internal space vacuum.
104
102
104
104
102
104
104
The member to be cooled is disposed in the hermetic container . A refrigerant section, which accommodates the gas and liquid of the refrigerant, is formed in the member to be cooled, and this refrigerant section is isolated from the outside of the member to be cooled (that is, a space between the hermetic container and the member to be cooled). It can also be said that the member to be cooled is a container for accommodating the refrigerant.
104
103
10
104
103
104
104
The member to be cooled may include a refrigerant introduction port at a portion thereof near the cryocooler or at other portions thereof. Refrigerant gas can be introduced into the member to be cooled from the outside through the refrigerant introduction port . The member to be cooled may include a refrigerant outlet. Refrigerant gas can be discharged to the outside of the member to be cooled through the refrigerant outlet.
104
102
106
116
106
10
104
106
106
104
102
100
104
The member to be cooled is connected to the hermetic container through a vibration insulating part and a connection member . The vibration insulating part is adapted to prevent vibration, which is caused by the operation of the cryocooler , or other vibration, which is transmitted from a surrounding environment, from being transmitted to the member to be cooled, or at least to reduce this vibration. The vibration insulating part may be, for example, a damper, bellows, vibration-proof rubber, other appropriate vibration insulating members, or other appropriate vibration insulating structures. The vibration insulating part connects a relatively high-temperature portion of the member to be cooled, such as the room-temperature section, to the hermetic container . Since a general-purpose vibration insulating part, which can be used in a room-temperature environment, can be employed in this case, it is convenient. Since the cryogenic device is adapted to protect the member to be cooled from vibration in this way, a low-vibration or vibration-free cryostat is provided in this embodiment.
104
108
110
108
112
108
108
10
110
108
102
104
102
108
108
110
The member to be cooled includes a liquefied refrigerant tank and a heat conductive sleeve attached to the liquefied refrigerant tank . A liquefied refrigerant , for example, liquid helium is stored in the liquefied refrigerant tank . The liquefied refrigerant tank is cooled by the cryocooler through the heat conductive sleeve . In order to suppress the entry of heat into the liquefied refrigerant tank from the surrounding environment and the hermetic container , the member to be cooled may include a heat shield that is disposed between the hermetic container and the liquefied refrigerant tank to surround the liquefied refrigerant tank . Such a heat shield may be cooled by the heat conductive sleeve .
110
104
102
16
110
114
110
10
10
110
a
The heat conductive sleeve of the member to be cooled is disposed in the hermetic container with a gap, which allows heat to be exchanged, between a first-stage cooling stage and the heat conductive sleeve . Hereinafter, this gap is also referred to as a heat exchange gap . The heat conductive sleeve is thermally coupled to the cryocooler without being in contact with the cryocooler . The heat conductive sleeve is made of a metal material having high thermal conductivity, such as copper.
104
10
110
108
10
The entire member to be cooled is disposed without being in contact with the low-temperature section of the cryocooler . Accordingly, not only the heat conductive sleeve but also the liquefied refrigerant tank is not in physical contact with the cryocooler .
110
106
116
102
102
106
116
110
110
110
The heat conductive sleeve is connected to the vibration insulating part by the connection member (for example, a thin-walled tubular member) , and is supported by the hermetic container (for example, a top plate of the hermetic container ) through the vibration insulating part . For example, the connection member is formed to be thinner than the heat conductive sleeve , and is connected to the heat conductive sleeve at the outer peripheral portion of the heat conductive sleeve .
10
10
12
12
14
14
16
16
12
12
12
14
14
14
16
16
16
a
b
a
b
a
b
a
b
a
b
a
b
The cryocooler is, for example, a Gifford-McMahon (GM) two-stage pulse tube cryocooler. Accordingly, the cryocooler includes a first-stage pulse tube , a second-stage pulse tube , a first-stage regenerator tube , a second-stage regenerator tube , a first-stage cooling stage , and a second-stage cooling stage . For convenience of description, the first-stage pulse tube and the second-stage pulse tube may be collectively referred to as a pulse tube in the following description. Likewise, the first-stage regenerator tube and the second-stage regenerator tube may be collectively referred to as a regenerator tube , and the first-stage cooling stage and the second-stage cooling stage may be collectively referred to as a cooling stage .
10
18
102
18
102
12
18
16
12
18
16
14
18
16
14
16
16
18
a
a
b
b
a
a
b
a
b
Further, the cryocooler includes amounting portion that is mounted on the hermetic container . The mounting portion may be, for example, a vacuum flange that can be attached to the opening portion of the hermetic container . The first-stage pulse tube connects the mounting portion to the first-stage cooling stage , and the second-stage pulse tube connects the mounting portion to the second-stage cooling stage . The first-stage regenerator tube connects the mounting portion to the first-stage cooling stage . The second-stage regenerator tube connects the first-stage cooling stage to the second-stage cooling stage . The mounting portion may be referred to as a top flange.
12
14
18
102
16
12
14
102
16
12
14
102
a
a
a
b
b
b
The pulse tube and/or the regenerator tube are regarded as connecting parts that extend from the mounting portion into the hermetic container in an axial direction C of the cryocooler. The first-stage cooling stage is attached to the connecting parts (for example, the first-stage pulse tube and the first-stage regenerator tube ), and is disposed in the hermetic container . Likewise, the second-stage cooling stage is attached to the connecting parts (for example, the second-stage pulse tube and the second-stage regenerator tube ), and is disposed in the hermetic container .
10
102
10
16
102
10
10
10
102
In this embodiment, the cryocooler is detachably installed on the top plate or an upper portion of the hermetic container so that the center axis of the cryocooler coincides with a vertical direction, and the cooling stage is disposed in the hermetic container . Accordingly, the axial direction C of the cryocooler is the vertical direction. However, the attachment posture of the cryocooler is not limited thereto. Since the cryocooler can be installed in a desired posture, the cryocooler may be installed on the hermetic container so that the axial direction C of the cryocooler coincides with an oblique direction or a horizontal direction.
12
12
14
14
14
12
14
12
12
14
12
14
14
a
b
a
b
a
a
b
b
a
a
b
a
b
Each of the first-stage pulse tube and the second-stage pulse tube extends in the axial direction C of the cryocooler. Further, the first-stage regenerator tube and the second-stage regenerator tube are connected in series and extend in the axial direction C of the cryocooler. The first-stage regenerator tube is disposed in parallel with the first-stage pulse tube , and the second-stage regenerator tube is disposed in parallel with the second-stage pulse tube . The first-stage pulse tube has substantially the same length as the first-stage regenerator tube in the axial direction C of the cryocooler, and the second-stage pulse tube has substantially the same length as the sum of the lengths of the first-stage regenerator tube and the second-stage regenerator tube in the axial direction C of the cryocooler.
12
14
15
12
14
12
14
In exemplary configuration, the pulse tube is a cylindrical tube in which a cavity is formed, the regenerator tube is a cylindrical tube that is filled with a regenerator material , and both the pulse tube and the regenerator tube are disposed adjacent to each other so that the center axes of the pulse tube and the regenerator tube are parallel to each other.
12
14
16
16
10
12
14
12
14
16
12
14
16
12
14
18
a
a
a
a
a
a
b
b
b
b
b
b
a
a
A low-temperature end of the first-stage pulse tube and a low-temperature end of the first-stage regenerator tube are structurally connected and thermally coupled to each other by the first-stage cooling stage . The first-stage cooling stage has an internal flow channel, and working gas of the cryocooler can flow between the low-temperature end of the first-stage pulse tube and the low-temperature end of the first-stage regenerator tube through this internal flow channel. Likewise, a low-temperature end of the second-stage pulse tube and a low-temperature end of the second-stage regenerator tube are structurally connected and thermally coupled to each other by the second-stage cooling stage . Further, the low-temperature end of the second-stage pulse tube and the low-temperature end of the second-stage regenerator tube are connected to each other by an internal flow channel of the second-stage cooling stage . On the other hand, high-temperature ends of the first-stage pulse tube and the first-stage regenerator tube are connected to each other by the mounting portion .
16
12
14
16
The cooling stage is made of a metal material having high thermal conductivity, such as copper. On the other hand, the pulse tube and the regenerator tube are made of a metal material, which has thermal conductivity lower than the thermal conductivity of the cooling stage , such as stainless steel.
16
20
20
16
b
b
The second-stage cooling stage may include at least one condensation hole that condenses a refrigerant. The condensation hole passes through the second-stage cooling stage in the axial direction C of the cryocooler.
12
14
18
24
18
18
102
102
18
102
12
14
16
102
24
102
The pulse tube and the regenerator tube extend from one main surface of the mounting portion , and a head part is provided on the other main surface of the mounting portion . As described above, the mounting portion is, for example, a vacuum flange and is attached to the hermetic container to keep the airtightness of the hermetic container . In a case where the mounting portion is attached to the hermetic container , the pulse tube , the regenerator tube , and the cooling stage are accommodated in the hermetic container and the head part is disposed outside the hermetic container .
24
26
28
10
10
12
14
26
28
10
26
12
28
The head part is provided with an oscillating flow generation source and a phase control mechanism of the cryocooler . As well known, in a case where the cryocooler is a GM type pulse tube cryocooler, a combination of a compressor that generates the steady flow of working gas and a flow channel switching valve that periodically switches the high-pressure side and the low-pressure side of the compressor to connect the high-pressure side and the low-pressure side to the pulse tube and the regenerator tube is used as the oscillating flow generation source . This flow channel switching valve also functions as the phase control mechanism together with a buffer tank that is provided as necessary. Further, in a case where the cryocooler is a Stirling type pulse tube cryocooler, a compressor, which generates oscillating flow by a piston oscillating harmonically, is used as the oscillating flow generation source and a buffer tank and a communication channel, which connects the buffer tank to the high-temperature end of the pulse tube , are used as the phase control mechanism .
26
24
26
18
26
24
24
28
18
28
24
24
The oscillating flow generation source does not need to be built in the head part (that is, the oscillating flow generation source may not be directly attached to the mounting portion ). The oscillating flow generation source may be disposed to be separated from the head part , and may be connected to the head part by a pipe having stiffness or flexibility. Likewise, it is not essential that the phase control mechanism is directly attached to the mounting portion , and the phase control mechanism may also be disposed to be separated from the head part and may be connected to the head part by a pipe having stiffness or flexibility.
10
12
10
12
16
10
16
16
According to this configuration, in a case where the cryocooler appropriately delays the phase of the displacement oscillation of a gas element (also referred to as a gas piston), which is present in the pulse tube , with respect to the pressure oscillation of the working gas, the cryocooler can generate PV work at the low-temperature end of the pulse tube and cool the cooling stage . In this way, the cryocooler can cool gas and liquid that are in contact with the cooling stage or an object that is thermally coupled to the cooling stage .
10
16
16
10
16
a
b
b
In a case where the cryocooler is used to recondense helium, the first-stage cooling stage is cooled to, for example, a temperature lower than 100K (for example, about 30K to 60K) and the second-stage cooling stage is cooled to about 4K or less that is the liquefaction temperature of helium. In a case where the cryocooler is used to recondense another refrigerant, at least the second-stage cooling stage is cooled to a temperature that is equal to or lower than the liquefaction temperature of the refrigerant.
10
10
10
100
10
For example, helium gas is often used as the working gas that circulates in the cryocooler to cool the cryocooler . In this way, the working gas of the cryocooler may be the same gas as refrigerant gas that is to be recondensed by the cryogenic device . However, in this embodiment, a flow channel for the working gas of the cryocooler is isolated from a flow channel for the refrigerant gas to be recondensed. Accordingly, these gases are not mixed with each other.
16
30
110
104
30
30
30
16
30
a
a
FIG. 2
The first-stage cooling stage includes at least one cold fin that extends toward the heat conductive sleeve of the member to be cooled in a direction perpendicular to the axial direction C of the cryocooler. A plurality of cold fins are provided in this embodiment, and eight cold fins are shown in . The number of the cold fins is not particularly limited, and the first-stage cooling stage may be provided with an arbitrary number of cold fins .
16
12
14
30
16
16
30
16
10
30
16
16
a
a
a
a
a
a
The first-stage cooling stage includes a main body to which the pulse tube and the regenerator tube are fixed, and the cold fins extend from the main body of the first-stage cooling stage along the plane perpendicular to the axial direction C of the cryocooler. In this embodiment, the main body of the first-stage cooling stage may have a discoid shape or a columnar shape and the cold fins extend outward from the main body of the first-stage cooling stage in a radial direction of the cryocooler perpendicular to the axial direction C of the cryocooler. The tip end surface (that is, the outermost surface in the radial direction) of each cold fin may form a part of a cylindrical surface of which the center axis passes through the center of the main body of the first-stage cooling stage . The first-stage cooling stage may have a shape like an external gear as a whole as seen in the axial direction C of the cryocooler.
30
30
16
a
For example, the respective cold fins are formed to have the same size. That is, the lengths of the respective cold fins are equal to each other, the widths of the respective fins are equal to each other, and the heights of the respective fins are equal to each other. The length of the fin is the radial dimension of the fin, and corresponds to a distance between the main body of the first-stage cooling stage and the tip end surface of the fin. The width of the fin corresponds to the circumferential dimension of the fin. The height of the fin is the dimension of the fin in the axial direction C of the cryocooler.
30
16
30
16
30
30
30
a
a
In this example, the length of the cold fin is shorter than the radius of the main body of the first-stage cooling stage and is shorter than, for example, a half of the radius of the main body. However, the length of the cold fin is not limited thereto and may be equal to or larger than the radius of the main body of the first-stage cooling stage . The width of the cold fin is shorter than an interval between two cold fins adjacent to each other in the circumferential direction. However, the width of the cold fin is not limited thereto and may be equal to or larger than such an interval.
30
16
16
30
16
30
16
16
a
a
a
a
a
Further, the height of the cold fin is equal to the thickness (axial dimension) of the first-stage cooling stage , and the upper surface and the lower surface of the fin are flush with the upper surface of the main body of the first-stage cooling stage and the lower surface of the main body, respectively. However, the height of the cold fin may be larger or smaller than the thickness of the first-stage cooling stage . Furthermore, the cold fins may be provided on the main body of the first-stage cooling stage at positions that are slightly deviated from the main body of the first-stage cooling stage in the axial direction C of the cryocooler.
30
16
30
16
30
a
a
The cold fins are arranged at regular angular intervals over the entire circumference of the first-stage cooling stage . However, the cold fins may be provided on only a portion of the outer periphery of the first-stage cooling stage . Further, the cold fins may be arranged at irregular angular intervals.
32
110
104
110
104
30
32
114
Fin receiving grooves , which are recessed in the direction perpendicular to the axial direction C of the cryocooler, are formed in the heat conductive sleeve of the member to be cooled. The heat conductive sleeve of the member to be cooled receives the cold fins in the fin receiving grooves with the heat exchange gap .
110
16
16
114
110
16
a
a
a
The heat conductive sleeve is disposed around the first-stage cooling stage to surround the first-stage cooling stage , so that the heat exchange gap is formed between the heat conductive sleeve and the first-stage cooling stage as described above.
110
16
32
114
110
16
110
16
30
16
16
16
108
110
16
a
a
a
a
a
b
a.
The heat conductive sleeve includes a central opening portion that receives the first-stage cooling stage and passes therethrough in the axial direction C of the cryocooler, and the fin receiving grooves and the heat exchange gap form a part of the central opening portion. The heat conductive sleeve has the shape of a circular ring that is disposed coaxially with the first-stage cooling stage . The heat conductive sleeve faces only the outer peripheral surface of the first-stage cooling stage provided with the cold fins , and does not cover the bottom surface of the first-stage cooling stage . The bottom surface of the first-stage cooling stage faces the second-stage cooling stage in the liquefied refrigerant tank . The heat conductive sleeve also does not cover the upper surface of the first-stage cooling stage
32
110
114
32
30
30
32
114
32
30
110
16
110
16
114
a
a
The fin receiving grooves are recessed outward from the inner peripheral surface of the heat conductive sleeve , which forms the heat exchange gap , in a plane perpendicular to the axial direction C of the cryocooler. The fin receiving grooves , of which the number is the same as the number of the cold fins , are provided and correspond to the cold fins one to one. The size and shape of the fin receiving groove are determined so that the heat exchange gap is formed between the fin receiving groove and the corresponding cold fin . The heat conductive sleeve may have a shape like an internal gear that meshes with the first-stage cooling stage as a whole as seen in the axial direction C of the cryocooler (However, as described above, the heat conductive sleeve and the first-stage cooling stage are separated from each other by the heat exchange gap and are not in contact with each other).
32
32
30
110
104
110
16
32
30
a
The fin receiving grooves extend in the axial direction C of the cryocooler. The fin receiving grooves are provided outside the cold fins in the direction perpendicular to the axial direction C of the cryocooler, and pass through the heat conductive sleeve of the member to be cooled in the axial direction C of the cryocooler. The thickness (axial dimension) of the heat conductive sleeve may be slightly larger than the thickness of the first-stage cooling stage . Accordingly, the axial length of the fin receiving groove may be larger than the height of the cold fin .
FIG. 2
114
16
110
30
16
32
110
114
114
a
a
As shown in , the heat exchange gap extends between the first-stage cooling stage and the heat conductive sleeve to be bent in a meandering shape in a plane perpendicular to the axial direction C of the cryocooler. On the other hand, since the cold fins extend in the axial direction C of the cryocooler on the outer periphery of the first-stage cooling stage and the fin receiving grooves passes through the heat conductive sleeve in the axial direction C of the cryocooler as described above, the heat exchange gap provides a linear gas passage in the axial direction C of the cryocooler. The heat exchange gap is not bent in a meandering shape in the axial direction C of the cryocooler.
114
16
110
114
30
32
30
32
30
32
16
110
30
a
a
For example, the heat exchange gap has a constant width between the first-stage cooling stage and the heat conductive sleeve . The width of the heat exchange gap is in the range of, for example, 1 to 10 mm or 2 to 5 mm. A distance (radial dimension) between the tip end surface of the cold fin and the surface of the fin receiving groove facing this tip end surface is equal to a distance (circumferential dimension) between the side surface of the cold fin and the side surface of the fin receiving groove facing this side surface. Further, the distance between the tip end surface of the cold fin and the surface of the fin receiving groove facing this tip end surface is also equal to a distance between the first-stage cooling stage and the heat conductive sleeve at a portion between two cold fins adjacent to each other in the circumferential direction.
30
32
16
110
114
16
10
114
30
32
30
32
a
a
The size and shape of the cold fin and the size and shape of the corresponding fin receiving groove are not particularly limited, and may be appropriately set according to, for example, heat exchange performance that is desired between the first-stage cooling stage and the heat conductive sleeve , the flow channel resistance of the heat exchange gap , the amplitude of the vibration of the first-stage cooling stage during the operation of the cryocooler , the size of particles that are expected to enter the heat exchange gap together with gas, or other conditions. Further, it is not essential that two different cold fins (and two corresponding fin receiving grooves ) have the same sizes and shapes as each other, and the two different cold fins (and two corresponding fin receiving grooves ) may have sizes and shapes different from each other.
32
30
32
30
30
32
30
It is not essential that the fin receiving grooves correspond to the cold fins one to one. For example, in a case where the width of the fin receiving groove is relatively large or in a case where the width of the cold fin is relatively small and the cold fins are arranged to be relatively close to each other, one fin receiving groove may receive a plurality of cold fins .
100
100
10
16
16
16
110
114
110
110
16
FIG. 1
a
b
a
a.
The operation of the cryogenic device according to the embodiment will be described with reference to again. As described above, in this embodiment, the cryogenic device is formed as a cryostat that has a function to recondense helium. In a case where the cryocooler is operated, the first-stage cooling stage and the second-stage cooling stage are cooled to desired cooling temperatures. Since the first-stage cooling stage is thermally coupled to the heat conductive sleeve through the heat exchange gap without being in contact with the heat conductive sleeve , the heat conductive sleeve is cooled by the first-stage cooling stage
104
103
1
16
110
114
2
108
16
16
16
108
a
b
b
b
Helium gas is introduced into the member to be cooled from the refrigerant introduction port as shown by an arrow B, and flows to the vicinity of the first-stage cooling stage and the heat conductive sleeve . The helium gas is cooled while passing through the heat exchange gap in the axial direction C of the cryocooler as shown by an arrow B, and enters the liquefied refrigerant tank . The helium gas is cooled by the second-stage cooling stage and is liquefied at the second-stage cooling stage . The liquefied helium drops from the second-stage cooling stage and is stored in the bottom of the liquefied refrigerant tank .
104
103
100
Liquid helium is used to cool objects. An object to be cooled may be disposed in the same cryostat. Alternatively, an object to be cooled may be disposed at another place, and liquid helium may be supplied to the object to be cooled through a liquid helium conduit extending from the cryostat. As a result, evaporated helium is collected and is introduced into the member to be cooled from the refrigerant introduction port again. In this way, the cryogenic device can construct a cryogenic circulation cooling system that uses a cryogenic refrigerant.
100
16
30
110
104
32
110
104
32
110
104
30
32
114
a
As described above, in the cryogenic device according to the embodiment, the first-stage cooling stage includes the cold fins that extends toward the heat conductive sleeve of the member to be cooled in the direction perpendicular to the axial direction C of the cryocooler, and the fin receiving grooves , which are recessed in the direction perpendicular to the axial direction C of the cryocooler, are formed in the heat conductive sleeve of the member to be cooled. The fin receiving grooves extend in the axial direction C of the cryocooler. The heat conductive sleeve of the member to be cooled receives the cold fins in the fin receiving grooves with the heat exchange gap .
114
114
114
Accordingly, all or most of the heat exchange gap , which is also a gas passage, can be a linear path extending in the axial direction C of the cryocooler. As compared to a meandering path, the flow of gas passing through the heat exchange gap is facilitated and the clogging of the heat exchange gap caused by particles, which may be contained in the flow of gas, is also less likely to occur.
16
30
110
32
16
110
a
a
Further, since the first-stage cooling stage is provided with the cold fins and the heat conductive sleeve is provided with the fin receiving grooves , a heat exchange area is increased. As a result, the efficiency of heat exchange between the first-stage cooling stage and the heat conductive sleeve is improved.
10
16
12
14
16
10
16
Since high-pressure refrigerant gas periodically enters and exits from the cryocooler as described above, pressure fluctuations are caused. Since such pressure fluctuations causes cryogenic connecting parts, which are connected to the cooling stage including the pulse tube and the regenerator tube , to periodically expand and contract in the axial direction C of the cryocooler, the periodic position fluctuations of the cooling stage in the axial direction C of the cryocooler are caused. In this way, during the operation of the cryocooler , the cooling stage may oscillate with a larger amplitude in the axial direction C of the cryocooler than in other directions.
100
32
30
32
114
114
16
30
16
110
114
a
a
According to the cryogenic device of the embodiment, the fin receiving grooves extend in the axial direction C of the cryocooler and the cold fins are inserted into the fin receiving grooves with the heat exchange gap , so that the heat exchange gap is formed in the direction perpendicular to the axial direction C of the cryocooler. For this reason, even though the first-stage cooling stage , that is, the cold fins oscillate in the axial direction C of the cryocooler, the first-stage cooling stage is less likely to be in contact with the heat conductive sleeve . Accordingly, the size of the heat exchange gap can be set to be relatively small, which also contributes to the improvement of the efficiency of heat exchange.
32
30
110
104
114
110
114
114
114
114
Further, the fin receiving grooves are provided outside the cold fins in the direction perpendicular to the axial direction C of the cryocooler, and pass through the heat conductive sleeve of the member to be cooled in the axial direction C of the cryocooler. Accordingly, the heat exchange gap is a linear gas passage that extends from the upper surface of the heat conductive sleeve to the lower surface thereof. The flow of gas passing through the heat exchange gap is facilitated, and the clogging of the heat exchange gap caused by particles, which may be contained in the flow of gas, is also less likely to occur. Furthermore, since the axial direction C of the cryocooler coincides with the vertical direction (direction of gravity) in this embodiment, an effect that particles fall due to own weight without stopping in the heat exchange gap is also expected, which may also help to avoid the clogging of the heat exchange gap .
FIG. 3
16
30
110
32
110
32
110
104
30
32
114
a
is a schematic cross-sectional view showing another embodiment. As in the above-mentioned embodiment, a first-stage cooling stage includes cold fins that extend toward a heat conductive sleeve in a direction perpendicular to an axial direction C of a cryocooler. Fin receiving grooves , which are recessed in the direction perpendicular to the axial direction C of the cryocooler, are formed in the heat conductive sleeve . The fin receiving grooves extend in the axial direction C of the cryocooler. The heat conductive sleeve of a member to be cooled receives the cold fins in the fin receiving grooves with a heat exchange gap .
110
34
16
110
16
34
40
16
34
114
a
a
a
The heat conductive sleeve includes a surface (hereinafter, referred to as a facing surface ) facing the bottom surface of the first-stage cooling stage . The heat conductive sleeve includes an inner peripheral rim extending inward in a radial direction, and the upper surface of the inner peripheral rim faces the bottom surface of the first-stage cooling stage as the facing surface . An interval between the bottom surface of the first-stage cooling stage and the facing surface in the axial direction C of the cryocooler is larger than the heat exchange gap in the direction perpendicular to the axial direction C of the cryocooler.
36
16
16
38
36
110
38
36
40
36
110
16
110
b
a
a
One or a plurality of stage bottom fins , which extend downward (for example, toward the second-stage cooling stage ) in the axial direction C of the cryocooler, are provided on the bottom surface of the first-stage cooling stage . Bottom fin-receiving recessed portions , which receive the stage bottom fins , are formed on the upper surface of the heat conductive sleeve . The bottom fin-receiving recessed portions are recessed in the axial direction C of the cryocooler to correspond to the stage bottom fins that extend in the axial direction C of the cryocooler. Since the interval is formed, the stage bottom fins are not in contact with the inner peripheral rim of the heat conductive sleeve and the first-stage cooling stage and the heat conductive sleeve are thermally coupled to each other without being in contact with each other as in the above-mentioned embodiment.
32
30
110
104
114
30
32
42
16
16
114
42
114
42
114
42
114
a
a
The fin receiving grooves are provided outside the cold fins in the direction perpendicular to the axial direction C of the cryocooler, and pass through the heat conductive sleeve of the member to be cooled in the axial direction C of the cryocooler. The heat exchange gap is formed between the cold fins and the fin receiving grooves . A through-slit , which passes through the first-stage cooling stage in the axial direction C of the cryocooler, is formed in the inner peripheral rim of the first-stage cooling stage . The heat exchange gap and the through-slit are arranged in line in the axial direction, so that a linear path along which gas can pass is formed by the heat exchange gap and the through-slit . According to even this configuration, the flow of gas passing through the heat exchange gap and the through-slit is facilitated and the clogging of the heat exchange gap caused by particles, which may be contained in the flow of gas, is also less likely to occur.
16
30
36
110
32
38
16
110
a
a
Since the first-stage cooling stage is provided with the cold fins and the stage bottom fins and the heat conductive sleeve is provided with the fin receiving grooves and the bottom fin-receiving recessed portions , a heat exchange area is increased. As a result, the efficiency of heat exchange between the first-stage cooling stage and the heat conductive sleeve is improved.
10
40
16
34
114
16
110
16
30
114
a
a
a
Further, as described above, vibration, which may be generated by the cryocooler , has a relatively larger amplitude in the axial direction C of the cryocooler than in other directions. Since the interval between the bottom surface of the first-stage cooling stage and the facing surface in the axial direction C of the cryocooler is larger than the heat exchange gap in the direction perpendicular to the axial direction C of the cryocooler, the first-stage cooling stage is less likely to be in contact with the heat conductive sleeve even though the first-stage cooling stage , that is, the cold fins oscillate in the axial direction C of the cryocooler. Accordingly, the size of the heat exchange gap can be set to be relatively small, which also contributes to the improvement of the efficiency of heat exchange.
16
36
16
34
110
a
a
The first-stage cooling stage may not include the stage bottom fins . The bottom surface of the first-stage cooling stage may be flat and the facing surface of the heat conductive sleeve may also be flat to correspond to the flat bottom surface.
110
42
40
16
34
110
114
40
114
a
The heat conductive sleeve may not include the through-slit . In this case, a gas passage is formed of the interval , which is formed between the bottom surface of the first-stage cooling stage and the facing surface of the heat conductive sleeve , and the heat exchange gap . The interval may be regarded as a part of the heat exchange gap .
The invention has been described above on the basis of the embodiments. It is understood by those skilled in the art that the invention may have various design changes and various modification examples without being limited to the above-mentioned embodiments and the modification examples are also included in the scope of the invention. Various features described in relation to a certain embodiment can also be applied to other embodiments. A new embodiment formed from combination has the effects of the respective combined embodiments.
16
110
16
110
16
a
a
a.
The first-stage cooling stage has a discoid shape and the heat conductive sleeve has an annular shape in the above-mentioned embodiments, but the shapes of these are not particularly limited. For example, the first-stage cooling stage may have the shape of a rectangular plate, and the heat conductive sleeve may have the shape of a rectangular frame that surrounds the rectangular plate-like first-stage cooling stage
30
16
30
32
16
110
16
16
16
a
a
b
a
a.
The cold fins are provided on the first-stage cooling stage and the cold fins are accommodated in the fin receiving grooves in the above-mentioned embodiments, so that a non-contact heat transfer structure of the first-stage cooling stage and the heat conductive sleeve is formed. However, such a non-contact heat transfer structure may be applied to the second-stage cooling stage instead of the first-stage cooling stage or together with the first-stage cooling stage
10
The cryocooler is not limited to a pulse tube cryocooler and may be a GM cryocooler or other cryocoolers. For example, in the case of a GM cryocooler, the “regenerator tube” of the above-mentioned embodiment may be a cylinder that accommodates a displacer in which a regenerator is built. The GM cryocooler does not include a pulse tube.
100
10
The cryogenic device may use a refrigerant other than helium. In a case where the refrigerant is used, the cryocooler has only to provide the liquefaction temperature of the refrigerant and may be a single-stage cryocooler.
Although the invention has been described using specific words and phrases on the basis of the embodiments, the embodiments merely illustrate one aspect of the principle and application of the invention. Many modification examples and changes in arrangement are allowed in the embodiments without departing from the scope of the invention defined in claims.
INDUSTRIAL APPLICABILITY
The invention can be used in the fields of a cryogenic device and a cryostat.
It should be understood that the invention is not limited to the above-described embodiment, but may be modified into various forms on the basis of the spirit of the invention. Additionally, the modifications are included in the scope of the invention. | |
UXmatters has published 5 articles on the topic Expert Reviews.
In this edition of Ask UXmatters, our experts discuss their views on the best approaches to conducting expert reviews.
Each month in my column Ask UXmatters, our UX experts provide answers to our readers’ questions about a broad range of user experience matters. To get answers to your own questions about UX strategy, design, user research, or any other topic of interest to UX professionals in an upcoming edition of Ask UXmatters, please send your questions to: [email protected]. Read More
This month in Ask UXmatters, our expert panel discusses how to perform a UX audit to evaluate an existing product. A UX audit typically includes an evaluation of a product’s usability, learnability, and accessibility characteristics. There are several approaches you can use when conducting a UX audit. Our experts describe their preferred methods.
Understanding the user’s journey fully requires that you map the user journey for both the product and any related Web site, then evaluate both. Plus, it is important to understand the business requirements for the product to understand whether the product is fulfilling those requirements. Read More
In this Ask UXmatters column—which is the first in a series of three columns focusing on usability—our experts discuss the use of usability testing versus expert reviews. In the upcoming columns, we’ll discuss what usability techniques to use when money or time is tight and how to best conduct remote usability testing. | https://www.uxmatters.com/topics/research/expert-reviews/ |
In work that sheds light on both the genetic similarities between dogs and humans and the genetic differences between dog breeds, an international research team led by scientists at the Broad Institute of MIT and Harvard announced today the completion of a high-quality genome sequence of the domestic dog.
The research will be published in the Dec. 8 issue of Nature.
Comparing dog and human DNA reveals key secrets about the regulation of the master genes that control embryonic development. Comparing dog breeds reveals the structure of genetic variation within the species. The researchers' catalog of 2.5 million specific genetic differences across several breeds can now be used to unlock the basis of physical and behavioral differences, as well to find the genetic underpinnings of diseases common to domestic dogs and their human companions.
"The incredible physical and behavioral diversity of dogs -- from Chihuahuas to Great Danes -- is encoded in their genomes," said senior author Eric Lander, director of the Broad Institute and a professor of biology at MIT. The sequencing of that genome "can uniquely help us understand embryonic development, neurobiology, human disease and the basis of evolution," said Lander, who is also a professor of systems biology at Harvard Medical School and a member of the Whitehead Institute for Biomedical Research.
Dogs not only occupy a special place in human hearts, they also sit at a key branch point in the evolutionary tree relative to humans. By tracking evolution's genetic footprints through the dog, human and mouse genomes, the scientists found that humans share more of their ancestral DNA with dogs than with mice, confirming the utility of dog genetics for understanding human disease.
Most importantly, the comparison revealed the regions of the human genome that are most highly preserved across mammals. Roughly 5 percent of the human genome has been well preserved by evolution over the past 100 million years. The researchers discovered that the most highly conserved of these sequences are not randomly distributed throughout the genome. Instead, they are crowded around just a tiny fraction (about 1 percent) of the genes that encode crucial regulatory proteins involved in development (such as transcription factors or axon guidance receptors).
"The clustering of regulatory sequences is incredibly interesting," said Kerstin Lindblad-Toh, first author of the Nature paper and co-director of the genome sequencing and analysis program at Broad. "It means that a small subset of crucial human genes is under much more elaborate control than we had ever imagined."
More than two years ago Lindblad-Toh, Lander and their colleagues embarked on a two-part project to assemble a complete map of the dog genome. First, they acquired a high-quality DNA sequence from a female boxer named Tasha, covering nearly 99 percent of the dog's genome. Using this information as a genetic "compass," they then sampled the genomes of 10 different dog breeds and other related canine species, including the gray wolf and coyote.
By comparing these dogs, they pinpointed 2.5 million individual genetic differences among breeds, called single nucleotide polymorphisms (SNPs), which serve as recognizable signposts that can be used to locate the genetic contributions to physical and behavioral traits, as well as disease.
The scientists then used the SNP map to reconstruct how intense dog breeding has shaped the genome. They discovered that selective breeding has carried large genomic regions of several million bases of DNA into breeds, creating "haplotype blocks" that are 100 times larger than those seen in the human population. "The huge genomic regions should make it much easier to find the genes responsible for differences in body size, behavior and disease," said Lander. "Such studies will need many fewer markers than for human studies. It should be like hitting the side of a barn."
Breeding programs have not only selected for desired traits, they have also had the unintended consequence of predisposing many dog breeds to genetic diseases, including heart disease, cancer, blindness, cataracts, epilepsy, hip dysplasia and deafness. With the dog genome sequence and the SNP map, scientists around the world now have the tools to identify these disease genes.
Humans suffer from many of the same illnesses as their four-legged friends and even show similar symptoms, but the genetic underpinnings have proved difficult to trace. "The genetic contributions to many common diseases appear to be easier to uncover in dogs," said Lindblad-Toh. "If so, it is a significant step forward in understanding the roots of genetic disease in both dogs and humans."
For this work, the dog-owner community is an essential collaborator. "We deeply appreciate the generous cooperation of individual dog owners and breeders, breed clubs and veterinary schools in providing blood samples for genetic analysis and disease gene mapping," said Lindblad-Toh. "Without their interest and help we could not be doing this work."
This work was funded in large part by the National Human Genome Research Institute, one of the National Institutes of Health.
A version of this article appeared in MIT Tech Talk on December 14, 2005 (download PDF). | https://news.mit.edu/2005/dog-genome |
The Chosen One
$20.00
The prophecy of the Chosen One was an ancient Jedi legend that foretold the coming of a powerfully Force-sensitive being who would restore balance to the Force. Hero of the Republic during the Clone Wars and later becoming the right hand to the Emperor of the Galactic Empire, Anakin Skywalker was believed to be the Chosen One the prophecy spoke of. After 23 years of doing the Emperor’s bidding as Darth Vader, Anakin Skywalker was redeemed aboard the Second Death Star when he fulfilled the prophecy by killing the Emperor and returning back to the light.
| |
The General Assembly,
|
Recalling its resolution 58/192 of 22 December 2003,
Recalling also Commission on Human Rights resolution 2005/56 of 20 April 2005 entitled "Promotion of peace as a vital requirement for the full enjoyment of all human rights by all",/1
Taking note of its resolution 39/11 of 12 November 1984 entitled "Declaration on the Right of Peoples to Peace", and the United Nations Millennium Declaration,/2
Determined to foster strict respect for the purposes and principles enshrined in the Charter of the United Nations,
Bearing in mind that one of the purposes of the United Nations is to achieve international cooperation in solving international problems of an economic, social, cultural or humanitarian character and in promoting and encouraging respect for human rights and for fundamental freedoms for all without distinction as to race, sex, language or religion,
Underlining, in accordance with the purposes and principles of the United Nations, its full and active support for the United Nations and for the enhancement of its role and effectiveness in strengthening international peace, security and justice and in promoting the solution of international problems, as well as the development of friendly relations and cooperation among States,
Reaffirming the obligation of all States to settle their international disputes by peaceful means in such a manner that international peace and security and justice are not endangered,
Emphasizing its objective of promoting better relations among all States and contributing to setting up conditions in which their people can live in true and lasting peace, free from any threat to or attempt against their security,
Reaffirming the obligation of all States to refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any State, or in any other manner inconsistent with the purposes of the United Nations,
Reaffirming its commitment to peace, security and justice and the continuing development of friendly relations and cooperation among States,
Rejecting the use of violence in pursuit of political aims, and stressing that only peaceful political solutions can ensure a stable and democratic future for all people around the world,
Reaffirming the importance of ensuring respect for the principles of the sovereignty, territorial integrity and political independence of States and nonintervention in matters that are essentially within the domestic jurisdiction of any State, in accordance with the Charter and international law,
Reaffirming also that all peoples have the right to self-determination, by virtue of which they freely determine their political status and freely pursue their economic, social and cultural development,
Reaffirming further the Declaration on Principles of International Law concerning Friendly Relations and Cooperation among States in accordance with the Charter of the United Nations,/3
Recognizing that peace and development are mutually reinforcing, including in the prevention of armed conflict,
Affirming that human rights include social, economic and cultural rights and the right to peace, a healthy environment and development, and that development is in fact the realization of those rights,
Underlining the fact that the subjection of peoples to alien subjugation, domination and exploitation constitutes a denial of fundamental rights, is contrary to the Charter and is an impediment to the promotion of world peace and cooperation,
Recalling that everyone is entitled to a social and international order in which the rights and freedoms set forth in the Universal Declaration of Human Rights /4 can be fully realized,
Convinced of the aim of creating conditions of stability and well-being, which are necessary for peaceful and friendly relations among nations based on respect for the principles of equal rights and self-determination of peoples,
Convinced also that life without war is the primary international prerequisite for the material well-being, development and progress of countries and for the full implementation of the rights and fundamental human freedoms proclaimed by the United Nations,
Convinced further that international cooperation in the field of human rights contributes to creating an international environment of peace and stability,
64th plenary meeting
|
|
Footnotes
1/ See Official Records of the Economic and Social Council, 2005, Supplement No. 3 and corrigendum (E/2005/23 and Corr.1), chap. II, sect. A.
2/ See resolution 55/2.
3/ Resolution 2625 (XXV), annex. | http://un-documents.net/a60r163.htm |
FIELD
BACKGROUND
DETAILED DESCRIPTION
The subject matter herein generally relates to system, device, and method for distribution network.
Most retailers have restructured their procurement strategies from decentralized procurement through traditional wholesale markets to centralized procurement systems through their own distribution centers. The management team needs to choose an ideal distribution center location to minimize the opening, operational, and transportation costs. Logistical costs represent a large portion of company expenses. Distribution system design has become a major issue for many industries.
Generally, factory and/or warehouse locations should be addressed at a strategic level, while cargo vehicle routing must be targeted at a tactical or operational level to satisfy customer demand. Location and routing decisions are interdependent and concurrent.
It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures, and components have not been described in detail so as not to obscure the related relevant feature being described. Also, the description is not to be considered as limiting the scope of the embodiments described herein. The drawings are not necessarily to scale and the proportions of certain parts may be exaggerated to better illustrate details and features of the present disclosure.
The present disclosure, including the accompanying drawings, is illustrated by way of examples and not by way of limitation. Several definitions that apply throughout this disclosure will now be presented. It should be noted that references to “an” or “one” embodiment in this disclosure are not necessarily to the same embodiment, and such references mean “at least one.”
The term “comprising” means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in a so-described combination, group, series and the like.
The present disclosure pertains to system and method for finding optimal or near optimal depot locations and/or vehicle routes to serve a set of customers in a distribution system. For example, it is required to visit a subset of customer vertices to satisfy their specific demands or specific time window of customers (available for receiving delivery shipments) while minimizing the total distance traveled. Therefore, the system and method in accordance with the instant disclosure may provide decisions on whether a depot is to be opened or closed, whether a delivery vehicle is available for courier assignments to the opened depots, and which delivery routes to be constructed to fulfill the demand.
FIG. 1A
10
10
12
14
16
18
10
1
2
is an illustration of an example distribution system . The exemplary distribution system may comprise one or more delivery vehicles , a plurality of customers , a plurality of depots to address a plurality of customer demands (Di) . In some embodiment, the depots may be pre-arranged before the distribution system operating in an area. For example, D and D should be considered which one should be opened or both should be opened.
FIG. 1B
100
100
102
104
106
108
is an illustration of an example distribution system . The exemplary distribution system may comprise one or more delivery vehicles , a plurality of customers , a plurality of depots to address a plurality of customer demands (Di) .
102
104
108
106
Each vehicle provides a predetermined shipment carrying capacity and has vehicle activation cost. Each customer is associated with customer demands , a location coordinate, a service time, and/or an available time window for receiving delivery shipments. Each depot is associated with an opening cost, a location coordinate, a storage capacity and an opening time/closing time.
102
106
102
1
1
2
3
4
102
106
102
2
2
In at least one embodiment, the vehicle may start and end at the same depot . For example, if the vehicle starts from depot D, then it end/stop at depot D. The vehicle can't stop at depot D, D, or D. Another vehicle may start from a different depot , but it stops or end at its' starting depot. For example, the vehicle starts from depot D, then it end/stop at depot D.
102
106
102
1
2
3
4
In at least one embodiment, the vehicle may start and end at a different depot . For example, if vehicle starts from depot D, then it end/stop at depot D, D, or D.
2
2
2
Another vehicle may start from a different depot, but it must stop or end at its' starting depot. For example, another vehicle, say vehicle , may start from depot . But it must stop/end at depot .
1
2
102
1
1
1
1
2
3
4
1
102
1
2
10
3
4
1
102
1
2
1
5
6
1
102
5
6
1
102
1
4
5
6
1
102
100
For an exemplary scenario where depot D is opened and depot D is closed. The vehicle with a holding capacity of 30 shipments may upload 30 shipments in D and choose route (D-C-C-C-C-D) to go on a first round trip. The vehicle may unload 5 shipments in C, 5 shipments in C, shipments in C, 10 shipments in C, and head back to D. The vehicle may then upload 20 shipments in D and choose route (D-C-C-D) to go on a second round trip. The vehicle unloads 10 shipments in C, 10 shipments in C, and goes back to D. In some embodiments, the vehicle can choose other routes (such as D-C-C-C-D) in order to satisfy different objectives, such as minimizing total distance traveled, total time traveled or total distribution network costs. In some embodiments, numbers of vehicles can be applied in the distribution system .
Specifically, one of the objectives for minimizing the total distribution network costs may include “depot opening cost” and “routing cost,” i.e. travel cost and fixed cost. Decisions may be made as to which depots should be opened, as to how many vehicles should be operated, and as to how the operated vehicles may serve all customers under routing and capacity constraints.
In some embodiments, the number of vehicles is abundant, and one customer can only be served by one vehicle. In some embodiments, depot capacity and demand are deterministic, and each customer or each depot has deterministic time windows. In some embodiments, each customer or each depot has deterministic time constraints
The vehicle routing method in accordance with the instant disclosure may be adopted by a variety of distribution network applications other than delivery networks, for example, the newspaper distribution network, waste collection network, food and drink distribution network, medical service network, and the like.
FIG. 2
200
202
204
202
202
202
202
202
202
shows a vehicle routing system. The exemplary vehicle routing system comprises a plurality of vehicle routing device (in the instant case, N devices) communicatively coupled with each other through the network (e.g., the Internet). The vehicle routing device can be located in the depots, the vehicles, or carried by the customers. All the routing information and data (such as vehicle routing plan) can be exchanged among the depots, the vehicles, or the customers through the vehicle routing device . In some embodiments, the vehicle routing device can be set in a cloud center where the cloud center can receive all the routing information from the depots, the vehicles, or the customers. For example, the routing devices in the depots may be configured to provide depot capacity or depot time window information; the routing device in the vehicles may be adopted to provide vehicle capacity or vehicle availability information; and routing devices carried by the customers may be configured to provide order information or customer time window information. The cloud center may be arranged to receive the routing information and make optimal vehicle routing plans accordingly.
206
In at least one embodiment, the routing device is in a cloud center .
FIG. 3
FIG. 2
300
200
300
304
302
304
320
306
304
306
304
306
310
304
310
308
304
shows an exemplary vehicle routing device adaptable in the vehicle routing system as shown in . The vehicle routing device comprises a processor configured to generate at least one operation solution based on a routing information. An input unit is coupled to the processor and configured to inputting routing information. The input unit may be any suitable electronic device that includes an input interface configured to receive an input data/information (e.g., cellular telephone, personal digital assistant (PDA), laptop, radio, broadcasting, walkie-talkie, etc.). A memory is coupled to the processor and configured to receive and store the routing information. The memory may comprise some instructions (executed by software, firmware or programs) executable by the processor . The memory may comprise a volatile or a non-volatile memory device such as a flash memory, a read only memory (ROM), or a random access memory (RAM), and actual implementation of the memory device should not limited to these examples. A display is coupled to the processor and configured to display information that shows the operation instructions and a visual representation of the operation solution on vehicle routing information (for example, displaying a vehicle routing plan). The display may be an electronic device that includes an output unit, such as a monitor, cellular telephone, personal digital assistant (PDA), laptop, radio, broadcasting, walkie-talkie, etc. A communication unit is coupled to the processor and configured to transmit or receive any routing information.
300
302
306
306
308
306
304
304
310
308
300
300
300
300
In at least one embodiment, the vehicle routing device is arranged in a depot. A staff in the depot may input the objective information and depot information through the input unit (in some embodiment, the objective information comprising minimizing the total cost of distribution network/system is pre-stored in the memory , and the depot information is pre-stored in the memory ). The commination unit is configured receive vehicle information from vehicles and customer information from customers as routing information. The objective information and the routing information may be stored in the memory or be transmitted to the processor directly. The processor is configured to execute a program to generate a vehicle routing plan based on the routing information and the objective information. The vehicle routing plan can be shown on the display to the staff in the depot and is also transmitted to the vehicles and customers through the commination unit . Therefore, arrangement on vehicle routing is updated. In some embodiment, vehicles, customers or cloud centers also may operate the vehicle routing devices . In at least one embodiment, the vehicle routing device is mainly operated in the cloud center to generate a vehicle routing plan. The objective function (or objective information) can be preinstall in the vehicle routing device in the cloud center or be input manually by anyone who operates the vehicle routing device . The depots, the vehicles and the customers provide their information to the cloud center and receive the vehicle routing plan performed by the cloud center afterward.
300
308
300
308
304
308
In at least one embodiment, the vehicle routing device is arranged in a cloud center, wherein the communication unit is available for exchanging routing information among the vehicles, depots, and customers. The process of generating vehicle routing plan are in the cloud center. For example, the vehicle routing device is operated in a cloud center and is configures to receive the routing information from any devices (such as mobile phone, PDA, etc.) in vehicles, depots and customers by the communication unit . After a vehicle routing plan is generated by the processor . The communication unit is configured to transmit the vehicle routing plan to any devices (such as mobile phone, PDA, etc.) in vehicles, depots and customers from the cloud center.
Because some information may be dynamic, the vehicle routing plan may be changed according to the objective information and conditions of the depots, the vehicles and the customers. For example, when a vehicle has an accident and is not available to work, the vehicle will update vehicle information to the system so that the vehicle routing device/system may make a new vehicle routing plan dynamically in accordance with the updated information.
FIG. 4
400
is a flowchart as one embodiment showing a vehicle routing or depot locating method.
402
302
306
In block , performing at least one of the objective function (or objective information) via the input unit or preinstalled in the memory . The objective function may comprise minimizing total distance traveled, total time traveled or total distribution network costs.
404
304
In block , generating at least one routing information basing on at least one of the depot information, the vehicle information and the customer information via the processor . The depot information may be provided from depots, wherein the depots information may comprise capacity of the depots or time window of the depots. The vehicle information may be provided from vehicles available in a vehicle routing system (e.g., a shipment distribution network.). The customer information may be provided form customers who give an order or when the shipment is available to be delivered. When receiving the information from the depots, the vehicle and customers, the information are original information, wherein the original information are randomly arranged without being modified optimally. Therefore, an optimal solution for a vehicle routing plan based on the objective information is necessary.
406
304
In block , generating a solution based on the routing information and the objective information, wherein the solution satisfies the objective function by the processor . The objective function may have a criteria for the solution to be certificated. If the solution matches the criteria, the solution can be chosen as optimal or near optimal solution.
408
304
In block , generating a vehicle routing plan basing on the solution by the processor . The vehicle routing plan helps the vehicles to reschedule their routes in order to satisfy the objectives, such as minimizing total distance traveled, total time traveled or total distribution network costs.
410
In block , outputting a visual representation of the vehicle routing plan on a display unit.
304
In some embodiment, the vehicle routing plan comprises a depot locating plan. The depot locating plan can be generated basing on the solution by the processor . The depot locating plan provides an arrangement plan for where the depots should be locate in order to satisfy the objectives, such as minimizing total distance traveled, total time traveled or total distribution network costs.
304
In some embodiment, a depot locating plan can be generated basing on the solution by the processor with depot locating method. For example, when evaluating where to operate the depots, there may have numbers of locations can be chosen. The depot locating plan provides an arrangement plan for where the depots should be locate in order to satisfy the objectives, such as minimizing total distance traveled, total time traveled or total distribution network costs. Therefore, the depots can be considered where to be operated.
FIG. 5
406
Referring to as one embodiment of an instruction to generate the solution according to the block . For example, the first solution (initial solution) is provided by Greedy algorithm. The instruction is able to generate a second solution based on the first solution. For example, the second solution is provided by using a simulated annealing algorithm (SA). The SA is a local search-based heuristic capable of escaping from being trapped at a local optimum by accepting, with small probability tolerances, worse solutions during its search for the optimal solution. The optimization procedure of the SA searches for a (near) global minimum mimicking a slow cooling procedure in a physical annealing process. Starting from an initial solution by greedy algorithm, a new solution is taken from the predefined neighborhood of the current solution at each iteration.
502
504
506
508
510
512
In block , the instruction is able to input or import data. In block , the instruction is able to generate a first solution. In block , the instruction is able to generate a second solution based on the first solution. In block , the instruction is able to evaluate and determine whether the second solution is better than the first solution. If the second solution is better than the first solution, then the process is going to next evaluation. In block , the instruction is able to evaluate and determine whether the second solution is better than the present best solution. If the second solution is better than the present best solution, then generate a new second solution which replaces the present best solution. In block , the instruction is able to determine whether the objective of the operation solution is achieved.
FIG. 6
illustrates the detailed flow chart of SA for vehicle routing considering time window, wherein the objective may comprises “minimize total distance” or “minimize total distribution network costs”.
0
best
best
602
604
606
608
610
612
614
612
616
The flow chart begins by setting current temperature T to Tand generating an initial solution X by greedy heuristic algorithm in block . The current best solution, X, and the best objective function of X, denoted by F, are set to be X and Obj(X) in block , respectively. A random value r is generated in block . For each iteration, a new solution Y is obtained from pre-defined neighborhoods of the current solution X in block . The objective function values of X and Y are then evaluated. The r is related to corresponding block (Swap, r≦⅓), block (Insertion, ⅓<r≦⅔) and block (2-opt, ⅔≦r≦1). For example, if value of r is between ⅓ and ⅔ (⅓<r≦⅔), then insertion in block is chosen and iteration (I=I+1) in block is defined.
618
620
624
626
620
622
628
630
632
634
best
best
best
iteration
In block , suppose Δ=obj(Y)−obj(X). If Δ is less than or equal to zero, then it means that Y is better than X, and therefore X is replaced with Y in block ; otherwise, the probability (value of r is generated again in block ) of replacing X with Y is exp(−Δ/KT). If value of r is less than exp(−Δ/KT) in block , X is replaced with Y in block . In block , If Obj(X,P) is less than F, then it means that X=X and F=Obj(X,P) in block ; otherwise, it decides whether iteration (I=I) in block . The current temperature T is then decreased after running I, using the formula T=αT in block and make Y=X in block . For example, the current temperature T is then decreased after running I(5000 iterations), using the formula T=αT, where α=0.98.
best
best
best
best
best
best
best
best
final
best
non-improving
636
638
640
642
644
646
648
650
Furthermore, set Y as Xand then perform the local search based on the swap operation in block , block (decision on if Obj(Y,P)<F) and block (X=Y, F=Obj(Y,P) and N=0). Then set Y as Xand then perform the local search based on the insertion operation in block , block (decision on if Obj(Y,P)<F), block (X=Y, F=Obj(Y,P) and N=0) and block (N=N+1). The algorithm is terminated when the current temperature T is lower than Tor current best solution Xhas not improved for Nconsecutive temperature reductions in block .
FIG. 7
700
702
704
708
706
700
illustrates an embodiment of an interface of a vehicle routing device. A first input field is configured to select and upload customer data or customer information. A second input field is configured to select and upload depot data or depot information. After inputting the depot information and the customer information, a position map illustrates the position of the depots and the customers. The program will be executed after the solve button being pressed. In some embodiment, vehicle information can be selected and uploaded in the interface .
FIG. 8
800
802
804
806
illustrates another embodiment of an interface of a vehicle routing device. A first output field shows total cost as an objective after the program being executed. A window and a report show a vehicle routing plan after the program being executed. The vehicle routing plan comprises every vehicle routing information including the vehicle identification, the vehicle load, the vehicle capacity, the vehicle traveled distance, and the vehicle setup cost, number of customers visited by the vehicles. The vehicle routing plan also comprises depot information including the depot identification, the depot capacity, the depot demand, and opening cost. The vehicle routing plan also comprises cost information including total opening cost, total set up cost, total traveling cost, and total cost.
The embodiments shown and described above are only examples. Many details are often found in the art such as the other features of a vehicle scheduling device and method for transportation system. Therefore, many such details are neither shown nor described. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, especially in matters of shape, size, and arrangement of the parts within the principles of the present disclosure, up to and including the full extent established by the broad general meaning of the terms used in the claims. It will therefore be appreciated that the embodiments described above may be modified within the scope of the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
Many aspects of the disclosure can be better understood with reference to the following drawings. The components in the drawings are not necessarily drawn to scale, the emphasis instead being placed upon clearly illustrating the principles of the disclosure. Moreover, in the drawings, like reference numerals designate corresponding parts throughout the several views.
FIG. 1A
is an illustration of an example distribution system.
FIG. 1B
is another illustration of an example distribution system.
FIG. 2
is an illustration of an embodiment of a distribution network.
FIG. 3
FIG. 2
is an illustration of an embodiment of a device to apply the network of .
FIG. 4
is a flowchart of an embodiment of a vehicle routing method.
FIG. 5
is a flowchart of another embodiment of a vehicle routing method.
FIG. 6
is a flowchart showing a vehicle routing method according to SA.
FIG. 7
is an application interface of a vehicle routing device.
FIG. 8
is another application interface of a vehicle routing device. | |
In 2014, millions of Americans participated in the ALS Ice Bucket Challenge, which helped to raise awareness for the disease. Five years later, researchers are still working to find a cure.
Amyotrophic lateral sclerosis, or ALS, is a neurodegenerative disease that causes progressive degeneration of motor neurons leading to weakness and loss of muscle mass, including the muscles involved in breathing, swallowing, and in the arms and legs.
Drs. Lydia Sharp and James Orengo, neurologists at Baylor College of Medicine, share what you should know about the disease.
Q: What are the symptoms of ALS?
Sharp: The symptoms of ALS include muscle weakness, muscle loss, muscle cramping and twitching, which can impair the use of the legs and arms. Individuals may also experience trouble swallowing, difficulty speaking, and difficulty breathing.
Q: Do we know how or why people develop ALS?
Orengo: About 90% of individuals with ALS have no known cause for the development of disease, while the other 10% typically have a gene mutation that runs in families.
Unfortunately, there is currently no cure for ALS. However, there are two FDA-approved drugs that modestly slow the progression of the disease. There are also several research studies underway in animal models to cure some of the genetic forms of ALS.
Life expectancy varies quite a bit – from as little as six months to over 20 years from the time of diagnosis. On average, the life expectancy is between two to five years from the onset of symptoms.
Q: How can quality of life can be improved for patients with ALS?
Sharp: ALS patients can benefit from multidisciplinary care, which includes a physical, occupational, and speech therapist, pulmonologist, respiratory therapist, dietitian, neuropsychologist, and a neurologist. The goal is to treat symptoms and provide adaptive devices as needed in order to maximize the patient’s quality of life.
Q: What can friends and family members do to support loved ones with ALS?
Orengo: Individuals with ALS require a lot of support both physically and emotionally. Caregiver burnout is an important issue. In addition to being there for family members with ALS, caregivers also need to take time out to ensure their own wellbeing. Caregivers should also try to promote a rich social life for individuals with ALS.
Q: Can you tell us about the Greater Houston ALS walk?
Orengo: The Walk to Defeat ALS – Houston, which takes place on Saturday, Oct. 26, is organized by the Texas Chapter of the ALS Association. This annual event is focused on raising funds for innovative research towards a treatment and cure for ALS. Baylor has its own team, which is led by Dr. Sharp. In addition, Drs. Michelle York, Annise Wilson, and I are part of the team and our goal is to raise $1,000.
Drs. Sharp and Orengo are assistant professors of neurology at Baylor. Learn more about how to join and support the Baylor ALS Clinic Team.
Additional Resources
Learn more about the Neuromuscular Disease Center at Baylor or call (713) 798-2273.
Read more information about ALS. | https://blogs.bcm.edu/2019/10/23/understanding-als/ |
Clare Strand Fotografie Und Video, Museum Braunschweig (solo show) May-June 2009
The mysterious and fantastic productions of the British photographer Clare Strand cite various social and scientific uses of photography, and can be considered simultaneously as academic and ironic statements. Her black-and-white photographs and videos show just how much our shared cultural imagination is shaped by this medium. The wide ranging rhetorical possibilities of photographic images have long since been a central part of our visual experience: The unemotional stock-taking of the crime scene photographs often seen in newspapers, the demure objectivity of a scientific test recreated from old textbooks, or the entire spectrum of the invisible made visible - which begins with the world of medical in the x-ray and ends in the spiritualistic images claimed to represent anything from ghosts to living auras.
Clare Strand’s works play with the idea of photography as evidence and the notion that photography is an ostensibly true representation of reality. Thus she belongs to that generation of photographers who do not exhaust themselves with the accepted canon in the history of photography, but rather examine the cultural and utilitarian histories and uses of the medium. It is no coincidence that now, at the “end of the analog form of photography,” the poetic potential of the ‘everyday’ is discovered in the poor and discarded genres of this medium. | https://www.clarestrand.co.uk/exhibitions/?id=138 |
Hiring bias can be defined as the inclination, opinion or judgment we make while trying to decide if they are the right fit for the job. Research says that humans make around 35,000 decisions each day, sometimes we do it unknowingly. Our upbringing, social groups, exposure to diversity and media are some of the things that carve our perspectives, and are also the base of our decisions. These biases are a part of our conscious and unconscious mind that impact employees and the organization. Here are the strategies to get rid of hiring biases.
1. Creating Awareness
The very first step to remove hiring bias is to understand the types of hiring bias and to create an awareness through training, by emphasizing on Diversity, Equality and Inclusion) (DE&I) policies.
2. Holding everyone accountable
Including accountability adds weightage to the interview process which compels interviewers to take ownership in following the hiring norms set by the Software Organization.
3. Modify Job Description
Sharing information is the primary step and it is the reason for the types of applications we receive. Job descriptions emphasizing on skill sets and job role along with the list of flexible application norms (women with career gap, all age groups, people will to relocate etc)
4. Implementing data-based hiring process
Computerizing application and primary interview rounds based on communication and skill set or job role tasks will ease the interview process.
5. Standardize Interviews
Having a standardized interview system based on the required knowledge and experience will result in gaining a similar set of responses or scores which can further compare to shortlist or finalize the Software Employee. | https://www.techdoquest.com/blog-software-development-companiesstrategies-to-get-rid-of-biases-during-recruitment |
Cognitive behavioral therapy is an umbrella term that encompasses many therapeutical approaches, techniques and systems.
- Acceptance and Commitment Therapy is a "third wave" behavior therapy, developed by Stephen Hayes based on relational frame theory.
- Anxiety Management Training was developed by Suinn and Richardson (1971) for helping clients control their anxiety by the use of relaxation and other skills.
- Applied Behavioral Analysis, described by Baer, Wolf and Risley in 1968, is the science of applying experimentally derived principles of behavior to improve socially significant behavior.
- Behavioral activation is a behavioral approach to treating depression, developed by Neil Jacobson and others.
- Behavior modification is a term originally used by Edward Thorndike in 1911.
- Behavior therapy
- Cognitive therapy was developed by Aaron Beck and has become of the most studied psychosocial treatments.
- Cognitive analytic therapy
- Cognitive behavior modification
- Cognitive behavioral analysis system of psychotherapy
- Cognitive processing therapy for Post traumatic stress disorder
- Computerised Cognitive Behavioral Therapy
- Contingency Management
- Dialectical Behavior Therapy
- Demartini Method
- Direct therapeutic exposure
- Exposure and response prevention
- Functional Analytic Psychotherapy
- Interactive Cognitive Subsystems
- Mindfulness-based Cognitive Therapy
- Multimodal Therapy
- Problem-Solving Therapy
- Prolonged Exposure Therapy
- Rational Emotive Behavior Therapy, formerly called Rational Therapy and Rational Emotive Therapy, was founded by Albert Ellis and is "regarded by many as one of the premiere examples of the cognitive-behavioral approach"
- Reality Therapy
- Relapse Prevention
- Self Control Training.
- Self Instructional Training was developed by Donald Meichenbaum, influenced by the developmental psychology of Alexander Luria and Lev Vygotsky, designed to treat the mediational deficiencies of impulsive children
- Self-talk Identification, Questioning & Revision (SIQR)
- Stress Inoculation Training
- Systematic desensitization is an anxiety reduction technique, developed by Joseph Wolpe.
- Systematic Rational Restructuring was an attempt by Marvin Goldfried to reanalyze systematic desensitization in terms of cognitive mediation and coping skills.
Notes
- ↑ 1.0 1.1 1.2 1.3 1.4 1.5 Dobson, Keith S.; Dozois, David J. A. (2001). "Historical and Philosophical Bases of the Cognitive-Behavioral Therapies" Dobson, Keith S. Handbook of cognitive-behavioral therapies, 2nd, 3–39, New York: Guilford Press.
- ↑ Baer DM, Wolf MM, Risley TR (1968). Some current dimensions of applied behavior analysis. J Appl Behav Anal 1 (1): 91–7. | https://psychology.fandom.com/wiki/List_of_cognitive%E2%80%93behavioral_therapies |
Defining the Business Needs and Solution Scope applies an approach to using business analysis skills in the change initiative, or even before. Prior to launching an initiative to affect any sort of organisational change it is essential to be clear about the desired business outcomes, determine a solution scope, identify and assess all the viable options, scrutinise each of the options and then make sure all that is involved in the change initiative, including required costs, resources and risks, is fully understood.
The business case establishes the framework for a successful change by revealing all of the potential pitfalls and tells executives the whole story before the investment is made. A good business case is honest, unbiased, objective and well-socialised; key stakeholders contribute and review before it is formally presented.
The skills of business analysis can help many professionals identify the right types of solutions to solve their business challenges and build the business cases to justify those recommendations. Defining the Business Needs and Solution Scope is an intermediate to advanced course designed to provide the knowledge needed to begin working on identifying business needs and analysing the benefits of various solution options to help limit the choices before work gets underway or even before the solution work is chartered. In particular, this course “precedes” the typical project lifecycle as it sets up the benefits, value and possibilities that the change may bring, which then become the focus of the initiation phase of a project to implement those changes and execute the strategy.
This course can help anyone who needs to understand how effective projects and programmes align with organisational strategy and confer benefits that solve business problems or who makes decisions or informs those who make decisions on which projects and programmes to invest in.
In diesem Kurs lernen Sie
- Explain how the concepts of business needs and value drive change initiatives
- Describe the importance of business cases to solution recommendation
- Use current state analysis to identify business needs, goals, and objectives
- Relate the discipline of benefits management to solution recommendation
- Utilise stakeholder and capability analysis to plan future states
- Conduct feasibility assessments on solution alternatives
- Develop and present business cases for or against potential solutions
Kursinhalte
-
Benefits Management
What is benefits management
What is a benefit
Roles in benefits management
Identify potential benefits and dis-benefits
Quantify the benefits
Portfolio level benefits
Identify stakeholders in benefits managements
Benefits mapping
Benefits realisation plan
Planned and emergent benefits
-
Define the Current State
Define the current situation
Facts
Issues and concerns
Ask the right questions
Analyse the current state
Define the business need in terms of prioritised problems and opportunities
The Business Case: Communicating the Current State and Business Need
-
Define the Solution Scope
Future state vision
Identify and describe stakeholder needs
Required capabilities
Conditions and constraints about the solution
Link capabilities to goals
Refine the solution scope in terms of who, what, where, when, why and how
-
Driving Toward Business Value
Business value and business need
Value proposition
Types of business needs
Value stream, value chain
Who, what, where, when, why and how
-
Establish Business Goals and Objectives
Begin with the end in mind
Strategic vision and alignment
Prioritised business goals
Participants in business goal development
Types of goals
SMART business objectives
The balanced scorecard
Goal hierarchy
Goal prioritisation
Approval of the business objectives
-
Financial Analysis
Cost-benefit and Financial Analysis
Patterns of planned business value
Estimate benefits
Estimate costs
Costs to acquire the solution
Costs to live with the solution
Financial analysis and indicators
-
Identify and Assess Alternatives
Identify alternative solutions
Determine the viable and non-viable alternatives
Analyse the feasibility of the viable alternatives
Organisational feasibility
Technical feasibility
Economic feasibility
Real options analysis
Identify alternative solution approaches
Describe the change strategy
Refine the future state
-
Putting the Business Case in Context
Approvals
Benefits Management
Making a No Decision
After approval
Revisiting the business case during development
-
Risk Analysis
Risks to business value
Identify risks
Business risks
Technology risks
Project risks
Risk theory
Risk management
Risk tolerance
Risk impact scale
Risk log
Allowance for risk contingency
-
The Business Case
Purpose of a business case
Content and structure of a business case
Participant roles in the business case
Characteristics of a good business case
Mehr über diesen Kurs erfahren
Hier finden Sie eine Übersicht über unsere Veranstaltungshotels mit entsprechenden Kontaktmöglichkeiten. | https://www.strategyex.de/unsere-kurse/business-analyse-kurse/defining-business-needs-and-solution-scope |
4 August 2010
South Africa’s public sector is making “steady progress” in securing senior positions for women in the workplace, Minister of Women, Children and People with Disabilities Noluthando Mayende-Sibiya said at the launch of Women’s Month 2010 in Pretoria on Monday.
Although the entire month is dedicated to women, the public holiday on 9 August is particularly significant, as it marks the 54th anniversary of the Women’s March to the Union Buildings in Pretoria, at the time the headquarters of the apartheid government.
Free high-resolution photos and professional feature articles from Brand South Africa’s media service.
More than 20 000 women took part in this march to protest against racial segregation and the discriminatory pass laws, which restricted the movement of black people within declared “white areas”.
This year government will use August to reflect on efforts made since then to empower women in South Africa’s rural areas, townships and cities.
Women now occupy about 36% of senior-level jobs in government, Mayende-Sibiya said at the launch. “There is steady progress in the representation of women at senior levels of public services.”
According to the minister, there are now more women in decision-making roles than there were in 1994, the year South Africa held its first democratic elections.
Up to 44% of members of the legislature, on a national and provincial level, are women – this puts South Africa in third position worldwide for the greatest number of females in Parliament, Mayende-Sibiya said.
The number of women ministers and deputy ministers has more than doubled over the past 16 years, growing from 18% in 1994 to 40% in 2010, she added.
Transformation slow in private sector
While the South African government works hard to empower women and positively influence their role in society, other employers are lagging behind.
According to the country’s affirmative action policy, the employment of women and previously disadvantaged individuals should be prioritised, but top private-sector positions are still dominated by white men, the government says.
Black, Indian and coloured South Africans fall into the “previously disadvantaged” category.
At present, white men hold about 63% of senior management jobs in the private sector, while black, Indian and coloured women only account for 5%.
While massive progress has been made in boosting female access to education, South Africa has to “ensure that skills development programmes focus on empowering women”, so they are able to follow “careers that are still male-dominated”, Mayende-Sibiya said.
Speeding up transformation
The Department of Women, Children and People with Disabilities is planning to introduce a new policy to “enforce gender parity measures across all sectors of society”.
The Gender Equality Bill should be tabled by next year, Mayende-Sibiya said.
The Bill reflects the government’s realisation that it needs to act decisively to enforce change in the workplace. “Our analysis of various studies available indicates that if we continue at the current pace of transformation, it will take us almost 40 years to attain 50-50 gender parity.
“We cannot allow that. Measures have to be taken to hasten the process of gender and racial transformation in our country,” the minister said.
Empowerment projects in August
The government is planning to launch a number of countrywide initiatives to empower women this August.
Mayende-Sibiya said their projects are aimed at tackling challenges facing women, reducing poverty and improving the socio-economic status of women in South Africa.
The Gauteng provincial government said it will launch 200 women-only schemes across the province from 9 August.
The schemes will take the form of cooperatives offering cleaning and catering services in hospitals, according to Simon Zwane, spokesperson for the Gauteng Department of Health and Social Development. “This is part of our agenda to empower women,” he said.
Both the public and private sector will support the Take a Girl Child to Work initiative on 19 August, as has been done since the drive was launched in 2003.
“To enforce mentoring of girls into various careers, we will all be supporting the campaign,” Mayende-Sibiya said.
First published by MediaClubSouthAfrica.com – get free high-resolution photos and professional feature articles from Brand South Africa’s media service. | https://www.brandsouthafrica.com/people-culture/people/womensmonth |
Wildlife in El Coco
When we first arrived in Playa del Coco (or 'El Coco' as the locals call it), I was struck by how little wildlife there was here compared...
When we first arrived in Playa del Coco (or 'El Coco' as the locals call it), I was struck by how little wildlife there was here compared...
We did a touristy thing. If you look up 'things to do in El Coco' you'll find about 90% of them are some form of 'sunset sailing'....
It's always been a dream of mine to live by the sea. And, for the last few weeks that's exactly what we've been having a go at - seeing...
We are now at the beach!! After a month of travelling around the Central Valley and Rainforests of Costa Rica, we've finally made it to...
When I was a little girl we used to take day trips to a place called Sutton on Sea. It's a sleepy seaside town on the Lincolnshire coast....
Considering the Arenal Volcano dominates the landscape around here, you won't be surprised to hear that one of the 'must do' activities...
Sorry for that bad pun but it's the best I can manage right now. Yesterday's fun 'experience' certainly was memorable, but not...
I'm feeling a touch like a kid in a candy store right now. There's so much to do here in La Fortuna that I just want to dive in and do...
One of the things I did to prepare for our trip to Costa Rica was to read about the history of this intriguing country. I have long had...
We've spent the first few days in La Fortuna exploring our new domain. There's a lot more life here. Yes it's still very touristy (with...
It was nearly time to leave Monte Verde and head to La Fortuna. About 40 miles as the crow flies, or 90 miles if you're driving thanks to...
Name a creature that Costa Rica is known for. Okay, unfair question, it's got about 5% of all the world's biodiversity (ie tonnes of...
Today was all about heights. Specifically getting as high as possible to see the amazing views of both the Pacific and Caribbean coasts....
Finally, the sun made an appearance in Monte Verde! With such stunning weather we decided to walk a couple of miles to a ‘heladeria’ (ice...
I know we're here in Costa Rica in rainy season. I know that means there's a lot of, well, rain. What I didn't know is that this can then...
I've never been anywhere like Costa Rica. A tropical country, just above the Equator that has multiple micro climates. No number of...
Our first day in Monte Verde (aka Green Mountain in Spanish) and, boy, does it live up to its name. 1) we are going to have buns of steel...
Okay so before you get TOO excited we're not talking Cocaine, or Speed or anything of that ilk. What we are talking about is anything...
My bag is getting more travelled than me. After lolling about in Miami airport for the night it finally decided to head over to Costa...
3am. 3. Blooming. AM. That's the time we ALL woke up this morning. Hurrah for jet lag! Thank god breakfast is served from 6am. Just three... | https://www.thegrindescape.com/blog-1 |
Island Environments specializes in custom design and site planning solutions, including full ARB submission packages. Our services include greenscapes, hardscapes, drives, walks, paths, pools, ponds, patios, decks, planters, pots, drainage, irrigation and outdoor lighting. Whatever the scope of work, the design process always starts by listening carefully to our clients. We gather information about the overall site concept, desired theme or style of the involved elements, likes and dislikes in plants and materials, as well as the intended use of the overall project. These considerations, blended with the existing site elements and features, architectural setting and the lifestyle of the client, are combined to formulate a plan that maximizes the projects potential while still remaining sustainable, low in maintenance and budget sensitive. From initial site analysis and discussions, to preliminary design and revisions through ARB submission and approvals, we have the experience and expertise to plan a landscape that can dramatically improve the overall aesthetic, increase property values, and be enjoyable not only now but for years to come.
Please call for more information, references, work samples, or to schedule an appointment. | https://www.islandenvironments.com/design--planning.html |
WASHINGTON – U.S. Sen. Mark R. Warner (D-VA), a member of the Senate Select Committee on Intelligence and co-founder of the bipartisan Senate Cybersecurity Caucus, is asking three federal agencies for information on the tools available—and the additional tools which might be needed—to prevent cyber criminals from compromising consumer products, such as Internet of Things (IoT) devices. The market for IoT products—such as connected refrigerators, smart thermostats, and Internet-enabled cameras—is growing exponentially. Weak security features in many of these products can enable access to user data by hackers, create easy entry points to home or work networks, and allow hackers to hijack devices into enormous botnets used to send crippling amounts of data to specific Internet sites and servers.
Botnets are frequently referred to as ‘zombie computers,’ and Sen. Warner said the metaphor is appropriate: bad actors infect unsuspecting computers and network devices with malware, sending remote commands to hordes of compromised computers to maliciously cripple parts of the Internet. Experts say that is what occurred on Friday, temporarily affecting Twitter, Netflix, PayPal and other popular sites.
“The weak security of many of the new connected consumer devices provides an attractive target for attackers, leveraging the bandwidth and processing power of millions of devices, many of them with few privacy or security measures, to swamp internet sites and servers with an overwhelming volume of traffic,” Sen. Warner said. “I am interested in a range of expert opinions and meaningful action on new and improved tools to better protect American consumers, manufacturers, retailers, Internet sites and service providers.”
The text of Sen. Warner’s letter to the Federal Communications Commission (FCC) follows and can be found here. Similar inquiries were also sent to the Federal Trade Commission (FTC) and the Department of Homeland Security’s National Cybersecurity & Communications Integration Center (NCCIC).
October 25, 2016
The Honorable Tom Wheeler
Chairman
Federal Communications Commission
445 12th Street S.W.
Washington, D.C. 20554
Dear Chairman Wheeler,
I have watched with growing concern over the past two months as an ever-larger network of infected devices has been leveraged to conduct the largest series of Distributed Denial of Service (DDoS) attacks ever recorded. According to global telecommunications provider Level 3 Communications, the ‘Mirai botnet’ has more than doubled since the source code was first made public on October 1st. The Mirai botnet functions by taking control of highly insecure devices, such as ‘Internet of Things’ (IoT) products, and using them to send debilitating levels of network traffic from these compromised devices to particular sites, web-hosting servers, and internet infrastructure providers. By infecting consumer devices with this malware, attackers can hijack the communications capabilities of users’ devices, using large numbers of them to flood sites and servers with overwhelming traffic. As the co-Chair of the Senate Cybersecurity Caucus, I invite your prompt response to a number of important questions raised by these incidents.
While the precise form of Mirai’s attacks is not new, the scale of these volumetric attacks is unprecedented. The weak security of many IoT devices provides an attractive target for DDoS attackers, leveraging the bandwidth and processing resources of millions of connected devices. Botnets are frequently referred to as “zombie computers” and the metaphor is fitting: bad actors infect unsuspecting computers and network devices with malware, sending remote commands to hordes of compromised computers. Analysts have also noted the dynamic nature of Mirai Command and Control (C&C) servers (platforms used by attackers to send these remote commands to the botnets), with the malicious operator or operators switching C&C servers far more rapidly than in past botnet attacks. The United States Computer Emergency Readiness Team (US-CERT) notes in its alert that the release of the Mirai source code has increased the risk of similar botnets being created, acknowledging at least one new separate malware family leveraging IoT vulnerabilities in a manner similar to Mirai.
Mirai’s efficacy depends, in large part, on the unacceptably low level of security inherent in a vast array of network devices. Attackers perform wide-ranging scans of IP addresses, searching for devices with poor security features such as factory default or hard-coded (i.e., unchangeable) passwords, publicly accessible remote administration ports (akin to open doors), and susceptibility to brute force attacks. In my June 6th letter to the Federal Trade Commission (FTC), I raised serious concerns with the proliferation of these insecure connected consumer products, noting that the “ever-declining cost of digital storage and internet connectivity have made it possible to connect an unimaginable range of products and services to the Internet,” potentially without adequate market incentives to adopt appropriate privacy and security measures. Juniper Research has projected that by the end of 2020, the number of IoT devices will grow from 13.4 to 38.5 billion – yet there is no requirement that devices incorporate even minimal levels of security. The internet’s open architecture has been a catalyst for its growth, allowing an enormous range of devices and services to connect to a global, interoperable network. The lack of gating functions, however, has potentially created a systemic risk to the resiliency of the internet.
Additionally, the global nature of the supply chain for such devices requires attention not just to the final product integrator’s practices, but also to that of suppliers throughout the manufacturing process. In the recent Mirai botnet, researchers have identified a single software supplier as responsible for vulnerabilities in a wide range of manufacturers’ products, with Flashpoint concluding that over 500,000 connected devices were vulnerable to Mirai because of an exploitable component from a single vendor’s management software. Manufacturers today are flooding the market with cheap, insecure devices, with few market incentives to design the products with security in mind, or to provide ongoing support. And buyers seem unable to make informed decisions between products based on their competing security features, in part because there are no clear metrics. Because the producers of these insecure IoT devices currently are insulated from any standards requirements, market feedback, or liability concerns, I am deeply concerned that we are witnessing a ‘tragedy of the commons’ threat to the continued functioning of the internet, as the security so vital to all internet users remains the responsibility of none. Further, buyers have little recourse when, despite their best efforts, security failures occur.
Under the Federal Communications Commission’s (FCC’s) Open Internet rules, ISPs cannot prohibit the attachment of “non-harmful devices” to their networks. It seems entirely reasonable to conclude under the present circumstances, however, that devices with certain insecure attributes could be deemed harmful to the “network” – whether the ISP’s own network or the networks to which it is connected. While remaining vigilant to ensure that such prohibitions do not serve as a pretext for anticompetitive or exclusionary behavior, I would encourage regulators to provide greater clarity to internet service providers in this area.
DDoS attacks can be powerful tools for censorship, criminal extortion, or nation-state aggression. Tools such as Mirai source code, amplified by an embedded base of insecure devices worldwide, accomplish more than isolated nuisance; these are capabilities – weapons even – that can debilitate entire ranges of economic activity. While the internet was not designed with security in mind, its resiliency –which serves as its animating principle – is now being undermined.
I respectfully request that you respond to the following questions:
1. What types of network management practices are available for internet service providers to respond to DDoS threats? In the FCC’s Open Internet Order, the Commission suggested that ISPs could take such steps only when addressing “traffic that constitutes a denial-of-service attack on specific network infrastructure elements.” Is it your agency’s opinion that the Mirai attack has targeted “specific network infrastructure elements” to warrant a response from ISPs?
2. Would it be a reasonable network management practice for ISPs to designate insecure network devices as “insecure” and thereby deny them connections to their networks, including by refraining from assigning devices IP addresses? Would such practices require refactoring of router software, and if so, does this complicate the feasibility of such an approach?
3. What advisories to, or direct engagement with, retailers of IoT devices have you engaged in to alert them of the risks of certain devices they sell? Going forward, what attributes would help inform your determination that a particular device poses a risk warranting notice to retailers or consumers?
4. What strategies would you pursue to take devices deemed harmful to the network out of the stream of commerce? Are there remediation procedures vendors can take, such as patching? What strategy would you pursue to deactivate or recall the embedded base of consumer devices?
5. What consumer advisories have you issued to alert consumers to the risks of particular devices?
6. Numerous reports have indicated that users often fail to install relevant updates, despite their availability. To the extent that certain device security capabilities can be improved with software or firmware updates, how will you ensure that these updates are implemented?
7. Do consumers have meaningful ability to distinguish between products based on their security features? Are formal, or third-party, metrics needed to establish a baseline for consumers to evaluate products? If so, has your agency taken steps to create or urge the creation of such a baseline?
8. Should manufacturers have to abide by minimum technical security standards? Has your agency discussed the possibility of establishing meaningful security standards with the National Institute of Standards and Technology?
9. What is the feasibility, including in terms of additional costs to manufacturers, of device security testing and certification, akin to current equipment testing and certification of technical standards conducted by the Federal Communications Commission under 47 CFR Part 2?
I look forward to your response. If you should have any questions or concerns, please contact Rafi Martina in my office at 202-224-2023.
Sincerely, | https://www.warner.senate.gov/public/index.cfm/pressreleases?ContentRecord_id=CD1BBB25-83E0-494D-B7E1-1C350A7CFCCA |
What is engagement? Despite the fact that I work with clients everyday to track ENGAGEMENT metrics, I haven’t taken the time to reflect on a working definition. There appears to be two distinct camps approaching this question; 1) psychologists and 2) marketing professionals and academics. As a disclaimer, I have worked for almost a decade as a digital marketing strategist and therefore the latter approach to defining engagement is more familiar to me.
These dual approaches are outlined by Gambetti, R. and Graffigna, G. in their work entitled ‘The Concept of Engagement’. Psychologists have defined engagement as a ‘sort of ongoing emotional, cognitive and behavioral activation state in individuals’, whereas advertising professionals ‘see it as the turning on of a prospect to a brand idea enhanced by the surrounding context’ (Gambetti, R. and Graffigna, G., 2010, p. 4). Their work goes further to uncover contradictory definitions for the term ‘engagement’ and confusion around its actual meaning (Gambetti, R. and Graffigna, G., 2010).
A strong voice on the business side, Brian Solis, had this to say on the subject of defining engagement (Solis, B. 2011):
Engagement is defined as the interaction between a consumer or stakeholder and an organization. It is measured – here’s the important part – as the take-away value, sentiment and actions that follow the exchange. Without definition, where will they go, what will they feel, what will they do or say?
Despite the lack of a clear-cut definition, both camps include mention of an ‘action’. Whether it’s an interaction or a behavioral activation state, the fact that the engaged user is behaviorally taking action seems to be a common thread.
Engagement = Behavior
The concept that engagement includes a behavioral action is supported by the work of Bijmolt, T.H.A., Leeflang, P.S.H., Block, F., Eisenbeiss, M., Hardie, B.G.S., and Lemmens, A.L. They define customer engagement as the behavioral manifestation from a customer toward a brand or a firm which goes beyond purchase behavior (Bijmolt, T.H.A. et al. 2010).
Gambetti also stresses the importance of the behavioral component of engagement, citing actions such as co-creation, social sharing and other interactive, collaborative and participative dimensions as helping brands connect with and ENGAGE consumers (Gambetti, R. and Graffigna, G., 2010).
This behavioral stance is further supported by Van Doorn and her colleagues who cite several different meanings of the verb ‘to engage’, all of which imply a behavioral focus (Van Doorn, J., Lemon, K. N., Mittal, V., Nass, S., Pick, D. N., Pirner, P., 2010). Their work develops the concept of Customer Engagement Behaviors or CEB’s, which are customers’ behavioral manifestations (beyond purchase) toward a brand resulting from motivational drivers. CEB’s can include a wide range of behaviors including word-of-mouth activity, recommendations, helping other customers, blogging, writing reviews and social media activity (Van Dorn, J. et al. 2010).
Five Dimensions of Engagement
In order to nuance their definition of the term ‘engagement’, Van Dorn et al. proposed five dimensions of customer engagement behaviors. These key components help to further define engagement and determine the impact on a brand or firm. They include (Van Dorn et al. 2010):
- Valence – the extent to which the attitude behind the behavior is positive or negative.
- Form/Modality – the different ways the behavior is expressed by customers, for example time, money or both.
- Scope – the temporal and geographic scope of the behavior, momentary or ongoing, local or global.
- Impact – immediacy, breadth, intensity and longevity of the behaviors impact.
- Customer goals – the purpose and intended audience of the engagement behavior.
Each of these factors helps to further refine what customer engagement actually LOOKS like and serves to aide in its measurement.
An Engaged Consumer is a Happy Consumer
As technology and digital media continues to evolve, so will the concept of ‘engagement’. The term will continue to be a buzz word for marketing professionals as long as studies continue to prove engaged consumers are more loyal customers (Lea, W. 2012). There is a keen opportunity for psychologists and marketing professionals to come together to provide a better experience for consumers.
Mihaly Csikszentmihalyi, the father of positive psychology, outlined three platforms for happiness in a recent TEDx talk in Chicago. They included pleasure, engagement and meaning. His research has determined that the MOST predictive element of happiness is ENGAGEMENT or the ability to enter into a state of ‘flow’. If brands can better understand the underlying psychological aspects of engagement, then perhaps they can contribute to overall consumer satisfaction. The union of positive psychology and business practices could spell a better future for us all.
References:
Bijmolt, T. H. A., Leeflang, P. S. H., Block, F., Eisenbeiss, M., Hardie, B. G. S., Lemmens, A. l., et al. (2010). Analytics for Customer Engagement. Journal of Service Research, 13(3),341-356.
Csikszentmihalyi, Mihaly. Rules of Engagement presentation, TEDxChicago 2011: https://www.youtube.com/watch?v=7e1xU0-h9Y8
Gambetti, R., & Graffigna, G. (2010). The Concept of Engagement. International Journal of Market Research, 52(6), 801-826.
Lea, W. (2012). The New Rules of Customer Engagement. http://www.inc.com/wendy-lea/new-rules-of-customer-engagement.html
Solis, Brian. (2011). The Rules of Smarter Engagement. http://www.briansolis.com/2011/11/the-rules-of-smarter-engagement/
Solis, Brian. (2012). Engagement ain’t nothing but a number – why 1% isn’t good enough http://www.briansolis.com/2012/04/engagement-aint-nothing-but-a-number-why-1-isnt-good-enough/
Van Doorn, J., Lemon, K. N., Mittal, V., Nass, S., Pick, D. N., Pirner, P., et al. (2010). Customer Engagement Behavior: Theoretical Foundations and Research Directions. Journal of Service Research, 13(3), 253-266. | https://mediapsychology101.com/2014/07/10/media-psychology-what-is-engagement/ |
The Roller Coaster is a wooden roller coaster located at Lagoon in Farmington, Utah, USA. It was designed by John A. Miller and opened in 1921, making it the sixth oldest roller coaster operating today.
History
When it opened in 1921, the Roller Coaster was the second coaster to be built at Lagoon.
In 1953, a fire damaged the Roller Coaster, and burnt down the rest of the park. The lift hill and station had to be rebuilt.
In 2007, Roller Coaster became an ACE Coaster Landmark, due to being a 'classic coaster'. The park has also decided not to continue painting the Roller Coaster white; now using natural colored treated wood to replace older portions as needed, meaning it will turn brown as the wood is gradually replaced.
For the 2018 season, the Roller Coaster received new trains from Great Coasters International.
Name
The ride has never really had a name other than simply "Roller Coaster". It is often called the "White Roller Coaster" by locals.
Design
The ride begins with a turn out the station which leads to the lift hill. Guests reach heights of 60 feet before plummeting down the first drop and over a hill, then back up again into the west turn. A series of airtime hills follow, getting smaller as the velocity of the train drops. There are two more turns, then the train returns to the station.
Trains
2 trains with 4 cars per train. In each car, riders are arranged 2 across in 3 rows, for a total of 24 riders per train.
External links
- Roller Coaster on the Roller Coaster DataBase. | https://coasterpedia.net/wiki/Roller_Coaster_(Lagoon) |
The goal is to identify regulators and interactors of conserved genes that, when mutated, can cause human disease.
Understanding the genes that interact with a disease gene will shed light on the genetic pathway in which the disease gene acts. By activating or inhibiting the activity of interacting genes, it may be possible to alleviate symptoms of the disease. Thus, genetic screens to identify interacting genes may lead to novel therapeutic targets.
For all diseases in which the responsible gene is known, we need to understand the function of that gene in the normal and disease condition. And for those diseases in which the responsible gene(s) is not known, we need more research designed at finding and defining the responsible gene(s).
There are approximately 7,000 rare (or orphan) diseases known in humans, ~80% of which are monogenic. This number is growing weekly. By definition, a rare disease affects fewer than 200,000 people in the United States (~1:1500). However, given the number of rare diseases that exist, about 10 percent of the population has a rare disease. Treatments for less than a 1,000 of these diseases currently exist.
We are using C. elegans as a tool to determine the genetic interactions of a given rare human disease gene ortholog. The factors identified in our genetic screens could then be examined in other model systems and human cells to determine whether such factors might be useful therapeutic targets.
For human autosomal recessive monogenic diseases in which the responsible gene is known, we are using C. elegans to study the function of that gene and to genetically identify other factors that act in the same pathway. There are a number of criteria that we require in order for this strategy to work. First, there would have to be a convincing and clear C. elegans ortholog. Second, using standard CRISPR/Cas9 genome-editing tools, we are generating total gene deletions (to examine the null phenotype) and missense alleles that mimic human patient alleles. Third, there would have to be a scorable phenotype. The more penetrant the phenotype, the better. If these criteria are met, genetic suppressor and enhancer screens could be performed to identify interacting factors that function with that given gene and the biological process in which it functions. We can also try drug screening to find drugs that reverse or suppress the mutant phenotype.
For diseases caused by dominant mutations, our strategy would be different. We could attempt to express a dominant variant of the C. elegans ortholog. If there is a penetrant phenotype, we can characterize it and use genetic suppressor and enhancer screens to identify other factors that act in the same pathway. Likewise, we could even express the human gene in C. elegans, characterize its phenotypes, and subject such transgenic animals to genetic and/or drug screens. Many of the diseases we are investigating do appear to be dominant in patients. Whether they behave dominantly in C. elegans is under investigation.
Suppressors that are not silent but have phenotypes of their own may even prove beneficial. A gene that, when mutated, has early developmental defects may not be excluded as a therapeutic target if the treatment is targeting animals that have already developed. Thus, a therapy that targets an essential gene may be useful if used on late-stage or adult animals. For many human diseases, the onset of disease symptoms is quite variable, and therapies targeted at essential genes may not disrupt development if treating older children or adults.
Of the more than 1,000 diseases for which the responsible mutated gene has been identified, the molecular mechanism for a majority of those diseases has not been clearly defined. Often it requires the collaboration between basic researchers and clinicians to establish the molecular pathway and mechanism of the disease. Once we have identified new players in the rare disease pathway (through the methods described above), it is our intention to utilize the NIH Clinical Center and contacts with external clinicians to attempt to put the basic research knowledge we have gained to practice in a clinical setting. Such knowledge and collaboration will hopefully lead to a rational (and perhaps novel) design for therapy that will benefit individuals suffering from the rare disease being studied.
Localized TWIST1 and TWIST2 basic domain substitutions cause four distinct human diseases that can be modeled in Caenorhabditis elegans.
Kim S, Twigg SRF, Scanlon VA, Chandra A, Hansen TJ, Alsubait A, Fenwick AL, McGowan SJ, Lord H, Lester T, Sweeney E, Weber A, Cox H, Wilkie AOM, Golden A, Corsi AK.
From phenologs to silent suppressors: Identifying potential therapeutic targets for human disease.
Our research focuses on the C. elegans orthologs of human genes. Orthologs are genes that retain the same function in different species. Thousands of human diseases are caused by mutations in our genes. By studying mutated orthologs in the roundworm, we hope to learn more about how these genes function during development. This knowledge should help further our understanding of the function of these genes in humans. What we learn may be useful for developing therapies for human disease. | https://www.niddk.nih.gov/about-niddk/staff-directory/biography/golden-andy |
RRI Tools - How to Align Scientific Research with the Needs of Society?
Science can and should contribute to solving many global challenges our society faces, such as climate change, health, pollution, resource depletion. With that aim in mind, the European Commission recently pushed forward the concept of Responsible Research and Innovation (RRI) to foster and facilitate research and innovation in an inclusive, societally-oriented way. RRI Tools project, funded by EC, resulted in the RRI Toolkit - a wealth of resources that help stakeholders (researchers, policy-makers, business and industry, educators and civil society organizations) across Europe to put Responsible Research and Innovation into practice. http://www.rri-tools.eu/
The general goal of the workshop is to highlight the importance of societal issues in science and innovation and necessity of collaboration between different groups of stakeholders (e.g. scientists, science educators and policy makers). The aim is to initiate a self-reflection regarding responsibility in our practice and raise questions on how to make science and innovation more responsive and more responsible, but also to create ideas and offer some practical tools and guidelines.
The participants in this symposium will receive the certificate of attendance of RRI Tools Training.
Trainers are:
Katarina Anđelković,
RRI Tools trainer, Center for the Promotion of Science; Department of International Cooperation, Sociologist
Đurđa Timotijević,
RRI Tools trainer, Center for the Promotion of Science; Department of International Cooperation, Psychologist
Apart from being one of the partners at the RRI Tools project, the Center for the Promotion of Science also acts as the SEE (Southeast) Hub Coordinator in Serbia, Croatia, Albania, Montenegro and Bosnia & Herzegovina.
The Center for the Promotion of Science (CPN) in Serbia is a public institution established by the Law on Scientific Research with the task to promote science and technology. The Center, according to its mandate, cooperates with research and educational institutions (universities, research centers and schools) in Serbia and worldwide, works closely with the government ministries as well as the media and the private sector.
This workshop is part of the 13th ICIE conference: Excellence, Creativity & Innovation in Basic and Higher Education. | https://wbc-rti.info/object/event/14829 |
On January 18th, 1958, Willie O’Ree laced up his skates and stepped on to the ice for the Boston Bruins. Unbeknownst to O’Ree, he had just broken the color barrier and became the first Black player in NHL history.
The Canadian player faced what many would consider to be overwhelming odds, which included having to play while racists spewed their venom and, more surprisingly, making to the NHL while being almost completely blind in his right eye due to taking a shot in the face while playing junior hockey.
Despite the lack of sight in his right eye, O’Ree persevered and played two seasons in the NHL with the Bruins, skating for a total of 45 total games in the 1957-58 and 1960-61 seasons. He spent the majority of his career, more than two decades, playing for leagues such as the AHL, EPHL, QHL and the Western Hockey League (WHL). He spent 13 years in the latter, playing for the Los Angeles Blades and San Diego Gulls, amassing a career stat line consisting of 328 goals and 311 assists.
After O’Ree left the NHL ice in 1961, the League didn’t see another Black player until 1974 when Mike Marson suited up for the Capitals.
On Tuesday, O’Ree, at the age of 82, finally got the call he (and everyone else) has been waiting for, and he will now be headed to the Hockey Hall of Fame.
The groundbreaking player has been eligible for the Hall of Fame since 1962 and while his stats might not be that impressive, his true greatness and importance is in what he accomplished, endured and set up as the League’s first Black player. Without O’Ree, players such as Jarome Iginla, P.K. Subban and Wayne Simmonds might not have gotten the chance to put their skills on display for all to witness and appreciate.
P.K. Subban on Twitter
Today is a great day for @NHL and the game of hockey! I’m very proud to be an NHLer! @thehockeyhalloffame #HHOF https://t.co/nnhMaq3SxS
I cant think of anyone who has done more to broaden the appeal of our great sport to new audiences, Simmonds wrote in The Player’s Tribune. Hes a living hero to so many of us, and he deserves to be honored as a legend of the game.
The Players’ Tribune
“For every kid who was ever told to ‘stick to basketball,’ Willie was like the first man on the moon.” Wayne Simmonds wants to see his hero Willie O’Ree in the Hall of Fame.
This honor would not be possible if I had not rejoined the league in 1996, ORee said in a release published by the NHL. I was given a second wind to give back to the game and I am honored to be recognized.
And his recognition extends to his contributions off of the ice, where he has mentored Black players and worked with the NHL’s Hockey is for Everyone program, which promotes diversity and inclusion in the sport of ice hockey. And while hockey has not completely shed itself of the racism which O’Ree had to face by himself six decades ago, it’s only right that the League finally recognized one of the most important players in the history of their game and honor him the right way with enshrinement. | https://theshadowleague.com/willie-o-ree-finally-gets-the-call-from-the-hockey-hall-of-fame/ |
A legend on the court, Kobe showcased his greatness off of it too.
On Sunday, 25 January, the world was shocked and deeply saddened to learn that NBA icon Kobe Bryant, along with his daughter Gigi and seven other passengers, had tragically passed away in a helicopter accident on the outskirts of California. Having spent 20 seasons perfecting his craft on the hardwood floor and providing the world with countless moments of greatness, it can be easy to forget just how much of a great Kobe was off the court too.
Over the course of a highly successful NBA career, Kobe elevated himself from an eccentric and driven 17-year-old, to a first ballot Hall of Fame player who is carved into the pillars in the minds of multiple generations of fans and peers alike.
When Kobe officially announced his retirement, it acted as an organic nudge to fans to fully appreciate the greatness they had been fortunate enough to witness over the course a 20 year period. Not without his share of controversial times, Kobe had treated fans to a host of moments and memories that will live on to the end of time, causing those same fans to acknowledge a level of greatness seldom seen.
Finding moments of on-court magic or history making plays that showcase Kobe Bryant's greatness is easy, but here we look at eight - a fitting number - of things he achieved off the court that highlight his greatness in just as equal measure.
15 Former NFL Players In Vince McMahon's XFL
8 Things We Learned From WWE's Opening XFL 2020 Games
10 Things WWE Fans Need To Know About The XFL
A Self-Proclaimed Newcastle Utd aficionado. Lover of all things Sport (except rugby and golf, no-one likes those). Whether it's Wrestling, Movies, TV or Comics, you can be sure to find an impassioned Kent-based opinion here. | https://whatculture.com/sport/kobe-bryant-8-off-court-moments-of-greatness |
Renal cell cancer (also called kidney cancer or renal adenocarcinoma) is a disease in which malignant (cancer) cells are found in the lining of tubules (very small tubes) in the kidney. There are 2 kidneys, one on each side of the backbone, above the waist. Tiny tubules in the kidneys filter and clean the blood. They take out waste products and make urine. The urine passes from each kidney through a long tube called a ureter into the bladder. The bladder holds the urine until it passes through the urethra and leaves the body.
Cancer that starts in the ureters or the renal pelvis (the part of the kidney that collects urine and drains it to the ureters) is different from renal cell cancer. (See the PDQ summary about Transitional Cell Cancer of the Renal Pelvis and Ureter Treatment for more information).
Anything that increases your risk of getting a disease is called a risk factor. Having a risk factor does not mean that you will get cancer; not having risk factors doesn't mean that you will not get cancer. Talk with your doctor if you think you may be at risk.
Risk factors for renal cell cancer include the following:
These and other signs and symptoms may be caused by renal cell cancer or by other conditions. There may be no signs or symptoms in the early stages. Signs and symptoms may appear as the tumor grows. Check with your doctor if you have any of the following:
The following tests and procedures may be used:
The prognosis (chance of recovery) and treatment options depend on the following:
CancerHelp Online® is a patient education program of The CancerHelp Institute, official Content Distribution Partner of the National Cancer Institute. | http://cancerhelpessentiahealth.org/Cancer_Types/kidney_201070E2_01.html |
Given a binary string S of length N and an integer K, the task is to find the smallest non-zero sub-string of S that can be jumbled to produce a binary string divisible by 2K. If no such sub-string exists then print -1. Note that K is always greater than 0.
Examples:
Input: S = “100”, k = 1
Output: 2
Smallest substring that can be jumbled is “10”.
Thus, the answer is 2.
Input: S = “1111”, k = 2
Output: -1
Approach: Let’s look at the condition of the permutation of a string being divisible by 2K.
- The string must have at least K number of 0s.
- The string must have at least one 1.
This can be implemented using two-pointer technique. For every index i, try to find the smallest index j such that the substring S[i…j-1] satisfies the above two conditions.
Let’s say the left pointer is pointing at index i and the right pointer is pointing at j and ans stores the length of the smallest required substring.
If the condition is not satisfied then increment j, else increment i.
While iterating, find the minimum (j – i) satisfying the above two conditions and update the answer as ans = min(ans, j – i).
Below is the implementation of the above approach:
C++
|
|
Java
|
|
Python3
|
|
C#
|
|
3
Time Complexity: O(N)
Attention reader! Don’t stop learning now. Get hold of all the important DSA concepts with the DSA Self Paced Course at a student-friendly price and become industry ready.
Recommended Posts:
- Check if there exists a permutation of given string which doesn't contain any monotonous substring
- Find permutation of n which is divisible by 3 but not divisible by 6
- Lexicographic smallest permutation of a String containing the second String as a Substring
- Check if any permutation of N equals any power of K
- Check if any permutation of a number without any leading zeros is a power of 2 or not
- Check if any permutation of a large number is divisible by 8
- Check if any permutation of a number is divisible by 3 and is Palindromic
- Check if any permutation of array contains sum of every adjacent pair not divisible by 3
- Length of the largest substring which have character with frequency greater than or equal to half of the substring
- Smallest number divisible by n and has at-least k trailing zeros
- Smallest integer which has n factors or more
- Length of the smallest substring which contains all vowels
- Length of the smallest number which is divisible by K and formed by using 1's only
- Minimum number of adjacent swaps required to convert a permutation to another permutation by given condition
- Count pairs (A, B) such that A has X and B has Y number of set bits and A+B = C
- Check if it is possible to create a matrix such that every row has A 1s and every column has B 1s
- Generate a string of size N whose each substring of size M has exactly K distinct characters
- Minimum number of times A has to be repeated such that B is a substring of it
- Construct a string of length L such that each substring of length X has exactly Y distinct letters
- Find if a given string can be represented from a substring by iterating the substring “n” times
If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to [email protected]. See your article appearing on the GeeksforGeeks main page and help other Geeks.
Please Improve this article if you find anything incorrect by clicking on the "Improve Article" button below. | https://www.geeksforgeeks.org/smallest-non-zero-substring-which-has-any-permutation-divisible-by-2k/?ref=rp |
- Published:
Decreased retinal nerve fiber layer thickness in patients with cerebral venous thrombosis
BMC Ophthalmology volume 19, Article number: 57 (2019)
-
729 Accesses
-
1 Citations
-
1 Altmetric
-
Abstract
Background
To identify thickness variations in the retinal nerve fiber layer around the optic disc and macula in patients with cerebral vein thrombosis (CVT) without papilledema.
Methods
This study included 28 patients with CVT diagnosis and appropriate treatment. Detailed ophthalmologic examination found bilateral vision 10/10, vision field test normal and fundus examination found no papilledema images. The patients had macular and optic retinal nerve fiber layer thickness (RNFL) measured with spectral domain-optical coherence tomography (SD-OCT) (Optovue, Fremont, CA). Patients had retinal nerve fiber thickness compared with a control group.
Results
When the effect on the macula and RNFL near the optic nerve disk is investigated, there was significant thinning identified in the macula inferior inner, temporal inner, superior inner and temporal outer quadrants (p = 0.009, 0.001, 0.026, 0.014, respectively) and in the inferior temporal quadrant of the optic nerve disk (p = 0.020) in CVT patients compared to normal individuals.
Conclusions
Even after appropriate treatment of CVT patients, axonal loss was identified with OCT. As a result, it may be important to use OCT measurements to monitor CVT treatment.
Background
Thrombosis of the cerebral veins and sinuses (CVT) is a rare cerebrovascular disease, that may become significant with missed or late diagnosis. It may be observed in all age groups, more commonly in very young and middle-aged individuals and mainly affects women.1 Though pregnancy, puerperium, oral contraceptive use, coagulopathies, intracranial infections, cranial tumors, penetrant head trauma, lumbar puncture, malignancy, dehydration, inflammatory bowel disease, connective tissue diseases, Behçet disease, sarcoidosis, nephrotic syndrome, parenteral infusions and a variety of medications have been shown among causes, very detailed investigations have not determined a cause in 20–25% of cases [1,2,3,4].
Visual disorders linked to the increase in intracranial pressure like papilledema, diplopia and blurred vision may accompany the tableau [5, 6]. However, the effect of CVT on the eye in the long term continues to be uncertain. The aim of this study is to assess optic disc retinal nerve fiber and macula thickness variations in patients with CVT without papilledema after appropriate treatment. To the best of our knowledge, the present study is the first to evaluate the posterior ocular segment changes in patients with CVT using optical coherence tomography (OCT) or traditional imaging modalities.
Materials and methods
This prospective case-control study, which was conducted by the Department of Ophthalmology and Department of Neurology, Kafkas University Medical Faculty Hospital (KUMFH), adhered to the tenets of the declaration of Helsinki and was approved by the local ethics committee (80576354–050-99/122; Kafkas University, Human Ethics Comitteee, Kars, Turkey). Our study included all consecutive patients over the age of 18 treated in the KUMFH area for CVT between December 2012 and July 2016. All subjects provided informed consent to participate in the study.
Participants
The study included 28 patients with CVT diagnosis at Kafkas University Medical Faculty monitored in the Neurology clinic with best improved vision sharpness on Snellen eye chart and 30 healthy volunteers with examination at the ophthalmology clinic. The 28 CVT patients had been admitted to the Kafkas University Medical Faculty Neurology clinic, with definite diagnosis with cranial magnetic resonance imaging (MRI) and MR venography and had common complaints of severe headaches previously unknown or with changed character. The majority of patients had vomiting complaint. Five patients applied to the hospital due to experiencing epileptic seizures. None of the patients had vision complaints. During admission to the neurology ward, patients had consciousness varying from open to stupor, with neurologic deficit present in some patients. Seven patients had radiological diagnosis of thrombosis mainly of the right sinuses (sigmoid, transverse, v. jugularis), with 21 diagnosed with thrombosis of the left sinuses. Additionally, on radiology some patients had thrombosis of the central sinuses (superior and inferior sagittal, sinus rectus, confluence sinus) (Fig. 1). All patients had anticoagulant treatment while some had antiedema treatment administered. On first neurological examination, no patient had papilledema.
For the study, patients had ophthalmologic examination when general state was stable, when neurological symptoms regressed and after antiedema treatment was stopped. Ophthalmologic examination was completed from 9 to 12 months after the patients applied to the neurology clinic. During ophthalmologic examination, all patients were conscious and had no neurological symptoms.
The selection criteria were normal optic nerve appearance on dilated stereoscopic examination and fundus photography; normal visual field defect at Humphrey perimeter during follow up. None of the patient and control group had thyroid disorders, hypertension, diabetes mellitus, cardiovascular events, Cushing disease, or congenital adrenal hyperplasia. Patients and healthy volunteers who used alcohol or tobacco were excluded from the study. The patients and control subjects who underwent ocular surgery or had ocular trauma or any ocular diseases at the time of OCT measurement were excluded as well. The control group consisted of normal healthy volunteers recruited from among the hospital staff.
Study protocol
The diagnosis of CVT had to be confirmed by cerebral MRI combined with cerebral MR venography, following established diagnostic criteria . Each patient underwent a comprehensive ophthalmologic examination. Following this detailed ophthalmologic examination, macular and RNFL thickness were measured using spectral domain OCT with digital software (RTVue-100, Optovue Inc., Fremont, CA, USA). OCT imaging was performed through undilated pupils and with the same intensity of dim room lighting. All images were taken by the same operator. MM6 (12 radial line scans with 1024 A-scans each, within 6 mm diameter) protocol was used to detect the macular thickness measurements. The scan was divided into the nine Early Treatment Diabetic Retinopathy Study (ETDRS) subfields . The parameters registered in this study were superior outer macular thickness (SOM), inferior outer macular thickness (IOM), temporal outer macular thickness (TOM), nasal outer macular thickness (NOM), superior inner macular thickness (SIM), inferior inner macular thickness (IIM), temporal inner macular thickness (TIM), nasal inner macular thickness (NIM), and central foveal thickness (CFT). The peripapillary RNFL thickness and parameters were calculated by fast RNFL scan, which measures RNFL thickness at 3.45 mm from the center of the optic disc.
Statistics
SPSS 11.5 (SPSS Inc., USA) software was used to perform the statistical analyses. The Mann-Whitney U test was used to compare numeric variables between headache and control groups and P values < 0.05 were considered as statistically significant.
Results
The mean age of 28 CVT cases with ages from 21 to 36 was 27.72 ± 5.12 years, while the mean age of 30 cases in the control group with ages from 18 to 43 was 29.83 ± 9.02 years. Of CVT cases 3 were male (10.7%) and 25 (89.3%) were female. The control group included 5 males (16.7%) and 25 females (83.3%). The mean axial length of patients in the CVT group was 23.9 ± 0.91, while for healthy volunteers this was 23.9 ± 0.84. There was no significant difference in age, gender distribution and axial length between the 2 groups (p = 0.116, p = 0,492, p = 0.457, respectively). Detailed ophthalmologic examination of patients and volunteers in the control group found bilateral vision 20/20, with mean intra ocular pressure in the CVT group 18.0 ± 0.2 mmHg and in the healthy volunteers 16.9 ± 2.0 (p = 0.214). Bilateral anterior segment findings were natural. Fundus examination found no papilledema images and visual field tests were normal in both eyes.
Comparison of macular thickness in patients with CVT and healthy volunteers
We found that all macular thickness parameters were lower in eyes with CVT versus to normal eyes. This thinning in the values was significant for IIM, TIM, SIM, and TOM segments (p = 0.009, p = 0.001, p = 0.026, p = 0.014, respectively) (Table 1). In terms of central, parafoveal and perifoveal macular thickness parameters, there was no statistically significant difference identified between the right and left eyes of CVT patients (p = 0.025).
Average Peripapillary RNFL thickness in patients with CVT and healthy volunteers
We found that inferior temporal (IT) part of the peripapillary RNFL were significantly thinner in the CVT group versus to those in the healthy control group (p = 0.020). There was no significant difference in superior nasal (SN), nasal upper (NU), nasal lateral (NL), inferior nasal (IN), temporal lateral (TL), temporal upper (TU), and superior temporal (ST) scores between the 2 groups. Table 2 shows sectoral RNFL measurements for patients with CVT and controls. For the right and left eyes of CVT patients, there was no statistically significant difference identified for values for the same peripapillary segments (p = 0.25).
Discussion
This study investigated the macula and optic nerve disc RNFL thicknesses in patients with previous CVT diagnosis and treatment, with no vision complaints or papilledema at time of examination and identified that there was significant thinning in the IIM, TIM, SIM and TOM segments of the macula and the IT sector of the optic nerve disc compared to normal individuals. In light of these results, we conclude that after even effective treatment, axonal loss can be detected by OCT in CVT patients. We consider this retinal axonal loss may have developed as a result of subclinical increased intracranial pressure and chronic papilledema not identified by ophthalmoscopy.
Onset forms and clinical symptoms of CVT is extraordinarily variable, and such variability depends on different factors, such as the location, size, duration, and rapidity of development of thrombus. Obstruction of the intracranial venous drainage system secondary to a thrombus is most commonly observed in the superior sagittal sinuses (70–80%). Later transverse, sigmoid and at lower rates cavernous sinuses are affected . In one third of cases, more than one sinus is affected . Patients may apply with symptoms linked to increased intracranial pressure (headache, papilledema), focal neurological deficits, seizures, encephalopathy or tableau associated with these situations. Elevated opening pressure is a frequent finding in CVT and is present in > 80% of patients. Headache is the most common symptom of CVT considered to occur linked to intracranial pressure, and is present in approximately 90% of cases. The most common onset symptom of headache in 70–75% and benign intracranial hypertension seen in 20–40% of patients may be observed as a single symptom .
Eye symptoms may accompany the tableau 30.5% of the time and is observed as a single onset presentation in 21.2% of all CVT patients. The chief abnormal ocular complaint for 85.9% is blurring and degeneration of acute vision. It is argued that underlying ocular symptom of CVT are venous obstruction and intracranial hypertension . CVT patients exhibit not only vision loss, metamorphopsia, and diplopia, but also the symptoms of eyeball movement restriction, orbital pain, exophthalmos, chemosis, nystagmus, visual area defect and fundus changes. The symptoms of fundus changes include papilledema, optic atrophy, optic disc hemorrhage, retinal hemorrhage, retinal varices, and macular edema [11, 12]. The most common symptom in eyes is papilledema . Studies have reported papilledema in 27–68.7% of CVT cases [10, 11, 13].
The disc swelling in papilledema is primarily due to a rise of intracranial pressure (ICP) which produces axoplasmic flow stasis in the optic nerve head. Visual loss from papilledema can occur even in cases of mild ICP elevation. Elevated ICP causes a number of effects on the visual system, the most severe of which is nerve fiber dysfunction from swelling, progressive loss of retinal ganglion cell somas in the retina and retinal ganglion cell axons within the optic nerve, and optic atrophy . In our study, as in previous studies of CVT patients, papilledema diagnosis was made with ophthalmoscopic examination. None of our patients had papilledema identified, but even after appropriate treatment, compared with normal controls, all patients had significantly reduced macular and RNFL thickness. The cause of this thinning was not assessed with ophthalmoscope at time of application, but may be subclinical papilledema and/or subclinical ICPIS.
Monteiro and Afonso evaluated 52 eyes of patients with resolved chronic papilledema from idiopathic intracranial hypertension. Their results showed significantly reduced macular and RNFL thickness and confirmed the ability of OCT to quantify axonal loss in this condition . They reported that this reduction might be explained by transient ischemia due to intra- and extraaxonal edema resulting in atrophy of the retinal nerve fibers. Their study showed that axonal loss following papilledema can be estimated by OCT-measured macular thickness measurements. In eyes with resolved papilledema demonstrated significantly decreased macular thickness in eight out of nine macular parameters compared to the control group, while OCT-measured RNFL thickness were thinner in six of seven RNFL thickness parameters. In our study, we identified significant thinning in 4 of the 9 macular parameters and 1 of the 8 RNFL parameters assessed in CVT patients. We think the cause of this difference may be still present subclinical ICPIS and/or incomplete resolution of papilledema during OCT measurements.
Coagulation mechanisms are blamed for occurrence of CVT. As a result, anticoagulants are primarily used for CVT treatment [16, 17]. In addition to anticoagulants forming the basis of treatment, symptomatic treatment is important. Especially in the acute period antiedema treatment to prevent intracranial hypertension that may occur during clinical progression of the disease may be important. Patients should be monitored carefully for intracranial hypertension and complications; antiedema treatment duration should be set according to clinical assessment, fundus examination and vision field tests . All cases had treatment arranged according to the guidelines and patients were monitored closely for intracranial hypertension. None had papilledema or vision field defects identified. In spite of this, the RNFL and macular layer thinning identified in our study shows that OCT is important for monitoring CVT patients and deciding when to stop antiedema treatment. Because OCT makes it possible to detect mild papilledema that could not be visualized using traditional methods [19, 20].
A limitation of the present study is that some patients were on anti-edema treatment. Although, we determined that macular thickness parameters were lower in nearly all eyes with CVT, there might be patients with high intracerebral pressure which might affect the RNFL thickness.
Conclusions
This study was, to the best of our knowledge, the first evaluation of the macular and peripapillary RNFL thickness changes in CVT patients. In conclusion, when patients with no papilledema on fundus examination, with no visual symptoms or vision field defects are assessed with the more sensitive method of OCT, thinning of macula and RNFL thicknesses was observed. All patients with CVT diagnosis should have detailed eye examination including OCT investigation at time of application and during monitoring. Thus, mild papilledema at time of application and macula thickness changes during check-ups will be identified so treatment and monitoring of patients may be completed with more effective methods and eye and cerebral complications will be prevented. We believe our study will be important for monitoring and treatment planning for patients with CVT accompanied by diseases affecting the optic nerve disc like glaucoma.
Abbreviations
- CFT:
-
Central foveal thickness
- CVT:
-
Cerebral vein thrombosis
- IIM:
-
Inferior inner macular thickness
- IOM:
-
Inferior outer macular thickness
- NIM:
-
Nasal inner macular thickness
- NOM:
-
Nasal outer macular thickness
- OCT:
-
Optical coherence tomography
- RNFL:
-
Retinal nerve fiber layer thickness
- SIM:
-
Superior inner macular thickness
- SOM:
-
Superior outer macular thickness
- TIM:
-
Temporal inner macular thickness
- TOM:
-
Temporal outer macular thickness
References
- 1.
Masuhr F, Mehraein S, Einhaupl K. Cerebral venous and sinus thrombosis. J Neurol. 2004;251(1):11–23.
- 2.
Ferro JM, Canhão P, Stam J, et al. Prognosis of cerebral vein and dural sinus thrombosis: results of the international study on cerebral vein and Dural sinus thrombosis (ISCVT). Stroke. 2004;35(3):664–70.
- 3.
Ferro JM, Canhão P, Bousser MG, et al. Cerebral vein and dural sinus thrombosis in elderly patients. Stroke. 2005;36(9):1927–32.
- 4.
Kashkoush AI, Ma H, Agarwal N, et al. Cerebral venous sinus thrombosis in pregnancy and puerperium: a pooled, systematic review. J Clin Neurosci. 2017;39(9):9–15.
- 5.
Agostoni E. Headache in cerebral venous thrombosis. Neurol Sci. 2004;25(3):206–10.
- 6.
Agrawal K, Burger K, Rothrock JF. Cerebral sinus thrombosis. Headache. 2016;56(8):1380–9.
- 7.
Bousser MG, Russell RR. Cerebral venous thrombosis. In: Warlow CP, Van Gijn J, editors. Major problems in neurology. London, UK: WB Saunders; 1997. p. 27–9.
- 8.
Early Treatment Diabetic Retinopathy Study Research Group. ETDRS report no. 7: early treatment diabetic retinopathy study design and baseline patient characteristics. Ophthalmology. 1991;98(5):741–56.
- 9.
Renowden S. Cerebral venous sinus thrombosis. Eur Radiol. 2004;14(2):215–26.
- 10.
Damak M, Crassard I, Wolff V, et al. Isolated lateral sinus thrombosis: a series of 62 patients. Stroke. 2009;40(2):476–81.
- 11.
Saposnik G, Barinagarrementeria F, Brown RD Jr, et al. Diagnosis and management of cerebral venous thrombosis: a statement for healthcare professionals from the American Heart Association/American Stroke Association. Stroke. 2011;42(4):1158–92.
- 12.
Wang D, Fang B, Wei S. Analysis of clinical features of ocular presentation in cranial venous sinus thrombosis. Eur J Med Res. 2011;16(7):324–7.
- 13.
Sasidharan PK. Cerebral vein thrombosis misdiagnosed and mismanaged. Thrombosis. 2012;2012:210676.
- 14.
Schirmer CM, Hedges TR 3rd. Mechanisms of visual loss in papilledema. Neurosurg Focus. 2007;23(5):E5.
- 15.
Monteiro ML, Afonso CL. Macular thickness measurements with frequency domain-OCT for quantification of axonal loss in chronic papilledema from pseudotumor cerebri syndrome. Eye. 2014;28(4):390–8.
- 16.
Nagaraja D, Sarma GR. Treatment of cerebral sinus/venous thrombosis. Neurol India. 2002;50(2):114–6.
- 17.
Montagud M, Montserrat I, Oliver A. Pregnancy and thrombophilia in women with congenital deficit of antithrombin III, protein C, protein S or plasminogen: analysis of 39 cases. Med Clin. 1993;100(6):201–4.
- 18.
Wall M, Johnson CA, Cello KE, et al. NORDIC idiopathic intracranial hypertension study group. Visual field outcomes for the idiopathic intracranial hypertension treatment trial (IIHTT). Invest Ophthalmol Vis Sci. 2016;57(3):805–12.
- 19.
Vartin CV, Nguyen AM, Balmitgere T, et al. Detection of mild papilloedema using spectral domain optical coherence tomography. Br J Ophthalmol. 2012;96(3):375–9.
- 20.
Menke MN, Dabov S, Knecht P, et al. Reproducibility of retinal thickness measurements in healthy subjects using spectralis optical coherence tomography. Am J Ophthalmol. 2009;147(3):467–72.
Acknowledgements
No applicable.
Funding
No funding was obtained for this study.
Availability of data and materials
The datasets used and/or analysed during the current study is available from the corresponding author on reasonable request.
Ethics declarations
Ethics approval and consent to participate
The study adhered to the tenets of the Declaration of Helsinki. It was approved by the local ethics committee (Kafkas University, Human Ethics Comitteee, Kars, Turkey), and written informed consent was obtained from all participants before they recruited into the study.
Consent for publication
Written informed consent was obtained from the patient for publication of this study and any accompanying images.
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The Creative Commons Public Domain Dedication waiver (http://creativecommons.org/publicdomain/zero/1.0/) applies to the data made available in this article, unless otherwise stated.
About this article
Cite this article
Koban, Y., Ozlece, H., Karayol, S. et al. Decreased retinal nerve fiber layer thickness in patients with cerebral venous thrombosis. BMC Ophthalmol 19, 57 (2019). https://doi.org/10.1186/s12886-019-1046-9
Received:
Accepted:
Published: | https://bmcophthalmol.biomedcentral.com/articles/10.1186/s12886-019-1046-9 |
Dear Colleagues,
We wish to extend a cordial invitation to you to participate in the 6th International Berlin Bat Meeting: The human perspective on bats to be held from 23rd to 25th March 2020 in Berlin, Germany.
Aim: With this conference, we would like to foster an exchange of ideas related to ‘human perspectives on bats’. We are especially keen on crossing disciplinary boundaries and hope that the discussion among bat biologists, social scientists, economists, ecologists, teachers, and conservationists will advance the field substantially. We suggest several exciting topics as sessions or workshops. In addition, we have invited plenary speakers to review novel applications and exciting developments in their respective research areas.
Tentative list of sessions
Human Dimensions of Bat Conservation and Management
The study field ‘Human Dimensions of Wildlife (Management)’ investigates how humans feel and think about wildlife (management) as well as how people influence or are influenced by wildlife management decisions. This session highlights some of the commonly used theoretical or conceptual frameworks from the social sciences that can be used to shed light on generalities in human-bat conflicts and conservation. Further, we seek to present projects related to the human dimensions of bat conservation and management.
Ecosystem Services
Bats provide important ecosystem services, such as consumption of (pest) insects, seed dispersal or pollination. These ecosystem services provided by bats are often investigated in agricultural or forested landscapes (e.g. pest insect control), while we still have little knowledge about them in other landscapes such as in urban areas (e.g. urban wetlands or community gardens). This session addresses the services provided by bats to people and ecosystems in different landscapes.
Bat Health and Human Health (One Health)
Diseases caused by pathogens may extirpate local bat populations as exemplified by the fungal pathogen causing White-Nose Syndrome in North America. However, pathogens are not only a risk to bats, but bat originated pathogens may pose a threat to humans as well. This session addresses research on bat health from a conservation perspective but also from the health perspective of humans when it comes to bats.
Killing, Culling, Hunting and Trading of Bats
Worldwide, humans kill bats for food, for trading, and as a result of perceived nuisance and conflict, resulting in potentially negative consequences for local bat populations. This session explores the current status of the killing, culling, hunting and trading of bats on a global scale.
Bats in Anthropogenic Landscapes
Bats live in urban areas worldwide. However, our understanding of why some bat species successfully adapt and survive in the urban environment and why others do not is limited. This session addresses the current knowledge on bats in urban areas, general trends, and explores next steps in studying the underlying mechanisms (e.g. morphological and behavioural traits) that enable certain bat species to successfully survive and thrive in the urban environment.
Bat Citizen Science Projects
Citizen science projects are increasing worldwide. This enables bat researchers to gather large sets of data while educating citizens in the process. Besides sharing lessons learned from bat citizen science projects, this session explores both sides: benefits of citizen science projects to bat conservation, and the impact of citizen science projects on people themselves.
Bats and Outreach: From Message Framing to Conservation Marketing
Bat outreach programs can be found worldwide; mostly with the aim to gain public acceptance toward bats and to promote bat conservation. Researchers increasingly explore how to effectively promote certain species, ranging from anthropomorphism, message framing, story-telling to conservation marketing. This session explores the state-of-the art knowledge of effective outreach strategies that can be useful for bat education.
We are looking forward to seeing you in Berlin in March 2020! | https://www.batlab.de/6th-ibbm/ |
When paired with Persephone, she and Demeter are called: “the Older” and “the Younger” in Eleusis, Demeters in Rhodes and Sparta, the Thesmophoroi or “the Legislators” in Thesmophoria, The Great Goddesses and The Mistresses in Arcadia. “The Queens” in Mycenaean Pylos.
Antaea – This name and epitaph is one that is applied equally to Cybele, Demeter and Rhea by the Greeks. The meaning of the name is unclear, though it does denote a name for a goddess whom people could approach in prayer.
Etymology: Earth Mother
It’s generally agreed that the second part to Demeter’s name, “meter” comes from a Proto-Indo-European word meaning mother.
Now, the first part to Demeter’s name, De originates as Da, becoming Ge in Attic and then De in Doric. Making it that Demeter means “Mother Earth.” The root word of De has also been linked to the name Deo, from the Cretan word for emmer, spelt, rye and other grains. In this respect, Demeter is the giver of food. Another alternative from Proto-Indo-European etymology is that De is derived from Despoina and Potnia where Des- means house or dome, making in this case, Demeter mean “mother of the house.”
In Greek mythology, Demeter is the Olympian goddess of agriculture and the harvest. She specializes in the cultivation of grains and is a fertility goddess. In addition, Demeter ruled over the cycles of life and death as well. Demeter is an ancient goddess whose worship predates the Greeks. Both Demeter and her daughter Persephone were the central figures in the Eleusinian Mysteries.
Attributes
Animal: Horse, Pig, Snake
Colors: Black, Green
Element: Earth
Month: August
Patron of: Agriculture, Harvest
Plant: Grains, Wheat, Barley, Poppy
Sphere of Influence: Growth, Seasonal Cycles, Harvest, Sacred Law
Symbols: Cornucopia, Scepter, Wheat, Torch, Bread
Early Greek Depictions
Found in Pylos, there is a set of Linear B Mycenean Greek tablets that dates from between 1400 to 1200 C.E. that depicts “two mistresses and the king” that are thought to possibly be Demeter, Persephone and Poseidon.
In Homer’s Odyssey, Demeter is described as a blond-haired goddess who separates the chaff from the grain.
Demeter doesn’t often appear in art before the 6th century B.C.E. Demeter is often associated with imagery of the harvest, flowers, fruit, grain and sometimes seen in the company of her daughter Persephone where they are both wearing crowns and hold a torch and scepter or stalks of grain. Another scene that Demeter is shown in is that of Athena’ birth. Sometimes Demeter is shown sitting alone wearing a wreath of braided ears of grain.
Eleusinian Mysteries
The Eleusinian mysteries were an annual religious celebration that predates the Olympian pantheon. It is an important life and death ritual with Persephone in her role as a vegetation goddess and Demeter having important roles where they are worshiped together. During the reign of King Erechtheus of Athens is when Demeter’s worship came to Eleusis.
Originally, the festival was celebrated in the autumn during the seasonal sowing in the city of Eleusis. The myth was told in three phases of a decent, the search and the ascent, describing Demeter’s sorrow and her joy as she became reunited with Persephone. This celebration also involved dancing in the Rharian field where the first grains were grown. There are inscriptions of “the Goddesses” being accompanied by Triptolemos, an agricultural god and another of the God and Goddess that refer to Persephone and Plouton.
There were two sets of observances or celebrations for the Eleusinian Mysteries that would be held every five years.
The Lesser Mysteries would be held the 20th Anthesterion (roughly coinciding with February 28th) and take place over a span of week
The Greater or Eleusinian Mysteries would occur during the 15th-21st of Boedromion (September 28th to October 4th).
Ancient Sumerian Origin – The idea has been put forward by the renowned scholar, Samuel Noah Kramer that the story of Persephone’s abduction to the Underworld likely sees its origins in the ancient Sumerian story of Ereshkigal, the goddess of the Underworld who was abducted by the dragon Kur and forced to become the ruler of the Underworld against her will.
Agrarian Cults – The cults of Demeter and Persephone of the Eleusinian Mysteries and Thesmophoria are based on some very old agrarian cults. These cults were led by priest as evidenced from an image on a Minoan vase dating to the end of the New Palace Period. This ancient cult held a connection to seasonal practices and tasks.
Daemons & Animal Nature – In Arcadia, the worship of Persephone and Demeter were the first daemons local deities who governed the powers of nature. Such ancient beliefs show a connection to animal nature that saw a belief in nature personified with nymphs and deities with human forms but also possessing animal heads and tails or other features.
Celebrate Good Times, Come On!
The seasonal disappearance and the later return of Persephone were times of festivals during the time of ancient Greece. The Eleusinian Mysteries are the most well-known and even then, the secrets for this festival were closely guarded, that not much is known about them.
Secret Rites & Immortality – Life after death seems to be a very common motif in many religions and beliefs around the world, even anciently. That somehow, life, some sort of existence continues even after death. It was no different for initiates into the Eleusinian Mysteries who closely guarded their initiation rites. After all, the Eleusinian Mysteries wouldn’t be a mystery if everyone knew about them. For the Eleusinian Mystery initiates, these secrets were that of resurrection and there would be some place better than that of dismal depths of Tartarus.
They wouldn’t be the first to have the idea of life after death. It is thought by the experts, that the rites and mysteries held during the Eleusinian mysteries, along with other traditions such as the Orphic tradition and Mithraism all contributed towards the formation of Christianity and its ideas of resurrection, everlasting life and even immortality.
In the Eleusinian Mysteries, Kore’s return from the Underworld conveyed the idea of immortality and a resurrection from death.
Orphic Tradition – This is where the myth of Persephone is identified with other deities such as Isis, Rhea, Ge, Hestia, Pandora, Artemis, and Hecate. It is within this tradition that Persephone, with Zeus becomes the mother of Dionysus Iacchus, Zagreus or Sabazius.
Local Cults & Worship
Each local cult held their own traditions and ideas for where Persephone had been abducted from. In the Homeric Hymn to Demeter, it is the “plain of Nysa” where Persephone’s is kidnapped. The Corinthian and Megarian colonists, and Sicilians believed her abduction to happen in the fields of Enna. The Cretes believed that Persephone’s abduction occurred on their island. Other versions will place the abduction in places like Attica, near Athens, or even near Eleusis.
Distant localities that lay in the mythical played a part in creating a sense of some mystically, distant chthonic world that normally couldn’t be visited and created more of an air of mystery and prestige to the Eleusinian Mysteries. In the month known as Anthesterion, Persephone was the only one to whom the mysteries were dedicated to in Athens.
Temples dedicated to the Eleusinian Mysteries and the worship of Demeter and Persephone were found throughout all ancient Greece, Asia Minor, Sicily, Magna Graecia and Libya. Not much is known about the specifics of local rites and worship.
Amphictyony – An ancient ruin site, this is likely the oldest cult center for Demeter in Anthele along the coast of Malis, Thessaly. For those interest in history, this is near Thermopylae where the famous 300 Spartans fought the invading Persians. After the “First Sacred War,” this Amphictyony became known as the Delphic Amphictyony. Basically a meeting place for many local Greek tribes and cities to come gather to maintain temples to the gods, festivals and work out any disputes and problems.
Megara – Temples to Demeter were called Megara and would be built in groves with neighboring towns nearby.
Mysia – The goddess Demeter worshiped here had a seven-day festival held at Pellene, Arcadia.
Sacrifices To Demeter – These would consist of pigs, bulls, cows, honey cakes, and fruit.
Minoan Crete
New Year’s Celebration & Divine Child
A near eastern culture with strong ties and connection to the ancient Greeks. The Minoans of Crete held a belief in a fertility goddess whom every year, would give birth to the God of the New Year. That sounds familiar. The New Year’s baby to symbolize the New Year.
This god of the New Year would become the fertility goddess’ lover and of course, the cycle would repeat with the god’s death and his rebirth at the New Year. Similar beliefs and cults are found with those of Adonis, Attis and Osiris.
In Minoan Crete, this fertility goddess is Ariadne and the “divine child” who died every year were part of an aniconic religion whose main deities were female. Every year, an ecstatic sacral dance that involved tree-shaking and the worshiping of stone or stone idols were conducted. The idea and suggestion have been put forward that the worshiping of Persephone may likely be a continuation of the worshiping of a Minoan Great Goddess.
Eileithyia – She is a local Minoan goddess found in Amnisos, Crete where she is a goddess of childbirth who gives birth to a divine child. Her consort is given as Enesidaon, the “earth-shaker” an epitaph of Poseidon. Eileithyia’s myth and cult would come to be absorbed into the Eleusinian Mysteries.
Divine Child – This boy consort to the Great Goddess symbolized the annual dying and renewal of vegetation every year.
Mycenean Greece – Arcadia
While we know the mystery cults existed, not much is known about other than a few inscriptions. In Mycenae, Persephone is thought to have been identified with a local goddess by the name of Despoina, “the Mistress” and chthonic goddess of West-Arcadia. Despoina’s worship is just an example of another deity who would be absorbed into the worship of Greek deities. To the uninitiated of the Arcadian mysteries, the name Despoina was not allowed to be revealed.
The local temples throughout Arcadia were often built near springs and there is evidence of continual fires being kept at some of these. The worship of Demeter and Kore were closely linked to springs and animals.
Thesmophoria
Another mystery cult similar to the Eleusinian Mysteries. Many of the secret rites and traditions are very similar to each other, including an early concept idea of immortality. Thesemophoria were held and celebrated in the city of Athen before coming more wide spread throughout Greece. It was a women-only festival that held strong association to marriage customs. It would be held on the third day of the year in the month of Pyanepsion, marking when Kore was abducted, and Demeter neglected her duties as a harvest goddess. The date can vary, if the festival were held in Athens, it would during the 11th-13 Pyanepsion, roughly coinciding with October 23rd-25th.
One ceremony involved burying sacrifices of pigs into the earth and then unearthing the decayed remains of pigs buried from the previous year. The remains would be placed on an alter and mixed with seeds before being planted.
Thesmophoria would be celebrated over the course of three days. On the first day is the “way up” to the sacred space. The second day is a day of feasting where pomegranate seeds are eaten. The third and final day, is a meat feast that honors Kalligeneia, goddess of beautiful birth. Hades, under the euphemistic name of Zeus-Eubuleus would attend the feast.
Thesmophoros – “Giver of Customs” or “Legislator” is a name and epitaph that links Demeter to the goddess Themis, which derives from the word thesmos, the unwritten law.
Parentage and Family
Parents
Cronus and Rhea
Consort
Zeus, Oceanus, Karmanor, and Triptolemus
Iasion – Demeter manages to lure Iasion away during the wedding of Cadmus and Harmonia.
Poseidon – The Arcadian cult and myths link Demeter and Poseidon together. In this respect, Demeter is then equated with the Minoan Great Goddess, Cybele.
Siblings
She is the second child born of Cronus and Rhea.
The birth order is Hestia, Demeter, Hera, Hades, Poseidon and Zeus.
Chiron – a half-brother by way of Cronus and the nymph Philyra.
Children
Amphitheus I – Her son by Triptolemus.
Arion – A magical speaking horse, her son by Poseidon.
Chrysothemis & Eubuleus – Her children by Karmanor.
Despoina – Her daughter by Poseidon.
Dmia – Her daughter by Oceanus.
Iacchus – Her son by Zeus. Due to the similarity of his name with Bacchus, he is sometimes identified as being Dionysus.
Persephone – Goddess of Fertility and Queen of the Underworld, her daughter by Zeus.
Philomelus – her son by Iasion.
Ploutos – Also spelled Plutus, her son by Iasion.
Olympian Goddess
While Demeter may just very well indeed predate Grecian culture, she is counted among the twelve major deities who resided on Mount Olympus, the highest mountain peak in Greece and all of Europe. For the Greeks, this was the perfect location for where the gods would preside at while keeping watch on humankind down below them.
As there are several deities within Greek mythology, just who numbers among the Olympians varies. It’s generally agreed that the twelve major Olympians are: Zeus, Hera, Poseidon, Demeter, Athena, Apollo, Artemis, Ares, Aphrodite, Hephaestus, Hermes, and then either Hestia or Dionysus.
Birth Of A Goddess
We start with Cronus and Rhea, the parents of Demeter and all her siblings.
As the story goes, Cronus defeated his father, Uranus, overthrowing him to become the leader and King of the Titans. Shortly after, Cronus receives a prophesy that just as he killed his father, so too, would a child of his kill him.
This prompts Cronus to decide to devour his children whole as soon as they are born. This happens five times. Poor Rhea just gets to where she can’t take it anymore. With the birth of her sixth child, Zeus, Rhea hides him away and manages to convince Cronous that this large stone is their latest child. Bon Appetit, Cronous eats the “stone baby” none the wiser that he’s been tricked.
Rhea takes and hides Zeus, that later, when he is older, he can come fulfill the prophecy killing his father Cronus. During the battle, Zeus splits open Cronus’ stomach, freeing all of his brothers and sisters: Poseidon, Hades, Demeter, Hera and Hestia.
There is a ten-year long war known as the Titanomachy, that by the end, Zeus takes his place as ruler and king of the gods on Mount Olympus. Demeter and the other gods take up their roles as part of the newly formed Pantheon.
Demeter & Zeus
Zeus as we know, King of the Gods, fathered many children with many goddesses and mortal woman alike and usually by rape.
In the Homeric Hymn to Demeter, Zeus rapes his sister Demeter, resulting in Kore, Persephone.
By one account, Demeter becomes a fourth wife to Zeus and in their union, they have a daughter by the name of Kore (Persephone).
With the information from the Homeric Hymn and Zeus’ reputation, that would be an awful lot of wives if he married everyone he’s to have raped.
The Rape Of Persephone
You read that right. Yes, I could have titled this one differently. However, this is the title of the story for Persephone’s abduction by Hades to the Underworld that many are familiar with and the most well-known story regarding Persephone. Plus, this is also a story involving her mother Demeter and her role in it and the primary story told in the Eleusinian Mysteries.
When Persephone is first known as Kore, the Maiden, she lived with her mother Demeter, a harvest Goddess. Kore herself is a fertility goddess who makes or causes everything to grow. Kore’s father is the mighty Zeus himself.
Kore grew up and spent her time playing in the fields with the nymphs, gathering flowers, playing and with her mother. As she grew older, Kore came to attract the attention of the other male Olympian gods. Hephaestus, Ares, Apollo and Hermes all sought her hand in marriage. The young Kore rejected them all for she was still interested in playing with her nymph friends and collecting flowers. Demeter made sure that her daughter’s desires are known.
This doesn’t stop Hades, the god and ruler of the Underworld. For Hades, this is love at first sight. As was customary, Hades went to his brother, Zeus (Kore’s father), to petition for Kore’s hand in marriage, getting permission.
Zeus took the proposal to Demeter who refused. Kore isn’t going to leave her or go anywhere, least of all the Underworld with Hades. Not going to happen!
At first, this sounds as if Demeter is simply being unreasonable. The type of response of a mother fearing the empty nest or mother smothering and won’t let her child go. What we would call now days, Helicopter Parenting.
Zeus likely thinks he’s being reasonable, mentioning that every child grows up and leaves their parents eventually and that Kore is certainly old enough to marry. But Zeus isn’t listening, he thinks he knows better. That Demeter is just making an idle threat that if he marries off Kore to Hades and takes her down to the Underworld, nothing will grow!
Since they can’t get Demeter’s approval for the match, Zeus and Hades take a step back, allowing Demeter to think she’s won this round. Hades comes up with a plan to outright kidnap/abduct Kore while she is out gathering flowers. Zeus is in on this too and plants a narcissus flower to attract Kore’s attention.
While Kore is distracted by this new, unusual flower, behind her, a chasm opens up in the earth and out comes Hades, riding in his chariot to snatch up Kore to carry away with him back to the Underworld.
Of all of Kore’s Nymph friends, only the Naiad, Cyane tried to rescue and stop her abduction. Overpowered by Hades, Cyane in a fit of grief cried herself into a puddle of tears, forming the river Cyane.
Demeter, hearing the nymph’s cry out that something was amiss, came running, only to find that her daughter is missing and none of the nymphs in their crying could tell her what happened. Angry, Demeter cursed the nymphs that they turned into Sirens. Only the river Cyane offered any help with washing ashore, Kore’s belt.
In vain, Demeter wandered the earth, searching for her daughter. During her search, Demeter found herself in the palace of Celeus, King of Eleusis in Attica. Demeter took the guise of an old woman, calling herself Doso and asked the King for shelter. Celeus took the old woman in and had her nurse Demophon and Triptolemus, his sons.
Now, from a goddess’ perspective, she planned to reward Celeus’ kindness by gifting his son Demophon immortality. To grant the gift of immortality, Demeter anointed the child with ambrosia and laid him down in the hearth fire with the intention to burn away his mortality. Mom, Queen Metanira walks in and see her baby laying in the fire and understandably freaks out, screaming. Demeter decided against this idea and instead taught the older boy, Triptolemus the knowledge of agriculture. From this, this is how humankind learned how to plant, grow and harvest grain.
Unable to find her, Demeter went and hid herself in sorrow at the loss of her daughter. Once plant life begins to die, the other gods go in search of her. Especially once all their followers begin to cry out there’s no food, help them.
Pan is the one who eventually finds her in a cave. Demeter in her despair, reiterates that without Kore, nothing will grow.
The way this gets told in most retellings, Demeter is threatening to refuse any new life or plant growth. To appease her and prevent people from starving, the gods agree to find Kore so that life can return. It seems that way if you don’t know or forget Kore’s already existing role as a fertility goddess.
Hecate realizes and knows there’s a problem. Hence, she intervenes. All isn’t lost if Kore hasn’t eaten the food of the Underworld, the dead, she can return to the world above.
Down in the Underworld, a frightened and despairing Kore is refusing the advances of Hades and refusing to eat any food. Kore knows that if she eats the food, she won’t be able to return to the living world.
Now at some point, Hecate comes and talks with Kore. At some point, Kore falls in love with Hades or she sees the state of what the Underworld is like. A plot twist comes and Kore does, either willingly or tricked into it, eats some pomegranate seeds. The number of which varies from one to four, Persephone is bound to the Underworld and must spend part of the year there. The rest, she can spend above in the mortal world with her mother Demeter.
This way, Hades doesn’t lose his wife and queen and Persephone can fulfill her role as a fertility goddess, bringing life to the land.
Variations
As a note, I came across commentary that says there are some 22 variations in Antiquity about the story of Persephone’s abduction. I doubt I could find all of them. The Homeric Hymn to Demeter written between 650-550 B.C.E. is thought to be the oldest story.
Overly Simplified – One version of the above story is drastically simplified and glosses over a lot of details to the story of Persephone and Hades. In it, Hades just happens to be out and about in the mortal realm when he spots Persephone. It’s easy enough to say Hades has love and first sight and he simply grabs Persephone and carries her off with him down to the Underworld. Persephone is unhappy at first with her lot, but eventually she grows to love Hades and comes to accept her fate as his wife.
As to Demeter, she is so overcome with grief at the loss of her daughter that she neglects her duties with creating plant growth. It is Zeus who makes a decree that Persephone may be reunited with her mother, but only for part of the year. Zeus sends the god Hermes down to the Underworld to retrieve and bring Persephone back.
Hades held no desire to give up the goddess whom he intended to marry. Coming up with a plan, Hades tricked Persephone into eating some pomegranate seeds. Now because she had eaten the food of the Underworld, Persephone was bound to stay.
Persephone needed to only stay part of the year and the rest, she could be with Demeter. This way too, Hades didn’t lose his bride for she would have to return to him.
Not the best version of the story to give as it removes many details and robs Persephone of any agency or choice in the matter. Stockholm Syndrome at its finest.
Version 2 – When Demeter becomes distraught over the loss of Persephone, she goes mad and wanders the land disguised as an old woman carrying a pair of torches in her hands. She searches for some nine days and nights.
Eventually, Demeter meets Hecate on the tenth day who takes pity on Demeter’s miserable appearance. Hecate tells Demeter to seek out Helios, the sun god who can tell her of what happened. Demeter finds Helios who informs her about Hades abducting Persephone.
Demeter begs Hades to release Persephone and allow her to come back to the living world. Hades consults with Zeus about the matter. Hecate returns and lets Demeter know that Persephone hasn’t eaten four pomegranate seeds and because of that, Persephone will still be able to return to the living world. There is a catch and that is, because Persephone has eaten some of the pomegranates, she will have to return to the Underworld for part of the year.
Both version 2 and 3 retellings go for making it look as if Demeter is responsible for refusing to allow anything to grow and does so out of anger or spite. Or that in her grief, Demeter simply neglects her duties for making things grow. This idea originates in Homer’s “Hymn to Demeter,” that gives the idea that Demeter is in charge of fertility.
Those versions work if you want to ignore that Kore/Persephone is a Fertility goddess, she’s the one who is responsible for new plant growth.
Version 3 – Some versions of the story place the episode where Demeter goes to Celeus’ kingdom to hide in sorrow after she learns just who abducted Persephone. Regardless of if its Helios or Hecate who tells her the news.
This placement in the narrative often fits when the impression of Demeter as a Fertility goddess is wanted to be given and that in her despair or out of spite, sets the world on a path to barrenness and winter.
Side Note – Sometimes the characters of Demephon and Triptolemus are seen as being the same person, especially Triptolemus.
Ascalaphus – In what seems to be padding the story, Ascalaphus, the keeper of Hades’ Orchard is who tells the other gods that Persephone has eaten the pomegranate seeds. Demeter becomes so enraged with this news that she buries him beneath a huge rock in the Underworld. Later, when Ascalaphus is released, Demter turns him into an owl.
Hades’ Role In The Myth
In the story for the Rape of Persephone, Hades fits into the story as he is an Underworld deity himself. Among the Greeks, it was believed that Hades rode around in his chariot catching the souls of the dead to carry back down to the Underworld.
With Persephone being a chthonic goddess, the Greeks likely came up with the story to better fit the goddess to her role as a Queen of the World. It unfortunately greatly diminishes her role and what her functions were from a much earlier era.
In the myths where Hades is called Pluto or Ploutos, he is not only a god of the Underworld, but wealth where the riches of the earth can be found. Partnering him up with Persephone is meant only to add to his power and domain for now it is the riches of the earth in terms of fertility. In this case, the wealth of corn or grain springing forth from the ground every year and the promise of renewal it brings with it.
Agriculture
This is perhaps the biggest aspect about Demeter. As an Earth Goddess and Goddess of the Harvest, this is Demeter’s biggest role in her gifting mankind with the knowledge of agriculture, especially for grains and cereals. Without the advent of agriculture, humans would still largely be hunter-gatherers moving about and never having settled in any place to build cities and all the rest that follows.
Grain – This crop was of great importance to the ancient Greeks as it was rare and hard to come by in the Grecian country sides. Persephone’s close association with this crop held the promise of renewal, regeneration and possibly immortality, knowing that she would return every spring.
This strong connection of grain and rebirth or renewal is what ties Demeter so closely to the Eleusinian Mysteries. In Hesiod, there are prayers to Zeus-Chthonios and Demeter to help ensure that the crops will be full and strong.
Secrets Of Agriculture – In the larger story of “The Rape of Persephone,” there is a shorter episode that occurs. During Demeter’s search for her missing daughter, the goddesses’ wanderings took her to the kingdom of Eleusis in Attica where King Celeus ruled. While there, seeking shelter in the guise of an old woman, Demeter, after deciding to not gift immortality to the young son, Demophan, the goddess instead taught the knowledge of agriculture to the older son, Triptolemus. In this way, this is how humankind learned the knowledge of how to plant, grow and harvest grain.
Now, there a few different versions to this myth and other figures such as Eleusis, Rarus and Trochilus will be who learned the secrets of agriculture. Fair enough.
Civilization!
Without the knowledge of agriculture, humankind would have continued to be nomadic, hunter-gathers. With Demeter’s influence, humankind is able to settle and stay in one place to begin building up their cities and civilizations. This fits with one of Demeter’s names: Thesmophoros as “Law Bringer” and laying out the planning and laws of society.
Seasonal Cycles & Changes
Like her daughter, Demeter is also closely connected to the Ancient Greeks beliefs about the changing of the seasons, especially as seen in the story: “The Rape of Persephone.” That Spring and Summer are when Persephone has returned to the Living World to be with her mother Demeter and that Fall and Winter come when Persephone descends back down to the Underworld to be with her husband Hades for the rest of the year.
Sure okay, makes sense I guess.
The more simplified Greek versions would have it that Demeter is responsible for the fertility of the earth and that she causes it to be winter out of grief and spite because her daughter Persephone isn’t with her. Add to that so many people wanting to give stories about how fickle and petty the Greek Gods could be, this just seems to fit the Pantheon’s MO, nobody is questioning the story?
Yay! I love mankind so much! I’m going to teach them agriculture and how to harvest! Boo! Hiss! You took my daughter! I’m going to punish the very mortals I claim to love so much by making the earth barren and winter!
That really doesn’t make sense!
Fertility Goddess – That’s because you have to remember that Persephone is a chthonic fertility goddess. The earth can grow again, and Spring comes when Persephone has ascended to the Living World.
The fertility function is something that the Greeks really seem to have forgotten and which role and function they attached to Demeter. That way, a version of the story where Demeter is the fertility goddess, it’s out of spite and grief that Demeter causes winter and refuses to allow anything to grow.
Harvest Goddess – Yeah! Everyone remembers this aspect about Demeter. Afterall, she taught mankind the secrets of agriculture! This is Demeter’s domain and better fits the dual roles that she and Persephone share.
Alright kiddos, Persephone’s going back to the Underworld to be with Hades again, better bring in those crops and harvest like I told you! It’s gonna’ be awhile and we don’t need any empty bellies or people dying while we wait for Persephone to come back.
Fall comes, and this is where Demeter’s role comes in. As plants become dormant or die, now is the time for harvesting, to make sure there enough food has been stored and gathered for the long winter months until Persephone and Spring returns. The first loaf of bread is thought to have been sacrificed to Demeter.
As a goddess of the Harvest, this domain ties closely to Demeter’s role as a goddess of Agriculture, having taught humankind it’s knowledge so they can grow enough food.
To keep with the version of the story where Demeter makes it Winter out of spite or grief because her daughter has been abducted seems contradictory. Especially if Demeter is one of the few Greek Gods who is considered closest to humankind and understands the most about grief and loss.
Mother Goddess
Just by the very meaning of Demeter’s name, “Earth Mother,” we know she is a mother goddess. Not necessarily a “Great Mother Goddess” as the Romans would identify Cybele and Rhea with.
As a mother goddess, Demeter is seen as the most compassionate and closest to humankind of all of the Greek Gods for she is the one who understands the most about grief and loss. It’s her gifts of abundance and the harvest yields that nurture and sustain humans through the long winter months.
Poppies
This is another plant besides grains that is strongly associated with Demeter. Her emblem is that of a bright red poppy flower growing among the barley. Theocritus wrote of Demeter being a poppy goddess, that she held poppies and sheaves of grain in both of her hands. In Gazi, Minoa, there is a clay statuette that was found of a goddess wearing seed capsules on her diadem. The idea has put forward that a Great Mother Goddess, under the names of Rhea and Demeter introduced the poppy with her cult in Cretan.
Healing A Poor Man’s Son – An episode often set during Demeter’s search for her daughter, the goddess comes across a poor, old man who is out gathering firewood. He invites the goddess to his home, likely not knowing who she is, and offers to share a meal with her. This would be the law of hospitality among the Greeks known as Xenia.
When Demeter told the old man about her search for her missing daughter, he wished Demeter success and said that he understood her grief and suffering for his own son lay dying. Taking compassion, Demeter decided to go with the old man to his home. She stopped once to gather some poppies and when they arrived, Demeter went straight to the boy’s bedside, kissing him on the cheek. At once, the boy’s sickly pallor left him, and he was restored to health.
As to the poppies, I assume the story intended some healing use and connection. Poppies are a source of opium from which morphine is derived. There is a history of poppies being used medicinally, mainly for diarrhea and pain, chest colds, coughs and pneumonia. So, a Greek audience likely knew very well what Demeter intended to use the poppies for.
Poppy seeds are also used in preparations for bread and confections. Not likely an immediate use of drug abuse.
Goddess Of Marriage
As a goddess of marriage, Demeter is venerated at the celebration of Thesmophoria. It’s an interesting connection and one that makes sense if one remembers that it wasn’t unusual for mothers to be kept out of the loop as to whom their daughter would marry when the father is making the arrangements.
Of course, this future husband was likely someone easily two if not three times the girl’s age and she would find herself torn from her birth home and leaving to live with her husband, most likely in another town and province.
Demeter’s grief over the loss of her daughter would resonate with many women in ancient Greece. Taking from the stance of Demeter as responsible for fertility, she, unlike many women was able to do something that others couldn’t. That was to defy Zeus’ will by holding the world hostage until he agrees to release Persephone back to Demeter, even if only for part of the year.
It may have been a partial victory, but a victory all the same for Demeter. Many mothers probably hoped to be able to do something similar. Or say, a daughter could return to visit her maternal family, things would never return to the way they were before. But just for a little while, they could.
Demeter & Iasion
Iasion is noteworthy as he is considered the only consort Demeter took by choice rather getting raped or forced by another person. Iasion is the son of Zeus and the mortal woman, Elektra.
During the marriage of Cadmus and Harmonia, Demeter spotted Iasion and fell in love. She managed to lure Iasion away from all the other partygoers. The two would head out to a field near Crete where they would have a tryst. Demeter would later give birth to twins: Ploutos (or Plutus) who is known for bestowing wealth and plenty on people and Philomelos who would become the patron of plowing.
Zeus would become jealous of Iasion and kill him with a thunderbolt. By one account, Zeus didn’t think it appropriate that a Goddess would consort with a mortal. But it’s okay if he does it? Got it.
Ploutos & Philomelos
In a case of sibling rivalry, Philomelos was envious of Ploutos great wealth. Rather than re-enact a biblical scene worthy of Cain and Abel, Philomelos bought a pair of oxen and invented the plow so he could earn a living tilling the earth. This so impressed Demeter, that she placed Philomelos up into the heavens to become the constellation Bootes.
Demeter & Poseidon
Well sure and why not? Demeter is the Goddess of the Earth and Poseidon is the God of Water. That’s a good match and they’re consenting adults and gods.
Mycenaen Greek – This is Bronze Age Greece, there is a script known as Linear B found in Mycenae and Mycenaean Pylos where both Demeter and Poseidon’s names appear. Poseidon is given the epitaph of E-ne-si-da-o-ne “earth-shaker” and Demeter’s name is given si-to-po-ti-ni-ja. In these inscriptions, Poseidon’s title and epitaph E-ne-si-da-o-ne (Enesidaon) links him as a King of the Underworld and gives him a chthonic nature.
Touching back to the Eleusinian Mysteries, there are tablets found in Pylos that mention sacrificial goods for “the Two Queens and Poseidon” or “to the Two Queens and King.” It’s agreed that the Two Queens very likely refer to Demeter and Persephone or its later precursor goddesses who are not associated with Poseidon later.
Eileithyia – She is a local Minoan goddess found in Amnisos, Crete where she is a goddess of childbirth who gives birth to a divine child. Her consort is given as Enesidaon, the “earth-shaker” whom we just mentioned is Poseidon. Her cult and worship would survive within the Eleusinian Mysteries. Plus, we see where local deities’ worship get absorbed and conflated with a more popular, well-known deity.
Arcadia – We’re still in Bronze Age Greece! Here, Demeter and Poseidon Hippios or Horse Poseidon give birth to a daughter, Despoina, who is a goddess in her own right before some of the myths confuse her with Persephone or make her an epitaph of Demeter.
In this myth, Poseidon is a river spirit of the Underworld, appearing as a horse. In this form, Poseidon pursues Demeter, who is also in horse form. Demeter hid among the horses of King Onkios. Due to her divinity, Demeter couldn’t remain hidden for long and Poseidon caught up with her and forced himself on her. When the two gods copulate, Demeter gives birth to a goddess who is also in horse or mare form. This is a myth that sounds very similar to another one between Poseidon and Athena and more accurately, Philyra and Cronos when Chiron is born. The horse motif is very common in norther-European myths and folklore.
As a mare-goddess, Demeter is known first as Demeter Erinys due to her fury with Poseidon for forcing himself on her. She becomes Demeter Lousia, “the bathed Demeter” after washing away her anger in the River Ladon. There’s something to be said for this as you can’t hold onto your anger forever, you must let it go or otherwise it consumes you.
The whole myth of pairing up Demeter and Poseidon is to connect Demeter as a Goddess of the Earth and Poseidon as a God of Water with their connection over nature. Despoina is the daughter who results from their union and whose name could not be spoken outside of the Arcadian Mysteries. Demeter and Poseidon also have another child, a horse by the name of Arion who is noted being able to speak, being immortal, really swift and for having a black mane and tail.
The effigy or imagery of Demeter worshiped in Arcadia depicts her as a gorgon or medusa-like with a horse’s head and snake hair while holding a dove and dolphin that likely represented her power over air and water. Close to the Arcadian city of Phigaleia, there is Mt. Elaios where a cave held sacred to Demeter is found. Here, an image of Demeter Melaine is seated showing the goddess dressed in black with a horse’s head and snake hair. According to Pausanias’ Description of Greece, when the statue caught fire and was destroyed, the Phigalians failed to make a new statue for Demeter, eventually leading to neglecting her sacrifices and festivals, the land became barren.
Demeter & Ascaelabus
I assume this is an episode set during when Demeter is searching for her daughter. When Demeter stopped at one point to kneel by a spring to quench her thirst, a man by the name of Ascaelabus began laughing when he heard the sound of Demeter’s gulping. Angry and embarrassed, Demeter turned the man into a lizard for his rudeness.
Demeter & Triopas
Considered the father of the Thessalians, Triopas was cursed by Demeter after he destroyed one of her temples. In retaliation, Demeter sent a huge serpent to kill Triopas. Even in death, Demeter wasn’t finished and she set Triopas up among the heavens as a constellation where the serpent could forever torment him.
Demeter & Erysichthon
Erysichthon was a Thessalian hero who decided to build himself a palace. Unfortunately for Erysichthon, the grove of trees he chose were sacred to Demeter. As Erysichthon set about to cut down the trees, Demeter came in disguise as a priestess by the name of Nikippe to try and warn Erysichthon not to cut the trees.
Nikippe is also the name of a nymph who lived in the grove. So when Erysichthon ignores the warning and chops down the tree, killing Nikippe, Demeter became very wroth and cursed Erysichthon with an insatiable hunger.
The more that Erysichthon ate, the thinner he became. In addition, when he had spent all of his money to try and sate his insatiable hunger, Erysichthon turned to selling his daughter Mestra into slavery.
Luckily for Mestra, she was a mistress of Poseidon and he granted the powers of shape-shifting into animals. Using this ability, Mestra would be able to escape slavery every time her father sold her.
Triple Goddess
In New Age, Pagan and Wiccan practices, Demeter is often seen as the Mother aspect of the “Triple Goddess” with Persephone representing the Maiden and Hecate the Crone.
Virgo Zodiac Constellation
The constellation of Virgo is the sixth sign of twelve that form the classical Greek Zodiac. For those who study and are into the classical Greek Zodiacs, this time is typically said to be from August 23 to September 22. Virgo is often depicted as a Winged Maiden holding a stalk or sheaf of wheat or some other grain in her hand. This figure is sometimes identified with that of Demeter, most notably by Marcus Manilus in his Astronomicon in 1st century Rome.
Ceres – Roman Goddess
Ceres is the Roman goddess of agriculture, grain crops, fertility, and motherhood and equated with Demeter. Similarly, Ceres has a daughter by the name of Proserpina is also abducted by Pluto down to the Underworld to become Queen of the Dead. The biggest difference in the myth is that Pluto is struck by an arrow from Cupid after his mother Venus told him to do. This is what causes the God of the Dead to fall madly in love with Proserpina. The other difference is that Cere’s celebrations and festivals come during the Spring while Demeter is venerated in Fall with the Harvest.
Cybele – Phrygian & Roman Goddess
The Greeks are who make the connection and equate Cybele with Demeter and Rhea, seeing in her a Mother Goddess. While Cybele does have her origins in Phrygian worship, when the Greeks encountered her, they just saw another deity like their own, just under a different name. Yes, all three are a Mother Goddess and Goddess of the Earth, you can see why the Greeks would equate all three together.
The Romans are clearer in acknowledging more clearly the genealogy of the Greek pantheon and equating Cybele whom they readily adopted as their own with Rhea and then equating Demeter with Ceres, a Roman Harvest goddess.
Antaea – This name and epitaph is one that is applied equally to Cybele, Demeter and Rhea by the Greeks. The meaning of the name is unclear, though it does denote a name for a goddess whom people could approach in prayer.
Rhea – Greek Goddess
The Greeks are who equate Demeter with her mother, Rhea, a Titaness, mother of the gods who is also a goddess of the earth and fertility. As I previously mentioned with the name of Antaea, that epitaph could be applied to Demeter, Cybele and Rhea equally. It works if you’re just seeing all the gods as different aspects of the divine and not making any distinction. It’s possible that’s just remnants of an older belief and religion that the Greeks replaced with their own.
Gaia – Greek Goddess
I’m my own Grandma!
Not really, leave it to the Greeks to continue with blending all their deities as being one and the same, to blur or ignore their own genealogies for their Pantheon. Gaia is the primordial goddess of the Earth and from whom all life sprang forth. Again, it works if you’re just seeing all of these deities as just different aspects of the divine.
Cybele Part 2
Attis & Cybele
This story is one of the major myths involving Cybele and they often include her relationship with Attis, a youthful consort to the goddess. Attis is noted too as being the name of a Phrygian deity. Further, Attis doesn’t become a part of the myth with Cybele until the Roman poet Catullus references him with Cybele as Magna Mater and as the name of the head priest for the Galli. Additionally, pine cones are used as symbols of Attis’ death and rebirth.
Attis – As a Phrygian deity, Attis is the god of vegetation, his death and resurrection is symbolic of the death and rebirth of vegetation and the harvest with each winter and spring. The name Attis in Phyrgia was a common name and one used for priests. In the myths linking Attis with Cybele as her consort; wherever Cybele’s worship spread, Attis’ worship went as well.
Imagery portraying Attis has been found at a number of Greek sites. Whenever Attis is shown with Cybele, he is shown as a younger, lesser deity to her. He is possibly even one of her priestly attendants. During the mid-2nd century B.C.E., various letters from the king of Pergamum to Cybele’s shrine in Pessinos all address the chief priest as “Attis.” So deity or priest tends to be a matter of personal interpretation with the myths of Attis.
The Myth
Attis was Cybele’s young lover who had devoted himself to the goddess. He had a made a promise that he would always be faithful. As fate would have it, Attis in time fell in love with a nymph by the name of Sagaritis (or Sagaris) and they decided to marry. When Cybele learned of this marriage, she burst in on the marriage ceremony, inflicting Attis with madness and sending the other guests into a panic.
In his maddened state, Attis fled for the mountains. There, he stopped under a pine tree and proceeded to mutilate himself to the point of castrating himself and bleeding to death there beneath the pine tree.
When Cybele found her lover, the young Attis dead, she mourned her actions and deeply regretted them. She pleaded with the god Jupiter to restore Attis to life. Jupiter vowed that that pine tree would remain sacred and like the tree, Attis would live again. The blood that Attis shed is said to have become the first violets.
In the versions of the myths where Maeon is Cybele’s father – Maeon kills Attis, the baby whom he sires after committing incest with his daughter. Cybele manages, in this myth to restore Attis back to life.
Pausanias’ Version – Another story of Attis, this time with Agdistis as another name for Cybele follows much of the same story as previously mentioned. Only now, when the baby, Attis is born, he is left exposed and a ram comes, standing guard over the child. As the baby grew, his beauty became ever more apparent as more than human. Agdistis saw Attis and fell in love with him.
When Attis finally came of age, he was sent to Pessinos, a city in Phrygia to wed the King’s daughter. After the marriage ceremony was completed, Agdistis appeared, causing Attis, driving him mad in her jealously to the point of cutting off his own genitals. The madness was such, it effected other nearby, that even the king cut off his own genitals.
Shocked, Agdistis sought amends for what she had done and begged Zeus to restore Attis to life so that he would be reborn.
Ovid’s Version – In this one, Attis had fallen in love with Cybele who wanted to keep the boy at her shrine as a guardian. She commanded Attis to always be a boy. Attis declared in kind that if he lied, let the lover he cheated be his last.
As happens with these kinds of stories, Attis does cheat with the Nymph Sagaritis (or Sagaris). Her tree is cut down by Cybele, killing her the Nymph. Attis in response goes mad and hallucinates that the roof to his bedroom is collapsing on him. Attis runs towards Mount Dindymus where he calls out for Cybele to save him.
Hacking away at his own body with a sharp stone, Attis continues to cry out to Cybele that she take his blood as punishment and cuts off his genitals as that is what has caused him to cheat on Cybele.
Ultimately, this story of Attis’ self-mutilation and castration is the basis for the Galli, Cybele’s priest to castrate themselves as a show of devotion to the goddess.
Cybele & Dionysus
Similar to the story of Attis & Cybele, is the story of Dionysus & Cybele. The earliest reference to this myth in Greek mythos is around the 1st century B.C.E. in Apollodorus’ Bibliotheca.
Like Attis, Cybele also cures Dionysus of his madness. Considering she’s the one who caused Attis’ madness, I would hope she would cure it too.
Both Dionysus’ and Cybele’s cult shared many similarities. As foreign deities worshiped among the Greeks, both gods would arrive in chariots drawn by large exotic cats. Dionysus would come in his chariot pulled by tigers whereas Cybele’s chariot was drawn by lions. Both deities would be accompanied to the fanfare of wild, raucous music and a parade of exotic foreigners and lower class citizens of Greek society.
For the Hellenic Greeks, these two gods held wild temperaments that didn’t sit well with many affluent Greeks and were thus, warily worshiped.
Due to the similarities of both Dionysus’ and Cybele’s cults, in Athens, by the end of the 1st century B.C.E., the two cults were often combined.
Cybele & Sabazios
Sabazios is the Phrygian version to the Greek Dionysus. Under Greek influence, the name Sabazios is often used as an epithet for Dionysus and the two’s myths have become very intertwined.
Further Greek influences have Cybele equated with Rhea. By Phrygian traditions, Cybele is the mother of Sabazios. When Cybele is equated with Rhea, she is the nurse-maid and tutor to a young Dionysus after his mother Hera rejects him.
Orgia – It is thought that the Orgia, the Orgiastic cult of Dionysos-Sabazios may have originated with Cybele. When Sabazios had been wandering in his madness, he made his way to Cybele in Phrygia where she purified him and taught him the initiation rite for the Orgia. Sabazios is to have received his thyrsus and panther-drawn chariot while he went throughout all of Thrace to spread the Orgia. The Orgia certainly seems to have become associated with the celebrations of Cybele as the Great Mother or Mountain Mother in the writings of Strabo or as Euripides makes mention of in his play Bacchae.
As Nurse-Maid – In a story very similar to Dionysus’ being rejected by his mother Hera, it is Cybele, identified as Rhea and Grandmother to Dionysus who takes up the infant to care for him much like she did her own son Zeus. The god Hermes, tells Cybele how Dionysus will become a god later when he’s grown to manhood. Cybele’s priests the Korybantes use their loud drumming and chanting to drown out the cries of the infant in order to prevent Hera’s wrath from finding him to finish what she had started with trying to kill Dionysus when she cast him out. The story of Dionysus’ youth with Cybele continues with him grabbing lions for the Mother Goddess to hitch up to her chariots and later acquiring a lion-drawn chariot of his own.
Atalanta & Hippomenes
These two were turned into lions in myth by either Cybele or Zeus as punishment for having sex with one of their temples. The Greeks believed that lions were not able to mate with other lions. Another version of the story will have Aphrodite turn them into lions when they forgot to give her proper tribute or offerings.
Bee Goddess
Cybele was also especially noted for being a bee goddess.
Mother Of The Mountain – Goddess Of Mountains And Fortresses
As a goddess of mountains, cities and forts, Cybele’s crown was seen to take the form of a city wall, showing her role as a guardian and protector of Anatolian cities.
There is an inscription of “Matar Kubileya” found at a Phrygian rock shrine dating from the 6th century B.C.E. It is often translated to: “Mother of the Mountain.” It is a name that is consistent with Cybele and a number of other tutelary goddess who are all seen as “mother” and connected to a specific Anatolian mountain or other locations. In this sense, Cybele is seen as a goddess born from stone.
Cybele’s connection and association with hawks, lions and the mountainous regions of Anatolia show her role as a mother of the land in its wild, uninhabited state. She holds the power to rule, moderate or soften the unbridled power and ferocity of nature and to reign it in for the use of civilization.
Idaea – Mountain Goddess & Nymph
Cybele is often connected with Mount Ida in Anatolia where there is an ancient site of worship. Idaea is the name of the local mountain goddess or nymph who resided here. Where many goddess get absorbed into each, the name of one deity, Idaea in this case will become an epithet to the more well-known deity.
Goddess Of Nature And Fertility
As an ancient fertility goddess, Cybele’s worship is believed to have covered from Anatolia to Greece during the Archaic period, roughly 800 to 500 B.C.E and then into the Hellenistic era of 300 to 50 B.C.E.
Lions and sometimes leopards were shown to either side of Cybele to depict her strength.
Cybele is typically seen as a guardian and protector over all of a nature and a goddess of unbridled sex.
Along with Artemis, Cybele is seen as the “Great Huntress” and patron goddess and protector of the Amazons.
Magna Mātēr – The Great Mother
The Romans revered and knew Cyble as Magna Mātēr or the Great Mother, Rome’s protector. They also knew her as Magna Mātēr deorum Idaea, the great Idaean mother of the gods. It is a similar title to the Greek title for Cybele of Mētēr Theon Idaia, Mother of the Gods from Mount Ida. In the early 5th century B.C.E., she was known as Kubelē. In Pindar, she was known as “Mistress Cybele the Mother.” Cybele’s worship among the Greeks saw her easily identified and equated with the Minoan-Greek Goddess Rhea and the grain-goddess Demeter.
As Magna Mātēr, Cybele was symbolized by a throne and lions. She held a frame drum. A bowl used for scrying. A burning torch was also used to symbolize her bull-god husband Attis in his resurrection. For some like Lucretius, Magna Mater represented the world order. Her imagery hold overhead represented the Earth, thought to “hang in the air.” As the mother of all, the lions pulling her chariot represent the offspring’s duty of parental obedience. Magna Mater is seen as un-created and separate from and independent of all of her creations.
Under Imperial Rome, Magna Mater represented Imperial order and Rome’s religious authority throughout its empire. Emperor Augustus, like many of Rome’s leading families, claimed Trojan ancestry and a connection to Magna Mater. His spouse, empress Livia was seen as the earthly equivalent and representation of Magna Mater. Statuary of Magna Mater has Livia’s likeness.
While there are not a lot of documents or myths that survive regarding Cybele, it has been suggested that her Phrygian name of Mātēr indicated a role as a mediator between the boundaries of the known and the unknown, the civilized world and the untamed wilds, the living and the dead. The Imperial Magna Mater protected Rome’s cities and its agriculture. Ovid mentions how barren the earth was before Magna Mater’s arrival. The stories and legend of Magna Mater’s arrival to Rome are used to promote and exemplify its principles and Trojan ancestry.
Megalesia – Festival To Magna Mātēr
Also known as the Megalensia or Megalenses Ludi; under the Roman calendar, Cybele’s Spring festival of Megalesia was celebrated from April 4th to April 10th, a period of six days. This festival celebrated Cybele’s arrival in Rome along with the death and resurrection of her consort, Attis. This festival and the whole month of April were celebrated with an air of rejoicing and lavish feasts.
Exactly how the festival was celebrated is uncertain. What is known is that there were many religiously themed plays, games and activities. There are descriptions of mummery, war dancers wielding shields and knives and a lot of drumming and flute playing. As to the games, slaves were not allowed to participate. On the first day of Megalesia, there would be a feast held. These feasts were known for being very lavish and the Roman Senate passed a law limiting the amount that could be spent on these feasts. On April 10th, Cybele’s image would be publicly paraded to the Circus Maximus, chariot races would be held in her honor. A statue dedicated to Magna Mater with her seat on a lion’s back stood at the side of the race track barrier line.
Hilaria – Holy Week
In addition to the Megalesia festival, there is also a week-long festival known as Holy Week that starts from March 15th, also known as the Ides of March. That really gives a new meaning to Shakespeare’s Julius Caesar when he’s told to beware the Ides of March. The entire festival is meant to have an air of celebration for the arrival of Spring and the Vernal Equinox.
The festival itself seems to have been established by Claudius as a means of claiming and honoring Trojan ancestry. As a result, the festival very likely grew and expanded over time as a celebration for the death and resurrection of Attis.
The Reed Entered – Also known as Canna Intrat, from the 15th to the end of the month, there is festival for Cybele and Attis that starts on the 15th or Ides, with Attis’ birth and his being left along the reed bank of the Sangarius river in Phrygia before either shepherds or Cybele find him. People known as Cannophores will carry away the reeds. During this time, there is a nine-day period of abstinence from eating bread, fish, pomegranates, pork, quinces and likely wine. Only milk was allowed to be drunk during this period.
The Tree Enters – Also known as Arbor Intrat, March 22nd marks the date of Attis’ death under a pine tree. It is observed. People known as Dendrophores or “Tree Bearers,” after sacrificing a ram, will cut down a tree and carry it to Magna Mater’s temple for a mourning period of three days.
Tubilustrium – March 23rd, this is an old, archaic holiday for the Roman god Mars. The tree has now been laid to rest in Magna Mater’s temple. Mars’ priest, the Salii will do a traditional beating of their shields accompanied by trumpets and other loud music from the Corybantes. Overall, this is a day of mourning.
The Day of Blood – Also known as Sanguis, Sanguem or Dies Sanguinis March 24th. The rites can only be described as frenzied as mourners and devotees whip or scourge themselves in order to sprinkle the alters and Attis’ effigy with their blood. Some of the rites involve castration and the tree is buried, symbolizing Attis’ placing within his tomb. This day was also to honor Bellona, a war goddess. Her priests were known as the Bellonarii and practiced mutilation along with using hallucinogenic plants.
The Day of Joy – Also known as Hilaria, on the Roman Calendar this marks the Vernal Equinox. It takes place on March 25th and celebrates Attis’ resurrection. It must be noted that is a day of celebration and not the previous mournful tones and rites. I’m also not the only one to have noted a similarity to the Christian association of Jesus’ resurrection.
Day of Rest – Also known as Requietio, March 26th. What can we say? Partying is hard work.
The Washing – Also known as Lavatio, March 27th. This is when Cybele’s sacred stone, the Pessinos’ black meteor is taken from the Palatine temple to the Porta Capena along a stream called Almo. This stream is a tributary to the Tiber river. Here, the stone would be bathed by a priest. The return trip back to the temple would be conducted by torchlight. It’s noted by Ovid as being an innovation by Augustus.
Initium Caiani – March 28th. This particular part of the festival is found on the Calendar of Philocalus. It is likely an initiation ceremony that was held at the Vatican sanctuary for the mysteries of Magna Mater and Attis.
Pine Cones
Pine cones are symbols of Cybele and the related myth of Attis. They are believed to have been worn by Cybele’s priests and followers as one of her symbols. As a protective symbol, a pine cone would be affixed to the top of a pole and placed out in vineyards to protect the crops. Pine cones would also be placed at the entrances to homes, gates and other entrances.
Tympanon
A type of hand drum or tambourine, the tympanon was used by the Greeks to denote worship in a foreign cult or religion. Of the foreign deities the Greek adopted, only Cybele is ever shown holding the tympanon. On the cuirass of Ceasar Augustus’ Prima Porta statue, Cybele’s tympanon is shown lying at the goddess Tellus’ feet.
The Trojan War
Among the Romans, Cybele was rewritten to be a Trojan goddess and thus making her an ancestral goddess through the Trojan prince Aeneas.
The Trojan War was a major and significant war among the Greeks. Many deities got themselves involved. Cybele was one of many such gods to do so. When Prince Aeneas was attacked by Turnus, leading the Rutulians, Cybele prevented Turnus from setting fire to the Trojan fleet by turning all of the ships into nymphs.
Virgil’s Aeneid – As Berecyntian Cybele, she is the mother of Jupiter and the protector of prince Aeneas. Cybele gave the Trojans her sacred tree to use for building their ships. Cybele then pleaded with Jupiter to make the resulting ships indestructible. Aeneas and his men are able to flee Troy, heading for Italy, where Rome would be founded. Once the they arrived in Italy, the ships all turned into sea nymphs or Oceanids.
Zodiac
Yes, you read that correctly. During the early Roman Imperial era, the poet Manilius introduces Cybele into classic Greco-Roman zodiac. It upsets the balance as there’s already twelve zodiac houses represented by a corresponding constellation. Each of which is ruled by a different deity, the Twelve Olympians in Greek and the Di Consentes in Rome. Manilius places Cybele as a co-ruler with Jupiter over Leo the Lion, which is noted for being in direct opposition to Juno who rules Aquarius.
Some modern scholars have taken note of how, as Leo rises over the horizon, that Taurus the Bull sets. Symbolically, this is seen as the lion dominating or defeating the bull. The idea then gets put forth that the celebrations of Megalensia includes this symbolism with lions attacking bulls. As a Spring festival, the date for the celebration of Megalensia is around April 12th when farmers would dig in their vineyards to break up the soil and sow their crops. This would also be when farmers would castrate their cattle and other livestock.
Mesopotamian Connection?
It has been suggested by some scholars that Cybele’s name can be traced to that of Kubaba, a deified queen who ruled during the Kish Dynasty of Sumer. Kubaba was worshipped at Carchemish and would later be Hellenized to the name of Kybebe. Kubaba was also known to the Hittites and Hurrians in the region. There isn’t enough etymological evidence to support this. However the names Kubaba and Matar do seem to have become closely associated. Such as the genital mutilations that are found both within Cybele’s and Kybebe’s cults. Much like many other localized mountain goddesses in Anatolia, who are called “mother” and among many who would become identified with Cybele.
Christianity And The Book Of Revelation
Of interest, is that the author of the Book of Revelations, identified by modern scholars as John of Patmos is likely to have been referring to Cybele when he mentions “the mother of harlots who rides the Beast.”
Christianity – Kept to a nutshell, the early Christians, once Christianity became the state religion of Rome, began to view and regard Cybele’s cult as evil, even demonic. Under Emperor Valentinian II in the 4th century C.E., he officially banned the worship of Cybele and the goddess followers and devotees fell under a lot of hate and persecution. Under the rule of Justinian, objects of worship for Cybele and her temples were destroyed and eventually by the 6th century C.E., Cybele’s cult seems to have vanished.
It has been noted by others how the Basilica of the Vatican is apparently the same exact spot for where Cybele’s Temple once stood and that Christians celebrate the death and resurrection of Jesus Christ in the same place where Attis was once worshiped. Some will even go so far as to suggest that revering the Virgin Mary is merely another aspect of worshiping Cybele and many other ancient Mother Goddesses.
Montanism – Christianity – Also known as New Prophecy – Now I do find it fascinating that around 100 C.E. a former Galli priest of Cybele by the name of Montanus formed a Christian sect that worked to oppose Pauline Christianity.
In Pauline Christianity, those who followed the teachings of the Apostle Paul, it held a major influence into the formation of Christianity in terms of scriptural interpretations, cannon and dogma.
Montanus’ sect was considered very heretical to the Catholic Church and would eventually see all of its followers excommunicated.
In brief, Montanus believed himself to be a prophet of god and that women could also be bishops and presbyters. Where much of early Christian theology diminished the power and presence of women within religion, Montanus’ sought to keep it.
It’s also interesting to note a rather prominent example of a Pagan religion that Christianity and former followers of other religions attempting to adopt and add in their beliefs. Like Montanus equating Jesus with Attis and the celebrating of Easter with the resurrection of Jesus during Holy Week, the days between Good Friday and Easter is also the same period that Hilaria, observing and celebrating Attis’ resurrection was held.
Very interesting…
Rhea – Greek Goddess
Just as Cybele is the Great Mother of the Roman Pantheon, Rhea, her Grecian counterpart is the Great Mother of the Greek Pantheon of Gods. Thanks greatly to the influence of the Romans, many people will identify and equate Cybele with Rhea.
The Romans were famous for subsuming many deities in their conquest across Europe, particularly the Mediterranean area, and identifying their gods with those of a conquered culture. The most famous being the Greeks, where many deities were renamed to those of Roman gods. Prominent examples like Zeus and Jupiter, Hera and Juno, Ares and Mars and so on down the line.
With the Hellenization of Latin literature, many Greek writers and even Roman writers rewrote and intertwined the myths of these two deities so that would virtually become one and the same. As the centuries have passed, the tradition of accepting both of these goddesses as one and the same has become generally accepted. Just that there are still some differences that separate the two.
Rhea’s best known story is with the birth of the Olympian gods. Cronus fearing that a son of his would kill him and take over, devoured all of his children as they were born. Rhea managed to rescue her youngest son, Zeus by tricking Cronus into swallowing a rock. She hid Zeus in the Dictean Cave in Crete. Zeus, after growing up, succeeded at overthrowing Cronus and rescuing his siblings.
Like Cybele, Rhea can help in easing the pain of childbirth and soothe the pain and difficulties that come with menstruation.
Demeter – Greek Goddess
The Greeks are who make the connection and equate Cybele with Demeter and Rhea, seeing in her a Mother Goddess. While Cybele does have her origins in Phrygian worship, when the Greeks encountered her, they just saw another deity like their own, just under a different name. Yes, all three are a Mother Goddess and Goddess of the Earth, you can see why the Greeks would equate all three together.
The Romans are clearer in acknowledging more clearly the genealogy of the Greek pantheon and equating Cybele whom they readily adopted as their own with Rhea and then equating Demeter with Ceres, a Roman Harvest goddess.
Antaea – This name and epitaph is one that is applied equally to Cybele, Demeter and Rhea by the Greeks. The meaning of the name is unclear, though it does denote a name for a goddess whom people could approach in prayer.
Idaea
Other names: Ida, Idaia
Pronunciation: /ɪˈdiːə/ or /aɪˈdiːə/
Etymology – Ida (Greek) “Wooded Mountain”
Idaea is either the name of several different mountain nymphs or an epithet of the goddess Cybele in Greek mythology. Most of the stories about all of these different nymphs named Idaea tend to be foundation myths linking the start or beginning of different tribes and their corresponding kingdoms with older, local beliefs and traditions before the Hellenic era of Greek history.
Epithet Of Cybele
As an epithet, the name Idaea refers to Cybele’s connection to Mount Ida within Asia Minor where there was an ancient site of worship.
Mount Idaea
The Homeric Hymns describe Mount Ida or Idaeas as a “shadowy mountain” with “lofty peaks where many fountains flow.” The mountain nymph who resided here was described as the mother of beasts.
There are two mountain nymphs of the same name who lived on Mount Idaea or Ida.
Cretan Nymph –
The first nymph lived on the highest mountain or elevation in Crete. Nowadays, this mountain is known as Mount Psiloritis.
In the mythological stories from Crete, Idaea was the daughter of Corybas, a priest of the goddess Cybele, who was worshiped as fertility god and the progenitor of the Corybantes. The Corybantes were a group of mountain gods or daimons from Asia Minor and whom, in Crete, are associated with the Curetes.
Another version of the stories state that Idaea was the wife of Lycastos, the son of King Minos and the nymph Itone who would later become s Minos’ successor to the throne. Sometimes this lineage is reversed and Idaea and Lycastos are the parents of Minos.
Other variations of the stories place Idaea and Zeus as the parents of Cres, the father of the Cretan tribe.
The Birthplace Of Zeus – The Idaean Cave found in Crete below the summit of Mount Ida is known as the birthplace for the infant god Zeus. Ida and her sister Adrasteia took care of the infant as his nannies and wet-nurses, guarding him until he was old enough.
Lover’s Tryst – The ancient Hesiod tells of a love story between the goddess Demeter and the hero Jason of Argonaut fame meeting on the mountain side of Mount Ida.
Phrygian Nymph –
The second nymph lived on the Mount Ida found within ancient Phrygia near the city of Troy found in Troad. In modern times, this place is located in the north-western region of Turkey. Mount Ida is now known in modern times as Mount Kaz Gagi.
The Phrygian Idaea was known as the Idean Mother, a Mother Goddess. In these stories she is noted as being the daughter of the river god Scamander. In addition, Idaea is the mother of the first king of Troy, Teucer.
Scamander – Another version places Idaea as being a river-nymph or mountain nymph. When Scamander jumps into the river Xanthus, she becomes his wife or mate and through that connection, Teucer’s mother. In either event, Teucer is the forefather to the kings of Troy and Dardania.
Zeus And Mount Ida – In Homer’s writings, Zeus lived on Mount Ida and whenever a storm gathered, the other gods and goddess would often be in attendance.
Dardanus – Zeus And Electra had an affair in which Dardanus was born. When sailing away during the Flood from his home island of Samothrace to Phrygia, Dardanus married the daughter of King Teucros. Dardanus goes on to become the founder of Dardania within the region of Troad.
Scythian Princess – There is, in this lineage with Dardanus, an Idaea who is the great-granddaughter of Bateia and Dardanus and who is also the second wife of Phineus. With Phineus, she is the mother of Mariandynus and Thynius
As the second wife of Phineus, Idaea accused her stepsons of rape. As a result, Phineus had them blinded. Later, when Phineus is killed, Idaea returned to her people and her father, Dardanus killed Idaea for the way she had treated her stepsons.
Ganymede – In the story of Ganymede, it is on Mount Ida that Zeus comes in the form of an eagle or sends one to abduct the youth to Mount Olympus.
Paris – In the stories from the Trojan War, Paris lived in exile on this sacred mountain as a shepherd. He had been left there by Priam to die of exposure after an ill-boding prophecy told of Paris’ part in the story of Troy. Obviously Paris lived and would return.
Other stories involving Paris during his time on Mount Ida have the goddesses Hera and Aphrodite coming to have him decides which of the goddesses was the most beautiful.
Pleiades Part 1
Etymology – “Daughters of Pleïone,” plein “to sail,” pleos “full” or “many” in plural, peleiades “flock of doves”
Also known as: The Seven Sisters, Vergilia, Vergiliae, Ladies of Plenty
In Greek mythology, the Pleiades are a group of seven sisters who are the daughters of Atlas and the sea-nymph Pleione, a protector of sailors. A slight variation to this is that instead of Pleione as the mother of the Pleiades, it is the sea-nymph Aethra or Erechtheus who is their mother.
They were born on Mount Cyllene. As the daughters of Atlas, they are also the half-sisters to the Hyades. Like the Hyades, their brother is Hyas. Other accounts will place Calypso and the Hesperides as their sisters too.
The Pleiades are also some of the many nymphs associated with the goddess Artemis. With their sisters the Hyades, they were also called the Atlantides, Dodonides and Nysiades. Depending on the stories referenced, they served with the Hyades as nursemaids and teachers to a young Dionysus.
The Pleiades star cluster is known throughout the world and many cultures revere and refer to these stars in a number of different cultural mythologies and astronomies. Only those cultures and people located far to the south on the Earth seem to have no significant mythologies or astronomy related to this star cluster.
Western Astronomy
In astronomy, the Pleiades are known as the Seven Sisters or Messier 45 and are one of two star clusters or asterisms found within the Taurus constellation. The Pleiades is sometimes, erroneously referred to as the Maia Nebula. It is believed that only six of the seven stars can be seen without the aid of a telescope. The star that isn’t visible is Merope, who hides her shame at having married a mortal, Sisyphus, the king of Corinth. Latin author Hyginus has suggested that this star is likely Electra mourning the loss of her son Dardanus.
For many ancient people and cultures around the world, the appearance of the Pleiades often marks important or significant annual events for changes of the seasons or agriculture.
Famed astronomer, Galileo Galilei is considered the first astronomer to use a telescope when observing the Pleiades. He’s thus the first to discover that this asterism contains numerous stars that are too dim to be seen with the naked eye. Galileo’s book Sidereus Nuncius has a sketch of the Pleiades showing 36 stars. The use and aid of telescopes has shown that there are as many as 500 stars within the Pleiades star cluster.
People with exceptional eyesight have been known to see more stars within Pleiades than the seven of Greek legend. Some claim to have seen as many as 20 stars. Maestlin, who tutored Kepler is to have mapped out 11 stars within the Pleiades before the advent of the telescopes.
From the Earth’s perspective, the Pleiades appear to be within the Taurus constellation. In the Northern Hemisphere, the best times to view this star cluster is in September, November and January. For many cultures located in the Northern Hemisphere, the month corresponding to November is often seen as the month for the Pleiades it is at this time the asterism can be seen rising from dusk and setting at dawn.
Brown Dwarfs
Over the last few years, astronomers have been learning more and more about the Pleiades star cluster. Not just in the high number of stars that make up this asterism, but the discovery of stars known as brown dwarfs. Brown dwarfs are small stars that may have started off like other stars, they lack having enough mass to create enough of a temperature and pressure to burn. After a brown dwarf’s initial creation, it may flicker or give off a small amount of light due to small quantities of deuterium burning. Most brown dwarfs are about the size of Jupiter and have about 10 to 80 times its mass. Eventually, a brown dwarf will fade and whatever core temperature and light it did have is gone, making brown dwarfs hard to find.
Etymology
The meaning for the word Pleiades has numerous different meanings. It is typically thought the Pleiades are named for their mother Pleione in Greek mythology. There’s a good deal of uncertainty as other words suggested are: plein, “to sail” and then there is pleos, “full, many” and lastly, peleiades, “flock of doves.”
Now days, the word Pleiades has generally taken on the meaning of “multitude.” It has inspired the name for a French literary movement called La Pléiade. There is also an earlier group of Alexandrian poets, known as the Alexandrian Pleiad.
Sisters In Myth, But Not In Astronomy
Nine of the brightest stars in the Pleiades are named for the seven sisters of Greek mythology and their parents Atlas and Pleione. While in Greek legends the Hyades and Pleiades are half-sisters, when it comes to astronomy, the two star clusters aren’t related at all.
While there are seven sisters and stars mentioned in the classical Greek mythology, the Pleiades are composed of hundreds of stars. In 1767 C.E., the Reverend John Michell calculated that the probability of such a seeming random chance alignment of so many stars to be 1 in 500,000. Since then, astronomers have found that the Pleiades star cluster is composed of hot blue-white suns, placing the age of this cluster to be some 100 million years old. The Hyades star cluster is composed of cooler red giant and white dwarf stars that place this cluster being far older at over 700 million years old.
Despite the myth of the Pleiades fleeing from Orion’s unwanted advances, this star cluster is slowly moving towards the stars that make up the feet of the Orion constellation. This will actually take about 250 million years.
The Seven Sisters
In regards to Greek mythology, the stars of the Pleiades represent a group of seven sisters, all of whom are daughters of the titan Atlas and the Oceanid Pleïone.
All seven sisters had love affairs with different prominent Olympian gods with the exception of Merope who was punished for loving a mortal. For this reason, Merope doesn’t shine as brightly as the other stars as she is thought to be concealing her shame.
Their names are given as follows:
Alcyone – Also called Halcyone, “queen who wards of evil [storms]” or “strong helper”. By Poseidon, she is the mother of Anthas, Aethusa, Hyperenor and Hyrieus.
Asterope – Also spelled Sterope, “lightning,” “twinkling,” “sun-face,” “stubborn-face,” “star-faced” or “flashing-face.” By Ares, she is the mother of Oenomaus, the king of Pisa. Other stories place Oenomaus as her husband.
Celaeno – Also spelled Celæno, “swarthy,” “black” or “dark.” By Poseidon, she is the mother of Eurypylus and Lycus. A different account says that by Prometheus, she is the mother Lycus and Chimærus.
Electra – Also called Eleckra, “amber,” “shining,” “bright.” By Zeus, she is the mother of Dardanus, the founder of Troy. Some accounts place Electra as the mother of Iasion with Zeus as the father. She is called Atlantis by Ovid. According to Thaumas, this Electra may be the mother of the Harpies.
Maia – “grandmother,” “mother,” “nurse,” “the great one” or “good nursing mother.” The oldest of the Pleiades, by Zeus, she is the mother of Hermes.
Merope – “eloquent,” “bee-eater,” “mortal” or “sparkling-face.” The youngest of the Pleiades, she was wooed by Orion. In other retellings of her story, she marries the mortal Sisyphus and thus becomes mortal herself and eventually she fades away or dies. With Sisyphus, Merope had several sons: Glaucus, Ornytion and Sinon. She is sometimes said to be the mother of Daedalus, Alcippe and Iphinoe.
Taygete – Also spelled Taigete, “long-necked” or “of Mount Taygetus.” By Zeus she is the mother of Lacedaemon, the founder of Sparta. By this, she is an important goddess.
The Lost Pleiades
The Greek myths tell of the loss of one of the Pleiades, Merope who is said to be hiding her face in shame as she married a mortal, leaving only six stars that can be seen. Sometimes the missing Pleiades is Electra who is hiding her face at the destruction of Troy. She reappears afterwards as a comet and as a result, the passing of comets in the heavens came to be associated with impending doom or disaster. Other times it is Celaeno, who was struck by lightning.
The story of a missing Pleiad also appears in other cultures such as African, Asian, Australian, European, Hindu, Indonesian, Jewish, Mongolian and Native American mythology. The star Celaeno is currently the dimmest star. However the star, Asterope is actually two stars, both of which are dimmer than Celaeno. There does seem to be a basis for this part of the legends as astronomical evidence clearly points to a once visible star within the Pleiades cluster that has since become extinct by the end of second millennium B.C.E.
Hathor
Pronunciation: hăth`ôr
Etymology: “House of Horus (the Elder)”
Hathor is a Pre-Dynastic goddess who was very well known and like many of the Egyptian deities, she is still known by many in modern times. Hathor’s name may be a reference to her domain as a sky goddess and being the Celestial Cow and where too, the god Horus held his domain as well. Where Horus represented the living king, Hathor represented the living queen.
Other Names and Epithets: Athor, Athyr, Hat-Her, Hethert, Het-Hert (House or Womb Above), Het-Heru, Hwt-Hert, Hethara, Hetheru
Hathor is a goddess who is known by many titles. The first of her titles is: “the Great One of Many Names”
An example of a good many of her names and more properly, titles are:
“Lady to the Limit”, “Lady of Heaven”, “The One Who Shines as Gold”, “The Gold that is Hathor”, “Lady of the West”, “Divine (or Celestial) Cow”, “Mistress of Heaven”, “Lady of Gold”, “Lady of Greenstone and Malachite”, “Lady of Lapis-Lazuli”, “Mistress of Life”, “the Great Wild Cow”, “the Golden One”, “the Mistress of Turquoise”, “Lady of Iunet” (Dendera), “Lady Of Denderah”, “Mistress of Qis”, “Lady of Punt”, “the Powerful One”, “Lady of the Southern Sycamore”, “Lady of the Turquoise”, “the Mistress of Turquoise”, “Mother of Mothers”, “The Celestial Nurse”, “Lady of Drunkenness”, “the Eye of Ra”, “Lady of Amenity”, “the Dweller in the Great Land”, “Lady of Ta-Tchesert”, “the Dweller in his breast”, “Lady of the Vulva”, “the Beautiful Face in the Boat of Millions of Years”, “the Seat of Peace of the doer of truth”, “Dweller in the Boat of the favored ones”, “Lady of Stars”, “Sovereign of Stars”, “Hand of God”, “Great Menat”, “Mistress of the Desert”, “Sovereign of Imaau”, “Queen of Heaven”, “Mistress of Heaven”, “the Gentle Cow of Heaven”, “Lady of the House of Jubilation”, “The One Who Fills the Sanctuary with Joy”
`
Hathor’s roles have been many for the many millennia that she has been known and worshipped. Beyond being one of two of Egypt’s Cow Goddesses, Hathor has been known as a Sky Goddess, a Sun Goddess, a Moon Goddess, the Goddess of the East, and the Goddess of the West, Goddess of Moisture and Fertility, Agriculture, Motherhood, Goddess of the Cycle, Goddess of the Underworld, Mistress of the Necropolis, Goddess of the Dead, Goddess of Love and Beauty, Goddess of Music, Song, Dance, Drinking and Joy. She has been known as the patron Goddess of Women and Marriage.
Attributes
Animal: Cow, Cobra, Falcon, Hippopotamus, Lioness, Snake
Colors: Red, Turquoise
Element: Air
Festivals: Aug 7th (New Years), Sept 17th, Festival of Het Heret – November 2nd
Gemstones: Emerald, Malachite, Lapis-Lazuli, Turquoise
Metal: Copper
Month: Third Month by the Egyptian Calendar, Hethara (as the Greeks called it) or Athyr. From September 17th to October 16th. This was the month of Inundation when the Nile River would flood.
Patron of: Sun, Universe, Children, Mothers, Miners, Musicians, Pharaohs
Planet: Sun and Moon
Plant: Myrtle, Rose, Sycamore
Sphere of Influence: Arts, Astrology, Beauty; Children, Childbirth, Dance, Family, Femininity, Fertility, Flowers, Foreign Lands, Joy, Love, Mining, Moisture, Moon, Motherhood, Music, Prosperity, Pregnancy, Sexuality, Sky, Song
Symbols: Cow, Cosmetics, Horns-and-Sundisk Headdress, Menat (a type of ritual necklace possibly used for percussive music), Mirrors; Sandalwood and Rose Incense; Sistrum (a type of rattle), Papyrus Reed
Egyptian Depictions
Early depictions of this goddess show her as being a cow with a sun disk between her horns or as a woman wearing the horns-and-sun disk headdress that may or may not have a symbol known as the uraeus on it. Sometimes when Hathor is shown as a cow, she is covered in stars. When depicting Hathor’s role as a fertility goddess and her powers of procreation, she is shown suckling a child.
An early depiction of Hathor and identifying her as a cow is likely from what is known as the Narmer Palette. And it seems Hathor absorbed and took over many of the roles as a fertility goddess from another cow goddess, Bat.
Sometimes Hathor would be shown as a hippopotamus, a falcon, cobra, goose, cat, malachite, sycamore fig or even as a lioness. These forms aren’t as common to Hathor as her more familiar shape of a woman or a cow.
When Hathor is shown as a cow, she is seen having beautifully painted eyes and is frequently a red color, the color of passion. Hathor, along with the dwarf god Bes are the only known Egyptian gods shown in portrait rather than in profile.
The depictions showing Hathor as a woman with a cow’s head are more common of later periods. Also more common to later periods is Hathor being shown with a twin set of feathers and a menat necklace. A number of ancient mirrors and sistras have been found showing a smiling, nude Hathor on them over the years. Hathor’s image of a woman with cow ears is often found on the top of stone columns in Egyptian temples.
Primordial Goddess
An ancient Goddess and one of the main gods of Egypt, Hathor was worshipped for well over 3,000 years and during that time, she has taken on many personas and aspects. She is the Celestial Cow, the protector of women, the Queen of Egypt, a Goddess of Love, Children, Pregnancy, Dancing, Singing and Poetry.
Fluid Theology
The Egyptians were very fluid in their theology and how the gods were depicted. Different deities were known to merge for a specific reason or to emerge and split away, becoming their own entity. Given the thousands of years the Egyptian Dynasties lasted, its not surprising in many ways for the myths to be fluid and change with the times. It was no problem for the Egyptians who saw such myths as complimentary and not contradictory.
At different points in the continuing development of Egyptian mythology, Hathor has been equated and associated with a good many other Goddesses who are sometimes, if not often seen as just being different aspects of the same Goddess. Hathor has also been shown to be the mother, daughter and wife of Ra and to have later seen many of her roles taken over by Isis who becomes the mother of Horus.
Some of the Goddesses are: Sekhmet, Bastet, Beb and Isis.
Bastet – As the goddess Bastet, Hathor is seen to be more gentle and loving. Particularly when compared to the more harsher image of Sekhmet. Where Bast represented Lower Egypt, Hathor represented Upper Egypt.
Bat – Another primordial, pre-Dynastic cow goddess of fertility. Hathor seems to have absorbed the aspects and roles that this Goddess once held. Bat has also been linked to the Ba, an aspect of the soul and Hathor seems to have gained her associations as a Death Goddess from this connection. The sistrum, a rattle that was once a symbol of Bat also became one of Hathor’s symbols.
Hesat – She was seen as a manifestation of Hathor in earthly form. Like Hathor, Hesat is also regarded as the wife of Ra. As an earthly cow-goddess, milk was said to be the beer of Hesat and part of her link to Hathor. Hesat was also known as the wet-nurse to the gods.
Isis – In the later periods of Egyptian religion, most of Hathor’s roles and aspect have been picked up and taken over by the goddess Isis. As Isis, some two thousand years after Hathor’s first appearances, now has Hathor’s headdress and sistrum symbol. There can often be confusion as to which goddess is meant to be shown. The difference though is that when Isis is shown with horns, she is also wearing the vulture headdress that is typical of another goddess Mut or she is wearing a multi-colored feathered dress.
Mehet-Weret – Her name means “Great Flood.” She seems to be another primordial cow goddess like Hathor and Bat. Hathor absorbed many of her myths, particularly from the creation story of being the mother of Ra, carrying him between her horns.
Nebethetepet – Her name means “Mistress of the Offering.” She was a manifestation of Hathor at Heliopolis where she was associated with the Sun-God Atum.
Saosis – A goddess who is often identified with Hathor. Her symbol was the acacia tree in which death and life were enclosed.
Sekhmet – A rather dark and fierce goddess of justice. This is a harsher side of Hathor that is usually tempered by the gentler image of Bastet.
Tefnut – A primal lioness goddess, she and Hathor share a similar story where they become estranged from Ra and wander off towards Nubia.
Theological Takeover!
As previously mentioned with the goddess Isis, some two thousand years after Hathor’s first appearances, the goddess Isis began to appear and assume many of the roles and functions that Hathor once held. Where Hathor was once considered the mother of Horus, Isis took over this role along with being the mother of the Pharaohs.
Greek & Roman Connection!
It wasn’t uncommon for the Greeks and Romans to equate many of their deities with those of other cultures. The Romans especially did it to any that they conquered. In the case of Egypt and their gods, Hathor in her role as a goddess of love is synonymous with the Greek Aphrodite, the Roman Venus. Another goddess is Hera in her role as a cow and cattle goddess.
Cults Of Hathor
Being an ancient, primordial deity, Hathor was worshipped in a good many Egyptian cities. Hathor was a patron of the cities of Iunet and Itjtawy. Temples could be found for her everywhere. The earliest temples and images for Hathor have been found drawn on rocks near Naqada and the Girez settlement. Both of these sites are located in the southern part of Upper Egypt and date back to the Predynastic era of about 4,000 B.C.E. Give or take a few years, this places Hathor around 6,000 years old.
Hathor’s cult thrived in Ta-Netjer (“Land of God”), modern day Dendera in Upper Egypt. Here she was worshipped as “Mistress of Dendra.” Dendra was also Hathor’s main temple, also known as the “Place of Intoxication.” So popular was Hathor’s worship that at one point her Dendera temple had as many as sixty-one priestesses. Hathor’s priests were both men and women, many of whom were capable dancers, musicians and singers. Priests of Hathor were also known for being oracles and midwives. It wasn’t unusual for people to go to her temples to have their dreams interpreted. The temple at Dendera along with the Temple of Deir el-Bahri clearly shows an indication of Hathor as a Sun Goddess. The temple of Dendera was also where Hathor’s cult was primarily found.
In the temple of Nefertari, found in Abu Simbel, Queen Nefertari is frequently shown as the goddess Hathor in many places. And Ramses II is shown in one sanctuary receiving milk from Hathor in her cow form. Not surprising as many of the Pharaohs of Ancient Egypt saw themselves as living gods.
Other temple sites dedicated to Hathor have been found in Deir el-Medina, West Bank, Luxor, another at Philae Island, Aswan, Timna valley, Israel, Inerty (Gebelein), Iunet (Dendera), Qis (Qusiya), Tpyhwt (Atfih), Mennefer (Hikuptah, Memphis) and Iunu (On/Heliopolis). As Hathor-Sekhmet, she was the main goddess of Yamu (Kom el-Hisn).
Canaan
Hathor had been worshipped in this land during the eleventh century B.C.E. as at this time, it was under Egyptian rule. Her holy city of Hazor or Tel Hazor was destroyed by Joshua as mentioned in the Jewish Torah or Christian’s Old Testament in Joshua 11:13, 21.
Other Lands
There were a good many places where Hathor was worshiped, not just Egypt and Nubia. Her worshippers could be found throughout all of Semitic West Asia, Ethiopia, Somalia and Libya, especially in the city of Byblos.
Narmer Palette
One thought for why Hathor’s worship is so widespread, even during the Predynastic Era is that she appears on the Narmer palette. Many scholars have put forward that idea that the goddess depicted isn’t Hathor, but another cow goddess named Bat or even possibly Narmer themselves.
The Five Gifts of Hathor – Initiation Into Hathor’s Cult
For those wishing entrance into Hathor’s cult, they would under go a ritual of initiation. This initiation ritual was known as “The Five Gifts of Hathor.” An initiate would be asked to name off the five things they were grateful for while looking at the digits of their left hand.
The idea is that the poor of Egypt who didn’t own their own lands, but would work for others in their fields would always be able to see their left hand while working. It was always visible to them as they reached out for the strands of grain to harvest and then cut the sheaths with the blade being held in their right hand.
With the naming of the five things a person was grateful for and identifying them with the fingers of their left hand, a person was always reminded of the good things in life and kept them the sins of ingratitude. Ingratitude was a sin that Egypts viewed as leading towards many others.
For the rich and more prosperous of Egypt, the Five Gifts were a way to keep them from envying others and what they had so that they could stay humble before the gods.
Parentage and Family
Parents
Hathor is said to be the daughter of the goddess Nut and the god Ra (or Re).
Given how fluid Egyptian mythology can be and the varying, ever changing roles that the gods played over the millennia and as one dynasty gave way to another, there are some accounts where Hathor is the Mother of Ra. Another account will place her as the Daughter of Ra.
This seems better understood when taking note of another primordial cow goddess, Mht wr who was the mother of Ra. Hathor took over her role and place in the creation story. Another explanation has been given that when Hathor is seen as the Daughter of Ra, it is when she is seen as part of the greater whole of the stars of heaven. The stars were known as the “Children of Ra.”
Consorts
It’s thought that in Pre-Dynastic times and certainly Early Dynastic Egypt, Hathor was the consort to the “Bull of Amenti,” who had originally been the deity of the Necropolis.
In Hermopolis, Thoth is considered the husband of Hathor, with him; she is the mother to Ra-Horakhty, one of many composite deities in Egypti. This could be due to Hathor at one point absorbing the role and aspects of Seshat, the goddess of Reading, Writing, Arithmetic and Architecture who is also Thoth’s wife.
When the gods Ra and Amun merged in Egyptian mythology, Hathor becomes seen as the wife of the god Sobek, an aspect of Amen-Ra.
Hathor is more famously known to be the wife of Horus the Elder.
Siblings
The siblings of Hathor are considered to be: Sekhmet, Bast, Ptah, Shu, Tefnut, Thoth and Serqet
Children
With Horus (the Elder), Hathor is the mother of Ihy (or Ahy), a falcon-headed god who like his mother, becomes a god of music and dancing. He is also shown as carrying a sistrum as well.
Some slight confusion is another child of Hathor and Horus (the Elder) in his aspect as Horus- Behdety is Harsomptus or Hor-sema-tawy (Horus Uniter of the Two Lands).
Sometimes, Ihy is listed as being one and the same as Hor-sema-tawy.
Other children of Hathor are: Imsety, Hapi, Duamutef and Qebehsenuef.
And with Hathor’s divine role as Mother of the Gods, she can claim all of the Egyptian gods as her children, including Ra who is both her father and son.
The Mother Of The Egyptian Pharaoh And Horus
The name Horus is a bit tricky as there is more than one god named Horus. This makes better sense when it is understood and known that Hathor was often considered the mother of the Egyptian pharaoh, who would stylize themselves as the “son of Hathor.”
Many of the Pharaohs would take on the name of Horus as an honorific at death. Plus the Egyptian Pharaohs also saw themselves as living gods who would become deified on death, reborn again when the next Pharaoh took the throne.
And what about the goddess Isis being the mother of Horus? It should be noted that yes, but this is Horus the Younger, a different Horus. There were a lot of deities named Horus, nearly as many as there were Pharaohs. Given that the Pharoahs of Egypt believed themselves to be a living god, that’s not surprising.
Mother Of Mothers And The Celestial Nurse
Hathor’s protection was invoked over children and pregnant women.
Seven Hathors!
In addition to the above information about Hathor’s role as a midwife and protector of children, anytime a child was born in Egypt, it was believed that seven Hathors would appear as seven young women wearing cow horns and playing tambourines. They spoke with one voice, determining a child’s fate in life even to the hour of his or her death, much like the European Fairy Godmother and the three Fates found in Greek, Roman and even Norse mythology.
The Seven Hathors held an extremely great power of being able to alter destinies. They could replace a prince should he have been born with bad fortune with a child who was born with good fortune. The Seven Hathors’ responsibility was to protect the Dynasty and Nation of Egypt. For it was believed among the Egyptians that a person’s destiny and fortune would follow them throughout their life with not ability to change it.
The Seven Hathors seem to be connected to divination and to be the questioners to those souls headed to the after life in the Land of the West.
As goddesses in their own right, the Hathors were worshipped in seven cities. These are: Waset (Thebes), Iunu (On, Heliopolis), Aphroditopolis, Sinai, Momemphis, Herakleopolis, and Keset.
Additionally, found both within the tomb of Nefertari and in the Book of the Dead, these seven Hathors had their own names as follows:
• Lady of the Universe
• Sky-Storm
• You from the Land of Silence
• You from Khemmis
• Red-Hair
• Bright Red
• Your name flourishes through Skill
Other alternatives names for the Seven Hathors have also been found on papyri. Some of these are:
• Lady of the House of Jubilation
• Mistress of the West
• Mistress of the East
• Ladies of the Sacred Land
During the Ptolemaic Period, when Egypt fell under Greek rule, the Seven Hathors became identified with the Pleiades star cluster.
Hand Of God – The Sistrum
Music was very important in the worship of Hathor who is sometimes shown carrying a sistrum, a type of rattle. This was an ancient musical instrument played by her priests and priestesses. The sistrum often had the face of Hathor on the handle at the joining part. There is thought to be sexual overtones connected with this instrument, particularly for fertility. Hathor’s titles of “Hand of God” and “Lady of the Vulva” seem to be connections to the design of the sistrum and her role in fertility.
Great Menat
The menat is another musical instrument sacred to Hathor. At first glance it looks like a necklace with a special counterweight. This counterweight piece is thought to be similar to fertility dolls found in ancient tombs which in this respect, represented wombs. The menat as an instrument would be held in the hands and rattled to make noise.
Both the Menat and Sistrum connect Hathor as a Goddess of Song and Dance. The ancient Egyptians believed that it is Hathor who first taught mankind how to sing and dance using her sacred instruments. The menat is also important as a symbol of rebirth.
There is a hymn to Hathor that goes:
“Thou art the Mistress of Jubilation, the Queen of the Dance, the Mistress of Music, the Queen of the Harp Playing, the Lady of the Choral Dance, the Queen of Wreath Weaving, the Mistress of Inebriety Without End.”
The Goddess Of Joy
Hathor was very popular among the ancient Egyptians. She was greatly revered by women in her role as wife, mother and lover. This led to a couple of Hathor’s titles as “Lady of the House of Jubilation” and “The One Who Fills the Sanctuary with Joy.”
Such was Hathor’s popularity that there were a lot more festivals dedicated in her honor than any other Egyptian god. Plus a good many children were named after Hathor than any other god. As previously mentioned, both women and men could be priestess of Hathor and not one gender or the other.
The Goddess Of Beauty
In addition to being a goddess of Love and Joy, Hathor was also the goddess of beauty and a patron of the cosmetic arts. As has been previously mentioned, many ancient mirrors showing a smiling, nude Hathor have been found over the years. In addition to Hathor’s image on mirrors, her likeness has been found too on cosmetic palettes. A traditional votive offering was two mirrors.
It must be remembered and noted that this did not mean or make Hathor vain and shallow. This beauty was a mark of Hathor’s own confidence.
Hathor was also closely connected to the fragrance of myrrh incense, which has a long history of being very precious and in ancient Egypt, it embodied all of the finer qualities of a woman. The Egyptians also used ground malachite in their eye makeup which they believed to have a protective property against eye infections.
Hathor’s Mirror
It must be noted that ancient Egyptian mirrors were made of flat oval copper or bronze that has been polished with a wooden or possibly bone handle. This handle was often enough shaped into the form of the goddess Hathor. It is thought the shape of the mirror represents the Sun Disc symbol of Hathor’s.
Goddess of Moisture And Fertility
Aside from Motherhood and Children, Hathor also ensured the fertility of the land and enough water or moisture from the annual flooding of the Nile for Farmers to grow their crops. In addition to this, Hathor represented the erotic aspects of femininity and procreation. As a fertility goddess, Hathor represents the creative abilities found in all of nature.
As a Vegetation or Fertility Goddess, Hathor was seen as both a giver and taker of life. When spring arrived, the land became fertile, only be destroyed later by the harsh summer sun as the seasons changed.
Hathor’s connection to the annual flooding of the Nile River was also connected to women’s pregnancies with the breaking of the amniotic sac and that she would be about ready to go into labor soon.
Lady Of Greenstone And Malachite – Goddess of Mines
Along with the titles “Lady of Lapis-Lazuli” and “the Mistress of Turquoise”, Hathor represented the very edges of the desert where mines for these gemstones were found at.
There is a major temple site found in Edomite Seir, Timna for Hathor where copper was mined. This temple was constructed by Seti II. Other mining places are Serabit el-Khadim found on the south-west Sinai Peninsula where a lot of turquoise was mined. Archaeologists have uncovered the remains of mining camps and a Temple of Hathor in this place.
Lady Of The West
In Thebes, Hathor was seen as the Goddess of the Dead with her title of “Lady of the West.” This title is associated with the sun god Ra and his descent into the Underworld when the sun sets on the western horizon.
Hathor’s image is sometimes found on funerary scenes where she is shown standing behind Osiris, welcoming the dead to their new home. Hathor’s image has also been depicted as a cow suckling the souls of the dead. It is thought that Hathor did this so souls could survive while their bodies were being mummified and make their journey to the Judgment Hall where their hearts would be weighed. Hathor could also be depicted in her cow form surround by tall papyrus reeds. In these images, she would be shown wearing a menat necklace, symbolizing rebirth.
Hathor’s image often appears on sarcophagi with Nut. Hathor appears on the tops of lids and Nut will be found under a lid.
In the cult of Osiris, the morally worthy were promised eternal life. At first, both men and women would become Osiris. By the time of the early Romans, women were identified with Hathor and men with Osiris.
Lady Of The Southern Sycamore
Continuing Hathor’s connection as a Goddess of the Dead, the sycamore tree was sacred to Hathor as she would give water to the dead from the branches of this tree and offer them food. The Sycamore was important as trees were not a common site in ancient Egypt and the shade provided by trees offered much needed protection and relief from the heat of the sun.
Other myths have Amentet, a daughter of Hathor as being the one who handed out water to the dead under a Sycamore tree.
One myth has Hathor using milk from a Sycamore tree to restore Horus’ eyesight as he had been blinded by Set.
Lady Of Stars And Sovereign Of Stars
A celestial goddess, Hathor symbolizes not just the Sun, but the Moon and stars, the entirety of the heavens and creation.
As the divine, celestial cow, Hathor along with another goddess Nut, represented the Milky Way during the third millennium B.C.E. when the both the Autumn and Spring equinoxes appeared to occur at the same spot on the Earth as the sun rose or set. The four legs of Hathor represented the pillars holding up the heavens over the earth.
It must be noted, that the ancient Egyptians viewed the Milky Way as a waterway across the heavens that the sun and moon gods sailed upon each day. They called it The Nile in the Sky. As a result of this and the name mehturt, Hathor was seen as responsible for the annual flooding of the Nile. Other interpretations or later myths will place Wadjet, a snake god as presenting the Milky Way and The Nile in the Sky.
One star in particular, Sothis (Sirius in more modern times) is significant. Originally, the star Sirius rose on the first day of the first month, known as Thuthi and Hethera by Grecian times. This marked a day of celebration for Hathor’s birth by her followers. The Nile River flooded at this time, providing a rejuvenation and growing for Egyptian farmers. During the time of the ancient Greeks, Hathor became the goddess of Hethara, the third month of the Egyptian calendar. The star Sothis would later be associated with the goddess Sopdet.
The Eye Of Ra – The Destruction of Mankind
This story has been found engraved on one of the shrines in Tutankhamen’s tomb and in “The Book of the Heavenly Cow.”
In this story, Hathor, as the Eye of Ra, turns into Sakhmet. How this came about is that Hathor’s father Ra, having grown old, was beginning to fall out of worship. Angry about this, Ra speaks to his daughter who turns into Sakhment and goes out to punish humanity.
As Sakhmet, she was very efficient and nearly wiped out everyone. Realizing that if she continued with killing everyone, there would be none left at all to worship the gods, Ra decided that there has been enough killing and tells her to stop. Only now she can’t quit, Sekhmet’s become so full of bloodlust.
Seeking the guidance of the ever-wise Thoth, he and Ra get large vats or barrels of beer that has been dyed and colored red to look like blood. In some versions of the story, they flood the land with the blood-red beer and in others; Thoth has a hallucinogenic like poppies put into the beer.
Regardless of the final version told, Sekhmet on seeing all this beer drinks it up, getting so drunk, she forgets about her reason for coming to the earth, her great blood lust and forgets all about killing anyone. When Sekhmet returns to Ra, he embraces her and Sekhmet turns back into Hathor. This is the Hathor that everyone knows of as being sweet loving, gentle and nurturing.
Another version of the story has it that this is how Hathor turns into Bast.
Hathor-Sekhmet
As Hathor-Sekhmet, we see Hathor take on a dual role in her aspect as a Sun Goddess. When she is Hathor, she represents the gentle spring Sun. When she is Sekhmet, she becomes a lioness and represents the scorching heat of the summer Sun. It has been noted how in the Zodiac, Taurus the Bull has a fixed sign in Spring and Leo the Lion has a fixed sign in Summer.
The symbolic importance of this story is that of the changing of the seasons from Spring to Summer. As summer comes to its height, so too does the danger of wildfires destroying crops and homes. Sekhmet returns to once more being gentle Hathor with the cooler autumn weather.
The color red is often symbolic of life and rebirth. The red beer again symbolizes the rejuvenation and regeneration of the Earth after the hot Summer weather and turn towards Autumn weather.
The Feast of Hathor
To commemorate this myth, the ancient Egyptians celebrated a yearly festival that marked the beginning of Egypt’s rainy season known as the Season of Inundation (Flooding). This was a time of the year when the glaring heat of the sun was finally stopped by the much needed life-bringing rains. The Feast or Festival was known for wild partying with sistrum music, dancing, love making and lots of beer.
The partying makes sense when realizing that the rise of the star Sothis (Sirius) marked the annual flooding of the Nile River on the Egyptian calendar. This would coincide with the end of August for Western Culture.
The myth of the annual flooding of the Nile would be later associated with Osiris.
New Years Festivities
As we’re on the subject, another popular and religious festival was celebrated on August 7th, the Egyptian New Year. The New Years also marked Hathor’s birthday. Hathor’s image would be taken from the temple and brought out to the rising Sun for the day. The New Years was a day of enjoyment, song and intoxication.
The Destruction of Mankind – Historical Context
This story has a historical context for the founding of Egypt’s Middle Kingdom when the Upper Egyptian pharaoh, Mentuhotep II took control of Lower Egypt. Before this, Lower Egypt had enjoyed a period of independence. Mentuhotep II’s forced unification resulted in a fierce bloody war that lasted for some twenty eight years before ending and peace resumed, when Mentuhotep III came to power. So the story of The Destruction of Mankind does look to be an analogy to this brutal period of Egyptian history.
The Distant Goddess
In this story, Hathor became angry with her father Ra. Maybe she remembered the events in The Destruction of Mankind. Another version of this story doesn’t state why Hathor got angry, she just does and decides she might have the earth covered again in the ocean and maybe return to even older primordial form of a serpent. Anyhow, angry, Hathor took off and wandered about, away from Egypt down towards Nubia.
A great sadness fell upon the land and Ra, missing his Eye and unable to do anything without it, sets out to try and get her back. Hathor by this time has turned into a deadly wild cat, killing anyone who comes near her. A slight variation to this has it that with Hathor turned into a lion, chaos swept the land with everything drying up and that’s why everyone and thing is dying.
As no one else was willing to go near an enraged Hathor, the god Thoth agreed to give a shot. In disguise, he managed to coax an angry goddess back to Egypt through the use of stories.
Once back in Egypt, Hathor bathed in the Nile River, returning to her calmer demeanor. As a result of her bathing, the waters of the river turned red from her cooling rage. With Hathor’s bathing, the Nile river overflowed and flooded the land, giving life giving waters to a parched land so Farmers could have their growing season.
Yeah, don’t make Hathor angry, you wouldn’t like her when she’s angry.
In some versions of this story, it is the goddess Tefnut who storms off in a fit of anger leaving Egypt and it’s the god Shu, not Thoth who sets off to bring her back.
Another telling of this story is that it is both Shu and Thoth who set off after Hathor, changing into lions to try and coax their sister back.
The Contendings Of Horus And Seth
Hathor only has a small part in this story. Her father, Ra had fallen into a bout of depression and Hathor, like any child, wanting to cheer up a parent, finds a way to do so. Taking off her clothing, Hathor dances nude around Ra’s throne. She keeps at it until he finally sits up and smiles at her antics.
Hyades
Etymology – In Ancient Greek: Ὑάδες “the rainy ones.” The Greek word: hyein – “to rain.” It may also come from the Greek word hys or hus for “swine.” Latin – Suculae, “Suckling-pigs” or “little pigs.”
In Greek mythology, the Hyades are the five daughters of Atlas as well as the half-sisters of the Pleiades. As minor goddesses or nymphs, they are associated with bringing rain and stormy weather. | https://brickthology.com/category/nurse-maid/ |
Indian Mural Paintings are paintings made on walls of caves and palaces. The earliest evidence of murals is the beautiful frescoes painted on the caves of Ajanta and Ellora, also on the Bagh caves and Sittanvasal. In the old scripts and literature, there were many evidences of mural paintings.
According to Vinaya Pitaka, the noted courtesan of Vaishali, Amrapali employed painters to paint the kings, traders and merchants of that time on the walls of her palace. There are also numerous references in prehistoric texts to ‘Chitragaras’ or galleries maintained by the kings and rulers. The earliest surviving mural paintings in the Indian subcontinent are those of Ajanta. The paintings here were made in two phases. The oldest date to around the 2nd century B.C. The marvellous latter phase was around the 5th century A.D., under the patronage of the Vakatakas who ruled the Deccan.
The history of Indian murals starts in ancient and early medieval times, from the 2nd century BC to 8th – 10th century AD. There are known more than 20 locations around India containing murals from this period, mainly natural caves and rock-cut chambers. The highest achievements of this time are the caves of Ajanta, Bagh, Sittanavasal, Armamalai Cave (Tamil Nadu), RavanChhaya rock shelter, Kailasanatha temple in Ellora Caves.
Murals from this period depict mainly religious themes of Buddhist, Jain and Hindu religions. There are though also locations where paintings were made to adorn mundane premises, like the ancient theatre room in Jogimara Cave and possible royal hunting lodge circa 7th-century AD – RavanChhaya rock shelter
The pattern of large scale wall painting which had dominated the scene, witnessed the advent of miniature paintings during the 11th and 12th centuries. This new style figured first in the form of illustrations etched on palm-leaf manuscripts. The contents of these manuscripts included literature on Buddhism and Jainism. In eastern India, the principal centres of artistic and intellectual activities of the Buddhist religion were Nalanda, Odantapuri, Vikramshila and Somarpura situated in the Pala kingdom (Bengal and Bihar).
Features and Techniques of Indian Mural Paintings
1. The Mural Paintings are comparatively different from all other forms of illustrative art. The two major characteristics which make them significant are their organic relation to architecture and broad public importance. The Indian murals are rich in expressive practicality.
2. The utilization of colour, design, and thematic treatment in mural paintings has the capability to bring about an extreme change in the sensation of spatial proportions of the building. Mural Paintings are the only form of artwork which is truly three-dimensional, since it modifies and shares a given space.
3. The colour materials on the mural paintings in ancient India were derived from the natural materials like terracotta, chalk, red ochre and yellow ochre mixed with animal fat. The subjects included the figures of human beings and animals, hunting, family scenes, court life, deities and stories from Budhhist ‘Jataka’. The ancient painters did the murals with expert hands and observant eyes. This is evident from the cave paintings of Ajanta, which were made during second century BC and continued till the 5th-6th century AD by the decorative motifs, crowded compositions, figure types and details of costumes. The other significant mural paintings of this period are found at Bagh in Madhya Pradesh, caves of Badami in Karnataka, Sittannavasal in Tamil Nadu and the Kailashanatha temple in Ellora, Maharashtra of 8th century AD and known for their linear styles.
4. Mud plaster had been applied in two coats – the first was rough in order to fill in the pores of the rocks and then a final coat of lime plaster is applied over it. The Mural painting took place in stages. The line is drawn in red ochre the colours are applied & the contours are renewed in brown, deep red or black. The pigments that were required for the paints were from local volcanic rocks with the exception of lamp black. Animal glue and vegetable gums were also used. The facial expressions were highlighted by patches of light colours. In order to create illusion of depth various methods were used.
Popular Indian Mural Paintings
1. In Arunachal Pradesh and Tripura sublime mural works have been found. Ladakh is known for its wall paintings in Alchi and Hemis monasteries, made on 11th-12th century and the Spiti Valley in Himachal Pradesh is known for its Buddhist paintings in the gomphas of Tabo Monastery.
2. North India has a rich heritage of mural paintings even before the Mughal period. The murals at the Vishnu Temple located at Madanpur in Lalitpur district of Uttar Pradesh of 12th century AD reveals the skilful hands of the painters. Though the Mughal era is known mostly for the miniatures, the enthralling murals embellished on the walls of forts and palaces of Akbar and Jahangir quietly speaks of the influence of Persian styles. The Mughal painting traditions influenced the Rajput painting. The wall paintings in Deeg, Bundi, Jaipur, Ajmer, Jodhpur and other places in Rajasthan are quite convincing.
3. South India also got rich tradition of mural paintings. In the reign of Cholas, Vijayanagaras and Nayakas, this art reached the climax. The Deccan art of Bijapur, Hyderabad, and Golconda schools were influenced by the Mughal traditions and later by European idiom. Maratha murals are also shaped under the Mogul traditions and employed oil as medium. The mural art of Kerala vividly depicted on the walls of temples and monuments show traces of European affinity.
Sources: | https://www.objectiveias.in/mural-paintings/ |
Presentation is loading. Please wait.
Published byPrudence Patrick Modified over 4 years ago
1
JOURNEYS (OXFORD)1
2
2 Those who cannot remember the past are condemned to repeat it. George Santayana (1863-1952), an American philosopher
3
JOURNEYS (OXFORD)3 AN INTRODUCTION TO HISTORY
4
JOURNEYS (OXFORD)4 At A Glance What History is Reasons for studying History Primary & Secondary Sources How History is recorded Measurement of time Problems historians face
5
JOURNEYS (OXFORD)5 WHAT IS HISTORY? History is a record of what took place in the past –About people who changed the world –About discoveries and events that have changed the world
6
JOURNEYS (OXFORD)6 WHY STUDY HISTORY? To understand the present more clearly To see how far we have come To study the achievements of our forefathers
7
JOURNEYS (OXFORD)7 WHY STUDY HISTORY? To learn from the mistakes of the past To know how people feel and think To help train the mind
8
JOURNEYS (OXFORD)8 Historians use various forms of evidence –Oral –Pictorial –Written FINDING OUT ABOUT HISTORY
9
JOURNEYS (OXFORD)9 ORAL EVIDENCE
10
JOURNEYS (OXFORD)10 PICTORIAL EVIDENCE
11
JOURNEYS (OXFORD)11 WRITTEN EVIDENCE
12
JOURNEYS (OXFORD)12 SOURCESOral, pictorial and written evidence are referred to as SOURCES 2 types of sources –Primary Sources –Secondary Sources HOW IS HISTORY EXAMINED
13
JOURNEYS (OXFORD)13 Provide first-hand information/original 2 types : Published and unpublished Eg bones, stones, artefacts Eg Man-made objects like pottery and buildings Eg Items left behind by people living in a certain period – maps, writings, diaries, letters, documents, newspaper reports PRIMARY SOURCES
14
JOURNEYS (OXFORD)14 Provide second-hand information What others have written Produced after a certain event; normally after studies of the event have been made Producers of these sources may not have been there when the event took place Eg Films, radio and TV programmes, books produced after a particular historical event took place SECONDARY SOURCES
15
JOURNEYS (OXFORD)15 ARCHAEOLOGY “ANCIENT” and “STUDY” Study of objects or items that are very old Historians find out about prehistory through archaeology Archaeologists specialised in the study of archaeology Like detectives – try to find out about past activities, most of which are buried below the surface of the earth
16
JOURNEYS (OXFORD)16 ARCHAEOLOGY The places which they dig up (excavate) are called SITES Stone, bone, wood, metal Bits of jewellery, pottery, tools or artefacts
17
JOURNEYS (OXFORD)17 MEASURING TIME A.D. : Anno Domini (Latin) The Year of the Lord (Birth of Christ) B.C. : Before Christ See page 12
18
JOURNEYS (OXFORD)18 PROBLEMS OF HISTORIANS Collecting information about the past Limited records – writing invented only about 5,000 years ago Not everything recorded was the truth –Incomplete –Biased
19
JOURNEYS (OXFORD)19 INFORMATION –Fact vs opinion What is a fact? What is an opinion? PROBLEMS OF HISTORIANS
20
JOURNEYS (OXFORD)20 EVALUATING EVIDENCE The 3 C’s –Credibility –Consistency –Corroboration
21
JOURNEYS (OXFORD)21 NEW SOURCES, NEW INTERPRETATION There is always new evidence This will provide new explanations of the past
22
JOURNEYS (OXFORD)22 Compare and Contrast Change and Continuity Cause and Effect Similarities and Differences Empathy HISTORICAL CONCEPTS
Similar presentations
© 2020 SlidePlayer.com Inc.
All rights reserved. | http://slideplayer.com/slide/6939122/ |
He Didn't Bring You Here
You make choices and while He will never leave you, some of the things that happen in your life are a direct result of your good or bad choices. I like to give credit where credit is due, but giving God credit for all the shitty things happening in your life is not 100% accurate.
No, God did not bring you to this situation.
That’s not how God works. It’s actually an immature way to think about God.
The Creator of our universe is in control of everything, absolutely. But when He created you, me, and every other human, He gave us free will. In His infinite power and wisdom, He gave us choice. We get to decide how things go. We can be in or out with Him.
He loves us either way, but.
Always a but.
With the power of choice comes consequences, cause and effect.
Taking it back to middle school science class, when one thing happens, it causes a reaction or multiple reactions. It’s what we teach our kids when they want to touch a hot stove. If you touch this hot stove, it will burn you. You have the power to touch this stove when I’m not looking, when you’re being sneaky, or when you want to disobey me, but there will be a direct consequence from the hot stove. You will burn your little hand. You will be in pain. You might have to take a trip to the hospital. You might not be able to use your hand for a while. You could have a scar.
God works the same way.
You make choices and while He will never leave you, some of the things that happen in your life are a direct result of your good or bad choices. I like to give credit where credit is due, but giving God credit for all the shitty things happening in your life is not 100% accurate.
It’s human nature to do dumb stuff.
It’s not God’s nature to do dumb stuff.
So that bad choice you made, He might have known you were going to make it and wasn’t on board with it, but He didn’t stop it either.
Sometimes you have to touch the hot stove and learn to use your wounded hand differently to learn the lesson.
Sometimes you have to see the direct consequences of your actions before you learn to be better, listen more, and be wiser.
Stop saying if God brought you to it, He’ll bring you through it because there’s a good chance your own bad choices brought you to it.
Also, it’s important to remember God can’t sin. He is too perfect, too pure, to sin. So if your choices in life can be traced back to greed, selfishness, lying, deceitfulness, betrayal, not loving someone, jealousy, competition, lack of empathy, lust, or a million other things not of God—HE DIDN’T BRING THESE THINGS TO YOU. You did.
You got yourself into this mess.
The good news is we’re all in this mess together. We live in a sinful world, and we are all sinners. So you’ve got company. We’re not alone here in this mess you and I have made for ourselves.
But the even better news is He’s here too.
Not to act as some magical creature who snaps His fingers and solves all our problems, but to offer us peace, comfort, calm, and wisdom in the midst of the chaos we’ve created if we ask Him for it.
Sin is literal separation from God. He can’t be with us when we’re in the midst of sin. But He’s there before and He’s there after. Which is comforting because we can come to Him when we’re in the struggle and on the cusp of something that will hurt us, and He’s there in the aftermath helping us pick up the pieces.
The free will He’s afforded us lets us do whatever we want.
The blood of the Cross covers our butts (and all the other parts as well, like that incredibly sinful elbow of yours) when we’re in too deep with our sin.
The point of being in relationship with God is to continually be on a journey to lessen our involvement in sin. There is no sinless life besides Jesus. So our goal, our end result, is heaven. We’ll never be perfect and whole and blameless here. But spending time in God’s Word, understanding His heart, learning about His interactions with people in the Bible, and really living in His grace and mercy should change our narratives, both internal and external.
We get to less sin by learning from our sins, asking for forgiveness, and coming back to home base (God) to ask for Godly correction, instruction, and wisdom.
We all burn our hands on the stove.
A lot.
Sometimes when one hand is on the stove and we’re saying “ouch” we’re also moving the other hand in the direction of the stove, because we’re forgetting what it feels like WHILE WE’RE STILL DOING IT.
Humans are fun like that.
God didn’t bring your marriage to ruin.
God didn’t make bad financial choices for you.
God didn’t betray your friends.
God didn’t make you lose your job.
God didn’t take your children away.
God didn’t make your life hard.
But He’s there with you. He’s telling you how to make it better. It’s probably not what the world is telling you. It’s probably not what your nature is telling you. But He’s always right, He’s always just, and He’s always love.
He didn’t bring you to this, but He will be with you in it. That is what the Bible says. | |
Teachers contribute to student achievement. As a practice, teacher evaluation has developed over time. Today, the focus of teacher evaluation is to determine the impact of teaching on student outcomes and for use as professional development. Research on teacher evaluation has produced mixed results. This overview provides information about teacher evaluation as it relates to collecting information about teacher practice and using it to improve student outcomes. The history of teacher evaluation and current research findings and implications are included.
Cleaver, S., Detrich, R. & States, J. (2018). Overview of Teacher Evaluation. Oakland, CA: The Wing Institute. https://www.winginstitute.org/assessment-summative.
Data Mining
The CJAA funded the nation’s first statewide experiment concerning research-based programs for juvenile justice. The question here was whether they work when applied statewide in a “real world” setting. This report indicates that the answer to this question is yes— when the programs are competently delivered.
Barnoski, R., & Aos, S. (2004). Outcome evaluation of Washington State’s research-based programs for juvenile offenders. Olympia, WA: Washington State Institute for Public Policy, 460.
Research supports significant difference in the performance of teachers in the top quartile versus the bottom. Teachers working with the most challenging students are often not afforded the status that teachers working with gifted or advance placement. Students in the bottom quartile are often given the teachers who are frequently given less effective teachers along with new teachers whom research finds are less effective than experienced peers. Research finds current evaluation systems are unable to effectively assess the ability of teachers. This results in teacher not receiving feedback to enable them to improve. These measures infrequently inform teacher assignments, professional development, or career advancement. Teachers are left on their own to self-determine their own strengths and weaknesses. This paper examines how to measure teacher performance and the practices necessary for increasing teacher trust in systems designed to effectively measure performance.
Cantrell, S., & Scantlebury, J. (2011). Effective Teaching: What Is It and How Is It Measured?. Effective Teaching as a Civil Right, 28.
This study developed a zero-to-five index of the strength of accountability in 50 states based on the use of high-stakes testing to sanction and reward schools, and analyzed whether that index is related to student gains on the NAEP mathematics test in 1996–2000.
Carnoy, M., & Loeb, S. (2002). Does external accountability affect student outcomes? A cross-state analysis. Educational Evaluation and Policy Analysis, 24(4), 305-331.
This brief explores research that points to the opportunities and the challenges that evaluating teacher preparation programs differently presents.
Coggshall, J. G., Bivona, L., & Reschly, D. J. (2012). Evaluating the Effectiveness of Teacher Preparation Programs for Support and Accountability. Research & Policy Brief. National Comprehensive Center for Teacher Quality. Retrieved from https://eric.ed.gov/?id=ED543773
C-SAIL was established in July 2015 as a resource on the implementation and effects of college and career readiness standards. The Center is funded through a grant from the Institute of Education Sciences (IES) of the U.S. Department of Education.
Edgerton, A. Polikoff, M., Desimone, L. (2017). How is policy affecting classroom instruction?. Evidence Speaks Reports. Volume 2, #14. The Center on Standards, Alignment, Instruction, and Learning (C-SAIL).
Research strongly suggests that feedback obtained through direct observations of performance can be a powerful tool for improving teacher’s skills. This study examines a peer teacher observation method used in England. The study found no evidence that Teacher Observation improved student language and math scores.
Education Endowment Foundation (2017). Teacher Observation. Education Endowment Foundation. Retrieved https://educationendowmentfoundation.org.uk/projects-and-evaluation/projects/teacher-observation/.
This article discusses the current focus on using teacher observation instruments as part of new teacher evaluation systems being considered and implemented by states and districts. They argue that if these teacher observation instruments are to achieve the goal of supporting teachers in improving instructional practice, they must be subject-specific, involve content experts in the process of observation, and provide information that is both accurate and useful for teachers. They discuss the instruments themselves, raters and system design, and timing of and feedback from the observations.
Hill, H., & Grossman, P. (2013). Learning from teacher observations: Challenges and opportunities posed by new teacher evaluation systems. Harvard Educational Review, 83(2), 371-384.
Standardized testing has increasingly been used to hold educators accountable. Incentives are often offered as a way to improve student test performance. This study examines the impact incentives for students, parents and tutors on standardized test results. The researchers provided incentives on specially designed tests that measure the same skills as the official state standardized tests; however, performance on the official tests was not incentivized. This study finds substantial improvement for performance when there were incentives on the results did not generalize to the official test. This calls into question how to effectively use incentives so they will actually produce desired outcomes.
John A. List, Jeffrey A Livingston and Susanne Neckermann. “Do Students Show What They Know on Standardized Tests?” working papers (2016) Available at: http://works.bepress.com/jeffrey_livingston/19/
This paper combines information from classroom-based observations and measures of teachers' ability to improve student achievement as a step toward addressing these challenges. The results point to the promise of teacher evaluation systems that would use information from both classroom observations and student test scores to identify effective teachers.
Kane, T. J., Taylor, E. S., Tyler, J. H., & Wooten, A. L. (2011). Identifying effective classroom practices using student achievement data. Journal of human Resources, 46(3), 587-613.
This review addresses two different proposals for reforming teacher training, neither of which is grounded in research. The authors report three weak correlations between the performance of program participants and TNTP’s certification evaluation rubric. The report concludes with three self-evident aphorisms: practice improves teaching, teachers who master teaching skills do better, and inadequate performers should be weeded out.
Mathis, W. (2014). Review of Two Alternative Teacher Preparation Proposals. National Education Policy Center. Retrieved from http://greatlakescenter.org/docs/Think_Twice/TT_Mathis_TeacherPrep.pdf
This report describes how the seven Regional Educational Laboratory (REL) Central states (Colorado, Kansas, Missouri, Nebraska, North Dakota, South Dakota, and Wyoming) evaluate their teacher preparation programs and the changes they are making to improve their approaches to evaluation.
Meyer, S. J., Brodersen, R. M., & Linick, M. A. (2014). Approaches to Evaluating Teacher Preparation Programs in Seven States. REL 2015-044. Regional Educational Laboratory Central. Retrieved from https://eric.ed.gov/?id=ED550491
This study examines the impact of 2 forms of professional development on prekindergarten teachers' early language and literacy practice: coursework and coaching. Participating teachers (N = 148) from 6 urban cities were randomly assigned to Group 1 (coursework), Group 2 (on-site coaching), or Group 3 (control group). Pre- and postassessments examined teachers' knowledge and quality of language and literacy practices. Analyses revealed no significant improvements between groups on knowledge of early language and literacy. However, those who received coaching made statistically significant improvements in the structural environment both immediately and 5 months later. Effect sizes were substantial for coaching, while those who received coursework made no significant improvements. Analyses of the active ingredients of coaching were examined using logs and interviews to further elucidate these findings. Results indicated that coaching appears to be an effective form of professional development for early childhood educators.
Neuman, S. B., & Wright, T. S. (2010). Promoting language and literacy development for early childhood educators: A mixed-methods study of coursework and coaching. Elementary School Journal, 11,63-86. No Child Left Behind Act of 2001, P.L. 107-110, 20 U.S.C. § 6319 (2002).
The Digest of Education Statistics 2015 was just released by The Institute for Education Sciences (IES) National Center for Education Statistics (NCES). This annual publication provides a compilation of statistical information covering the broad field of education from prekindergarten through graduate school. Topics include: the number of schools and colleges; teachers; enrollments; graduates; educational attainment; finances; federal funds for education; employment and income of graduates; libraries; technology; and international comparisons. It has been published annually since 1962, providing over 50 years of data with which to benchmark education performance at the system level in this country.
Snyder, T.D., de Brey, C., and Dillow, S.A. (2018). Digest of Education Statistics 2016 (NCES 2017-094). National Center for Education Statistics, Institute of Education Sciences, U.S. Department of Education. Washington, DC. | https://www.winginstitute.org/standards-evaluation |
What is an analytical statement?
Analytic Statement: a statement the truth value of which is determined by the meanings of its terms;e.g., “All squares are four-sided.” It is sometimes said (e.g. by Kant), when a statement is in simple subject-predicate form, that an analytic statement is one in which the predicate (e.g., the property of being four- …
How do you write an analytical statement?
To analyze something is to ask what that something means. An analytical essay answers how something does what it does or why it is as it is. Therefore, a thesis statement in an analysis paper should be answering a HOW or WHY question. A strong thesis makes a claim about the subject that needs proving.
What is analytic knowledge?
Analytic [by reason [analysis] alone] knowledge is, classically, “knowledge” that is true by analysis of language, by tautology: e.g., “a black cat is black.” In this sense, analytic knowledge is a priori: prior to empirical observation/sense perception.
Do statements have to be true?
As such, a statement is an assertion that something is or is not the case. A statement is true if what it asserts is the case, and it is false if what it asserts is not the case. It is the kind of sentence that is either true or false – in this case false.
What does P mean in logic?
P :⇔ Q means P is defined to be logically equivalent to Q.
Which statement is always false?
A statement which is always true is called a tautology. A statement which is always false is called a contradiction. For example, p ∧ (¬p) is a contradiction, while p ∨ (¬p) is a tautology. Most statements are neither tautologies nor contradictions.
What are statements in logic?
In logic, the term statement is variously understood to mean either: (a) a meaningful declarative sentence that is true or false, or. (b) the assertion that is made by a true or false declarative sentence.
What does R mean in logic?
true values are designated
What is logical thinking example?
Logical thinkers can also reason deductively. They can identify an acceptable premise and apply it to situations that they encounter on the job. Example: An organization may work with a core belief that employees are more productive if they have control over the ways they carry out their responsibilities.
Who is the father of logic? | https://morethingsjapanese.com/what-is-an-analytical-statement/ |
TO OUR CUSTOMER: With the global spread of COVID-19, in order to ensure the safety of our customers, our company has adopted strict employee control and regular disinfection measures. Under the scientific and effective measures of the Chinese government, the epidemic situation has been controlled. Please rest assured that the goods will be strictly disinfected when they are exported. But the delivery time of this period may be delayed, beg your understanding.
Do you have the habit to store all your jewelry on their own display sets? With the suitable necklace jewelry stands bracelet displays, and earrings cards & racks, everything in your dresser will be organized in order! | https://www.beebeecraft.com/c2-jewelry-display-301-1.html?s=category&pageSize=96&material=Plastic&sortIndex=5 |
# Irrelevant conclusion
An irrelevant conclusion, also known as ignoratio elenchi (Latin for 'ignoring refutation') or missing the point, is the informal fallacy of presenting an argument that may or may not be logically valid and sound, but (whose conclusion) fails to address the issue in question. It falls into the broad class of relevance fallacies.
The irrelevant conclusion should not be confused with formal fallacy, an argument whose conclusion does not follow from its premises; instead, it is that despite its formal consistency it is not relevant to the subject being talked about.
## Overview
Ignoratio elenchi is one of the fallacies identified by Aristotle in his Organon. In a broader sense he asserted that all fallacies are a form of ignoratio elenchi.
Ignoratio Elenchi, according to Aristotle, is a fallacy that arises from "ignorance of the nature of refutation". To refute an assertion, Aristotle says we must prove its contradictory; the proof, consequently, of a proposition which stood in any other relation than that to the original, would be an ignoratio elenchi. Since Aristotle, the scope of the fallacy has been extended to include all cases of proving the wrong point ... "I am required to prove a certain conclusion; I prove, not that, but one which is likely to be mistaken for it; in that lies the fallacy ... For instance, instead of proving that 'this person has committed an atrocious fraud', you prove that 'this fraud he is accused of is atrocious'"; ... The nature of the fallacy, then, consists in substituting for a certain issue another which is more or less closely related to it and arguing the substituted issue. The fallacy does not take into account whether the arguments do or do not really support the substituted issue, it only calls attention to the fact that they do not constitute proof of the original one… It is a particularly prevalent and subtle fallacy and it assumes a great variety of forms. But whenever it occurs and whatever form it takes, it is brought about by an assumption that leads the person guilty of it to substitute for a definite subject of inquiry another which is in close relation with it.— Arthur Ernest Davies, "Fallacies" in A Text-Book of Logic
● Example 1: A and B are debating as to whether criticizing indirectly has any merit in general.
A attempts to support their position with an argument that politics ought not to be criticized on social media because the message is not directly being heard by the head of state; this would make them guilty of ignoratio elenchi, as people such as B may be criticizing politics because they have a strong message for their peers, or because they wish to bring attention to political matters, rather than ever intending that their views would be directly read by the president.
● Example 2: A and B are debating about the law.
B missed the point. The question was not if B's neighbor believes that law should allow, but rather if the law does allow it or not.
Samuel Johnson's unique "refutation" of Bishop Berkeley's immaterialism, his claim that matter did not actually exist but only seemed to exist, has been described as ignoratio elenchi: during a conversation with Boswell, Johnson powerfully kicked a nearby stone and proclaimed of Berkeley's theory, "I refute it thus!" (See also argumentum ad lapidem.)
A related concept is that of the red herring, which is a deliberate attempt to divert a process of enquiry by changing the subject. Ignoratio elenchi is sometimes confused with straw man argument.
## Etymology
The phrase ignoratio elenchi is from Latin 'an ignoring of a refutation'. Here elenchi is the genitive singular of the Latin noun elenchus, which is from Ancient Greek ἔλεγχος (elenchos) 'an argument of disproof or refutation'. The translation in English of the Latin expression has varied somewhat. Hamblin proposed "misconception of refutation" or "ignorance of refutation" as a literal translation, John Arthur Oesterle preferred "ignoring the issue", and Irving Copi, Christopher Tindale and others used "irrelevant conclusion". | https://en.wikipedia.org/wiki/Irrelevant_conclusion |
Enter Title, Author, ISBN, etc.
Product Categories
Use arrow tabs for subcategories
|
|
Title: Animals as Disguised Symbols in Renaissance Art
Author: Cohen, Simona
Publisher: Brill; Publication Date: 2008
Hardcover; ISBN: 9789004171015
Volumes: 1; Pages: xi, 320
List Price in Cloth: $158.00 Our price: $133.99
(Add to Cart button is at the bottom of this page)
The relationship between medieval animal symbolism and the iconography of animals in the Renaissance has scarcely been studied. Filling a gap in this significant field of Renaissance culture, in general, and its art, in particular, this book demonstrates the continuity and tenacity of medieval animal interpretations and symbolism, disguised under the veil of genre, religious or mythological narrative and scientific naturalism. An extensive introduction, dealing with relevant medieval and early Renaissance sources, is followed by a series of case studies that illustrate ways in which Renaissance artists revived conventional animal imagery in unprecedented contexts, investing them with new meanings, on a social, political, ethical, religious or psychological level, often by applying exegetical methodology in creating multiple semantic and iconographic levels. | http://www.dovebooksellers.com/store/3461654/product/9789004171015 |
This is the heart beat and engine room of every company. This is the best department you can be as you can dictate your huge earnings monthly.
- Minimum Qualification: Degree
- Experience Level: Executive level
- Experience Length: No Experience/Less than 1 year
Job Description
The Real Estate Development Company Marketing activities shall include the following:
- Managing all marketing for the company and activities within the marketing department.
- Developing the marketing strategy for the company in line with company objectives.
- Co-ordinating marketing campaigns with sales activities.
- Overseeing the company’s marketing budget.
- Creation and publication of all marketing material in line with marketing plans.
- Planning and implementing promotional campaigns.
- Manage and improve lead generation campaigns, measuring results.
- Overall responsibility for brand management and corporate identity
- Preparing online and print marketing campaigns.
- Monitor and report on effectiveness of marketing communications.
- Creating a wide range of different marketing materials.
- Working closely with design agencies and assisting with new product launches.
- Maintain effective internal communications to ensure that all relevant company functions are kept informed of marketing objectives.
- Analysing potential strategic partner relationships for company marketing. | https://www.jobberman.com/job/marketing-and-sales-manager-vedx42 |
Upon successful completion of this course, you will be able to:
• Explain how different market structures result in different resource allocations.
• Model the impact of external shocks to a particular market structure and demonstrate the new equilibrium price and quantity after the impact of this external shock has played out.
• Evaluate the efficiency of an equilibrium. Different market structures produce different levels of efficiency.
• Explain when and why the government might intervene with regulatory authority or antitrust litigation to lessen inefficiencies in some markets.
• Describe how information problems can cause inefficient outcomes.
• Understand externalities and consider optimal government response to these market failures.
This course is part of the iMBA offered by the University of Illinois, a flexible, fully-accredited online MBA at an incredibly competitive price. For more information, please see the Resource page in this course and onlinemba.illinois.edu.
Syllabus
-You will become familiar with the course, your classmates, and our learning environment. The orientation will also help you obtain the technical skills required for the course.
Module 1: Perfect Competition
-This module introduces the concept of a perfectly competitive market. It is a benchmark construction, but it accurately models many markets in our economy. We will understand equilibrium outcomes in both the short run and the long run. We will understand how to analyze shocks to these equilibria.
Module 2: Monopoly Markets and Efficiency
-Analysts can predict equilibrium outcomes with some degree of certainty. We want to construct a measure of efficiency that will allow us to evaluate the attractiveness of these equilibrium market outcomes. After using this metric to consider the efficiency of the competitive market, we will introduce a different market structure, monopoly, and use our efficiency metric to evaluate the equilibrium resource allocation under monopoly.
Module 3: Oligopoly and Game Theory
-Perfectly competitive markets have many sellers. Monopoly has one seller. But much economic activity takes place in markets with just a handful of very large producers. These are called oligopoly markets. We will look at collusive arrangements among a small number of rivals, and then will use simple game theoretic techniques to model equilibrium.
Module 4: Market Failures
-Sometimes even markets that appear to be capable of great efficiency in resource allocation, such as the perfectly competitive market, can fall short of efficiency. Economists call this market failure. In this module, we will consider information issues and the impact on efficiency. We will also introduce externalities (spillovers) such as pollution and model these impacts.
Taught by
Larry Debrock
Tags
Related Courses
-
Firm Level Economics: Consumer and Producer Behavior
University of Illinois at Urbana-Champaign5.0
-
Introduction to Managerial Economics
Indian Institute of Management Bangalore
-
An Introduction to Microeconomics
Indian Institute of Technology Kanpur, NPTEL
-
Managerial Economics and Business Analysis
University of Illinois at Urbana-Champaign
-
Microeconomics: When Markets Fail
University of Pennsylvania5.0
-
The Power of Markets III: Input Markets and Promoting Efficiency
University of Rochester
Reviews
5.0 rating, based on 2 reviews
-
Anonymous completed this course.This was a great course. I had an amazing learning experience in this MOOC. The professor's lecture videos provided thorough explanations of interesting topics.
-
Anjin Yahya Jonathan Hendel completed this course. | https://www.classcentral.com/course/firm-level-economics-markets-5247 |
§780.36 Conditions and issuance of license.
(a) Upon receipt of the Board's decision and instruction to issue a patent license, the General Counsel shall issue a license which complies with the following:
(1) The scope and durations of such use shall be limited to the purpose for which it was authorized;
(2) Such use shall be non-exclusive;
(3) Such use shall be non-assignable, except with that part of the enterprise or goodwill that enjoys such use;
(4) Any such use shall be authorized predominantly for the supply of the U.S. market; and,
(5) Authorization for such use shall be liable, subject to adequate protection of the legitimate interests of the persons so authorized, to be terminated if and when the circumstances that led to it cease to exist and are unlikely to recur.
(b) The Board shall have the authority to review, on motivated request, the continued existence of these circumstances. The parties will propose and agree on a reasonable royalty fee within a reasonable time as determined by the General Counsel. A reasonable royalty shall provide adequate remuneration for the circumstances of each case, taking into account the economic value of the authorization. If a party does not agree with the terms and conditions of the license as determined by the General Counsel or if a royalty fee cannot be agreed upon within the reasonable time period established by the General Counsel, any party may, within 30 days after the expiration of such time period, initiate a proceeding before the Board, in accordance with subpart E of this part, for a reconsideration of the General Counsel's determination. After the proceeding under subpart E of this part is completed, the General Counsel shall modify the patent license in accordance with the Board's determination. | http://ecfr.io/Title-10/se10.4.780_136 |
,
Aremi MacDonald
Generative design is changing the way architects and urban planners approach the design process. Using sophisticated machine learning and algorithms, an iterative process generates optimised design solutions based on given building parameters and constraints. This enables architects to find the best match to fit their needs.
Franz Forsberg and André Agi are lead computational architects focused on sustainability and urban design. They aim to discover new data-driven tools and systems to improve and incorporate into existing architectural workflows.
Ingrid Cloud took a moment to speak with these industry experts to find out just what the future of this new design process means for architects and urban designers alike.
André Agi and Franz Forsberg from Link Arkitektur: finding new ways of solving old problems.
Ingrid Cloud: So, what exactly is generative design?
Franz: As designers, we are always looking for novelty to solve a problem in a new way, or to create a solution that has not been thought of before. The competitive quest for novelty, while still guaranteeing the design will perform as intended, creates a challenge which is not easily solvable through traditional design processes.
IC: Interesting. And a new way of thinking of the generative design process is comparing it to human evolution. Drawing parallels between producing multiple architectural solutions the same way the evolutionary process generates new iterations of a living species. Each new version learning and adapting from the previous.
Franz: Yes, the organisms that exist in nature represent a large selection of new formal solutions that go far beyond the imagination of the most creative human designer. At the same time, different organisms are uniquely fitted to their surroundings’ requirements. So, it seems that nature is capable of producing an infinite amount of shapes and solutions, which are both innovative and highly performative.
IC: What types of software and plugins are currently on the market?
Franz: Universities and research programs, private companies, developers and all kinds of people are developing tools and sharing them on the internet. A large amount of them are open-source or free, and you can use them to customise your scripts. It offers a lot of flexibility, and it is a very low investment compared to other CAD software and IT infrastructure. However, it’s not easy for lower-skilled users to dive into this process and make something that works on a large scale. For wind analysis, there are a lot of small plugins to use for very simple wind tunnels and geometries, but they shouldn’t be used for documentation. If it’s not a solution like Ingrid Cloud, you would need knowledge in CFD to run an accurate simulation.
André: There’s also a greater need for trust in plugins to address more complex matters like environmental analysis and CFD. You need to be able to trust that the algorithms being used are widely recognised within academia and verified against benchmarks like Ingrid Cloud. Ingrid Cloud offers a system with higher accuracy and higher trust. Because CFD simulations are heavy, using Ingrid Cloud speeds up the process and provides support and feedback that allows us to integrate efficiently throughout the design process.
IC: Because the design process is constantly evolving, is data-driven design and computational analysis creating better solutions for the industry?
André: Data and coding is getting more adapted by the industry, which places demand on architects to acclimate to new tools and methods. I wouldn’t say every architect should learn to code because it’s quite demanding, but with computational design, buildings become measurable and you’re able to verify performance and compare different designs in metrics.
IC: So what does all of this mean? What does the future of architectural design look like?
André: As designs become more complex, we’re going to need new tools to manage that complexity, and we’re going to need to deliver innovative solutions to them [architects]. Tools that give us answers throughout the design process. Technological innovations have always existed in the design community and have changed the way we design buildings. The use of data and algorithms has brought up a new way for technology to change our design process and offers a system to create more solutions in less time.
Iteration is the new black: using computational tools to iterate around a defined constraint and, based on that, present a series of design alternatives is a key concept for the generative design approach.
Whether you’re a computational architect or a novice in CFD, Ingrid Cloud offers a tool for architects and urban designers at every skill level, providing fully automated and intuitive CFD wind simulations throughout every stage of the design process. Its user-friendly interface and sophisticated algorithms mean it has the power to do the heavy lifting, providing fast and reliable solutions as architects look to iterative and generative design tools as the future of design optimisation. | https://www.ingridcloud.com/blog/com/ingridcloud/blog/blog/is-the-future-generative-design.php |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.