content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
# Wrist spin
Wrist spin is a type of bowling in the sport of cricket. It refers to the cricket technique and specific hand movements associated with imparting a particular direction of spin to the cricket ball. The other spinning technique, usually used to spin the ball in the opposite direction, is finger spin. Wrist spin is bowled by releasing the ball from the back of the hand, so that it passes over the little finger. Done by a right-handed bowler, this imparts an anticlockwise rotation to the ball, as seen from the bowler's perspective; a left-handed wrist spinner rotates the ball clockwise.
The name wrist spin is actually something of a misnomer, as the wrist is not a vital part of the mechanism for producing the characteristic spin on the ball. A wrist spin delivery is released with the arm held in a fully pronated position, with the fingers on the inside of the ball (to the left for a right-handed bowler). If this pronated position is maintained through the release, the fingers will naturally cut down the side of the ball and produce an anti-clockwise spin. The great Australian leg-spinner Bill O'Reilly is famous for bowling legspin in this manner. Additional spin may be put on the ball through two other means: the active pronation of the arm from an initially supinated position just before the ball is released, and the extension of the wrist at the moment of release. Both techniques increase the effect of the cutting mechanism. The slower a spin bowler delivers the ball, the more actively he must attempt to impart spin onto it in order to maintain the same rate of revolution.
Although the biomechanical details of wrist spin are the same for right and left handed bowlers, such bowlers are often discussed separately, as the direction in which the ball deviates as it bounces on the cricket pitch is different:
Right-handed wrist spin is more commonly known as leg spin. Left-handed wrist spin is more commonly known as left-arm unorthodox spin or simply wrist spin.
## Types of delivery
### Leg break
To grip the ball for a leg-spinning delivery, the ball is placed into the palm with the seam parallel to the palm. The first two fingers then spread and grip the ball, and the third and fourth fingers close together and rest against the side of the ball. The first bend of the third finger should grasp the seam. The thumb resting against the side is up to the bowler, but should impart no pressure. When the ball is bowled, the third finger will apply most of the spin. The wrist is cocked as it comes down by the hip, and the wrist moves sharply from right to left as the ball is released, adding more spin. The ball is thrown up to provide flight. The batsman will see the hand with the palm facing towards them when the ball is released.
### Wrong'un
A wrong'un or googly is a type of delivery bowled by a wrist spin bowler. It is occasionally referred to as a Bosie, an eponym in honour of its inventor Bernard Bosanquet.
While a normal leg break spins from the leg to the off side, away from a right-handed batsman, a googly spins the other way, from off to leg, into a right-handed batsman (and is distinct from an off break delivery). The bowler achieves this change of spin by bending the wrist sharply from the normal leg break delivery position. To achieve this bend requires maximal pronation of the forearm prior to delivery, as well as inward rotation of the shoulder: the tip of the elbow, which would normally face the right of a right-hand bowler at the point of delivery, faces upward, and the back of the hand, which would normally face the rear of the bowler, faces the front. When the Cricket ball rolls out of the hand (from the side near the little finger, as in a normal leg break), it emerges with clockwise spin (from the bowler's point of view). A googly may also be achieved by bowling the ball as a conventional leg break, but spinning the ball further with the fingers just before it is released.
The change of wrist action can be seen by a skilled batsman and the change of spin allowed for when playing a shot at the ball. Less skilled batsmen, or ones who have lost their concentration, can be deceived completely, expecting the ball to move one direction off the pitch, only for it to move the other direction. If the batsman is expecting a leg break, he will play outside the line of the ball after it spins. This means the ball can either strike the pads for a potential LBW appeal, or may fly between the bat and the pads and hit the wicket.
The googly is a major weapon in the arsenal of a leg spin bowler, and can be one of the bowler's most effective wicket-taking balls. It is used infrequently, because its effectiveness comes mostly from its surprise value. The grip is identical to that of a conventional leg-break: the only difference is the additional wrist and shoulder rotation, so that the batsman will see the back of the hand when the ball is released.
### Topspinner
A topspinner is a type of delivery bowled by a cricketer bowling either wrist spin or finger spin. In either case, the bowler imparts the ball with top spin by twisting it with his or her fingers prior to delivery. In both cases, the topspinner is the halfway house between the stock delivery and the wrong'un – in the wrist spinner's case his googly, and in the finger spinner's case his doosra.
A topspinning cricket ball behaves similarly to top spin shots in tennis or table tennis. The forward spinning motion impedes air travelling over the ball, but assists air travelling underneath. The difference in air pressure above and underneath the ball (described as the Magnus effect) acts as a downward force, meaning that the ball falls earlier and faster than normal.
In cricketing terms, this means that the ball drops shorter, falls faster and bounces higher than might otherwise be anticipated by the batsman. These properties are summed up in cricketing terms as a "looping" or "loopy" delivery. Also, the ball travels straight on, as compared to a wrist spin or finger spin stock delivery that breaks to the left or right on impact. A batsman may easily be deceived by the ball, particularly given that the action is quite similar to the stock delivery.
In delivery, the topspinner is gripped like a normal side spinner. For a legspinner the back of the hand faces the cover region and the palm of the hand faces the mid wicket region at release. For an offspiner, these directions are reversed. The ball is then released either with the seam going straight on to the batsman, or with a scrambled seam. A spinner will frequently bowl deliveries with both top spin and side spin. A ball presenting with roughly equal amounts of both is usually called an "overspinning" leg break or off break.
Tactically, a bowler will bowl topspinners to draw a batsman forward before using the dip and extra bounce to deceive them. In particular, batsmen looking to sweep or drive are vulnerable as the bounce can defeat them.
### Slider
A slider is a type of delivery bowled by a wrist spin bowler. Whereas a topspinner is released with the thumb facing the batsman, a slider is bowled with the thumb facing the bowler. On release the wrist and ring finger work to impart backspin to the ball. A topspinner tends to dip more quickly and bounce higher than a normal delivery. The slider does the opposite: it floats to a fuller length and bounces less than the batsman might expect. The classic slider heads with its seam aligned towards the batsman and may tend to swing in slightly. Sliders may also head towards the batsman with a scrambled seam (with the ball not spinning in the direction of the seam, so the seam direction is not constant, unlike in conventional spin bowling). This has less effect on the flight and bounce but absence of leg spin may deceive the batsman.
It is claimed that Shane Warne invented this type of delivery. However, this is inaccurate. The Australian spinner Peter Philpott used the technique in the 1960s, calling it simply an orthodox backspinner, while Australian allrounder and captain Richie Benaud used what he called his 'sliding topspinner' which appears again to have been similar. Since he was taught the technique by Doug Ring, it may be more accurate to suggest that Ring is the originator. Either that, or the ball is one of those deliveries with no easily identifiable point of origin.
Although there is often a good deal of confusion on the subject, the slider is thought to be more or less an identical delivery to the "zooter".
### Flipper
The flipper is the name of a particular bowling delivery used in cricket, generally by a leg spin bowler. In essence it is a back spin ball. Squeezed out of the front of the hand with the thumb and first and second fingers, it keeps deceptively low after pitching and can accordingly be very difficult to play. The flipper is comparable to a riseball in slow-pitch softball.
By putting backspin on the ball the Magnus effect results in air travelling over the top of the ball quickly and cleanly whilst air travelling under the ball is turbulent. The lift produced means that the ball drops slower and travels further than a normal delivery. The slower descent also results in the ball bouncing lower.
The flipper is bowled on the opposite side to a slider, much in the same way that the top-spinner is bowled. On release, the bowler 'pinches' or clicks the thumb and forefinger, causing the ball to come out underneath the hand. There must be sufficient tension in the wrist and fingers to impart a good helping of backspin or underspin. In doing so the flipper will float on towards the batsman and land on a fuller length than he anticipated, often leaving him caught on the back foot when he wrongly assumes it to be a pullable or a cuttable ball. The back spin or underspin will cause the ball to hurry on at great pace with very little bounce, though this may be harder to achieve on softer wickets. A series of normal leg spinners or topspinners, with their dropping looping flight, will have the batsman used to the ball pitching on a shorter length. The batsman may wrongly assume that the flipper will drop and loop like a normal overspinning delivery, resulting in the ball pitching under the bat and going on to either hit the stumps or result in leg before wicket.
Much of the effectiveness of the flipper is attributable to the "pop", that is, the extra pace and change in trajectory that is imparted to the ball when it is squeezed out of the bowler's hand. Occasionally, the term 'flipper' has been used to describe other types of deliveries. The Australian leg spinner Bob Holland employed a back spinning ball that he simply pushed backwards with the heel of his palm. Sometimes this form of front-hand flipper is called a 'zooter'. It is easier to bowl but not as effective as the amount of backspin is much less. | https://en.wikipedia.org/wiki/Wrist_spin |
The monastery was built far away from the rest of the Spanish colony on the island, located far upriver in the mountains. As with all structures on the island, it fell into ruin after the Spaniards fell victim to El Dorado's curse.
Layout
It consists of several buildings and courtyards, most notable a library and a large church. The library contains a secret room that leads to a series of catacombs which run underneath the entire area. They also lead into the church, which itself contains a hidden "gallery" that shows the entrance to the El Dorado treasure vault. Behind the church is a graveyard, which contains a mausoleum, which itself contains the hidden entrance to the treasure vault.
Beneath the monastery
Many of the monastery's structures lie below ground. The treasure vault is located in a large cavern beneath the graveyard. A network of hidden, interlinked catacombs also run underneath the church and library. The German submarine bunker was also constructed under the monastery, a short distance from the church. As a result, all of the above locations are in extremely close proximity, often overlapping. For example, the treasure vault contains an entrance to the German bunker.
Appearances
The monastery only appears in Uncharted: Drake's Fortune, though an Uncharted 3: Drake's Deception will feature a co-op adventure map based on the monastery. | http://uncharted.wikia.com/wiki/The_monastery_(Uncharted:_Drake%27s_Fortune) |
Introduction: How to Make a Duct Tape Flower
Here's how to make a duct tape flower, the easy and fun way!
Step 1: Materials
You will need duct tape ( any kind, any color) and a pen or pencil. ( the pen has to be a capped pen not a "clicky") Scissors are optional.
Step 2: Preparing Flower Petals
Rip off a piece of duct tape that is about three inches long. Cut out four of those for now just so the process will move faster.
Step 3: Making the Petals
Now take one of your almost squares of duct tape and flip it over so it is sticky side up. Then take the corner of the tape and bring it along the opposite side of the piece. Then do that step over with the flap you just created. Creating a triangle shaped point at the top and little bit of sticky space at the bottom (2 cm) and just make a whole bunch of them.
Step 4: Making the Flower
Take one of your petals and wrap it around your pen or pencil. Then continue doing that until you feel that your flower is the perfect size.
Step 5: All Done
You have finished planting your one of a kind duct tape flower!
1 Person Made This Project!
- CameliaL made it!
Recommendations
2 Comments
I always looked at these flowers and thought, "I am never making those they look way too hard," but these instruction REALLY helped! And they were simple and easy to follow too! Thank you. ( Also, I loved that tape)
I hope you guys have fun while making flowers! | https://www.instructables.com/How-To-Make-A-Duct-Tape-Flower-4/ |
CROSS-REFERENCE TO RELATED APPLICATION
BACKGROUND
SUMMARY
DETAILED DESCRIPTION OF EMBODIMENTS
This application claims priority under 35 U.S.C. §119(a) to German Patent Application No. 10 2013 010 171.9, filed on Jun. 19, 2013, the entire contents of German Patent Application No. 10 2013 010 171.9 are hereby incorporated herein by reference.
1. Field of the Invention
The invention relates to a computer network for data transmission between network nodes, the network nodes being authenticatable to one another by means of authentication information of a PKI. A root certificate authority is configured for generating the authentication information for the PKI. Furthermore, the invention relates to a network node for such a computer network with an authentication information storage unit, a processing device and a network communication device. The invention also relates to a method for authenticating such a network node to such a computer network, wherein the authentication information has a key information assigned to the network node and a signature information, and wherein a signature information is generated from a key information and a root key information assigned to the root certification authority.
2. Background Information
The central element of a public key infrastructure (PKI) is the root certificate authority (RootCA), which issues certificates and keeps certification revocation lists (CRL, revocation information list) up-to-date. This functionality usually requires a link of the network to the RootCA. In the case of an onboard solution, for example in an aircraft, specific problems occur. A RootCA, which itself has access to the on-board network, is possibly exposed to attackers. In order to achieve a sufficient level of security, an elaborate and expensive safeguard of the RootCA, for example in the form of a firewall, is used.
Moreover, for the purpose of changes, for example in order to issue a certificate, revoke a certificate or to change the certificate revocation lists, there has to be a link to the RootCA in a conventional PKI infrastructure. This may not always be possible in the case of airplanes, particularly in flight or on the ground in an untrustworthy environment.
An object of the invention is to manage authentication information of a PKI environment in an aircraft in a simple and secure manner.
Thus, the disclosed embodiments provide a computer network, a network node for the computer network, and a method for authenticating the network node to the computer network as described herein.
The computer network according to the invention is advantageous in that a firewall for safeguarding the root certificate authority can be omitted. Thus, both the weight and the energy consumption of the computer network are reduced.
The root certificate authority can be disposed in a first region with limited physical access. By simple construction measures, such as they already exist in an aircraft, such an access to the computer network can be limited. If a network node has no physical access to the first region, and thus to the root certificate authority, it will not obtain access to the computer network as such.
The root certificate authority can have a wireless short-distance data transmission device with a communication range that does not extend beyond the first region. Thus, a simplified wireless communication is possible, but it is efficiently limited to communication partners which have access to the secured region and which are thus accorded a position of trust.
The network node according to the invention permits the transfer, prior to its final installation in or on the aircraft, of authentication information by means of the initialization communication device and storing this information until the start of operation. The incorporation of the network node into the computer network then only requires that the former is brought once into the limited-access region prior to its installation and/or start of operation.
The temporary authentication information storage unit of the network node can be configured in such a way that is exclusively writable by the initialization communication device. It thus becomes impossible to read out the authentication information by means of the initialization communication device, for example because of a software fault.
The initialization device can be configured so as to be destructible by the processing device, so that a removal of the authentication information from the network node is effectively prevented.
The network node can comprise a revocation list storage device. It is thus no longer necessary to maintain a direct link to the root certificate authority in order to have access to revocation information lists.
Advantageously, the initialization device is externally supplied with power, so that it requires no power source of its own for the transfer of the authentication information.
The network node can be configured as an access point for a WLAN. In that case, such an access point can decide on granting access to the WLAN based on the authentication information and/or the revocation information lists.
The method according to the invention permits logging a network node into a computer network, or to transmit to the network node authentication information for the computer network, without the computer network being directly linked to the root certificate authority provided for this purpose.
The method can provide destroying the initialization device. Security is thus further enhanced.
Advantageously, the authenticity of authentication information sent from another network node is verified based on the authentication information stored in the authentication information storage unit. If the verification fails, i.e. if the authentication information cannot be successfully verified, then communication is denied. It is thus ensured that communication is carried out only with such network nodes that were brought into the limited-access region and were authenticated correctly therein.
In an advantageous embodiment of the method, a revocation information list is transmitted together with the authentication information to the initialization device and then stored in the temporary authentication information storage unit. Upon the start of operation of the network node, the revocation information list is transferred into the authentication information storage unit and distributed via the computer network to other network nodes. It is therefore no longer necessary to have direct access to the root certificate authority for accessing the revocation information list.
If a revocation information list is provided, the authenticity of authentication information sent from another network node is, advantageously, additionally checked as to whether the authentication information is contained in the revocation information list. If the authentication information is contained in the revocation information list, the communication process is denied.
FIG. 1
10
12
10
10
14
shows a computer network as well as a limited-access first region assigned to the computer network , the computer network having a public second region .
16
12
16
18
18
18
12
A root certificate authority also referred to as RootCA is disposed in the first region . The RootCA has a communication device configured as a wireless short-distance data transmission device. For wireless communication, the communication device thus only has a near field which in this case is configured as an RFID. Thus, the communication device has a very limited communication range that does not extend beyond the first region .
16
20
20
The RootCA has a signing device in which a root key information is stored in such a way that it cannot be read out from outside. By means of the root key information, the signing device is capable of digitally providing digital information with a signature information in such a way that its authenticity is ensured.
22
24
26
14
22
26
24
26
A plurality of network nodes , , interlinked with each other is disposed in the second region . The network node is linked by means of a cable-based connection to the network nodes that are configured as wireless access points for a WLAN. The network nodes are wirelessly linked to the access points via the WLAN.
22
24
26
22
24
26
16
20
Each of the network nodes , , has as authentication information a certificate (cert) that serves for authentication with respect to the other network nodes , , . In a typical PKI as it is provided in the embodiment presently described, the authentication information has a private key information, a public key information as well as the signature information prepared by the RootCA or its signing device .
22
24
26
24
24
26
16
26
16
22
24
26
26
22
24
26
22
24
26
In order to verify the authenticity of the authentication information provided by the other network nodes , , , the network nodes , , can have a certificate from the RootCA . In addition to their certificate, the access points have a certificate revocation list (CRL) in which it is stored which authentication information was revoked by the RootCA and is therefore invalid. If a network node , , attempts to log on to the access point with such an authentication information, it is denied the connection. If a network node , , receives messages from another network node , , that are not accompanied by a valid authentication information, then these messages can be discarded.
28
10
28
16
10
28
10
In order to be able to connect a new network node with the computer network , the new network node requires a valid authentication information. Because the RootCA is not linked to the computer network , the new network node is unable to obtain this authentication information via the computer network .
28
10
28
22
24
26
28
28
30
28
22
24
26
FIG. 3
Before the new network node is allowed access to the computer network , proof is to be furnished that the new network node or its user has access authorization. In order to transfer the authentication information, the network nodes , , , , as is shown in by way of example for a new network node , have an initialization device . The following description of the new network node can applied in the exact same manner to the network nodes , , .
30
32
34
32
18
The initialization device has an initialization communication device with an RFID antenna . The initialization communication device is configured as an externally power-supplied RFID receiver and requires no power supply of its own because the operating power is provided by the associated transmitter, in this case the communication device .
30
36
32
36
18
16
36
32
30
38
32
In addition, the initialization device has a temporary authentication information storage unit . The initialization communication device exclusively has write access to the temporary authentication information storage unit , in which it can store authentication information received from the communication device of the RootCA . It is thus excluded that authentication information stored in the temporary authentication information storage unit is read out by means of the initialization communication device . In addition, the initialization device can also have working memories to which the initialization communication device has both write and read access.
28
40
30
40
40
36
40
36
36
40
40
22
24
26
28
The network node has a processing device with its own authentication information storage unit and a network communication device. The initialization device and the processing device are functionally independent from each other. However, the processing device is able to read-access the temporary authentication information storage unit . When the operation of the processing device is started and it does not find any authentication information in its authentication information storage unit, it checks whether the temporary authentication information storage unit contains authentication information. If that is the case, the authentication information is copied from the temporary authentication information storage unit into the authentication information storage unit of the processing device . Then, the processing device is able with its own network communication device to establish an authenticated link to the other network nodes , , , .
28
60
18
32
28
FIG. 2
A method by means of which the new network node is able to obtain valid authentication information is shown schematically in . In a first step , the communication device requests from the initialization communication device information on the new network node .
62
32
18
64
18
66
20
In a second step , the initialization communication device transmits this information to the communication device . In a third step , the communication device generates key information as well as certificate information. In a fourth step , the key information and certificate information are transmitted to the signing device for signing.
68
20
22
24
26
28
20
18
70
32
In a fifth step , the signing device signs the key information and certificate information. The signed key information and certificate information together form the authentication information for authentication to other network nodes , , , . The signing device transmits this information to the communication device , which in turn transmits the authentication information in a sixth step to the initialization communication device .
32
36
40
28
40
Thereupon, the initialization communication device stores the authentication information in the temporary authentication information storage unit . The processing device of the new network node need not have been switched on yet at this point in time. Therefore, the entire process may proceed completely without the processing device .
40
72
36
32
74
If the processing device is switched on, then it requests in a seventh step the authentication information from the temporary authentication information storage unit of the initialization communication device and receives it in an eighth step .
40
76
32
32
36
It can be provided that the processing device in a ninth step transmits a command to the initialization communication device which leads to the initialization communication device destroying itself and, above all, the temporary authentication information storage unit .
10
16
10
For authentication, the computer network thus uses an onboard PKI with a certificate authority/RootCA separated from the network. The root certificate is protected against being read out. In particular, it cannot be read out through the computer network . The authentication information, for example in the form of a certificate, and revocation information list/CRLs are transmitted via a unidirectional out-of-band interface.
22
24
26
28
The transmission of the certificates and the CRLs requires no power supply of the network nodes , , , of their own. The transmission is locally limited; thus, a physical authentication (access authorization) is caused.
16
16
22
24
26
28
The level of security of the RootCA is higher compared to a solution with a RootCA linked to the network, with lower costs at the same time. Furthermore, the organizing effort for authenticating new network nodes , , , is greatly simplified. No further roles and mechanisms (trust agent or registration authority, for example) are needed in addition to the already existing organizing effort of the physical limitation.
16
22
24
26
28
12
12
16
22
24
26
28
14
12
14
In order to realize the onboard PKI solution, the PKI infrastructure is divided into two regions. The RootCA , which is considered the trust anchor for all network subscribers/network nodes , , , , is located in a first region with limited physical access, for example in a cockpit of an aircraft. Only persons with access authorization for this first region with limited physical access can directly access the functions of the RootCA . All other network components/network nodes , , , are located separate from this in a publicly accessible second region . There is no direct communication link between the regions , , neither cable-based nor via a radio interface.
16
16
16
16
The RootCA is responsible for issuing new certificates (authentication information) and to maintain an up-to-date certificate revocation list (CRL). All certificates that are no longer valid are recorded on this list. The list can be supplemented by manual input on the RootCA or by automatic processes of the RootCA . By signing the most up-to-date list by means of the secret key (root key information) of the RootCA , all network subscribers are able to verify the correctness of the CRL.
16
16
The private key (root key information) of the RootCA , which is required for all functions, is stored in a secure key storage unit. This key storage unit can be realized, for example, as a hardware security module or a smart card. All cryptographic operations that require the use of the private key are carried out by the key storage unit itself. The private key therefore never leaves the key storage unit. This is advantageous in that the private key cannot be read out even in the case of a physical access to the RootCA . Particular care can be taken to secure the key storage unit against side channel attacks, as is the case, for example, in smart cards.
22
24
26
28
24
24
24
FIG. 2
If a network subscriber , , , (a sensor node , for example) is replaced, then the certificate of the old sensor node is entered into the CRL/revocation information list, and a new certificate is issued for the new sensor node , as is shown in .
16
24
24
16
24
12
FIG. 3
The communication between the RootCA and the new sensor node is made possible by means of RFID (radio frequency identification). The advantage of this communication method lies in the fact that the sensor node requires no power source of its own for this process but is externally supplied with power by the RootCA . The schematic structure of the sensor node is illustrated in . Furthermore, RFID can be used as an ultra-short distance radio technology. This means that the communication cannot be monitored or influenced from outside the limited-access first region .
30
24
16
18
16
20
36
In the storage unit of its RFID controller, which in this case forms the initialization device , each new sensor node has information about itself in store (for example serial number, device class, etc.) In a first step, this information is read out by the RootCA , or its communication device . Then, the RootCA , particularly its signing device , generates a new pair of keys (consisting of a private and a public key), generates a new certificate using the information read out from the sensor, and uses its own private key to sign the certificate. Then, the pair of keys and the certificate, which together form the authentication information, are transmitted back to the sensor by means of RFID. In the process, the RFID controller of the sensor stores the key and the certificate in a storage area/block which the RFID controller can only write into, but not read (write only) (temporary authentication information storage unit ). In this way, it is impossible to read out the key via RFID.
24
24
40
24
36
Then, the sensor node is brought to its actual installation site. Once the sensor node is switched on by its own power supply (battery or cable), it passes through an initialization phase (once). In this phase, the main processor (processing device ) of the sensor node reads out both the pair of keys and the certificate from the temporary authentication information storage unit of the RFID controller and stores them in its own protected storage unit. Then, depending on a request, a destruction sequence can be transmitted to the RFID controller. Thus, the RFID controller self-destructs and becomes inoperable.
The cryptographic operation of the sensor then runs as in conventional systems. Remote stations (other sensor nodes, access points and other network subscribers, for example) can be identified by their certificates and thus establish trust relationships.
10
16
16
22
24
26
28
24
22
24
26
28
10
26
16
The CRL comes into the active part of the computer network in a similar way as the authentication information. The list signed by the RootCA is transferred by the RootCA onto the RFID controller of a sensor or an RFID module of another network subscriber/network node , , , . Once the sensor node or the network subscriber , , , establishes a connection to the computer network , the CRL can be distributed to the connected access points , for example. During the transmission, the CRL is secured against unnoticed manipulation by means of the attached signature of the RootCA .
16
In this way, the CRL can be updated at any point in time without there being a direct communication link to the RootCA . The transmission of the authentication information, of keys, certificates and the CRL takes place via unidirectional out-of-band signaling.
22
24
26
28
The invention permits the improvement in a simple manner of the security of using a PKI for the authentication of network nodes , , , of a computer network in an aircraft.
DESCRIPTION OF THE DRAWINGS
The invention is explained below in more detail with reference to an exemplary embodiment that is schematically depicted in the attached Figures. In detail:
FIG. 1
shows a structure of an embodiment of the computer network;
FIG. 2
shows a message transmission diagram; and
FIG. 3
shows a detailed view of a network node. | |
‘Following the money’ for borough president candidates
There are 12 candidates who have filed for Brooklyn borough president, according to the city’s Campaign Finance Board. How much money have they raised, and who have they raised it from?
We’ll concentrate on the four who already hold elected office. The information is courtesy of the CFB’s online feature, “Follow the Money.”
This site gives you not only the amount of money each candidate has raised, but the names of their donors and the amount of money each donor has given. From this, you can also deduce information about a candidate’s donor base.
If only money determined the election, two of them —Councilmember Robert Cornegy and Assemblymember Jo Anne Simon — would be the main candidates, with Councilmember Antonio Reynoso trailing behind and Councilmember Dr. Mathieu Eugene a distant fourth.
Along with the total amount the major candidates have raised, as of last week, we’ll also mention the amounts raised by “heavy hitters,” people or organizations donating $1,000 or more, and what these people represent. In addition, two or more people with high positions in the same medium-size business (or two or more members of a family) commonly give separate contributions to a particular candidate.
We must first note, of course, that money does not guarantee election. There are many examples of candidates who have won despite raising less money than their rivals. However, money is important to every political contest.
Leading the money race as of last week is Councilmember Cornegy, who had raised $249,639.99. The look at his big donors shows heavy support from labor unions, blue-collar businesses and real estate.
For example, he received five donations from people affiliated with Local 32 BJ, $1,000 from CWA District 1 PAC; $1,500 from the International Union of Operating Engineers, and $1,000 from Dalia Lamming-Tilly, comptroller for TWU Local 100.
Cornegy also received $1,000 from developer Daniel Brodsky; two donations, $1,000 and $500, from Ofer Cohen, president of commercial realtor TerraCRG; $3,950 from Noah Katz, of PSK Supermarket; $1,500 from Margo Catsimatidis, wife of grocery-store and real estate billionaire George Catsimatidis; $1,000 from Alan Levitt, owner of Big Apple Compactor, and more.
In other fields, Cornegy also received contributions from Alan Fishman of Ladder Capital, also chairman emeritus of BAM; and George Arzt, political consultant.
Second is Jo Anne Simon, who raised $117,850 as of last week. Among her bigger donors are well-known Court Street attorney Gregory Cerchione, with $1,500; Nancy Schuh, the head of a real estate management firm, also with $1,500; Jay Snyder of HBJ Investments, who has long been active in Democratic Party politics, with $1,500; a political club, the Central Brooklyn Independent Democrats, with $1,000; Henry B. Gutman, with $1,000; Local 891 of the International Union of Operating Engineers, located in the Brooklyn Navy Yard, with $1,000; and Dawn Cardi and Edgar Cardi, both attorneys with Cardi & Edgar LLP and both with $1,500.
Another donor to Simon’s campaign, listed as William Harris, retired, with $1,500, may be her husband, Bill Harris, well-known as a real estate broker in Boerum Hill and nearby areas. Simon herself contributed $4,500 to her own campaign.
All in all, however, the list of big donors to Simon’s campaign is a fairly short one. This means that most of the money for Simon’s campaign has been raised from donors contributing a smaller amount.
Antonio Reynoso, as of last week, had raised $166,395.59. Among his larger donors were Anthony Diaz and Mariano Diaz, both associated with C-Town supermarket, with $1,500; the Soft Drink Brewery Workers PAC, with $1,000; Theatrical Teamsters Local 818, with $1,000; two people associated with the financial Madison Group, with $1,000 each; International Brotherhood of Teamsters local 813, with $1,500; and more.
Since Reynoso’s district encompasses Williamsburg, Bushwick and Ridgewood, several large contributors hail from that area: for example, Martin Needelman, attorney with Brooklyn Legal Services A, with $1,500; Miriam Gross, associated with the Williamsburg Hotel, with $1,500; and Jonathan Flothow of Steve Winter energy conservation, in Ridgewood. Finally, Peter and Susan Restler, parents of Brooklyn political figure Lincoln Restler, contributed $1,000.
From the money point of view (and again, money alone doesn’t win elections), Councilmember Eugene, who raised $38,137.00 as of last week, has a way to go to catch up with three above-named candidates.
As far as big donors are concerned, he received $1,500 each from Benjamin Kahan and Jerome Kahan, both affiliated with Sheepshead Nursing and Rehabilitation; $1,000 from Yolanda Lezama Clark, nursing instructor and author of a children’s book on the West Indian Day Parade; $1,500 from Jean-Paul Ho, a real estate broker; $1,000 from Louis Belzie, a psychiatrist; $1,000 from Dr. Edouard Hazel, a physician, and several others.
The preponderance of people in medical-related fields may reflect the fact that the Haitian-born Eugene himself has a medical degree. Although Eugene doesn’t practice medicine nowadays, he’s still active in health issues. | https://brooklyneagle.com/articles/2021/02/03/following-the-money-for-borough-president-candidates/ |
How do you simplify #(3x^3)/ (12x^2+ 9x)#?
1 Answer
Jul 13, 2015
Answer:
You can divide 'top'and 'bottom' by the same numbers.
Explanation:
One first condition/restriction is that
or the numerator will be
After that we can divide everything by
Which gives us the next restriction: | https://socratic.org/questions/how-do-you-simplify-3x-3-12x-2-9x |
[Anatomic study of peroneal tendofascial flap combined with adipofascial flap for the repair of heel tissue defects].
To study the anatomy of peroneal tendofascial flap combined with adipofascial flap for the repair of heel tissue defects. The lower extremities of five cadavers (10 sides) were perfused with red latex, the blood supply of peroneal tendofascial flap and vicinity adipofascial flap were observed. The diameter, course, branches and location of the blood vessels were measured. Eight fresh cadavers (16 sides) were perfused with lead oxide-gelatine mixture. The covering fascia tissues of the lower extremities was obtained and photographed by X-ray. The vascular anastomosis and association of nutrient vessel of peroneal tendofascial flap and vicinity adipofascial flap were observed. Two adult lower extremities specimens (4 sides) were used to construct vessel diagrams for observation of the course, distribution and anastomosis of the vessels. Eight cases were treated successfully with theses flaps. The blood supply of the combined fascial flap is multi-originated. For the area within 4 cm below and above the lateral malleolus cusp, the blood supply includes 2-5 branches from heel lateral artery with an average diameter of (0.5 +/- 0.2) mm, 1-2 branches from posterior lateral malleolus artery with an average diameter of (0.6 +/- 0.2) mm and 2-3 branches from the descending part of perforating branches of peroneal artery with an average diameter of (0.5 +/- 0.2) mm. The blood supply of area 4 cm above lateral malleolus cusp is 1-3 branches from intermuscular septum perforating branches of peroneal artery with an average diameter of (1.0 +/- 0.2) mm. These above branches are anastomosed each other and also send off many smaller branches to form vascular net around tendon. The fascial flaps and free skin grafts in eight patients were completely survived. All patients were followed up for 3-24 months, the donor and recipient sites were healed very well. The functional and cosmetic results were satisfactory. Peroneal tendofascial flap combined with adipofascial flap, with proximal pedicle or reverse distal pedicle, can be used to repair the defect at the lower leg and refractory small- and medium-sized defects at the heel.
| |
An analysis of a character in literature constitutes an extension of a person’s verbal representation especially the inert behavior that controls speech, manner, and thought. Through the direct speech, actions, dialogue, and commentary, literature encapsulates some of the natural interactions in character. The traits of a character must be evident in any character analysis report or essay.
For instance, characters may be confident, lazy, noisy or quiet, careless, etc. Also, the physical outlook of a character is also important as this helps in matching a character or contrast the particular aspects of the character. In fact, even the name of the character is significant as it can contribute into a demonstration of an individual trait. For instance, Shakespeare uses ‘Hamlet’ as a name of a character to picture the size of the character. The name refers to a tiny doomed thing, and this explains why the character is fighting with himself. For instance, when a person feels mentally unstable, it is likely to expect a self-harm from such a character, as well as the harm caused to others. A good example of a name impact is Hamlet’s retreating after becoming unstable. He decides to harm the entire kingdom. Summarily, the complete obliteration is a manifestation of his inner struggle and the inability to restore sanctity.
The process of character analysis entails three main structural aspects. First is to identify the character, second is to describe a character, and third is to explain or appraise a character based on the behavior, actions or any other interactive influence. With identification, it is always important to select a genuine character and the one who plays a significant role in the literary works. One of the clues in identifying a character is by establishing the importance of a particular character in a literary work. Protagonists can be distinguished from lesser characters. As with character description, the process entails providing an overview of the role a character plays in the story. Lastly, an explanation of a character involves an account of a character in tandem with other characters in the literature work. The key areas of interpretation include the motivation behind a character’s behavior; the significance of a character’s actions; a characters relations with others in the story, and the theme generated through the actions.
Character analysis is crucial in literature for a number of reasons which include the revelation of the central theme in the story, identification and separation of the main characters from secondary ones and defining their relationships, as well as the determination of the conflict in the literature work. In other words, the analysis of a character gives the reader clues to learn more than only the outlook of a person. So, it helps to make every character of the story seem real and more appealing to readers.
As with the central theme, an analysis aims to establish the main idea posed by the author of the story. Such inner meaning can only become evident through character analysis. Often, the behavior, actions, and dialogue of the characters reveal the theme of the play, story, fiction or any other literary work. However, narration or play may have more than one theme. Through analysis, the main topics may be organized to identify the central and subsidiary themes. A look at the Hamlet as a character reveals the intention of Shakespeare’s writing.
The theme of certainty, the theme of action, and theme of revenge are some of the key themes shown through an analysis of the Hamlet protagonist. Certainty theme is evident through the postponement of Hamlet’s actions while he kept trying to determine the certainty of what he was doing. The play poses several questions that have no particular answer. Because of the shadows of death in the play, it is impossible for Hamlet to determine for certain, the factuality about crimes that have no evidence. This theme is only evident as one tries to evaluate the meaning of the play.
Character analysis also helps in the identification of the main character. This is important because the main characters contribute to understanding what the author was aimed to say and provides a revelation of the main themes. Often, the main characters constitute a significant part of the dialogues, actions, and other interactions. In a play, for instance, two main characters are likely to prevail – one is a protagonist and the other secondary. Hamlet is identified as the main character because of the taken role in the play. Because of the inherent revenge within the play, Hamlet’s emotion leads us to the identification of other main characters including Claudius, Gertrude, Polonius, Ophelia. Regardless of their existence, Hamlet is still the main character because of some relations. For instance, Ophelia is used by his father to spy Hamlet and thus demonstrates that even minor characters like her father are focused on Hamlet. Other key points of analysis are as follows.
The social life of a character constitutes what the character does while interacting with others. In this aspect the analyst endeavors to establish whether a character has an aptitude for developing a friendship, does the character treat others with respect, does the character have a relationship, and does the character have religious leanings and so forth. Concerning Hamlet play, it is evident that despite being a prince, Hamlet has a social life as seen in his interaction with characters like Claudius and Polonius. As with intimate relationship, Hamlet seduced Ophelia even though she was used later to spy on him.
Morality refers to the ethical standards that are observed in society. In analyzing any morality in a literary work, the basis is the generally accepted code of conduct. If speaking of Hamlet, Shakespeare succeeded in creating a great character and illustrated the high complexity of the persona. Even without the support of Shakespeare’s elaboration, the description of the main character who can be described as very cautious yet very courteous. However, due to an altercation with other characters and negative events, Hamlet’s moral characters changes to being reckless, unstable and downright unfriendly. Despite the desire to revenge, Hamlet’s religious moral helps him to vacillate the killing of Claudius.
Regarding language, Hamlet presents a tremendous sense of arrogance when responding to subjects. For instance, when Polonius asked him about what he reads. The Hamlet’s response is that he reads words. Such character is depicted as arrogant through the relative answer because everything: a play, a book, a song or many other things are a collection of words. However, Hamlet distinguishes himself as the most attentive character in the play. This is unlike Polonius’s mastery of language which is very shallow instead he seems to master rhetoric.
Summing up this guide, it is important to reiterate that character analysis entails the appraisal a person’s direct speech, actions, dialogue, and commentary in any literary work. Such analysis aims to identify the central message in the play, the major and minor themes, and the main and minor characters in the story. The author (s) tend to concentrate on one or two personas more, than on others thus making everything in the story center around them. In the reference play, Hamlet mentioned in this discussion; every other character revolves around the main character – Hamlet. Other aspects of analyzing the character include the physical outlook, the name chosen by the author, the language used by the character, and the character’s social life. Summarily, an understanding of a character through analysis makes the literature work very interesting and easy to understand.
I am a blogger and an experienced content marketer. I share my opinion on the spheres of literature, poetry, classic music. | https://writing.wikinut.com/Character-Analysis-in-Modern-Literature/167h-_y4/ |
The City of Salina will begin collecting leaves next week. According to the City, the Annual Curbside Collection Program will be conducted from November 3 to December 31, weather permitting.
Program Participant Guidelines and Information:
- Rake and pile leaves between the curb and sidewalk. If no sidewalk exists, pile leaves directly behind the curb.
- Do not place, rake or blow leaves into the street; it is a City code violation, a hazard to traffic and may prevent storm drainage systems from working properly.
- Do not park vehicles directly in front of or behind leaf piles, it makes collection more difficult.
- Leaves in alleys will not be collected.
- Leaves must be ready on the first day your zone is scheduled for collection.
- There will not be another round of curbside leaf collection this year.
Schedule of leaf pickup:
- Zone 1 All of the city south of Republic Ave. November 3 – November 14
- Zone 2 Between Crawford St. and Republic Ave. November 17 – November 28
- Zone 3 Between Iron Ave. and Crawford St. December 1 – December 12
- Zone 4 All of the city north of Iron Ave. December 15 – December 31
City Sanitation customers can expect crews to continue collecting leaves placed in bags or yard waste carts, set alongside refuse carts on their regular trash collection day. Trash and leaves cannot be mixed; bags of leaves along with other yard waste materials are transported to a special location for compost recycling. | https://www.ksal.com/salina-leaf-collection-begins-next-week/ |
Containers have and will continue to disrupt software development and distribution. Containers enable software to be easily deployed across environments by forcing a consistency in the software’s development and operating environment. This, in turn, makes it easier for developers to build and deploy their code, and also restricts the number of production issues arising from differences in the operating and development environments. Container technology has a direct impact on the agility of a software development team and consequently have seen a huge increase in interest, adoption and usage.
Differences in development and production environments
Software production deployment typically faces hiccups due to the following types of differences between the production and development environment:
Tools, libraries and OS and infrastructure
Often, variations in the infrastructure, operating system, libraries, and tooling are responsible for the unexpected and unforeseen behavior of software outside the development environment. Applications that have been thoroughly tested and deployed in non-production environments can still exhibit patterns that do not match the intended design of the development team. This is because slight variations arising from different versions of libraries or from slightly different implementations of the tooling or differences in the state of the operating system can impact and change the behavior and reaction of a piece of software has to its inputs.
Network topologies
Production systems typically have a lot more fine-grained and robust network topologies to enable high levels of connectivity and availability. Developers typically will not have access to nor use topologies similar to production networks while developing the application. Given the differences in the software, hardware and networks associated with production and development environments, software that works reliably in a development environment network topology can face issues when running in a production environment network.
Security policies
Development environments almost always have vastly different security policies compared to production environments. Most commonly, developers typically have ‘root’ level privileges in their development machines whereas, in production, most applications do not operate with root level access. This means that software which might be operating with the highest levels of permissions and access to the local development environment may not be able to do so in production. In addition, security policies, access control etc. are often implemented with very different libraries, protocols, and techniques making it likely that the software will stumble in production.
Storage
Development environments typically let developers use local disk and file storage for application development purposes. Developers can easily access the local file system and use it to read, write and store data. However, in a production environment, storage mechanisms can vary from central, network storage or cloud storage. Such variations in storage can make the application behave differently and assumptions made during development might not hold in production.
Best practices to manage development to production transitions with containers
While containers offer a solution to the problem of incongruent development and production environments, they also open up new challenges if used incorrectly or inappropriately.
Using malicious images
Base container images sought by developers can be infected with malicious or low-quality code and configurations that infect every application built on top of the image. Such vulnerabilities can also make it possible for the application to be taken over by a remote attack once deployed to production. Developers should only download and use images from trusted sources and use one of several available image vulnerability scanning solutions available to ensure that the images are trustworthy. Central IT teams should ensure that enterprise developers cannot download container images from outside the enterprise unless and ensure that all images that are deployed to production have been certified by IT, Security and QA.
Creating unsecure images
Developers that are creating and contributing images to the central registry for other developers to find and reuse should be very careful about the data that they include in the images. Information such as secrets, passwords, application data, user data etc. can often be, inadvertently, left inside the image and the image with the data shared with other developers. Developers should double check that any such data is not left inside the image. In addition, tooling should be built and leveraged that can list and identify such data leakage issues.
Signing images
It is a good idea to have various development teams to sign the container images before the image is deployed in production. This ensures that the deployment team can verify that the images are known, trusted and verified for quality. This also mitigates the introduction of malicious or corrupted images from entering the production environment.
Time drift
For best application performance in an ecosystem of applications and services that communicate with each other, it is critical that all containers and the applications running in the containers are synced to the same clock to avoid time drift and the resulting unpredictable application behavior.
Monitoring container behavior
Another very useful technique to ensure high performing container based production deployments is that of profiling, baselining and monitoring. Automatically monitoring container behavior across the data it accesses, the services it accesses and the operations it performs is extremely important. Any deviations from the expected or usual behavior should be quickly detected and addressed.
Data backup and storage
Because containers offer fast boot up and teardown and are dependent on the continued availability of the underlying infrastructure, it is very important that container level backup is implemented. Procedures that backup container data and information continuously to protect against data loss from any infrastructure or production environment level outages and issues are well established and should be aggressively adopted.
This article is published as part of the IDG Contributor Network. Want to Join?
Next read this: | https://www.cio.com/article/3241030/containers/best-practices-for-a-secure-and-trustworthy-container-platform-strategy.html |
Respect is something that everyone wants to receive from others and that others want to give. For some people, earning it can be challenging because it requires a certain amount of effort. But in reality, respect cannot be bought or given for free; instead, it must be earned through one’s behavior toward others.
The Reasons Why Respect Is Earned
You can’t buy respect, and you won’t get it if you expect to be respected for any reason other than because people want to respect you.
There’s no magic way to suddenly make yourself seem more important or worthy of respect than the people around you.
If you’re dealing with someone who doesn’t show you respect, the best thing you can do is show them how much they mean to you, which will make them treat you better. The more respect you show others, the more they’ll want to return the favor. Never forget this.
Respect takes many forms and can be expressed in many ways:
- Respect for diversity – This means accepting people who are different or want different things from us and treating them courteously.
- Respect for disagreement – We shouldn’t disrespect those who disagree with us. If you disagree, just withdraw from the conversation. If everyone did that, there would be less conflict.
- Respect for Elders – Respect for elders is something I was taught as a kid. It shows that we value their experience and wisdom, and it’s the first step in learning courtesy, even if some elders aren’t always pleasant.
- Respect authority – This means respecting those who’ve power over us, such as parents, teachers, police officers, politicians, business people, and other leaders in our community. But not everyone is a role model, and sometimes it can be a challenge to respect them, but sometimes you may not be doing it for them, but for your peace so that you don’t get into unnecessary conflicts.
- Respect for nature – We should treat the earth with utmost care because it provides us with food, fuel, and other resources we need to survive. It also provides us with the beauty that makes life worth living. This should be a golden rule in every culture.
Respecting Ourselves Is the First Step
Nothing is given to us as a gift. It takes time, effort, and patience to build trust, respect, and admiration in the eyes of others.
First and foremost, respect yourself by accepting who you’re. You may not be perfect, but you’re good enough. You may not be the most intelligent person in the room, but that doesn’t make you stupid.
You’re unique and distinctive. Your talents, skills, and abilities are all special in their way. No one else has had your experience or will ever have it again. So embrace who you’re and what you’ve to offer the world because it’s valuable.
The first step to earning respect is to respect yourself. It’s a simple concept, but it’s not so easy to get it right. It often takes years of self-reflection and self-acceptance before we can truly accept who we’re and what we stand for.
Treat Yourself With Love and Care Because Your Body Is Your Temple!
Your body can heal itself only if we give it what it needs (food, water, and exercise).
Eating clean, nutrient-dense foods allows our bodies to function correctly, which reduces the likelihood of getting sick! The same goes for exercise: Exercise helps our body’s blood flow and helps us stay healthy throughout the year! Being active also helps us sleep better at night.
Respect Is the Key to All Relationships
Respect is vital in many relationships, but it’s essential in friendships. Friendship is about giving, sharing, and helping others when needed.
We can show respect by listening to what our friends are saying, rather than just waiting for them to finish so we can put in our point of view. We can also show respect by honestly sharing our feelings and opinions with them, even though it may hurt or upset them.
Respect also means respecting each other’s differences – whether they’re physical (e.g., height or weight), emotional (e.g., feelings about school), or cultural (e.g., religious beliefs). By respecting these differences, everyone involved can show their true selves without fear of being judged or ridiculed by others.
Respect Should Go Both Ways
In an ideal world, respect is a two-way street, but it doesn’t always work that way. If you want to get respect from others, you must give it first.
You can’t demand respect from others and expect them to give it to you without asking.
- Respect is a mutual feeling between two people. So if one person shows disrespect to the other, nothing will change.
- Respect means being considerate of other people’s needs and wants. It means having good manners and being polite. Respect means treating everyone equally, regardless of age, race, gender, or religion.
- Respect is an essential aspect of life that helps us get along. If we’re respectful to others, they’ll usually be respectful to us. Lack of respect can lead to bullying and conflict at school and workplaces, so teaching children how to respect others early is essential. It is important to teach them how to show respect to others, but it’s also essential for a young person to feel respected. If a young person feels respected, she’s more likely to show the same level of respect to others and become a role model!
Mutual Respect Helps Build Stronger Relationships
Mutual respect is a two-way street. If you want to earn another’s respect, you need to give it back:
Respect the individuality of every fellow human being, whether it’s your colleagues, parents, managers, teachers, or even strangers. Try to respect their personal beliefs and opinions, even if they differ from yours.
Respect must also be earned by respecting yourself and others around you.
You Can’t Buy True Respect
Most people may show you their deep admiration when you’re rich and powerful, but that doesn’t mean they show you genuine respect.
Genuine Respect Comes From Within and Is Earned Through Actions, Not Money or Looks
People show respect to others because they recognize that they share a common humanity with them. It’s a recognition of our commonalities and our shared humanity. And we’ve to earn it over time by showing that we’re worthy of respect.
It Takes Hard Work to Learn What Proper Respect Means
Respect can be defined in many ways. It can mean knowing your place in the social hierarchy or being aware of your abilities and limitations.
When we’re young and learning about life, most of us learn essential respect values:
Say please and thank you, hold the door for someone when they come through behind you (especially if they look like they need help), and don’t eat like a pig at the dinner table (or any table for that matter).
These simple ways show others that we care about them and their feelings. We should never forget that everyone wants to feel important, no matter who they’re or where they come from.
Learning what respect means, however, takes hard work. You have to work hard to learn how to treat others, and you’ve to learn how to behave in certain situations. Respect isn’t something you just get; you’ve to earn it over time by being considerate of others’ feelings.
In Life, Nothing Is Given to Us. Proper Respect Is Earned, and It’s a Choice
Respecting others is a rewarding experience that makes you feel happier about yourself and the world around you. It also makes for better relationships! But it’s important to remember that respect isn’t something you can buy or demand from others. You’ve to earn it by showing others that they’re just as important as everyone else – and maybe even more important because they’re different from us. | https://brilliantio.com/why-respect-is-earned-not-given/ |
Variation
Make Ahead
Mix matzo balls with soup; cool completely. Place in freezer container; cover and freeze up to 3 weeks.
Servings
9 servings, about 1 cup soup and 2 matzo balls each
Diabetes Center
Carb Choices: Carb Choice
Nutrition Bonus
Nutritional Information
Serving Size 9 servings, about 1 cup soup and 2 matzo balls each
AMOUNT PER SERVING
Calories
250
% Daily Value
Total fat
11g
Saturated fat
2g
Cholesterol
125mg
Sodium
920mg
Carbohydrate
15g
Dietary fiber
1g
Sugars
4g
Protein
17g
Vitamin A
70 %DV
Vitamin C
6 %DV
Calcium
4 %DV
Iron
6 %DV
* Nutrition information is estimated based on the ingredients and cooking instructions as described in each recipe and is intended to be used for informational purposes only. Please note that nutrition details may vary based on methods of preparation, origin and freshness of ingredients used.
Ratings & Reviews
Ratings & Reviews
Rate this Recipe
Leave a Review
quiltlady19quiltlady19|Sun, Dec 2 2012 10:05 AM
CINDY97CINDY97|Fri, Feb 4 2011 6:47 PM
It was really cold and this soup was great.
I substituted gnocchi for the matzo balls, also added a can of veg all...
sallycat69sallycat69|Sun, Jul 25 2010 8:27 PM
My hubby was under the weather, and this recipe hit the spot. I used egg noodles, extra chicken & carrots, therefore, more liquid. It was even better the next day.
I look forward to making this soup again.
| |
One-third of plant and animal species could be gone in 50 years, study says
The common giant tree frog from Madagascar is one of many species impacted by recent climate change. Credit: John J. Wiens
Accurately predicting biodiversity loss from climate change requires a detailed understanding of what aspects of climate change cause extinctions, and what mechanisms may allow species to survive.
A new study by University of Arizona researchers presents detailed estimates of global extinction from climate change by 2070. By combining information on recent extinctions from climate change, rates of species movement and different projections of future climate, they estimate that one in three species of plants and animals may face extinction. Their results are based on data from hundreds of plant and animal species surveyed around the globe.
Published in the Proceedings of the National Academy of Sciences, the study likely is the first to estimate broad-scale extinction patterns from climate change by incorporating data from recent climate-related extinctions and from rates of species movements.
To estimate the rates of future extinctions from climate change, Cristian Román-Palacios and John J. Wiens, both in the Department of Ecology and Evolutionary Biology at the University of Arizona, looked to the recent past. Specifically, they examined local extinctions that have already happened, based on studies of repeated surveys of plants and animals over time.
Román-Palacios and Wiens analyzed data from 538 species and 581 sites around the world. They focused on plant and animal species that were surveyed at the same sites over time, at least 10 years apart. They generated climate data from the time of the earliest survey of each site and the more recent survey. They found that 44% of the 538 species had already gone extinct at one or more sites.
"By analyzing the change in 19 climatic variables at each site, we could determine which variables drive local extinctions and how much change a population can tolerate without going extinct," Román-Palacios said. "We also estimated how quickly populations can move to try and escape rising temperatures. When we put all of these pieces of information together for each species, we can come up with detailed estimates of global extinction rates for hundreds of plant and animal species."
A dead Alligator Juniper from Arizona. Unable to cope with rising temperature extremes, repeated surveys have shown that this species is literally being pushed up the mountain slopes under the impact of climate change. Credit: Ramona Walls
The study identified maximum annual temperatures—the hottest daily highs in summer—as the key variable that best explains whether a population will go extinct. Surprisingly, the researchers found that average yearly temperatures showed smaller changes at sites with local extinction, even though average temperatures are widely used as a proxy for overall climate change.
Previous studies have focused on dispersal—or migration to cooler habitats—as a means for species to "escape" from warming climates. However, the authors of the current study found that most species will not be able to disperse quickly enough to avoid extinction, based on their past rates of movement. Instead, they found that many species were able to tolerate some increases in maximum temperatures, but only up to a point. They found that about 50% of the species had local extinctions if maximum temperatures increased by more than 0.5 degrees Celsius, and 95% if temperatures increase by more than 2.9 degrees Celsius.
Projections of species loss depend on how much climate will warm in the future.
"In a way, it's a 'choose your own adventure,'" Wiens said. "If we stick to the Paris Agreement to combat climate change, we may lose fewer than two out of every 10 plant and animal species on Earth by 2070. But if humans cause larger temperature increases, we could lose more than a third or even half of all animal and plant species, based on our results."
The paper's projections of species loss are similar for plants and animals, but extinctions are projected to be two to four times more common in the tropics than in temperate regions.
"This is a big problem, because the majority of plant and animal species occur in the tropics," Román-Palacios said.
More information:
Cristian Román-Palacios et al, Recent responses to climate change reveal the drivers of species extinction and survival, Proceedings of the National Academy of Sciences (2020). DOI: 10.1073/pnas.1913007117
Citation:
One-third of plant and animal species could be gone in 50 years, study says (2020, February 12)
retrieved 12 February 2020
from https://phys.org/news/2020-02-one-third-animal-species-years.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
E-mail the story
One-third of plant and animal species could be gone in 50 years, study says
Note
Your email address is used only to let the recipient know who sent the email. Neither your address nor the recipient's address will be used for any other purpose.
The information you enter will appear in your e-mail message and is not retained by Phys.org in any form.
Your message
Newsletter sign up
Get weekly and/or daily updates delivered to your inbox.
You can unsubscribe at any time and we'll never share your details to third parties.
Your Privacy
This site uses cookies to assist with navigation, analyse your use of our services, and provide content from third parties.
By using our site, you acknowledge that you have read and understand our Privacy Policy
and Terms of Use. | |
Senior Software Engineer (Google Go/JAVA/Python)
LocationUnited States,
Remuneration $40 - $100 per hour
Employment type contract
Updated 07th Jan 2017
Company Selby Jennings
Contact Jack Bowen (NY)
Phone 6467594560
Description
My client are seeking a Sr. Software Engineer (Google
Go/JAVA/Python/C ) with 8 years of web programming and
architecture experience. Candidate will have extensive experience
with the design and development of web based applications and
enterprise integrations as they will be accountable for the
success of both the technical and functional aspects of a given
project.
- Ability to drive good software engineering practices including
configuration management
- Ability to write and envision algorithms
- Ability to take leadership in proposing, researching and
implementing creative technology solutions
- Perform the lead technical role in designing and implementing
practical, maintainable project solutions
- Maintain a consistent focus on quality for the entire project
- Perform code reviews; developing and adhering to coding
standards
- Stay current with emerging technologies and techniques
- Stay current with rapidly changing web standards
- Encourage team awareness and appropriate adoption of emerging
technologies
- Mentor junior team members
- Work with other departments to ensure high quality and timely
delivery
- Work comfortably within a dynamic challenging environment
within the parameters of delivery deadlines
- Maintain open lines of communication relating to the status of
a given projects and its risks and challenges
- Become a recognized subject matter expert within their fields
of expertise
- Must have a collaborative and positive attitude
apply online
Please enter your contact email below to apply for this job, if you wish to save your details for other jobs and add your curriculum vitae you need to create a free account with us, click here to do so | |
Labyrinth is the story of a teenage girl named Sarah (Jennifer Connelly), who one night wishes that goblins would come and take her baby brother Toby away. Little does she know that goblins exist, and that the Goblin King, Jareth (David Bowie), has Toby in his grasp. She has thirteen hours to solve the labyrinth and save Toby… or he’ll become a goblin.
David Bowie is electric as Jareth. Both menacing and beautiful, he brings so many different layers and facets to the role and steals every scene he’s in. Jennifer Connelly, on the other hand, annoyed me. She overacted during pretty much the entire film, and came off as whiny.
The effects still hold up today, and Jim Henson’s puppetry is a true work of art. I forgot that these were puppets on screen; they were their own individual characters, with different motives and personalities.
I adored Labyrinth, for the most part. David Bowie was a vision as Jareth, and the landscape of the film is gorgeous. The effects and puppetry are marvelous, and the story is original. My biggest issue is with Jennifer Connelly’s performance. | https://alycatgeekery.com/2016/09/30/labyrinth-1986-film-review-100-day-film-challenge-day-93/ |
Usually, self-help books do fairly well in book sales. Today, for example, the number one best-seller on Amazon is Jordan Peterson’s 12 Rules for Life. This review is NOT about that book.
Review? No — please allow these words to function more as a warning — A VERY LOUD WARNING.
I’m begging you, do not read Arizona author Joel C. Cunningham’s Keys to Success From a Completely Unsuccessful Person. Do not give it to your sons and daughters. Do not donate it to a local library. I never thought I’d type the following words, but this particular book should be considered nothing more than kindling.
However, if you have already read every other book on the market, and you honestly think one more might be your ticket to amazing success and riches beyond your wildest dreams, I’m begging you, please go back and reread them all again before you stop into a bookstore to request Joel C. Cunningham’s Keys to Success From a Completely Unsuccessful Person.
That being said, Dog-Eared Pages bookstore in Phoenix proudly offers signed copies of Keys to Success From a Completely Unsuccessful Person, and this hilarious book is also available online. | https://news.citysuntimes.com/2018/04/04/dog-eared-review-keys-to-success-from-a-completely-unsuccessful-person/ |
CROSS-REFERENCE
STATEMENT AS TO FEDERALLY SPONSORED RESEARCH
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
Incorporation by Reference
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF THE INVENTION
This application claims the benefit of U.S. Provisional Application No. 60/574,545, filed May 27, 2004, which is incorporated herein by reference in its entirety.
This invention was made with the support of the United States government under Contract number by NAME OF AGENCY.
Objects:
Process & Methods for Content Adaptive Learning
1.0 General Objects
1.a The invention will integrate methods and processes of observation and detection, proactive behaviors, learning, with behavior change into a Adaptive Learning for improving individual and team behaviors and performance.
1.b The invention will recursively apply methods and processes of data navigation to visually illustrate the level of synergy or dissidence between the observed views of all individuals involved in an interaction to guide self improvement and team learning.
2.0 Objects of Content Detection
2.a The invention will detect keywords & phrases in video, voice, and textual media streams in real-time based on expressed events of interest.
2.b The invention will detect emotional content in video, voice, and textual based interactions in real-time.
2.c The invention will detect attributes of interactions from this and other systems as a means of expanding the precision and breadth of business rules which can be created and acted upon.
2.d The invention will detect content in a manner which is time synchronized enabling accurate correlation of events and definition of causal relationships.
2.e The invention will apply a ‘consistent’ method of ranking confidence level of observed events of interest.
3.0 Objects of Pro-Active Behaviors Based on Business Norms
3.a The invention will provide methods and processes which enable it to contrast observed events of interest to business norms and industry standards and initial subsequent processing.
3.b The invention will provide a method of describing business norms to guide alerting and reasoning behavior.
3.c The invention will provide a visual and message based status and alerts, in realtime, to enable human intervention in interactions which are not meeting desired business norms.
4.0 Objects of Learning
4.a The invention will use temporal correlation of events of interest as a means to improve confidence levels.
4.b The invention will use temporal correlation and detection confidence levels as a means to show causal relationships and patterns of behavior over time (i.e. multiple interactions).
4.c The invention will detect content in a manner which is self correcting for improved accuracy over time & observed experiences.
4.d The invention will provide a method of ‘self learning’ based on past experiences and target norms.
4.e The invention will apply processes and methods of logic based reasoning to make recommendations.
4.f The invention will apply processes and methods of forward and backward reasoning to make recommendations.
5.0 Objects of Behavior Change 5.a The invention will use graphical techniques to present current performance levels for individuals and teams against business and industry norms. It will also graphically illustrate cause and effect relationships between events of interest of the participants.
5.b The invention will use gauges which incorporate business norms and average levels of performance to communicate actual status against business norms and guide behavior change.
5.c The invention will conditional communicate surveys to individuals involved in an interaction to collect their perspectives on the interaction consistent with the methods and processes of data navigation.
5.d The invention applies the methods & processes of data navigation to collected survey responses and integrates the visual presentation of business norms and recommendations based on individual and team experiences.
5.e The invention will apply graphical and textual representation of performance over time for specific business norms (metrics) vs. goals for individuals and teams.
Advantages:
An advantage of the invention is that it alerts supervisors and agents in real-time that interactions are occurring which exceed business norms enabling immediate action or escalation providing customers with a greater level of responsiveness and effectiveness of interactions.
An advantage of the invention is that it is highly configurable enabling an enterprise to set its own expectations of performance.
An advantage of the invention is that the system can dynamically alter its configuration based on past experiences enabling it to adapt to a changing enterprise.
An advantage of the invention is that it presents information in highly visual mechanisms which make the presentation of large volumes of information easy to view in a short period of time further enhancing the enterprises behavior to react to changes in interactions dynamically.
An advantage of the invention is that it applies the notion of triangulation to data navigation to enable members of the enterprise to see gaps or commonality of perspectives of performance helping guide corrective behaviors and learning within ‘minutes’ of the interaction events being detected.
An advantage of the invention is that it identifies in a real-time and proactive manner the places where supervisors and agents need to spend their time to improve customer satisfaction.
An advantage of the invention is that content is extracted from the media stream in real-time in the form of attributes, keywords, emotions, and gestures enabling accurate and timely assessment of the quality of an interaction with a customer.
An advantage on the invention is that the temporal correlation of content detectors results acts to improve the accuracy of the interaction as requiring supervisor intervention.
An advantage of the inventions is to graphically illustrate cause and affect relationships between events and participants in the interaction better providing insights for corrective behavior.
An advantage of the invention is that it identifies patterns of behavior in time enabling both spontaneous and longer term organizational learning.
An advantage of the invention is that it provided a means for supervisors to correlate key performance measures and customer satisfaction in a causal relationship graphically and textually.
All publications and patent applications mentioned in this specification are herein incorporated by reference to the same extent as if each individual publication or patent application was specifically and individually indicated to be incorporated by reference.
The novel features of the invention are set forth with particularity in the appended claims. A better understanding of the features and advantages of the present invention will be obtained by reference to the following detailed description that sets forth illustrative embodiments, in which the principles of the invention are utilized, and the accompanying drawings of which:
FIG. 1
illustrates a summary view of the major components of this Business system for providing the process and methods of Content Adaptive Learning for assisting teams with continuous improvement of customer service by a 360 degree view (Agent, Customer, & Manager) of their performance against goals and performance measures.
FIG. 2
illustrates a detailed view of the major components of this Business system for providing the process and methods of Content Adaptive Learning for assisting teams with continuous improvement of customer service by a 360 degree view (Agent, Customer, & Manager) of their performance against goals and performance measures.
FIG. 3
illustrates a summary view of a system's implementation of this Business system for providing the process and methods of Content Adaptive Learning for assisting teams with continuous improvement of customer service by a 360 degree view (Agent, Customer, & Manager) of their performance against goals and performance measures.
FIG. 4
illustrates an example visualizing information within this Business system for providing the process and methods of Content Adaptive Learning for assisting teams with continuous improvement of customer service by a 360 degree view (Agent, Customer, & Manager) of their performance against goals and performance measures.
While preferred embodiments of the present invention have been shown and described herein, it will be obvious to those skilled in the art that such embodiments are provided by way of example only. Numerous variations, changes, and substitutions will now occur to those skilled in the art without departing from the invention. It should be understood that various alternatives to the embodiments of the invention described herein may be employed in practicing the invention. It is intended that the following claims define the scope of the invention and that methods and structures within the scope of these claims and their equivalents be covered thereby.
1.0 Learning Center—the Learning Center is a web based integration of content & data management mechanisms which enables the storage of events, documents, rules, metrics, and media with objective. The Learning Center is central it all of the key components which are described in this patent and its implementation.
2.0 Content Detection—the key components of component detection are the 2.1 Tapping Devices which provide real-time video, audio and data streams to the 2.2 Content Detectors. The Content Detectors update the 1.0 Learning Center with Events of Interest, events determined to be significant to operation of the enterprise. Content Detection occurs on both the media stream of the customer and the enterprises agent in order to provide events of interest from both perspectives. All of the activities are temporally synced with time code information so that synchronization of events and the media content can be done spontaneously or in post processing. Another benefit of this temporal synchronization is to enhance the confidence level of detectors. By having near coexistence of detected events of interest from multiple detectors the confidence level of a significant event within an interaction is significantly increased. The real-time media stream can also be provided to 3.4 Live Monitoring, which enables supervisory personal to monitor interactions which have been flagged to contain events of interest in live mode.
Proactive Behaviors—The invention provides for near real-time proactive behaviors as a result of detected values in the 1.0 Learning Center by the 3.1 Alerting Engine, in the system which are manifest in many possible forms. The 3.2 Workflow engine can present these alerts in many forms they can be as simple as a basic text message, and RSS data feed, an IM message, data contained in a scrolling banner on user screens. The scope of the actions is bounded only by the content of the 3.4 Workflow Actions data store. Workflow actions can be any set of system behaviors which can be constructed in the chosen scripting language of the implementation. Alerts can also trigger subsequent processing such as the activation of the 4.1 Reasoning Engine. Additionally alerts can be in the form of indicator lights, gauges and charts which are presented within the user interface of the implementation by 3.3 Visual Data Provider.
4.0 Learning—Learning behaviors are realized by the 4.1 Reasoning Engines output 4.2 Recommendations which are provided to the supervisor and in some cases to the Agent based on parameters set by the implementations operators. 4.3 Rules optimization process looks at the gaps between the recommendations and the rules and adapts over time the 4.4 Rules store using both forward and backward reasoning techniques. This cycle creates a self learning loop which enables the implementation to adapt to observed experiences over time.
5.0 Behavior Change—to affect behavior changes in the agent's interactions with customers in the future a collection of information in many forms is summarized and presented in a timely manner. The 5.1 Agent Dashboard is a configurable Dashboard of gauges, indicators, charts, attributes and textual data designed to present a current view of an agents with respect to business norms, individual and team performance. This is a central to the notion of data navigation, in order to affect change in behavior you must be able to present a navigational aid which helps the agent see in a timely manner what should change. To assist in the process, the supervisor is provided a broader view of operations via the 5.2 Supervisor Dashboard. This similar collection of information and mechanisms enables a supervisor to quickly see the status of events of interest during the interaction and to determine how their time is best spent in monitoring or participating in live interactions to mentor the agent and improve customer satisfaction. 5.3 Customer Dashboard provides ‘controlled’ information to the customer who can assist the participants in the overall process of improvement by enabling them to highlight key performance areas, as well as provide direct feedback in the form of a survey. When significant events occur which exceed desired business norms intervening action can be taken, One such action would be the initiation of a survey process. Central to our notion of data navigation and the Content Adaptive Evaluation Process, is the 360 degree Survey process. 5.4 Agent Survey, 5.5 Customer Survey, and 5.6 Supervisor Survey are triggered by business norms being exceeded. Key is the well formed questions set of the surveys which ask the same question from the three perspectives of the Agent, Customer, and Supervisor. Using the same measurement system the results from these surveys are correlated in the graphical form showing any viewer the gaps or synergy in the responses from these three perspectives on a particular interaction. The survey event is an automatically generated warning flag for the supervisor indicating that business norms during this interaction have been exceeded. Thus providing a clear set of interactions to review in ranked priority, significance, and confidence which enables substantial savings of time with greater repeatability. This trigger 5.7 Evaluate Performance which the supervisor/mentor needs to perform with in a predetermined period of time. The inclusion of the survey data, actual information from the events of interest are synchronized with the media stream showing a causal relationship between keyword events, emotions and key attributes of the interaction. Presenting a visual timeline of events of significance and recommendations. 4.2 Recommendations comes from the 4.1 Reasoning engines processing, which is augmented by the supervisors own experience based and expectation. All of this information is summarized in 5.8 Agent Evaluation which shows the events, interaction, the consequences and the recommendations all in a format which is highly graphical and can play back the interactions in a synchronized manner with the events and recommendations.
FIGS. 4 & 5
The consequence of these connections and interactions enables Agents to understand how to improve their performance from every interaction. See as an example.
Operation:
Operation of Invention
Effective operation of the invention is comprised of a cycle three main activities configuration, Operation and learning. If an enterprise is effectively using the invention this cycle will repeated routinely insuring that the goals, key performance indicators, and business norms are evolving with the organization. Thus the invention is an embodiment of a full system which enables an enterprise to ‘live’ a continuous learning cycle.
1. Configuration
1.1 Setup
Installation and setup of the invention involves linkage of physical and the logical data which describes the communications channel and the users of that channel.
System parameters required to operate the system such as the location of system resources, directories, licensing, capabilities of installed software and hardware, and other parameters which describe how the system should operate in a particular system configuration (Single or multi-node systems).
Communications Channels include but are not limited to traditional PSTN Analog Trunk and Station lines, Digital Trunk & Station lines, VOIP communications, e-mail, instant messenger sessions, and web interactions. So the definition of these physical devices, their location and their logical mappings.
Description of system users, their relationships to each other and departments, customization data for a personalized environment, as well as the security and access control data on a user basis.
Description of the Dashboards which present ‘live’ information to system users.
Description of work-flow processes and methods.
Installation & Configuration of selected detector types to meet the objectives of the enterprise.
1.2 Define goals, key performance indicators and norms linked to Business Strategy Key to the operation of the Content Adaptive Learning, the enterprise must describe its business goals and then transform these goals into a set of Key Performance Indicators and expected norms. These KPI's should be categorized into sets such as effectiveness, efficiency, and customer satisfaction and align them to their Business Strategy.
Link Key performance indicators to Business Goals and Strategies.
Establish business norms for Key Performance indicators by individual, experience level, or team.
In organizations with more experience in using metrics and measuring performance combinations of individual experience, and team metrics may be constructed and applied.
Communicate the goals, key performance indicators and expected performance levels using the individual and team supporting options provided.
Balance your Key Performance indicators into categories such as efficiency, effectiveness and customer satisfaction. Using the reporting options to provide a pictorial view of your key performance indicators by category and their linkage to your business goals and strategies.
Select if particular business norms are goals or thresholds. (Goals are values to strive for, while thresholds are values never to exceed).
Describe and implement work-flow behaviors which are to be performed.
Select the work-flow behaviors to be taken if a goal isn't achieved or a threshold is exceeded.
1.3 Create survey questions.
A critical component of our Content Adaptive Learning is the construction of well formed surveys which are to be sent out when particular events of interest or key performance indicators exceed desired business norms. In our view less is more when it comes to surveys. A few well formed questions consistently and routinely will provide much more useful data for an enterprise to operate on then many surveys which are complex and not well designed. Here are the key elements for the construction of 360 surveys;
Define clearly the objective of the survey.
Construct 3-4 question topics which reinforce your key business goals & strategies (Professionalism, Knowledge, Right the first time, Satisfaction Level).
For each topic ask essentially the same question from the perspective of the parties involved (Customer, Customer Service Agent, Supervisor).
Make sure to construct the questions in a manner that they don't lead the recipient to a desired conclusion.
Keep the rating system simple, 1to 3 or 1 to 5 and define the meaning of a 1,2,&3 in simple and relevant terms.
Our measurement techniques is to consistently and routinely apply a set of questions which are aligned to the key business objectives and performance measures, ask them from three perspectives in a blind survey form. Then to contrast the results and identify positive and negative gaps between responses, we use the magnitude of the difference in response for the relevant pairs, Customer to Agent, Customer to Supervisor, Agent to Supervisor as a means to find ‘our position’. We then translate these deltas on the three vectors into a recommended set of actions; the set of the actions will be described in the implementation part of this operational discussion later in the document.
2. Operation
The operation of the invention is comprised of a set of activities which are highly interactive processes and methods which operate in an on going cycle during each working day within the enterprise;
Content Detection processes & methods.
Pro-active Behaviors processes & methods.
Behavior Change processes & methods.
Central to the effective operation of the Content Adaptive Review is the creation of both system and human processes and methods which are carefully orchestrated and routinely measured.
2.1 Content Detection Processes & Methods
Once configured Content Detection processes & methods are automated real-time detectors which monitor interactions looking for specific content and making observations about events of interest, confidence level, and date and time.
Content Detector Family (Voice-Keyword/Phrase Detector, Voice-Emotion Detector, Attribute Detector, Text-Keyword Detector, Text-Emotion Detector, Video-Gesture Detector).
Selected Content Detectors observe Communications channels in Real-time and produce events of interest based on the configured system data. As an example Voice Keyword Detectors would produce observe the date and time those keywords/phrases of interest were observed and place the observed events in the systems database.
Content Detectors would routinely be checking the systems database for changes in their configuration information such as frequency of execution, user focus, or changes to the list of keywords/phrases of interest and alter their behavior accordingly.
All operational changes or status information from the family of content detectors would be placed in the system data base and use system alerting mechanisms to communicate immediately to personnel responsible for system operation.
2.2 Proactive Behaviors Processes & Methods.
Pro-active Behaviors are automated processes and methods which look at observed events of interest and act on them based on the predefined rules data (Key Performance Indicators, goals, & business norms, logic about these events and work-flow processes and methods which have been defined) on a continuous basis.
2.2.1 Routine Measurement
Routine measurement of these KPI's and performance against these norms must be presented consistently and objectively to all members of the team to be creditable. This process of routine measurement and display is central to setting performance expectations. Correlation of KPI performance and customer satisfaction should be periodically performed to ensure that the KPI's selected are relevant to the desired business objectives for customer satisfaction.
Operationally we provide measurement data in the forms of tables, reports, charts, graphs, gauges and indicators lights which are routinely refreshed with live data. Within all of the application modules of our implementation we have constructed dashboards to show summary views which can lead a user quickly to more specific detailed information. We also provide within all of our user views critical status information in the form of data feeds, indicator lights, and gauges to keep every individual appraised of how they are doing.
2.2.2 Presentation
Central to the operation of a Content Adaptive Learning is the effective communications of current status and activities of all vested parties involved in improving operational performance of the enterprise. We provide measurement data in the forms of tables, reports, charts, graphs, gauges and indicators lights which are routinely refreshed with live data. Within all of the application modules of our implementation we have constructed dashboards to show summary views which can lead a user quickly to more specific detailed information. We also provide within all of our user views critical status information in the form of data feeds, indicator lights, and gauges to keep every individual appraised of how they are doing.
Individual Dashboards with status information regarding their performance with respect to goals and business norms.
Alert messages which start at the individual involved in the interaction and are directed up the chain of command based on the frequency and severity of detection within an interaction.
2.2.3 Alerting Special mechanisms exist to provide immediate data to invoke immediate intervening human interaction in a live interaction based on the detection of a/set of significant events of interest. Among the mechanisms which are employed are;
Alert messages directed up the chain of command of team members involved in the interaction.
Live indicator lights on the displays of those same individuals.
Live Data feeds which can be presented to parties of interest.
2.3 Behavior Change Processes & Methods
The operation of the Behavior Changes Processes and Methods is a system assist set of human processes. Ultimately we are trying to show the gaps in perspectives from the involved parties, to show a causal relationship between the observed events of interest and the behaviors in the interaction, and to suggest changes in behavior, changes in process, or other actionable recommendations which will improve the performance of the individuals involved in the interaction and subsequently improve the performance of the organization. Three main activities are involved;
A Blind survey process which is executed by the Pro-active Behaviors Processes & Methods to capture three perspectives on any interaction which contained significant events of interest based on the express business goals & norms of the enterprise.
The survey can be delivered in a number of forms to the parties involved, via company computing infrastructure in the form of an email message with a URL to the survey form, a fax survey, or a paper survey which requires data entry on completion.
Upon completion of the three surveys or reaching some predefined expiration date a message is sent the supervisor of the individuals involved in the interaction that survey data has been completed and is ready for their review and evaluation.
2.3.1 Blind Survey
Performance outside of the norms established for the KPI's should trigger a ‘blind’ survey process. Where the questions of the survey are crafted in a manner to contrast from three perspectives how the customer interaction achieved its purpose and how well it was performed.
Consistently & Routinely.
2.3.2 Evaluation & Feedback
The Content Adaptive Learning is based on contrasting the separate perspectives of how the interaction proceeded, with factual observed events of interest, showing a causal relationship to the parties involved allowing them to get immediate feedback and recommendations for improvement.
FIG. 4
Upon receipt of notice of a pending evaluation a supervisor/manager reviews the materials received (Survey Dashboard example see ).
Reviews the recorded interaction media/data and the observed events of interest.
Reviews the system recommendations, and alters them and adds commentary and recommended actions/training materials.
2.3.3 Training
Training recommendations come in the form of system generated recommendations based on past experiences as well as supervisor/manager recommendations for training. Follow up on timely completion of recommended training materials, reading or video/audio examples are provided to ensure the closure of the Behavior change cycle.
3. Learning
By evaluating the history of Rules, Experiences, Measurements, and Recommendations the system will be able to make recommendations of how to improve it's configuration enabling enhanced operational performance.
Multiple learning loops exist within the process & methods set our in the invention. One is to make recommendations to users of the system on how to improve their performance. Another exists within the reasoning components of the processes & methods as a means to optimize the rules which are being used in the normal operation of the environment within a specific enterprise. Yet another is embodied by the processes and methods called out in the invention are a learning loop set up by the use of triangulation techniques and blind surveys. This is an integrated set of human and system processes and methods. Yet another learning loop is set up via the measurement data and changes in individual and team performance over time. This loop is continuously enhanced through the modification of individual and team goals and business norms as initial objectives are meet. This continuous loop sets up an ongoing comparison to past performance, targeted future performance, and contrasts that to industry norms. | |
REVIEW: The Advent of Lady Madeline by Pamela Sherwood
Dear. Ms. Sherwood,
I bought this 109-page Christmas novella around the holidays and it sat on my kindle until July, when I decided to read it. The novella, set in England a bit before Christmas of 1879, begins with a conversation between Hugo Lowell, Viscount Saxby, and his sister, Charley.
Charley encourages Hugo to join the Duke of Whitborough’s party during Advent. Her and Hugo’s younger brother, Wilf, is also invited, and apt to get in trouble since he’s a guest of the duke’s feckless heir, Lord Denforth. If Hugo goes, he will be able to keep an eye on Wilf and act as a mitigating influence.
Hugo reminds Charley that he will attend Earl Clement’s for Christmas itself. Although he is not yet engaged, he plans to ask Lady Althea Clement for her hand in marriage.
Though Lady Althea is “a paragon of virtue and amiability—along with being pretty and well-dowered,” Charley is sorry to hear this. Lady Althea isn’t not likely to stir things for her brother, who had to mature quickly after their father was paralyzed in an accident and is therefore in danger of growing staid.
Hugo gives in and goes to Whitborough’s party for Advent, intending to leave for Earl Clement’s party at Christmas and propose to Lady Althea then. But while at Whitborough’s, he meets his host’s bright, outspoken daughter, Lady Madeline Lyons, and slowly, his plans begin to unravel.
Madeline has declined numerous offers of marriage because her own parents’ marriage has been a contentious one, but now she has decided she does want to marry after all. She is not aware that Hugo has an understanding with another young lady, and when he helps her and her youngest sister Juliana find a pregnant cat who has invaded his room, she is charmed.
As Advent progresses, Madeline finds herself seeking out Hugo, and he too, finds reasons to spend more and more time in her company. He also finds himself engaging in activities he has never tried in the past, composing letters to Charley in his head that begin with “Never before have I…”
Never before have I attended a cat’s confinement…
Never before have I left a hunt before the kill…
Never before have I attended an amateur theatrical…
Never before have I felt so alive.
Madeline and Hugo are both appealing characters. For all of Madeline’s occasional sharpness or bossiness, she comes across as vulnerable, having been hurt by her parents’ marital difficulties. Her view of her family was rocked when she learned that her father had been unfaithful to her mother, and even though her mother has forgiven him, Madeline cannot.
Hugo, meanwhile, is an affable, innately kind man, friendly and responsible. We see him set that good example for his brother Wilf, and offer Wilf advice as well as a lending ear. He may be an avid sportsman but he leaves the hunt early when Madeline needs to be escorted home.
These two characters are well suited, and their romance is touching and smoothly written, even if it doesn’t break much new ground. What I liked best about the story though, was the unusual dynamics of Madeline’s family.
This novella launches a series about the Lyons, a family inspired by the movie The Lion in Winter. Having never seen this movie, I had no particular interest in homages to it, but after reading countless series featuring siblings who love each other and get along, it was so refreshing to visit with a family that argued and had some issues.
Here, the parents play favorites, so Madeline’s twin Hal, the duke’s heir, and Reggie, the second son and heir to the duchess’s properties in France, are forever fighting. Youngest brother Jason is spoiled, but may yet be salvaged, while sisters Elaine and Juliana are sweeter.
Most intriguing though, is Madeline’s third brother, Gervase, a cool and distant observer of the others’ antics who nonetheless gets drunk on the same night that Hal becomes engaged. Madeline may not understand why, but I was immediately hooked, and I bought Gervase’s book, Devices and Desires (review to come), as soon as I finished reading this one.
If I had one criticism of The Advent of Lady Madeline, it’s that the romance between Hugo and Madeline proceeds at a gentle pace, with Hugo almost unaware that he is falling for Maddie even as he does so. Therefore, their low-conflict courtship comes close to being overshadowed by the freshness and power of the family issues. B for The Advent of Lady Madeline.
Sincerely, | https://dearauthor.com/book-reviews/overall-b-reviews/b-reviews/review-advent-lady-madeline-pamela-sherwood/ |
Traditional roofing details stand the test of time and are fine for the majority of situations. However, at a low roof pitch, components of a roof system may be working at the limit of their capabilities, meaning more chance of failure; i.e water leakage, under extreme weather conditions. Areas such as eaves, abutments and window surrounds require careful detailing to ensure a durable and watertight roof system. At eaves, on very low roof pitches, it can be difficult to achieve an adequate fall for water run-off from the eaves course tiles and the underlay. Roof window surrounds can be particularly tricky to detail effectively, even though the window flashings work perfectly well at low pitches.
Detailing a low pitch eaves
The lower the roof pitch, the more difficult it becomes to construct an effective eaves system, particularly where roofspace ventilation is required. Remember that the eaves course tiles carry all the rainwater that the roof face has collected and must shed that water safely into the gutter. It is therefore important that the eaves course tiles be set at the same relative pitch as the tiles above in the general roof area. It is equally important that an adequate fall is set in the underlay and to ensure that the underlay is fully supported so that it does not drape and form a trough behind the fascia.
The fascia height, with over fascia ventilator if required, must be set to allow an adequate fall in the tiling and underlay. Sometimes, these two requirements can be at odds; for example, getting the required pitch in the tiling can result in no fall in the underlay. If this is the case, set the fascia height to give a fall in the underlay, then set the tile pitch using a ventilator strip or tilt batten fixed over the underlay support tray – see drawing ‘A’. If a batten is used, it must be notched to allow free flow of water from the underlay into the gutter.
Support the underlay behind the fascia using underlay support trays. Overlap these by 100mm and seal the laps using a suitable sealant. The underlay should overlap the underlay support trays by at least 150mm and can be bonded to the underlay support trays using adhesive or double-sided adhesive tape.
Remember that the eaves course tiles must be twice fixed; normally head nailed and tail fixed. Seal any fixing perforations through the underlay support trays using sealant or bituminous nail tape.
Detailing side abutments
It is always important, regardless of roof pitch, to use the correct weathering detail at side abutments. For double lapped slates and plain tiles use soakers, for flat interlocking single lap tiles use a continuous secret gutter and for profile tiles use a cover flashing that extends at least 150mm over the tiles and covers one continuous roll.
A common mistake is to use a simple cover flashing with flat interlocking tiles – this may work at steeper pitches; i.e 30 degrees and over, in sheltered areas and with short rafter lengths, but otherwise there is a risk that water will run between the flashing and tiles and leak into the structure. Therefore, the appropriate detail is to install a side, or ‘secret’ gutter to capture water that runs sideways off the abutment tiles. A cover flashing can be installed in addition to the secret gutter to prevent debris such as leaves and pine needles etc. from clogging the gutter. There are also preformed rigid soakers available for use with flat interlocking tiles.
Detailing around roof windows
Although roof window manufacturers supply perfectly adequate flashings to surround their windows, remember that the tiling needs to pass over the flashings and achieving a perfect seal between the tiles and flashings can be difficult. Although water will generally run off the tiles into the window flashings, under some conditions, especially at low pitches, water may be driven between the tiles and flashings, into the roofspace. Leakage through the tiling is more likely around roof windows if there are a few small gaps in the tiling where the tiles ‘kick’ as they pass over the flashings.
To ensure an efficient seal around a roof window, the general underlay should turn up against the window upstands and be taped or bonded to the upstands. The corners are vulnerable to leakage where the underlay is cut, therefore it is important to use sealing tape at these points.
If the window manufacturer supplies a window ‘collar’ or ‘skirt’, this should be fitted over the general underlay and taped or bonded to the window upstands – see photo ‘A’. The outer edges of the collar can be taped over the general underlay and tile battens. A cut is made in the general underlay above the roof window so that the window collar is pushed under and lapped by the underlay. This junction can be taped also.
Once the window flashings are installed, the tiles can be laid over the flashings, taking care to minimise ‘kicking’ by removing tile nibs if necessary. Tiles can be pulled closer to the flashings by fixing them with screws into the battens, rather than nails, taking care to avoid fixing through the flashings.
In summary
As I said in my previous article, contractors want to do a job as efficiently and cost-effectively as possible, be paid and to not need to go back to rectify complaints. Following these simple recommendations will ensure that each job is a success, first time, with far fewer call-backs. For further information on how to construct a watertight sub-roof, download the Wienerberger Low Pitch Installation Guide. | https://rcimag.co.uk/sandtoft-blog/constructing-low-pitch-watertight-roof-part-2 |
For many years I used to feel lost, stuck and confused about what it was that I wanted to achieve in life. I felt like I wasn’t where I wanted to be at this stage of my life and even though I surrounded myself with amazing, supportive family and friends and I had a job that I enjoyed, I still felt like there was something missing. Due to this I felt unhappy inside and over time I’m convinced that this unhappiness and low mood manifested itself in different ways. Looking back I realise now that when something is not quite right on the inside it starts to manifest itself in different ways outwardly. Some suffer from anxiety, panic attacks, depression and others with health concerns and issues.
During this time I suffered from headaches, nausea, muscle cramps and aches and extreme tiredness. After several months I visited the doctors and had a series of tests and examinations but, the results showed nothing. After 2 years I was diagnosed with Chronic Fatigue Syndrome, CFS.
I started looking into this and could completely resonate with the symptoms and signs of CFS and eventually took the strength to take some time out from work to recover and rest. It was at this time that the doctor recommended that I take some time out to relax and recharge. This was a difficult message to hear because I was so used to rushing around and at first I really struggled with this. He suggested I try meditation and yoga and begrudgingly I tried them both.
I practiced meditation on and off for a while and found it difficult at first to relax and during meditation I found it hard to sit still and focus on my breath as my mind kept wandering. I kept getting distracted but, over time I got better at meditating and I started to realise the benefits of meditation, it enabled me to pause life for a few moments and I began connecting with my breath. As soon as I realised the positive effects it was having on my body, mind and mood I started practising it more frequently.
When I adopted a more consistent approach to meditation I started to reap the rewards and it enabled me to take a step back from life and in those moments of meditating I was able to gain clarity and see the world as it was. Meditating helps me to pause and notice when my mind begins to wander, during meditation I gain a sense of self awareness and clarity.
This helps me to look at life in a very matter-of-fact way, there is no room for drama, negativity or pessimism as it helps me to adopt a positive outlook and see the best in everything. Since I began practicing this I have changed my perspective and feel much richer in life because of the way I view everything.
Mindfulness and meditation cannot be taught they have to be caught. Mindfulness teaches us to respond to situations instead of react and it encourages its participants to adopt a beginners mind. I have cultivated a sense of curiosity about life and through self awareness I understand the patterns that I have adopted over time. By understanding these patterns I can be aware when I am overdoing or taking too much on.
I feel happier in myself and adopt the mindfulness approach which encourages adopting a loving, kindness approach to both yourself and others.
Some people still think that meditation and mindfulness is a little ‘out there’ but, mindfulness seems to be everywhere at the moment; in the workplace, in schools, in the NHS and individuals are much more willing to attend a mindfulness course as it seems to have a sense of acceptance within society.
Three years on, I have now developed my meditation and mindfulness practices and have started my own coaching, personal development and wellness business, Aspirational Living. In this business I have the opportunity to help others gain a sense of balance and learn how to be emotionally resilient in such a fast paced world.
I now encourage others to take a step back from life and ask them to cultivate an attitude of loving kindness towards themselves. I shine a light up to them and show them how they can too be their harshest critic at times, this enables them to have the confidence to move forward.
There are endless benefits of mindfulness and meditation and they can benefit you spiritually, emotionally, mentally and health-wise. In today’s climate even the NHS are referring candidates onto mindfulness courses as it can help others overcome anxiety, panic attacks, depression chronic fatigue and other illnesses.
I choose to live life fully, openly and consciously and now have the opportunity to make a difference to others lives and that’s what Aspirational Living is all about! | http://aspirationalliving.me/blog/space-to-breathe/ |
Recently in January 2014, the European Commission (EC) announced the new climate and energy targets for 2030, which will further the progress towards establishing a low-carbon economy and a competitive and secure energy system that ensures affordable energy for consumers, increases the security of energy supplies, reduces dependence on energy imports and creates new opportunities for growth and jobs. This announcement follows the Commission’s March 2013 Green Paper, which launched a broad public consultation on the most appropriate range and structure of climate and energy targets for 2030. Specifically, the 2030 goals include a reduction in greenhouse gas (GHG) emissions by 40 per cent below the 1990 level, a European Union (EU)-wide binding target for share of renewable energy consumed to be at least 27 per cent, increased focus on energy efficiency policies, a new governance system and a set of new indicators to monitor achievement of targets. The European Council will review this new 2030 framework at its upcoming spring meeting in March 2014.
The EU’s climate and energy objective entails reducing its GHG emissions by 80-95 per cent below 1990 levels by 2050. To this end, it has set its 2020 targets to reduce GHG emissions by 20 per cent below 1990 levels, increase renewable energy to 20 per cent, and achieve energy savings of 20 per cent. The new framework constitutes the next step towards reaching the 2050 goal. More importantly, the impact of the economic and financial crisis needs to be taken into account. The current economic crisis has affected the capacity of the EU’s Member States to invest. Fossil fuel prices remain high, which is negatively affecting EU’s trade balance and energy costs. The EU's Emissions Trading System (ETS) is not sufficiently driving investments in low-carbon technologies. At the same time, the energy system also requires significant investment to replace aging infrastructure. For this, investors urgently need a clear policy framework that provides predictability and reduced regulatory risk beyond 2020. This will also stimulate research and development in efficient low-carbon technologies. In addition, the EU needs to decide what GHG reduction target it is going to contribute to the global climate agreement that is to be adopted at the end of 2015.
The key elements of the 2030 policy framework set out by the Commission include the following:
Further, the Commission is of the view that an increased share of renewable energy and a more efficient energy system are not enough to ensure sufficient progress towards the 2030 goals. Systematic monitoring with key indicators is needed to assess the progress over time and to inform any future policy intervention. These indicators include energy price differentials between the EU and major trading partners, diversification of energy imports and the share of indigenous energy sources used in energy consumption, and deployment of smart grids and interconnections between Member States.
Conclusion
Endorsement of the Commission's 2030 framework by the European Council and the European Parliament is the next step. The Commission has also invited the two legislative bodies to confirm that the EU should pledge a 2030 GHG reduction target of 40 per cent in early 2015 as part of the international negotiations on a new global climate agreement. Such action will allow the EU to contribute constructively to the international negotiations and increase predictability for investors by creating greater clarity about the required level and type of efforts needed after 2020. Before 2021, the 2030 GHG reduction target will need to be translated into national GHG targets for the non-ETS sectors and Member States will need to draw up their national plans for the period up to 2030.
Overall, the new framework builds on the existing ‘climate and energy package’ targets for 2020 as well as on the Commission’s 2050 roadmaps for energy and for a competitive low-carbon economy. The aim remains to reduce dependence on imported fossil fuels, make the EU more energy efficient/less carbon intensive, increase investments, and develop new sectors, technologies and jobs. | https://globaltransmission.info/archive.php?id=18837 |
BACKGROUND OF THE INVENTION
DETAILED DESCRIPTION OF THE DRAWINGS
It has been my observation and evaluation as the inventor of the invention entitled Knee Pocket System that my invention is a necessity and not a luxury. The said invention generally relates to a pocket design attached to a garment, a garment consisting of two pant legs of equal length surpassing the knees and reaching the ankles in most cases (jump suits, jeans, work pants, overalls, chaps, baby pants or suit, scrub pants, casual pants, military pants or any other similar pant garment), in this case in order to describe the said invention the garment is an all-purpose pant.
Identical shaped pocket designs are sized and created proportionately for each pant leg and stitched to the exterior knee area. The placement around the knee area will always be in a position that avoids any discomfort while a person is standing or kneeling. A locking device (preferably a zipper) is located at the top edge of each pocket design allowing the pocket to be opened and closed for a uniquely fitted comfort pad (durable, lightweight elastomeric foam is preferred). This comfort pad (our name for the kneepad) is matched to the dimensions of the pocket design, but slightly smaller. Each uniquely fitted comfort pad can be implanted or removed at will providing the knees with padded comfort and protection. The combined pocket design elements of the said invention give a pant garment a unique quality of appearance and a unique quality of utility. A pant garment can be worn with the Knee Pocket System for casual, for play or for work activities. People gain some added degree of comfort and some added degree of protection from rigid surfaces in case of accidental falls, from rigid surfaces during spontaneous kneeling and/or from rigid surfaces while kneeling part time or full time during work hours.
Problems associated with prior art are centered around kneepad replacement if not encased, kneepad movement and/or dislodgment, bulky or clumsy pant garments created by different kneepad arrangements and in many instances the need to carry additional kneepad equipment. Straps or too much material at the knee area can create discomfort and inconvenience making the pant garment awkward during standing and/or kneeling. The focus of prior art is mostly on a particular group of users; prior art fails to address the real needs of excluded users. The Knee Pocket System improves the approach to comfort, to protection and to convenience with reliability for everyone.
Many activities in the general population would benefit from our invention entitled Knee Pocket System. Most skateboarders (usually) do not wear any form of added knee comfort or added knee protection. And if they do wear some type of added comfort and protection, they wear bulky uncomfortable knee-padded equipment with straps. Skateboarders need to have comfort and protection for their knees, but without the anomaly that available products provide. The Knee Pocket System is a comfort and protection system that does not hinder their flows of movement. They simply wear a garment (in this case all-purpose pants) with the said invention attached to the garment (there is no discomfort, there is no inconvenience). It is a comfortable and protective way for skateboarders to maximize their activity in a safer, but natural way.
Police officers, firemen, and rescue personnel are often called to an emergency of one kind or another. Without a moment's notice or for a fraction of time the events require that they kneel; up to now they just kneel and wish they had been equipped with additional comfort and with additional protection for their knees (spontaneous kneeling occurs often during the course of events). The said invention is an unobtrusive invention that becomes a subtle part of a pant garment. It can equip these particular users with a pant garment that will provide the comfort and protection that they need. When they find themselves kneeling the said invention performs its utility and for the moments that they are not kneeling the said invention becomes a subtle part of their uniform creating no interference with their normal movement of walking and/or running.
Toddlers can have the said invention attached to a pant garment that they might wear during their crawling phase. Construction crews; floor installers; painters; roofers and other people performing a trade can have the said invention conform to their kneeling needs (of part time kneeling or full time kneeling). Kids and teenagers playing in the playground can play and run without being hindered while wearing a pant garment that includes the Knee Pocket System. A mechanic all of sudden needs to look under a car; while wearing a pant garment with the said invention, his kneeling is performed with added comfort and added protection. Other users can be photographers while filming a sporting event; stagehands while moving a staged concert; a gardener while planting vegetation; landscapers; soldiers; doctors; reporters; baseball players and golfers. These examples are just a few, but there are many circumstances that are prime examples of how such an invention improves the way people can live and/or do their work. The Knee Pocket System offers an option of unique improvement without a question. Whether the kneeling needs are casual or complicated, spontaneous or planned these needs are addressed by the Knee Pocket System.
The said invention is unique in its design and in its utility. No prior art (from Walther 514,576 A—through the more recent prior patents for this category) has the construction and/or design emphasis as the said invention. No prior art addresses the issues of major kneepad movement, of kneepad replacement and/or kneepad dislodgment as the said invention. And no prior art addresses the different work, play or casual needs of different age groups and/or work groups in the same way as the said invention. The Knee Pocket System is intended for a wide range of people needing some degree of added comfort and some degree of added protection for their knees. It does not limit itself by meeting the needs of a specific group or groups of people, such as, people that work in a trade. A person can wear a pant garment with the Knee Pocket System while walking in the park, while playing in the playground or while working on their knees part time or full time. The pant garment will not be made bulky, clumsy or inconvenient to wear because of the said invention. Instead, the pant garment will be simply attractive to wear with a utility feature that is both functional and unobtrusive.
I claim the invention entitled Knee Pocket System as shown and described. It will be understood by those skilled in the field that modifications may be made to the said invention without departing from the scope of the said invention.
It is to be made clear that the pant garment is not part of the claim; therefore, it is represented with broken lines.
FIG. 1
10
12
14
16
10
18
16
18
12
14
16
10
20
16
20
20
10
22
20
16
24
20
10
16
20
16
There is shown in a garment (in this case an all-purpose pant) that has two equal pant legs in length surpassing the knee area and reaching the ankles in most cases. Each pant leg and has durable material (preferably leather) attached to the exterior knee area of the garment by strong durable stitches . This durable material (preferably leather) has strong durable stitching at the side edges and at the bottom edge forming a vertical rectangular shape that is identical for each pant leg and and known as the pocket (made of durable material) . The top edge that remains unattached from the garment is attached to a locking device (preferably a zipper) that closes or opens the pocket . The edges of the locking device are attached by stitches. The top edge and side edges of the locking device are attached to the pant garment by stitches . But the bottom edge of the locking device is attached to the pocket (made of durable material) by stitches . Locking device is in between the pant garment and the pocket . The width of the locking device (preferably a zipper) is the full length of the width of the rectangular shape that forms the pocket .
16
20
20
16
22
20
10
20
24
16
20
16
12
14
FIG. 2
FIG. 1
Access into the pocket is achieved at the top edge by opening or closing the locking device (preferably a zipper) at will. It is shown in an enlarged fragmentary view of how the locking device covers the full length of the width of the pocket . Strong durable stitches attach the side edges and the top edge of the locking device to the pant garment . The bottom edge of the locking device is attached by durable stitches to the pocket . Placement of the locking device and the pocket will always be placed around the knee area along each pant leg and in a position that avoids any discomfort while a person is standing or kneeling.
28
16
28
16
20
26
28
16
20
18
22
24
20
12
14
10
26
FIG. 3
FIG. 1
A uniquely fitted comfort pad can be implanted or removed from the pocket . It is shown in an enlarged fragmentary view of showing a comfort pad made of durable material that is resilient, lightweight and water proof (elastomeric foam is preferred) implanted into the pocket and reaching behind the locked locking device displaying the preferred embodiment of the Knee Pocket System . It (the comfort pad ) is slightly smaller in its rectangular dimensions having generally smooth surfaces, generally resting flat and uniquely fitted (in all its dimensions) to the dimensions of the pocket and the locking device combined. Stitches , , and along with the locked locking device (preferably a zipper) prevent major comfort pad movement and/or dislodgment. Each pant leg and of pant garment having identical design elements of the Knee Pocket System .
18
22
24
16
20
26
26
28
16
20
26
18
22
24
26
12
14
10
26
26
FIG. 4
FIG. 3
A uniquely fitted comfort pad creates a distinct unique relationship with the stitches , and , pocket and the locked locking device minimizing movement and preventing dislodgment from any appropriate chosen size of the Knee Pocket System . It is shown in a profile view of showing the Knee Pocket System with the comfort pad resting in the pocket and reaching behind the locked locking device . This profile view uniquely reveals how the Knee Pocket System durably simplifies and durably secures added safeguards for the knee. Stitches , , and unify the design elements of the Knee Pocket System and/or attach them to the knee area of each pant leg and of pant garment . Included is an enlarged fragmentary view of the same profile view of the Knee Pocket System isolating the distinct and unique design construction of the top area of the Knee Pocket System .
28
28
30
28
32
28
28
26
28
28
26
FIG. 5
A different thickness comfort pad can be used (from ⅛″ to ¾″). It is shown in a view of the comfort pad showing one example of thickness for the comfort pad and a second example of thickness for the comfort pad . The examples only demonstrate that the comfort pad can vary in thickness. The appropriate application of the Knee Pocket System will determine the appropriate thickness of the comfort pad . Comfort pad will have the appropriate dimensions uniquely fitted to the appropriate dimensions required by the chosen combined design elements of the chosen size of the Knee Pocket System .
26
I claim the invention entitled Knee Pocket System as shown and described. It will be understood by those skilled in the field that modifications may be made to the said invention without departing from the scope of the said invention.
BRIEF DESCRIPTION OF THE DRAWINGS
For a better understanding of the said invention entitled Knee Pocket System we can refer to the accompanying drawings.
FIG. 1
is a front view of the Knee Pocket System attached to the exterior of each knee area of a pant garment. Broken lines show structure that is not part of the claim. The construction is as shown and described.
FIG. 2
FIG. 1
is an enlarged fragmentary view of of the Knee Pocket System in accordance with the construction of the said invention. Broken lines show structure that is not part of the claim. The construction is as shown and described.
FIG. 3
FIG. 1
is an enlarged fragmentary view of of the Knee Pocket System in accordance with the construction of the said invention. In this view we see a comfort pad uniquely fitted within the pocket reaching behind the locked locking device of the Knee Pocket System as shown and described. Broken lines show structure that is not part of the claim.
FIG. 4
FIG. 3
is a profile view of of the Knee Pocket System showing how uniquely and distinct the comfort pad is fitted within the pocket and made to fit behind the locked locking device (preferably a zipper). Included is an enlarged fragmentary view of the same profile view displaying the top area. Broken lines show structure that is not part of the claim.
FIG. 5
is a view showing a comfort pad of two different thicknesses. These two examples are only shown to demonstrate how a comfort pad of different thickness can be applied by the user. The appropriate thickness can vary depending on the activity and on the overall chosen size of the Knee Pocket System. | |
U.S.
Weather
Weird
World
Latest
Latest
Featured posts
Most popular
7 days popular
By review score
Random
Archeology
Home
Archeology
WWF: Nearly half of World Heritage sites under severe threat
Oldest ‘modern’ human hand is 1.8 million years old
Largest study ever on ancient European DNA, shows three main immigrating...
Archaeologists uncover mysterious prehistoric gold trade route
Someone made these over 3 million year old tools – but...
History shows we’ve become weaker – but will farmers agree that...
Stunning find: 508-million-year-old anthropod with vicious claws discovered
Study finds eagle talon necklaces were the hottest jewelry trend of...
Novel technique reveals origins of Caribbean slave skeletons
Climate change turning Chilean mummies into gross tar
Shocking findings: Stone Age Britons imported their own wheat
Scientists learn new secrets of 1,000 year-old mummy in Buddha statue
Archaeologists discover massive fortifications from the Iron Age in Israel
Pottery residue reveals earliest evidence of food spicing
3,445
Followers
Follow
LATEST NEWS
Video – NASA Sends Manned Orion Spacecraft to The Moon in...
Brain implant bypasses damaged nerves to control paralyzed limbs
Mice got human blood from teenagers and became younger.
Video: Gigantic “pyramid” spotted on Ceres
Curiosity rover capture images of a “veiled woman” on Mars
Video: Major breakthrough for Fermilab NOvA experiment
Sudden supernova-burst in space helps scientists measure expansion of the Universe
New anglerfish is so ugly, only a mother could love it
Supplement use is the new eating disorder for men
Video: How to get the most out of the Perseid meteor shower on Wednesday
New tadpole disease could spell doom for frogs around the world
Lake Michigan’s clear waters reveal stunning images for ‘Shipwreck Sunday’
Solar activity did not trigger climate change, study finds
RANDOM
NASA pays tribute to Neil Armstrong at National Cathedral
Experimental treatment cures aggressive form of breast cancer in eleven days
GOCE satellite collects trove of data on Earth’s ocean currents, gravity
Shape of black hole’s shadow may confirm theory of general relativity
Sudden supernova-burst in space helps scientists measure expansion of the Universe
The effects of bullying last long into adulthood, study finds
Use of Mobile phones and tablets is a daily activity among...
Woman goes to hospital for stomach ache, finds out she’s pregnant
Let’s check the weather forecast for another solar system, shall we?
Obesity on rise among U.S. adults (Video)
200 hours of water splitting from a 1.5 volt battery –... | https://natureworldreport.com/category/archeology/ |
Ewing, NJ – The College of New Jersey women’s basketball team defeated the Kean Cougars, 72-54, tonight at Packer Hall. This is the Lions sixth straight win.
They will next be in action this Saturday against the William Paterson Pioneers at 1 pm at Packer Hall. TCNJ won both games against Willy P this season and will be looking for their third in the NJAC tournament.
“One of the differences I see is in the beginning or the middle, we would make a mistake and just over analyze it and just get so mad at ourselves and make more mistakes,” coach Dawn Henderson said. “We’re still making mistakes, but we’re coming back playing harder instead of staying focused on mistakes, we’re playing through things.”
Angelica Esposito led the Lions attack with 23 points, while Kelly Coughlin had 16 points and Jessica Goldbach had 11. Kylie O’Donnell had seven, while Jess Lynch had six and Christina Merlin added five.
Nikki Schott contributed four points for the home team.
Freshman Najha Treadwell had a game-high 24 points, while AnnaRose Pierre added 12. Jazmine David scored eight points, while Mikeera Brown added four.
Jaquetta Owens had three, while Kenya Adams scored two. Shay Collins had a point.
At one point, Treadwell outscored the home team 8-2 to cut the lead to 53-45. Esposito and Merlin scored to make it 57-45, before Brown made it 57-47. Coughlin would put it to 12, before ending the game with an 18 point lead.
“She’s a great player, we have to play against her for three more years, she’s a team player and she finishes when she’s close to the basket, before playing us, she had 114 offensive rebounds and that’s tough,” Henderson said. “They have other kids that can do things, but we played in a zone to take that away, they wanted to drive and dish and stuff, so when we played well in transition and didn’t let them get into the paint, they had a hard time with what they were doing.”
The Lions would make it over 10 points at 40-30. Davis would cut it to 8 points at 40-32, before Esposito connected on a three-pointer to make it 43-32. Seconds later, the lead would grow to 15 points at 48-35.
After the break, TCNJ scored back-to-back baskets, before Treadwell made it 34-26 following two straight baskets of her own. Kean could make it 38-30 following a Pierre basket, which was the first time the lead was under 10 since 27-21.
“You know she’s a good player, but it was still hard to defend her when they kept lobbing it to her, she just makes them all,” Esposito said.
Kean would score three straight baskets to make it 27-21, before Esposito hit a three-pointer with seconds remaining. That gave the Lions a 30-21 going into the break.
“My teammates did a good job of getting me the ball, we tried to run our plays, but they were cheating up on everything so we were getting a lot of backdoor cuts, I know (Schott) and couple of the forwards made good passes, so that helped,” Esposito said of her performance.
Treadwell and David baskets made it 21-16 until Coughlin scored twice and Schott scored to make it 27-16. Kean would make it 15-12, before the Lions would score three straight baskets to make it 21-12.
Following a TCNJ timeout, the home team would go on a 7-0 run to jump out to a 15-8 lead, before Treadwell scored to make it 15-10. The Lions would go on a 7-2 run to make it 8-2, before Kean would tie the game at 8-8 with a Pierre basket.
The Cougars had their only lead of the half at 2-1 just minutes into the game.
Any Corrections?. You can contact Anthony Caruso III, Publisher at [email protected].
Follow us: @CapSportsReport on Twitter | The Capital Sports Report on Facebook
©2007-2018 The Capital Sports Report. Please honor copyright! Piracy hurts writers, devalues their works, and puts you and your employer at risk of lawsuits. All original materials contained on this website are protected by the United States copyright law and may not be reproduced, distributed, transmitted, displayed, published or broadcasted without the prior written permission. | https://thecapitalsportsreport.com/2015/02/19/lions-defeat-the-kean-cougars-to-clinch-the-4th-seed-playoff-home-game-on-saturdayurd/ |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
1. Field of the Invention
The present invention generally relates to data transfer, and more specifically relates to synchronous peer to peer deployed application propagation for large clusters.
2. Related Art
One method for deploying a Java 2 Platform, Enterprise Edition (J2EE) application (Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both) to a cluster of machines (e.g., a WebSphere cluster) includes:
1) A deployment manager runs deployment tools on the application and generates deployed code; and
2. The deployment manager transfers the deployed code to the cluster members in parallel.
Because deployed applications can be very large, network bandwidth (even on a 1 gigabyte (GB) network) will quickly become a bottleneck. Once the network bandwidth of the deployment manager is exhausted, the application deploy time to the cluster will increase linearly (or worse) with the number of cluster members.
1 GB network bandwidth=125 megabytes (MB)/sec; and
Hard disk (HD) limited transfer rate=25 MB/sec.
After the first 5 connections, bandwidth decreases linearly with each additional cluster member:
Deployment speed=(125 MB/sec)/445 cluster members=0.28 MB/sec; and
Total deployment time=1331 MB/0.28 MB/sec=4750 seconds=79 minutes.
Thus, it will take 79 minutes to deploy the application to each member of the cluster.
As an example, for a 1331 MB application deployed to 450 cluster members via a GB network:
One solution customers have to this problem is to invest in expensive network upgrades that are typically unnecessary for their day to day needs. Another, software-based solution is to use a peer to peer downloader. This type of program is designed to catalog, search and download files asynchronously from a peer to peer network, often downloading parts of a file from several different machines in order to maximize download speed. The process is asynchronous, because a file must be completely downloaded to a node before it can be sent out from that node, which limits the speed at which downloads can occur.
The present invention provides a synchronous peer to peer transfer model that utilizes all available network bandwidth to deploy application code to an entire cluster as fast as it can be sent to one machine. The synchronous peer to peer transfer model includes two parts. The first part determines the number of simultaneous connections that should be opened by a deployment manager to maximize network bandwidth. This is done using a dummy file. The second part synchronously deploys an application to the cluster using the simultaneous connections opened by the deployment manager.
A first aspect of the present invention is directed to a method for deploying an application to members of a cluster, comprising: determining a number N of simultaneous connections that should be opened to the cluster members to maximize network bandwidth; and synchronously deploying the application to the cluster members using the N simultaneous connections.
A second aspect of the present invention is directed to a system for deploying an application to members of a cluster, comprising: a system for determining a number N of simultaneous connections that should be opened to the cluster members to maximize network bandwidth; and a system for synchronously deploying the application to the cluster members using the N simultaneous connections.
A third aspect of the present invention is directed to a program product stored on a computer readable medium for deploying an application to members of a cluster, the computer readable medium comprising program code for: determining a number N of simultaneous connections that should be opened to the cluster members to maximize network bandwidth; and synchronously deploying the application to the cluster members using the N simultaneous connections.
A fourth aspect of the present invention is directed to a method for deploying a program for deploying an application to members of a cluster, comprising: providing a computer infrastructure being operable to: determine a number N of simultaneous connections that should be opened to the cluster members to maximize network bandwidth; and synchronously deploy the application to the cluster members using the N simultaneous connections.
The illustrative aspects of the present invention are designed to solve the problems herein described and other problems not discussed
The drawings are merely schematic representations, not intended to portray specific parameters of the invention. The drawings are intended to depict only typical embodiments of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements.
As stated above, the present invention provides a synchronous peer to peer transfer model that utilizes all available network bandwidth to deploy application code to an entire cluster as fast as it can be sent to one machine. The synchronous peer to peer transfer model includes two parts. The first part determines the number of simultaneous connections that should be opened by a deployment manager to maximize network bandwidth. This is done using a dummy file. The second part synchronously deploys an application to the cluster using the simultaneous connections opened by the deployment manager. The present invention takes advantage of the full duplex and dedicated bandwidth abilities of the switched network interconnecting the cluster members.
FIG. 1
10
11
12
13
14
14
15
14
16
Referring now to the drawings, depicts a flow diagram of an illustrative process carried out by a deployment manager to determine the number of simultaneous connections that should be opened to maximize network bandwidth. In step S, the process is initiated by a user. In response, in step S, the deployment manager generates a dummy file on its hard disk. In step S, the deployment manager connects to one member of the cluster and begins to transfer the dummy file, monitoring the transfer rate on that connection. In step S, the deployment manager connects to another member of the cluster and begins to transfer the dummy file, again monitoring the transfer rate on that connection. Step S is repeated until it is determined by the deployment manager in step S that the per cluster member transfer rate has dropped. The number of connections made by the deployment manager in Step S is the number (N) of simultaneous connections that should be opened to maximize network bandwidth. This number, which should remain static, is a function of hard disk access and network bandwidth, and is saved in a configuration file of the deployment manager in step S.
FIG. 2
20
21
22
depicts a flow diagram illustrating a process carried out by the deployment manager to deploy an application to each member of the cluster. In Step S, the deployment manager retrieves from its configuration file the number of simultaneous connections (N) that should be opened to maximize network bandwidth. In step S, the deployment manager prepares a “deployment token” for each member of the cluster it will connect to.
FIG. 3
30
32
34
34
34
34
With reference to , which depicts a deployment manager and an illustrative cluster having cluster members A, B, C, . . . , N, the deployment tokens are prepared as follows:
(A) Split cluster members into N parts. In this example, N is equal to 2. This means that data can be transferred simultaneously at maximum speed to 2 cluster members before exhausting network bandwidth.
36
36
36
36
36
34
34
34
34
36
34
34
34
34
30
34
34
36
36
36
36
36
36
34
34
36
36
34
3
36
34
36
36
36
34
34
34
36
34
34
34
36
34
34
34
36
34
34
34
34
34
34
36
36
36
36
34
34
34
36
36
36
36
30
30
(B) Generate N deployment tokens A, B. The value N and a listing of the cluster members in each part are packaged in a respective deployment token A, B. In this example, the deployment token A includes the value N=2 and a list including the cluster members A, B, C, . . . , G, while the deployment token B includes the value N=2 and a list including the cluster members H, I, J, . . . , N.
(C) The deployment manager opens a connection to the first cluster member A, H on the list in each deployment token A, B, respectively, and sends out the deployment token A, B over the connection.
(D) Upon receipt of the deployment tokens A, B, the cluster members A, H remove themselves from the listing of cluster members in the deployment tokens A, B, respectively, and split the remaining listed cluster members into N parts (if there ≦N cluster members left, skip (E) and (F) and connect to the N cluster members).
(E) Cluster member A generates N deployment tokens C, D and cluster member H generates N deployment tokens E, F. The value N and a listing of the cluster members in each part are packaged in a respective deployment token. In this example, the deployment token C includes the value N=2 and a list including the cluster members B, C, D, the deployment token D includes the value N=2 and a list including the cluster members E, F, G, the deployment token E includes the value N=2 and a list including the cluster members I, J, K, and the deployment token F includes the value N=2 and a list including the cluster members L, M, N.
(F) The cluster member A opens a connection to the first cluster member B, E on the list in the deployment tokens C, D, respectively, and sends out the deployment tokens C, D, respectively. Similarly, the cluster member H opens a connection to the first cluster member I, L on the list in the deployment tokens E, F, respectively, and sends out the deployment tokens E, F, respectively.
(G) This above process is repeated until the entire cluster is processed. In this way, the entire cluster is connected as a tree.
FIG. 2
23
24
25
Returning now to , in step S, each cluster member sends a “ready” message to the deployment manager after a connection has been successfully established using the above process. After the deployment manager has received a ready message from each cluster member (step S), the deployment manager is ready to deploy the application in step S.
26
30
34
34
27
FIG. 3
In step S, the deployment manager sends the deployed code out to the N cluster members to which it is connected. In the example shown in , for instance, the deployment manager sends the deployed code to the cluster members A, H. In step , as the deployed code is received from the deployment manager, each cluster member does the following:
FIG. 3
FIG. 3
34
34
34
34
34
34
34
34
34
34
34
34
34
34
A) Relays the data stream out to the N cluster members to which it is connected in a memory to memory fashion, eliminating hard disk delays. In the example shown in , for instance, the cluster member A relays the data stream to the cluster members B, E in a memory to memory fashion, while the cluster member H relays the data stream to the cluster members I, L in a memory to memory fashion.
B) Asynchronously saves the data to its hard disk. To this extent, time is not wasted by waiting for a disk write before sending the data back out to other cluster members.
This process is repeated until the deployed code is received by all of the cluster members. In the example shown in , for instance, processing ends after the deployed code has been received in its entirety by the cluster members C, D, F, G, J, K, M, N located at the bottom of the tree.
Total data transfer rate=1331 MB/25 MB/sec=53 seconds (89 times faster than the above-described prior art example)
To this extent, the total data transfer rate is governed only by the HD limited transfer rate of the hard disk of the deployment manager.
Given the same scenario discussed above, which comprises a 1331 MB application deployed to 450 cluster members via a GB network, wherein the network bandwidth is 125 MB/sec and the HD limited transfer rate of the deployment manager is 25 MB/sec, the total data transfer rate is now:
In accordance with the present invention, data is relayed across the cluster in a synchronous fashion. Currently, many processes propagate files in a tree-like manner, like internet worms, file mirroring servers, peer to peer file sharing programs, etc. However, this is done asynchronously, which forces one node to completely receive a file before sending it to another. By building the whole tree before starting the data transfer, as provided by the present invention, data can be propagated from a node before the whole file is downloaded and at the maximum speed the network will allow. Further, by optimizing the number of outgoing connections per node, the entire tree structure is optimized for the specific cluster.
FIG. 3
FIG. 3
The present invention forms a “deployment tree” as shown, for example, in , via deployment tokens. To this extent, nodes can propagate tokens in parallel, so it only takes 4 iterations to create connections to every server in the cluster depicted in .
Data is relayed between cluster members in a memory to memory fashion. This would be difficult to do without establishing the whole tree first, because at 25 megabytes per second, a connection delay or failure would probably force data to be buffered on the hard disk. This would slow down the data transfer because it would require a disk write and then a read before sending the data. This is avoided using the present invention.
FIG. 4
100
100
102
102
104
104
130
132
134
136
138
134
136
shows an illustrative system in accordance with embodiment(s) of the present invention. The system includes a computer infrastructure that can perform the various process steps described herein. The computer infrastructure is shown including a computer system that operates as a deployment manager, as described above. The computer system includes a simultaneous connection determining system for determining the maximum number N of simultaneous connections (N) that should be opened to maximize network bandwidth, a deployment token system for preparing and sending out deployment tokens to N members of a cluster , and a code deployment system for deploying application code to the N members of the cluster .
104
108
110
114
112
104
116
118
108
110
118
108
110
118
114
112
104
116
120
104
104
134
136
134
136
The computer system is shown as including a processing unit , a memory , at least one input/output (I/O) interface , and a bus . Further, the computer system is shown in communication with at least one external device and a storage system . In general, the processing unit executes computer program code that is stored in memory and/or storage system . While executing computer program code, the processing unit can read and/or write data from/to the memory , storage system , and/or I/O interface(s) . Bus provides a communication link between each of the components in the computer system . The external device(s) can comprise any device (e.g., display ) that enables a user (not shown) to interact with the computer system or any device that enables the computer system to communicate with one or more other computer systems. Each member of the cluster can include a similar configuration of components. Each member of the cluster further includes its own deployment token system and code deployment system and operates as described above.
104
104
104
In any event, the computer system can comprise any general purpose computing article of manufacture capable of executing computer program code installed by a user (e.g., a personal computer, server, handheld device, etc.). However, it is understood that the computer system and the is only representative of various possible computer systems that may perform the various process steps of the invention. To this extent, in other embodiments, the computer system can comprise any specific purpose computing article of manufacture comprising hardware and/or computer program code for performing specific functions, any computing article of manufacture that comprises a combination of specific purpose and general purpose hardware/software, or the like. In each case, the program code and hardware can be created using standard programming and engineering techniques, respectively.
102
102
Similarly, the computer infrastructure is only illustrative of various types of computer infrastructures that can be used to implement the present invention. For example, in one embodiment, the computer infrastructure comprises two or more computer systems (e.g., a server cluster) that communicate over any type of wired and/or wireless communications link, such as a network, a shared memory, or the like, to perform the various process steps of the invention. When the communications link comprises a network, the network can comprise any combination of one or more types of networks (e.g., the Internet, a wide area network, a local area network, a virtual private network, etc.). Regardless, communications between the computer systems may utilize any combination of various types of transmission techniques.
FIG. 4
100
It is understood that some of the various systems shown in can be implemented independently, combined, and/or stored in memory for one or more separate computer systems that communicate over a network. Further, it is understood that some of the systems and/or functionality may not be implemented, or additional systems and/or functionality may be included as part of the system .
110
118
It is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a computer-readable medium that includes computer program code to enable a computer infrastructure to carry out and/or implement the various process steps of the present invention. It is understood that the term “computer-readable medium” comprises one or more of any type of physical embodiment of the program code. In particular, the computer-readable medium can comprise program code embodied on one or more portable storage articles of manufacture (e.g., a compact disc, a magnetic disk, a tape, etc.), on one or more data storage portions of a computer system, such as the memory and/or storage system (e.g., a fixed disk, a read-only memory, a random access memory, a cache memory, etc.), and/or as a data signal traveling over a network (e.g., during a wired/wireless electronic distribution of the program code).
102
In another embodiment, the invention provides a business method that performs the process steps of the invention on a subscription, advertising, and/or fee basis. A service provider can create, maintain, support, etc., a computer infrastructure, such as the computer infrastructure , that performs the process steps of the invention for one or more customers. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising space to one or more third parties.
102
104
In still another embodiment, a computer infrastructure, such as the computer infrastructure , can be obtained (e.g., created, maintained, having made available to, etc.) and one or more systems for performing the process steps of the invention can be obtained (e.g., created, purchased, used, modified, etc.) and deployed to the computer infrastructure. To this extent, the deployment of each system can comprise one or more of (1) installing program code on a computer system, such as the computer system , from a computer-readable medium; (2) adding one or more computer systems to the computer infrastructure; and (3) incorporating and/or modifying one or more existing systems of the computer infrastructure, to enable the computer infrastructure to perform the process steps of the invention.
As used herein, it is understood that the terms “program code” and “computer program code” are synonymous and mean any expression, in any language, code or notation, of a set of instructions intended to cause a computer system having an information processing capability to perform a particular function either directly or after either or both of the following: (a) conversion to another language, code or notation; and (b) reproduction in a different material form. To this extent, program code can be embodied as one or more types of program products, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing and/or I/O device, and the like.
The foregoing description of the preferred embodiments of this invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other features of this invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
FIG. 1
depicts a flow diagram of an illustrative process carried out by a deployment manager to determine the number of simultaneous connections that should be opened to maximize network bandwidth, in accordance with an embodiment of the present invention.
FIG. 2
depicts a flow diagram of an illustrative process carried out by the deployment manager to deploy an application to each member of the cluster, in accordance with an embodiment of the present invention.
FIG. 3
depicts an illustrative process for preparing and communicating deployment tokens to the cluster members of a cluster in accordance with an embodiment of the present invention.
FIG. 4
depicts an illustrative computer system for implementing embodiment(s) of the present invention. | |
Anglo Pacific seeks to maintain the highest standards in all areas of its business.
Our Commitment
An extensive review was commissioned in 2014 by the Board, taking into account international guidance. The standards considered included: the E xtractive Industries Transparency Initiative; the Global Reporting Initiative Mining and Metal Sectors Supplement; the United Nations’ Guiding Principles on Human Rights; and the Voluntar y Principles on Security and Human Rights, together with CSR reporting and CSR commitments of the mines that it is invested in. Consequently, the Group has extended and strengthened its due diligence process to reflect current best practices.
The mechanism that the Group uses to monitor CSR issues has been given greater granularity. In particular, it directs the Group to consider the governance, policy provision, management, measurement and reporting of each material issue. During 2016, the Group has applied this to the consideration of potential investments, including it as a key royalty acquisition criterion, and uses it in the monitoring of existing investments.
At the same time the Group has further improved its office practices, in particular those within its London head office. The Group has implemented improvements, including but not confined to measures to conser ve energy, which we are pleased to report has improved by 14%.
During 2016, the Group improved its recycling policy and now recycles 35% of all office waste (2015: 25%). The Group plans to improve this further during 2017.
The Group is confident that the changes made will enable it to achieve improvements in its CSR practice.
Environment
Anglo Pacific is committed to an environmental policy of collaborating fully with statutor y authorities, local communities and other interested parties in order to limit any potential adverse impacts of its activities on the natural and human environments associated with its operations. The nature of the Group’s royalty investments is such that it does not operate any of the properties underlying its royalty portfolio and, consequently, it does not always have the ability to influence the manner in which the operations are carried out. Nevertheless, a responsible approach to a project ’s environmental impact and its sustainability management is essential to the success of the project over its life.
As part of the Group’s investment decision process, careful consideration is given to the environmental aspects of any potential asset purchase during the due diligence phase. In particular, the Group typically engages with consultants who have the requisite expertise to ensure that it can consider and, if necessar y, mitigate any risks in this regard to a properly maintainable level. In 2016, as part of the Denison financing agreement, Anglo Pacific engaged an independent consultant, Golder Associates, to review the key environmental risks and environmental liabilities relating to the project. No issues were
identified as part of this process. The Group expects employees to address environmental and sustainability responsibilities within the framework of normal operating procedures and to look to minimise waste as much as economically practicable. The Audit Committee is responsible for periodically reviewing the Group’s environmental practices and for monitoring their effectiveness.
Social & Community Issues
Anglo Pacific acknowledges that, whilst its activities have little direct contact with communities, it can positively influence the social practices and policies of companies it conducts business with. Positive social and community relationships are essential to profitable and successful mining activities. The Group endeavours to ensure that companies it works with have appropriate procedures in place to facilitate this. More specifically, Anglo Pacific’s investment decision process for potential asset purchases involves due diligence relating to the full range of CSR issues, including the social and community aspects of the project. As part of its 2016 Denison financing agreement, Anglo Pacific reviewed the social and community factors associated with the Cigar Lake Project. No issues were identified as part of this process.
Human Rights
The debate on the role of business and human rights has gained increasing prominence in recent years. Anglo Pacific welcomes this focus as respect for human rights is implicit across the Group’s employment practices. Further, a commitment to human rights is an important part of any successful organisation. As part of the Group’s investment decision process, if necessary, consultants with the requisite expertise are engaged to assist in identifying and mitigating any such risks.
Diversity
The Group’s employees are instrumental to its success, and it respects and values the individuality and diversity that ever y employee brings to the business. As at December 31, 2016, 54% of the Group’s employees were female (2014: 54%) as the Group had
11 employees, six of whom were female. In terms of the Company ’s
Board of Directors, there were six Directors, five of whom were male and one of whom was female. Prior to any appointment to
the Board, the Nomination Committee gives due regard to diversity and gender with a view to appointing the best placed individual
for the role. The Group recognises that it has more to do in encouraging and supporting diversity and hopes to be able to identif y and develop talent at all levels in the organisation as the Group continues to grow.
Integrity
Anglo Pacific is committed to maintaining its reputation for fair dealing. The Company does not offer, give or receive bribes or inducements whether directly or through a third party.
The Company has policies and procedures in place to ensure that all Directors, officers, employees, consultants, advisors, business partners, and anyone else who may be acting on its behalf, are aware of their responsibilities in this area. The Company actively promotes a transparent approach to all of its business dealings and expect employees to adopt a zero tolerance attitude to corruption. Employees are encouraged to report any potential or apparent misconduct in accordance with the Company’s internal whistle-blowing policy and any employee that refuses to pay bribes, or raises any issues honestly, and in good faith, will be supported by the Group.
The Company chooses business partners and counterparties carefully, based on merit and reputation, and only works with persons of known integrity, who it believes will act consistently with its own standards. The Company does not make facilitation payments. Where business is conducted in countries with laws that are less restrictive than the Company’s policies and procedures, it will seek to follow its own policies and procedures, promoting its standard of integrity wherever possible.
Health & Safety
The health and safety of the Group’s employees is of fundamental importance and is a responsibility it takes seriously. The Group’s small size allows the day-to-day responsibility to remain at Board level, being monitored by the Chief Executive Officer. The Group has both a health and safety policy and office risk assessments in place, which are reviewed on an annual basis. Furthermore, a commitment to health and safety is a fundamental component of any mining project, and, as part of the Group’s investment decision process, consultants with the requisite expertise are engaged to assist in identifying and mitigating any such risks
Donations
The Group’s philosophy on charity has historically been that this is a decision best made by shareholders with their own resources. The Group has revised its policy and will now consider supporting select charities at the discretion of the Directors. No donations were made during 2016; however, the Group will continue to consider supporting select charities during 2017.
Greenhouse Gas Emissions
The UK Government requires that UK listed companies should report their global levels of greenhouse gas emissions in their Annual Report. Anglo Pacific is a relatively small organisation, with 11 employees, which means that any emission sources within its operational and financial control, such as business travel, purchase of electricity, heat or cooling by the Group, are not material in their impact. As the management and operation of the underlying mines generating the Group’s royalty income are outside its control, it is unable to report on these emissions.
Following the Group’s move to a new office at the end of 2014, power consumption has been monitored and has improved by 14%. | https://www.anglopacificgroup.com/our-contribution/ |
Special clue numbers related to the difference between numbers in two adjacent cells and values of the stars in the "constellation" make this a doubly interesting problem.
Find all the ways of placing the numbers 1 to 9 on a W shape, with 3 numbers on each leg, so that each set of 3 numbers has the same total.
Advent Calendar 2011 - a mathematical activity for each day during the run-up to Christmas.
You have been given nine weights, one of which is slightly heavier than the rest. Can you work out which weight is heavier in just two weighings of the balance?
This second Sudoku article discusses "Corresponding Sudokus" which are pairs of Sudokus with terms that can be matched using a substitution rule.
A Sudoku based on clues that give the differences between adjacent cells.
in how many ways can you place the numbers 1, 2, 3 … 9 in the nine regions of the Olympic Emblem (5 overlapping circles) so that the amount in each ring is the same?
Given the nets of 4 cubes with the faces coloured in 4 colours, build a tower so that on each vertical wall no colour is repeated, that is all 4 colours appear.
In this Sudoku, there are three coloured "islands" in the 9x9 grid. Within each "island" EVERY group of nine cells that form a 3x3 square must contain the numbers 1 through 9.
Label the joints and legs of these graph theory caterpillars so that the vertex sums are all equal.
Take three whole numbers. The differences between them give you three new numbers. Find the differences between the new numbers and keep repeating this. What happens?
Try to solve this very difficult problem and then study our two suggested solutions. How would you use your knowledge to try to solve variants on the original problem?
This sudoku requires you to have "double vision" - two Sudoku's for the price of one
A pair of Sudokus with lots in common. In fact they are the same problem but rearranged. Can you find how they relate to solve them both?
In this article, the NRICH team describe the process of selecting solutions for publication on the site.
You have twelve weights, one of which is different from the rest. Using just 3 weighings, can you identify which weight is the odd one out, and whether it is heavier or lighter than the rest?
Can you put the 25 coloured tiles into the 5 x 5 square so that no column, no row and no diagonal line have tiles of the same colour in them?
Choose four different digits from 1-9 and put one in each box so that the resulting four two-digit numbers add to a total of 100.
Problem solving is at the heart of the NRICH site. All the problems give learners opportunities to learn, develop or use mathematical concepts and skills. Read here for more information.
This article for teachers describes several games, found on the site, all of which have a related structure that can be used to develop the skills of strategic planning.
Pentagram Pylons - can you elegantly recreate them? Or, the European flag in LOGO - what poses the greater problem?
My two digit number is special because adding the sum of its digits to the product of its digits gives me my original number. What could my number be?
Place the 16 different combinations of cup/saucer in this 4 by 4 arrangement so that no row or column contains more than one cup or saucer of the same colour.
This Sudoku, based on differences. Using the one clue number can you find the solution?
A pair of Sudoku puzzles that together lead to a complete solution.
Explore this how this program produces the sequences it does. What are you controlling when you change the values of the variables?
Four small numbers give the clue to the contents of the four surrounding cells.
Find out about Magic Squares in this article written for students. Why are they magic?!
Do you notice anything about the solutions when you add and/or subtract consecutive negative numbers?
You are given the Lowest Common Multiples of sets of digits. Find the digits and then solve the Sudoku.
If you take a three by three square on a 1-10 addition square and multiply the diagonally opposite numbers together, what is the difference between these products. Why?
Charlie and Abi put a counter on 42. They wondered if they could visit all the other numbers on their 1-100 board, moving the counter using just these two operations: x2 and -5. What do you think?
Can you arrange the numbers 1 to 17 in a row so that each adjacent pair adds up to a square number?
An introduction to the binomial coefficient, and exploration of some of the formulae it satisfies.
Replace the letters with numbers to make the addition work out correctly. R E A D + T H I S = P A G E
15 = 7 + 8 and 10 = 1 + 2 + 3 + 4. Can you say which numbers can be expressed as the sum of two or more consecutive integers?
The NRICH team are always looking for new ways to engage teachers and pupils in problem solving. Here we explain the thinking behind maths trails.
Solve this Sudoku puzzle whose clues are in the form of sums of the numbers which should appear in diagonal opposite cells.
This task encourages you to investigate the number of edging pieces and panes in different sized windows.
An irregular tetrahedron is composed of four different triangles. Can such a tetrahedron be constructed where the side lengths are 4, 5, 6, 7, 8 and 9 units of length?
A particular technique for solving Sudoku puzzles, known as "naked pair", is explained in this easy-to-read article.
A 2 by 3 rectangle contains 8 squares and a 3 by 4 rectangle contains 20 squares. What size rectangle(s) contain(s) exactly 100 squares? Can you find them all?
Label this plum tree graph to make it totally magic!
The challenge is to find the values of the variables if you are to solve this Sudoku.
I added together some of my neighbours' house numbers. Can you explain the patterns I noticed?
Imagine a stack of numbered cards with one on top. Discard the top, put the next card to the bottom and repeat continuously. Can you predict the last card?
Imagine you have an unlimited number of four types of triangle. How many different tetrahedra can you make?
This Sudoku combines all four arithmetic operations.
Use the differences to find the solution to this Sudoku.
A Sudoku with a twist. | https://nrich.maths.org/public/topic.php?code=-99&cl=3&cldcmpid=294 |
How many Bitcoins are left in circulation?
According to Statista.com, records closing in quarter 2 of the year 2020 show a total of 18.52 Million in circulation. Therefore, with mining capping at 21 million, how many bitcoins are left? Only 2.48 million to mine. Bitcoins in circulation is a relative figure.
How many Bitcoins exist and how many are there?
How Many Bitcoins Exist? But 21 million is the maximum cap which is yet not fully mined and not in circulation. As of now, 17.7 million coins have been mined and the total coin supply halves every four years. Due to this, the last bitcoin will be mined in the year 2140 and after that, no new bitcoins can be mined as per the Bitcoin protocol limit.
How many BTC are circulating in the world?
As of writing this article the exact number is 18,620,000 BTC which will change every 10 minutes. To get real time data on the Bitcoin鈥檚 circulating supply there are several ways. If you are running Bitcoin core wallet then execute gettxoutsetinfo command in the console window.
How many Bitcoins are there in 2020?
As of 2020, there are just over 18 Million Bitcoins in existence. However, not all of them are actually usable. Among those 18 million, approximately 4 million bitcoins are lost whereas, around 1 million were stolen in various hacks and heists such as that of through Mt. Gox. That leaves us with 13 million bitcoins. | https://www.douyinyuny.com/how-many-bitcoins-are-in-circulation/ |
This no-bake oreo pie is out of this world amazing! Decandant, creamy, sweet, and a perfect dessert to end a meal with. You can never go wrong with an oreo pie recipe no bake because you don’t even have to heat the house. Just whip it up, let it set up and devour every bite of its sweet goodness.
No-bake pies are always a hit at dinner parties, barbecues, and potlucks. Next time you are going to an event, whip up this oreo cookie pie, and I promise you won’t have leftovers.
How To Make Oreo Pie
The hardest part of making this no-bake pie is that you have to wait for it to set up. It is totally worth the wait, though. Now it’s time to give you all the details on making this Oreo cookie pie.
First Step: Over low heat, place the cream in a saucepan and cook until it’s bubbling.
Second Step: Add chocolate chips to a heat-friendly bowl. Add the hot cream over the chocolate chips.
Third Step: Continue to stir the cream and chocolate mixture until the chips have melted, and it’s mixed well. Allow to cool.
Fourth Step: Add pudding mix and really cold milk to a large mixing bowl. Mix for 1 minute or so until it is well stirred.
Fifth Step: Let the pudding rest for around 3 minutes to give it time to solidify.
Sixth Step: Toss in whipped topping and stir.
Seventh Step: Add mini Oreos to the mixture and combine.
Eighth Step: Pour mixture into the Oreo pie crust, making sure not to overfill.
Ninth Step: Place the no bake pie in the freezer for around 10 minutes to cool it off.
Tenth Step: Take the pie out of the freezer and spread the cooled ganache over the top.
Eleventh Step: Add some Oreos and crushed Oreos as a garnish to the top of the pie.
Twelfth Step: Refrigerate the delicious easy pie for 4 hours up to overnight before serving.
Thirteenth Step: Let the pie thaw on the counter for 10 minutes before cutting and serving.
Oreo Pie Recipe No Bake Variations
This recipe has the traditional flavors of an Oreo no bake pie, but there are still many things you could try with it. I love adding different flavors, colors, and textures, depending on my mood and what I have on hand. Here are some fun ideas to try out:
- Sprinkles – If you are making this easy pie for a birthday party or another fun event, add some bright and colorful sprinkles. Who can resist that?
- Oreo Varieties – Try this with some Mint Oreos, Peanut Butter Oreos or Chocolate Cream Oreos for an excellent flavor spin! Each one has its own uniqueness that will make the pie even better!
- White Chocolate – Drizzle melted white chocolate on top of the cream pie. It will add some depth while being the perfect decoration.
- Peanut Butter Chips – Toss in some peanut butter chips to the cream mixture. Not only does it taste terrific, but it also looks nice too.
- Pudding Varieties – If you don’t have the cheesecake pudding on hand, you can switch it out for plain vanilla, chocolate, or even butterscotch.
- M&M’s – You can add different colored M&M’s depending on the season to add some color to the cream pie.
What Makes This The Best No Bake Oreo Pie?
I feel like this is the best easy no bake pie because you don’t have to put in a ton of effort. The ingredients are super versatile and can easily be switched out for something different when the craving hit. It’s also perfect for all occasions! You will never take one of these pies to an event, and no see people smiling as they eat it. Plus, with the decadent chocolate, it can keep any chocolate fanatic happy!
When Should I Serve This Oreo Cookie Pie?
You can literally serve this pie for all occasions, not even joking! Some people think of cold no bake pies as a summer dessert, but you can actually eat it any time of year. Here are some occasions when I have served it:
- Birthday Parties – Forget regular cakes, try something new and exciting. Your guests will rave!
- Christmas – Add some red & green sprinkles, candies, or M&M’s to give it a Christmas flair.
- Reunions – Every bite will be gobbled up!
- Dinner Party – This no-bake cream pie is elegant enough for a dinner party too.
- Barbecue – It’s cool, refreshing, and mouthwatering good.
- Potluck – Let’s face it; the desserts are always the best part of any potluck!
How To Store This No Bake Pie Recipe
Always make sure this pie is tightly covered and keep it cold in the refrigerator. If it sets out longer than 2 hours, it isn’t going to be good anymore. If you know it is going to be sitting out for longer than 2 hours, you can fill a bowl or dish with ice and place the pan in the dish. This will keep it nice and cold and prevent it from spoiling a little bit longer.
If you notice that the crust seems super mushy or watery, then it’s not at it’s prime anymore. You may also see condensation or water build up on top when it’s aging. Mold is a sure sign that it needs tossed too.
Otherwise, the cream pie will last around 3-4 days in the fridge. If you know you aren’t going to be able to eat it in that time, you can also wrap it up with tin foil or plastic wrap and place it in the freezer. I always double protect it by placing it in a freezer-safe airtight container too. It will last 2-3 months in the freezer. Set it on the counter for a few minutes before serving, but you can eat it frozen. It will taste like ice cream. Another option is to freeze the easy no-bake pie in single-serving pieces. Then it’s quick to grab a slice.
Craving More Sweet RecipesPrint
No Bake Oreo Pie with Chocolate Ganache
Description
No-bake pies are always a hit at dinner parties, barbecues, and potlucks. Next time you are going to an event, whip up this oreo cookie pie, and I promise you won’t have leftovers.
Ingredients
- 1 Oreo Pie crust
- 3 ounce cheesecake pudding mix
- 8 ounce whipped topping, thawed
- 1 3/4 cups milk, cold
- 1 ½ cups chocolate chips
- ½ cup heavy whipping cream
- 1 ½ cup Oreo minis
Instructions
- In a saucepan, over low heat, heat the cream until just starting to bubble.
- In a heat-friendly bowl, add the chips, and pour the heated cream over the top.
- Stir with spatula until melted. Allow to cool.
- In a large mixing bowl, add pudding mix and cold milk. Whisk for about a minute.
- Allow pudding mixture to sit and solidify, about 3 mins.
- Whisk in whipped topping.
- Mix in 1 ½ cups mini Oreos.
- Pour into pie crust, trying not to over-fill.
- Freeze for about 10 minutes.
- Take out of the freezer and spread cooled ganache over the top.
- Decorate top with remaining Oreos.
- Refrigerate for 4 hours or overnight.
- Thaw for 10 minutes before cutting. | https://sweetpeaskitchen.com/no-bake-oreo-pie-with-chocolate-ganache-recipe/ |
The Lee Family. Once upon a time Noel and Rena got married and had 2 kids - Doris and Donald. Then one day, Doris got married to Jeremy and had her own 2 kids - Vince and Edda. We all live far apart, and keep moving around. It's hard to keep tabs on each other. Welcome to our blog.
Tuesday, February 20, 2018
Usual Monday ride, Canyon, Vince is driving!
Jeremy went bike riding on President's day with the Potomac Pedalers. Usually he goes on Sat or Sun and it's fine, but he hasn't made much headway with being friends with the weekend bikers. On President's Day, he went on the advertised "Usual Monday Ride" and had a great time, everyone was very friendly, the ride was long enough and they went fast enough for Jeremy. I was like - how can it be the usual Monday ride? All they all unemployed? Turns out, they are all retired. Jeremy, who is now in fantastic biking shape, was working hard to keep up with a bunch of 70 year olds. Jeremy also just spent two years worth of careful savings (the fun fund is empty now!) on his first, real, true road bike. So if you gave him any birthday or Christmas money in the past two years, it's gone now.
******
Vince is in the middle of a state-mandated 30 hour classroom driving course. Along with the classroom bit, he gets three two-hour in-car driving lessons. While Jeremy was out biking with the 70 year olds, Vince got into a car and had his first lesson at the wheel. On the way to the driving lesson, I could tell he was nervous - he asked how he could possibly drive a car without ever having driven a car, but I told him that's what lessons are for! I picked him up from his driving lesson and he asked to drive us home once we got off the Rockville Pike and onto our neighborhood streets. I had taken the van to pick him up, so he drove our enormous minivan down our street.
By Doris at February 20, 2018
No comments: | http://www.justregularfolks.com/2018/02/usual-monday-ride-canyon-vince-is.html |
While there are times when all we want is to bite into a classic jalapeño popper, there are other times when we want to make something crazy and just go nuts with our culinary creations. Here, we take the elements of a jalapeño popper, but throw in a few surprises: biscuit dough and Doritos. By using flattened out biscuits, we’re able to make a delectable pocket for our cheese bombs, which we then coat in crushed nacho cheese Doritos…pure perfection. After frying it up, the finished result is an ooey-gooey, spicy, cheesy bomb that’ll have people running back for seconds!
Open biscuits and cut each one in half. Then flatten out with a rolling pin and place one cheese cube on each flattened biscuit.
Top cheese cube with diced jalapeños, then gently seal biscuit dough around the cheese, making sure to press all the edges together firmly.
Once sealed, dip each cheese bomb completely in buttermilk. Shake off excess, then roll biscuits in crushed Doritos.
Repeat with remaining cheese bombs.
Working in small batches, lower cheese bombs in hot oil and cook for about 1 minute, or until golden brown.
Transfer to a paper towel-lined plate to drain, then serve hot. | https://12tomatoes.com/rc-doritos-cheese-bombs/ |
The city of Cheyenne, Wyo. is considering writing off nearly one-quarter of a million dollars in uncollected accounts, some of it dating to the 1990s.
The total outstanding debt of $247,178 stems from 1,218 accounts - including 424 that total $174,855 owed to various city departments; 695 totaling $62,101 owed to the Board of Public Utilities sanitation billings; and 99 totaling $10,221 due to insufficient checks.
The majority of the accounts total less than $100, but two exceed $10,000 and two more exceed $20,000, according to the Wyoming Tribune Eagle.
The city's policy is to write off all outstanding debts that are more than four years old and deemed uncollectible, city officials said.
The City Council’s Finance Committee will meet this week to review whether it will write off the loans.
Most of those with high bills accumulated them by taking material to the landfill. The largest account, a firm called Gemm Homes, declared bankruptcy. The company owes the city's sanitation department $22,053 and an additional $80 for an insufficient check.
City records show that the owner of JR’s Roofing, the business that accumulated the second-largest bill at $21,417, died. | https://www.paymentssource.com/news/wyoming-city-may-write-off-247-000 |
Multiple Asteroid Strikes May Have Killed Mars’s Magnetic Field | Wired Science
Once upon a time, Mars had a magnetic field, just like Earth. Four billion years ago, it vanished, taking with it the planet’s chances of evolving life as we know it. Now scientists have proposed a new explanation for its disappearance. A model of asteroids striking the red planet suggests that, while no single impact would have short-circuited the dynamo that powered its magnetism, a quick succession of 20 asteroid strikes could have done the job. “Each one crippled a little bit,” said geophysicist Jafar Arkani-Hamed of the University of Toronto, author of the new study. “We believe those were enough to cripple, cripple, cripple, cripple until it killed all of the dynamo forever.” Rocky planets like Earth, Mars, Mercury and even the moon get their magnetic fields from the movement of molten iron inside their cores, a process called convection. But Arkani-Hamed’s new study in the Journal of Geophysical Research suggests that just one impact wouldn’t suffice. Image: NASA See Also:
10/23/13, 16:19-- This may solve Einstein's
A Step Towards Quantum Computing: Entangling 10 Billion Particles | 80beats
In life, most people try to avoid entanglement, be it with unsavory characters or alarmingly large balls of twine. In the quantum world, entanglement is a necessary step for the super-fast quantum computers of the future. According to a study published by Nature today, physicists have successfully entangled 10 billion quantum bits, otherwise known qubits. But the most significant part of the research is where the entanglement happened–in silicon–because, given that most of modern-day computing is forged in the smithy of silicon technology, this means that researchers may have an easier time incorporating quantum computers into our current gadgets. Quantum entanglement occurs when the quantum state of one particle is linked to the quantum state of another particle, so that you can’t measure one particle without also influencing the other. Spinning particles are all well and nice, but what do they have to do with computing? Image: Stephanie Simmons
Op-Ed: The Mass Extinction of Scientists Who Study Species | Wired Science
We are currently in a biodiversity crisis. A quarter of all mammals face extinction, and 90 percent of the largest ocean fish are gone. Species are going extinct at rates equaled only five times in the history of life. Scientists who classify, describe and examine the relationships between organisms are themselves going extinct. Take for example the aplacophorans, a rare rare group of invertebrates closely related to octopuses, squids, snails and clams. Fewer than two dozen scientific papers have been published on the group since 2005, even though many new species await discovery and description. If 50 percent of the species of aplacophoran went extinct tomorrow, we would never know. Amelie’s story is tragically common. Both kinorhynchs and gnathostomulids are small, less than one-tenth of an inch in length, and dwell in between grains of sand and mud on the ocean floor. Aplacophorans This problem plagues well-known groups, too. Why the loss of taxonomists? Why?
10/23/13, 19:15-- This actually coincides with
Quantum Entanglement
Whatever happened to one particle would thus immediately affect the other particle, wherever in the universe it may be. Einstein called this "Spooky action at a distance." Amir D. Aczel, Entanglement, The Greatest Mystery In Physics. The Theory When a photon (usually polarized laser light) passes through matter, it will be absorbed by an electron. When the original photon splits into two photons, the resulting photon pair is considered entangled. The process of using certain crystals to split incoming photons into pairs of photons is called parametric down-conversion. Normally the photons exit the crystal such that one is aligned in a horizontally polarized light cone, the other aligned vertically. To illustrate, if an entangled photon meets a vertical polarizing filter (analagous to the fence in Figure 4.4), the photon may or may not pass through. The Practice Experiments have shown that Einstein may have been wrong: entangled photons seem to communicate instantaneously. Figure 5.1.
New Doubts Raised About Potential Bee-Killing Pesticide | Wired Science
A federal entomologist has become the latest researcher to voice doubts about neonicotinoids, a controversial new type of pesticide that may be linked to the collapse of honeybee populations in the United States. The Independent reports that in a documentary screened in Europe but not yet broadcast stateside, USDA bee specialist Jeffrey Pettis describes exposing two groups of bees, one dosed with a neonicotinoid called imidacloprid, to Nosema, a common honeybee disease. Pesticide-dosed bees proved especially vulnerable to infection. Imidacloprid is manufactured by German agrochemical Bayer, who also manufacture clothianidin, another neonicotinoid. Since its approval, clothianidin has become widespread. Correlation isn’t cause, but there are already grounds for concern about clothianidin. “Clothianidin’s major risk concern is to non-target insects (that is, honey bees),” wrote those researchers. Image: Flickr, Jack Wolf See Also:
10/23/13, 19:19-- This essentially would be
Bibliography of Quantum Cryptography
by Gilles Brassard Département IRO, Université de Montréal. The original PostScript file from Gilles Brassard - provided by Edith Stoeveken - was converted to ASCII and reformatted in HTML; Sept 2 1994, Stephan Kaufmann. Abstract This paper provides an extensive annotated bibliography of papers that have been written on quantum cryptography and related topics. 1. For ages, mathematicians have searched for a system that would allow two people to exchange messages in perfect privacy. In addition to key distribution, quantum techniques may also assist in the achievement of subtler cryptographic goals, important in the post-cold war world, such as protecting private information while it is being used to reach public decisions. In the past few years, a remarkable surge of interest in the international scientific and industrial community has propelled quantum cryptography into mainstream computer science and physics. 2. Quantum cryptography is best known for key distribution. 3. 4. 5. 6. 7.
Sleeping Protects Memories From Corruption | Wired Science
“You must remember this,” Sam the piano player crooned to Humphrey Bogart and Ingrid Bergman in Casablanca. The couple might have recalled even more about their days in Paris if they’d been napping when Sam played the tune again. Replaying memories while people are awake leaves their memories subject to tinkering. But reactivating memories during sleep protects them from interference, researchers in Germany and Switzerland report online January 23 in Nature Neuroscience. The finding shows that the brain handles memories differently during sleep than while awake, says Sara Mednick, a cognitive neuroscientist at the University of California, San Diego who was not involved in the research. In the new study, volunteers played a Concentration-type game in which they had to remember the locations of pairs of cards. Both sleeping and awake volunteers who didn’t have their memories jogged by the odor remembered about 60 percent of the pairs. Image: Flickr/mollyollyoxenfree See Also:
Squeeze light to teleport quantum energy - physics-math - 23 January 2014
Putting the squeeze on light may be the key to teleporting energy across vast distances. Although the amount of energy that could theoretically be transmitted is tiny for now, it could be enough to power quantum computers that don't overheat. For years physicists have been smashing distance records for quantum teleportation, which exploits quantum entanglement to send encrypted information. No physical matter is transmitted, and nothing is travelling faster than light. Physicists have done this with light and with matter, such as entangled ions. Quantum toothpaste Theory has it that a vacuum is not truly empty – it is constantly roiling with tiny fluctuations that cause particles to pop in and out of existence. The quantum field in the vacuum of space is usually at its lowest energy level. Light work To get greater reach, Hotta and his colleagues have now applied a twist to their theory that adds squeezed light to the vacuum. Normally, photons travelling through a vacuum arrive randomly. | http://www.pearltrees.com/u/9969781-quantum-entanglement-stretch |
Marsha Severt, DVM, CVA, CEVMMP
Dr. Marsha is from Charlotte, NC and grew up on one of the last historic pieces of land in Charlotte. She attended North Carolina State University receiving her undergraduate degrees in Animal Science and Microbiology in 2005 and then her veterinary degree in 2009. During college, Dr. Marsha spent a semester living and working on a Thoroughbred racehorse farm in Lexington, KY. After graduating from veterinary school, Dr. Marsha spent a year at Texas A&M University as a large animal intern. There she gained further experience in large animal medicine and surgery. Following her internship, Dr. Marsha returned home to work in general equine practice and now solely provides integrative veterinary services to horses. Dr. Marsha has received certification in equine acupuncture from the Chi Institute and certification in spinal manipulation from the Integrative Veterinary Medical Institute. After completing her coursework, Dr. Marsha was invited to teach equine spinal manipulation for the Integrative Veterinary Medical Institute and does so every year.
When not working on her client’s horses, you can find Dr. Marsha spending time with her son Trent and daughter Ashley, riding her own horses, or traveling. She also enjoys running with her happy Vizsla named Reesie! Dr. Marsha is married to Dr. Skip and they live in Monroe, NC with their children and animals. | https://browncreekequine.com/about-our-clinic/our-team/ |
PROBLEM TO BE SOLVED: To provide a mark sheet answer immediate management system allowing an examinee to easily, securely and simply perform verification between examination questions and answer results after finishing an examination.
SOLUTION: The mark sheet answer immediate management system reads by an OCR a mark sheet 701 having correct marks and wrong marks printed to form an electronic file, stores the electronic file in a personal computer server having a modem corresponding to multiple lines, and allowing an examinee or the like to retrieve an image of the electronic file using an examinee's number or the like as a keyword through a telephone facsimile or the like, in order to allow the examinee to grasp the correct answers and wrong answers in a mark sheet 700 answered.
COPYRIGHT: (C)2012,JPO&INPIT
PROBLEM TO BE SOLVED: To provide a mark sheet answer immediate management system allowing an examinee to easily, securely and simply perform verification between examination questions and answer results after finishing an examination.
SOLUTION: The mark sheet answer immediate management system reads by an OCR a mark sheet 701 having correct marks and wrong marks printed to form an electronic file, stores the electronic file in a personal computer server having a modem corresponding to multiple lines, and allowing an examinee or the like to retrieve an image of the electronic file using an examinee's number or the like as a keyword through a telephone facsimile or the like, in order to allow the examinee to grasp the correct answers and wrong answers in a mark sheet 700 answered.
COPYRIGHT: (C)2012,JPO&INPIT | |
I am pleased to announce that Qt 5.9.1 is released today. It contains all the latest bug fixes and improvements from Qt 5.9 branch.
Qt Creator 4.3.1 is included in the Qt 5.9.1 offline installer packages and available via the online installer.
As a patch release Qt 5.9.1 does not add any new functionality, just bug fixes and other improvements. For details of the changes compared to Qt 5.9.0 release, please check the Change files of Qt 5.9.1.
Our intention is to make more frequent patch releases for Qt 5.9 LTS than before. So if your most desired fix is not included in Qt 5.9.1 there will be more patch releases in the coming months.
If you are using the online installer, Qt 5.9.1 and Qt Creator 4.3.1 can be updated using the maintenance tool. Offline packages are available for commercial users in the Qt Account portal and at the qt.io Download page for open-source users.
For users targeting iOS we have identified an issue which can be fixed with an additional iOS patch. We know this is unfortunate, but the alternative was to delay the entire release for over one month. In light of this we thought it would be better to release 5.9.1 today, with a hot patch for iOS.
It would be nice to mention also corresponding QTBUG-61690 and what to do with the patch.
Is there any reason, why this is not published as “update” (update files in 5.9), but instead as a “new” component (installs in 5.9.1)? Until now, patch releases have always been updates. I’d like to know why you changed that?
The last time patch level releases were published as separate components it was for 5.2, from 5.3 to 5.8 they were published as updates. Moving back to 5.2 habits doesn’t really seems like an improvement.
I can hear the argument that this allows people to move back to a previous 5.9 release, but it kind of contradicts the part where you say you want more frequents releases. If the next update is really going to be released in a short delay, people probably can afford to wait (and in the worst case there are offline installers). Also if the CI & test systems are really being improved, you should be able to trust that a patch release doesn’t brings new major bugs (i.e major enough that people need to downgrade).
I think you’re wrong, if 5.9.1 contains just bug fixes and improvements from Qt 5.9 branch and does not add any new functionality then why would someone downgrade to 5.9.0 it doesn’t make a sense.
Because there’s a small chance that, along with /fixing/ something, they /broke/ something you care about.
Even with comprehensive testing, it is not possible to guarantee that the bug fixes and improvements do not introduce any regressions. So, it is good practice to provide a mechanism to roll back, in case Qt 5.9.1 contains a regression.
Although I am also one of the users who believe Qt5 should pay more resource on stability rather than adding new features, I do believe it is very hard to ensure bug fixes wouldn’t break anything on a huge project like Qt5 even you are ultra cautious/spend tons of times on it.
Can anybody give us the qtbase_zh_CN.qm file? Some components are not translated to Chinese. It’s not a problem with Qt4.
This should be an update for the 5.9.0 not separate release install.
With these bugs a complex qml application will crash! With Qt 5.7.1 there are no crashes.
Sometimes there is a reason to get a specific patch release into use. There will be improvements to the installer during H2/17 that allow rollback. But for now the compromise is separate patch release install.
Indeed, that is definitely silly. I was wondering why the online installer reports no updates other that QtCreator and after waiting for half day thought I would check here to see whether the upgrade has for some reason not actually been put online yet.
Thanks, look forward to testing the new Mouse wheel support in Android!
Do you support CJK language virtual keyboard or 3rd party input method in embedded system?
Would it be possible that you make an official announcement regarding your plans about how frequently you will provide new LTS Minor versions?
It would be great for me to know how often I’d have to change our ci scripts as we want to always provide our software with the latest Qt LTS version.
Is there any tutorial to apply the ios patch? Thanks.
This is an amazing news, thank you so much for the improvements and updates.
I’m currently in the early stages of the developing an open source native Linux application for UX Design, similar to Sketch and Adobe XD, and Qt is my development platform of choice.
I’m starting to have doubts in which path I should be taking between developing in Qt/C++ or Qt/QLM.
I’ve built some tests applications, like a todo list app, video player, and calendar, both in Qt Designer and Qt Quick Designer. I found the latter easier to use and more intuitive in term of UI, but I noticed the limitations in available controls, and I struggled a bit in writing functionalities in QML compared to C++.
My question is, is QML ready to be used for large scale native desktop applications? Considering the complexity of the app I’m building, I don’t want to find myself in the situation of refactoring in C++ because of current limitations.
Apologies if my question is inaccurate or annoying, I’m quite new to this and I’m not sure if my approach is correct.
It will be great if QML can access the databases without C++ using SQL or ORM.
I’d like to see Qt Quick become a full stack MVC platform( like Django or Node.js), but not only a UI tool.
Have anyone experienced issues using QObjectPicker since Qt 5.9. I was using it with 5.8 and it was working fine, but since I updated to 5.9 and later to 5.9.1, I can’t pick an object!
Seem i can compile for Android now without big issues. | https://blog.qt.io/blog/2017/06/30/qt-5-9-1-released/ |
Hello eveyone!
I was wondering on how a NN works in forex and how to "train" it depending on the peformance.
The idea is this: based on 3 indicators, I create a NN that consist on 4 neurons(N).
N1 recieves data from indicator 1 and 2.
N2 recieves data from indicator 1 and 3.
N3 recieves data from indicator 2 and 3
N4 recieves data from indicator 1, 2 and 3.
Then, the result of each neuron gets multiplied by other weights and then goes to the output.
All weights are started as random numbers when the EA starts.
The next step, is to apply a sigmoid function to the values and, if the value is greater than a bias, activate a buy or sell operation, depending on the current state.
If the operation results in a loss, it is obviously desired to apply a correction to the weights, since we can't modify the inputs.
And here my question. How does the backpropagation function works? As far as I have read, its a function that corrects the weights based on the costs of the function (sigmoid function I think).
The main idea is: when the result is negative, use backpropagation for adjusting the weights and when the result is positive use the same idea to give a reward to the NN.
Any ideas? Thoughts?
I'm posting how I created the neuron and the sigmoid function I'm using. Is this something that has the potential of giving good results? | https://www.mql5.com/en/forum/317110 |
Click here for a PDF version of these instructions.
You’re ready for fishing. You’ve got everything … but bait. And no cash to buy any. Well, forget throwing money at minnows. Gather your own! It’s simple with this easy-to make trap. Here’s how:
WHAT YOU’LL NEED
- Two plastic soda pop bottles. The three-liter size is best, but two-liter will do.
- One woodworking nail, about 6-penny size (the exact size is unimportant).
- Some twine, kite string or something similar.
- Adult permission and/or help.
For tools, scrounge up a pair of sturdy scissors and locking pliers (such as Vise-Grip) or common slip-joint pliers. A utility knife can help with initial cuts but isn’t necessary. You’ll also need a controllable flame source — the kitchen stove is perfect.
WHAT YOU’LL DO
STEP 1: Label one bottle “A” and the other “B.” Cut off the bottom one-third of bottle A and put in your home recycling bin. Leave the bottle cap on.
STEP 2: On B, cut off the neck & shoulders, close to the top of the bottle label. It should be cut just below — maybe a half inch or so — where the sides begin to straighten out. Toss the bottom and spare bottle cap in the recycling bin.
STEP 3: The remaining steps should be done near your flame source, with the pliers and nail handy. Keep a bowl with cold water nearby also. Fit funnelshaped piece (B) into the bottom of A so it points toward A’s remaining bottle cap. It should now form a nice little “cave.”
STEP 4: Holding the two bottles together firmly in your weak hand (left hand if you’re right-handed, right if you’re left-handed), turn on the flame with the other hand. Pick up the pliers with your free hand and firmly grasp the nail near its head with the pliers. Carefully hold the nail over the flame so that it gets good and hot.
STEP 5: Keeping your grip on both the A and B bottle parts and the hot nail in the pliers, push the nail point through both the funnel and bottle, in 10 to 12 spots around the lip of the “cave” that we mentioned. Drop the hot nail into the cold water.
STEP 6: Using your string or twine, sew the two bottle parts together. Alternately, simply cut the string into short pieces, using the same number of pieces as there are holes, and individually tie each hole up so that the two plastic parts A and B don’t come apart.
STEP 7: Reheat the nail as in Step 4, and put a bunch of holes all over the sides of the bottle (A). A couple of dozen should do it.
SETTING YOUR MINNOW TRAP
To use your trap, add some bread or cracker bits through the funnel (B). Sink the trap in your favorite pond or lake for a few hours, preferably overnight. Tie it securely to a dock or tree. The minnows will go in the trap but aren’t smart enough to get out. Next morning, simply open the bottle cap and pour the minnows into your bait bucket. You’re all set for a day of fishing! | https://fishing.boyslife.org/make-a-minnow-trap/ |
Aeroflot in winter 2017/18 season plans to increase service to the Maldives, previously scheduled as 3 weekly flights. From 17DEC17, the Skyteam member will increase service to 5 weekly, until the end of winter schedule on 24MAR18. In winter 2016/17 season, the 5 weekly flights was served during New Year period. | https://www.routesonline.com/news/38/airlineroute/273454/aeroflot-increases-maldives-service-in-w17/ |
There needs to be a better and more fair way for everyone in all time zones to get points in the fortification and feeding events.
Everyone has experienced the frustration of logging in for a fortification or feeding event and finding all of their resources gone, that no one has a good amount of resources to steal, and that if you gather enough resources, someone will steal it before you can use it. For that reason, it is crucial to be online RIGHT when these events start to get points.
However, with this game being international, it gives an unfair advantage to certain time zones (not always the same ones). Even if PG decided to add treasure hunt with a timer for when the event will start, it’s still wouldn’t be possible for everyone to have the same shot at getting points. There needs to be a way to help out players who are asleep, at work, or have some other conflict. I’m not sure of the best way. I’ll put a few possibilities below. Feel free to comment with other ideas or tweak mine.
Have a higher amount of resources protected when the event starts (based on their level, so they can actually have enough to build or feed). Have that protection last for about 1 hour after the player logs in. Maybe have the protected amount decrease over a period of time if they don’t log in, but allow them enough time to sleep or work (so maybe like 10 hours after the events starts?).
Maybe at the start of the event, take all of their needed resources for that event (wood for fortification or food for feeding), and turn it into a resource pack. That way they can use what they had saved up whenever they log in.
A combination of the above ideas could work too. | https://forums.wardragons.com/t/fortification-and-feeding-event-start/17873 |
I just closed it and put it away, or rather, I put in on a table with some notion that I’d probably find another place for it later. So, what is “it”? My MacBook.
I’m not the most organized person on the planet. I have magazines piled everywhere, chargers coiling in the corners, and my phone seems to hate me and hide in the farthest nook possible. I could probably lose an elephant in my sitting room. They really should invent something so that your phone could answer your call, for when it’s lost and “here kitty-kitty” doesn’t work. However, they invented the fitness wristband instead, of all things!
When cleaning up my apartment, I would just scoop my old MacBook up with everything else and shove it away onto the window sill or into the armchair. It’s not that it weighs a ton, I just had no place for it. Every time I caught a glimpse of my old MacBook, I promised, I’d do something with it. I had trusted the laptop with my photos, emails, and shopping needs. I had trusted it with pieces of my life, memories frozen in time, a glimpse here, a snap there, and then I completely forgot about it.
My sad and forgotten MacBook is outdated, has scrapes and scratches, and I’ve lost the Lightning cable somewhere. But my gran has picture albums, and my mom has piles of DVDs and boxes full of VHS tapes stacked somewhere in the attic. (Where you could lose an elephant and a tiger, by the way.) I’ve got an account on iTunes and iCloud, and this old MacBook. It’s not like I’m going to pass it on to my grandkids. They’ll have had brain implants by the time I leave this world.
But, that’s not the point. My point is: would I be giving away more than an old laptop? Or am I just imagining things?
SSteve Jobs met Syeve Wozniak at the Homebrew Computer Club, in a garage in California’s Menlo Park. Wozniak had seen his first MITS Altair there, and was inspired by MITS’ build-it-yourself approach to make something simpler for the rest of us.
It almost didn’t happen, though. Wozniak told the Sydney Morning Herald, “I was shy and felt that I knew little about the newest developments in computers.” He came close to giving the Club a miss. But he didn’t. Then Steve Jobs saw the computer and recognized its brilliance. He sold his VW microbus to help fund its production. Wozniak sold his HP calculator, and together they founded Apple Computer Inc on April 1, 1976, alongside Ronald Wayne – now making Apple a 40 year old company!
By the way, the name caused Apple problems in later years, as it came uncomfortably close to the Beatles’ publisher, Apple Corps, but its genesis was innocent enough. Speaking to Byte magazine in December 1984, Wozniak credited Jobs with the idea. “He was working from time to time in the orchards up in Oregon. I thought that it might be because there were apples in the orchard or maybe just its fruitarian nature. Maybe the word just happened to occur to him. In any case, we both tried to come up with better names but neither one of us could think of anything better after Apple was mentioned.” Wozniak built each computer by hand, and wanted to sell them for little more than the cost of their parts – at a price that would recoup their outlay if they shipped 50 units.
But, Jobs priced the Apple I at $666.66, and inked a deal with the Byte Shop in Mountain View to supply it with 50 computers at $500 each. Byte Shop was going out on a limb, as the Apple I didn’t exist in any great numbers, and the nascent Apple Computer Inc didn’t have the resources to fulfill the order, nor could it acquire them. Atari, where Jobs worked, wanted cash for any components it sold him, a bank turned him down for a loan, and although he had an offer of $5,000 from a friend’s father, it wasn’t enough. In the end, it was Byte Shop’s purchase order that sealed the deal. Jobs took it to Cramer Electronics and, as Walter Isaacson explains in Steve Jobs: The Exclusive Biography, he convinced Cramer’s manager to call Paul Terrell, owner of Byte Shop, to verify the order.
We Help You Save Money: Sell your old and used MacBook to iGotOffer for the best price online! | https://igotoffer.com/apple/where-all-memories-go |
A highly social species, this bird is found in freshwater wetlands in the Pacific states, mainly California. With loss of wetland habitat, this species increasingly relies on agricultural fields for nesting, leaving chicks vulnerable to the harvest of hay and other crops. Audubon California is working with farmers to maintain agricultural nesting habitat long enough each season to allow the blackbirds to successfully raise their young – potentially spelling the difference between survival and extinction for this highly specialized bird.
Breeding populations are restricted to islands off the west coast of North America. Non-native nest predators and increased gull populations threaten breeding birds, and ocean pollution and overfishing threaten feeding birds. Audubon California is working to establish Marine Important Bird Areas and other programs to save this and many other marine bird species in need of protection.
The population that lives along the Pacific shoreline is federally threatened. Development along beaches, increased beach recreation, disturbance by pets, and increased predation require constant vigilance. Audubon California is supporting chapters in organizing beach surveys to monitor population trends and educating the public to enjoy the beach in plover-friendly ways.
The largest shorebird in North America, the curlew winters in the agricultural valleys of California. Estimates of how many curlews are left range from 20,000 to 160,000. Better estimates of how many curlews remain are needed with better understanding about what agricultural types and practices curlews depend. Audubon California and partners conducted a statewide survey of curlews and more than 28,000 birds were counted.
This species’ limited range, extending north from Mexico's Baja California to coastal southern California, and its specific habitat requirements, make it vulnerable and a high conservation priority. Burgeoning human populations have fragmented and destroyed suitable habitat for this species in southern California so that it was Federally listed as a threatened species in 1993.
This wide-ranging species has become increasingly rare as the coastal wetlands that it depends upon are developed. Three endangered subspecies, California, Yuma, and Light-footed Clapper Rail, occur in California. Audubon chapters are engaged in the protection of marshlands and coastal habitats throughout California.
One of North America's endemic grassland birds. Once plentiful on the short grass prairies of western North America, this species has declined by about 50% since 1966. These declines are due to alteration of prairie habitat on the breeding grounds. Mountain Plovers winter in California and depend on agricultural fields and practices.
Nesting high up in the old-growth conifers of the Pacific coast, these enigmatic seabirds were one of the last North American birds to have their nests discovered. Marbled Murrelets usually nest within 30 miles of the ocean and forage at sea within three miles of the coastline. These birds face a powerful triumvirate of threats--logging, gill-net mortality, and oil spills--and have experienced dramatic population declines in recent years.
The western population of this species was down to 600 pairs in 1972. Through concerted effort, it has rebounded to 4,500 pairs in southern California and the Bay Area. Least Terns are endangered because the beaches needed for nesting are in high demand for human recreation and residential development. | http://ca.audubon.org/key-california-birds-audubon-watchlist |
Dr. Kenneth Miller was the leadoff hitter for Plaintiffs in the trial over ID in Dover. Amidst other things, Miller’s testimony was aimed at making a case that the Neo-Darwinian hypothesis is as well-supported as gravitational theory.
It was my understanding that this trial was about whether or not Dover had violated the First Amendment by mentioning to students that some book in the library advocated intelligent design. So
I was a little confused as to why it was relevant for Miller to give us all a lesson in evolutionary biology.
Nonetheless, I like Ken Miller on a personal level and, relevant or not, I very much enjoyed Dr. Miller’s testimony. Though I disagree with Ken on many things, I think Dr. Miller genuinely cares about students. His testimony has also given me a week’s worth of things to think about. Here’s one thought I’d like to share.
What does Neo-Darwinism Predict with regards to Chromosomal History in Humans and Apes?
Under Neo-Darwinism, humans and extant apes obviously share a common ancestor. But how many chromosomes did that alleged ancestor have? Miller made his prediction that there was a fusion event simply by counting chromosomes in apes and humans—not by analyzing the chromosomes themselves.
Miller started off his “prediction” by simply observing that humans have 23 pairs of chromosomes and apes have 24 pairs; therefore two ape chromosomes were fused into one human chromosome.
Miller claims that this simple chromosome-counting requires a fusion event if common ancestry is true. But is that really the case?
Why couldn’t it be the case that the common ancestor had 23 distinct chromosomes, and one chromosome underwent duplication in the line that led to apes? Or maybe the common ancestor had 20 distinct chromosomes and there have been 4 duplications events in the ape line, and 3 in the human line?; or maybe the ancestor had 30 distinct chromosomes and there have been 6 fusion events for ape-line but 7 fusion events for the human-line.
Do you see my point? Simple chromosome-counting or comparisons of numbers of chromosomes does not lead common ancestry to make any hard predictions about how many chromosomes our alleged ape-human common ancestor had. So, under Miller’s logic, there is no reason why a chromosomal fusion event is a necessary prediction of common ancestry for all upper primates.
In fact, if we find evidence that humans have two distinct chromosomes that have evidence of fusion (i.e., let’s say human chromosome #2 has fusion evidence, and then, hypothetically, we also find evidence for fusion on human chromosome #9), then under Miller’s logic, if apes lack any evidence for a fused chromosome, then this should count against common ancestry. Thus, at the present time, absent a full analysis of fusion evidence in our chromosomes, we cannot necessarily say that the presence of one fused chromosome in humans is a prediction of common ancestry. Much more research still needs to be done.
If Miller’s Cold (Chromosomal) Fusion Tale is True, What does it mean for Common Ancestry?
But let’s take Miller’s word for a second, and assume, ad arguendo (for the sake of argument), that there MUST have been a chromosomal fusion event which created human chromosome #2. What does this mean for common descent?
Miller then testified how human chromosome #2 has two centromeres, which are the central – attachment points used for pulling a chromosome to one end of a cell during mitosis. Chromosomes normally only have one centromere, but human chromosome # 2 looks like two chromosomes were fused together, because it has two centromeres (or at least, it has one normal centromere, and another region that looks a lot like a centromere). Futhermore, Miller noted how chromosome #2 has a section where there are two telomeres, structures normally at the tips of chromosomes, which are found in the middle of chromosome #2. Essentially, these two telomeres are oriented in a way that it looks, genetically speaking, like the ends of two chromosomes were fused together.
So I am more than willing to acknowledge and affirm that Miller did provide some very good direct empirical evidence for a chromosomal fusion event which created human chromosome #2. But I’m more interested in two other questions: if we accept Miller’s chromosomal fusion evidence as accurate, then (1) is his chromosome fusion story good evidence for Neo-Darwinian common ancestry between humans and apes? Or (2) does it perhaps pose great problems for a Neo-Darwinian account?
The answer to question (1) is “NO” and the answer to question (2) is “YES!”
Evidence for Fusion in a Human Chromosome Tells you NOTHING about Alleged Common Ancestry with Apes
All Miller has done is documented direct empirical evidence of a chromosomal fusion event in humans. But evidence for a chromosomal fusion event is not evidence for when that event took place, nor is it evidence for the ancestry prior to that event.
The fusion-evidence implies that some of our ancestors likely had 48 chromosomes. But Miller has not provided any evidence that the individual with 48 chromosomes was historically related to modern apes. (I grant that our chromosome #2 has banding patterns similar to two ape chromosomes, but given that our chromosome structure is generally similar to that of apes anyways, it is not a stretch to assume that any 48 chromosome ancestor of you and me had a chromosome structure similar to apes, regardless of whether or not that individual was related to apes. Claiming that banding pattern similarities is evidence of common ancestry with apes simply invokes the “similarity = ancestry” argument, and thus begs the question.) It is entirely possible that our genus Homo underwent a chromosomal fusion event within its own separate history.
Under Neo-Darwinism, the common ancestor of humans and apes is thought to have lived about six million years ago. But under Miller’s account, it is entirely possible that this chromosomal fusion event happened only 50,000 years ago. In such a case, this chromosomal fusion event thus needs not have anything to do with making us human-like as opposed to ape-like. Clearly this chromosomal fusion event could be extremely far removed from any alleged ancestry with apes.
In essence, we don’t know that this chromosomal fusion event happened on a line which leads back to some alleged common ancestor of apes and humans. All we know is that this fusion event happened in the line that led to you and me. Whether that line has common ancestry with apes is a separate question which cannot be answered by this fusion evidence.
All that evolutionists have claimed is that this fusion event occurred after the split that led to humans, so it occurs only in the human lineage. Evidence of a chromosomal fusion event is not evidence that our line leads all the way back to apes.
Given that we had a 48-chromosome ancestor, we don’t know if our 48-chromosome ancestor was an ape or not. For all we know, our 48-chromosome ancestor was a part of a separately designed species, as fully human as anyone you meet on the street today. There is no good reason to think that going from a 46-chromosome individual to a 48-chromosome individual would make our species more ape-like.
Common descent could not have been falsified if there was no evidence for a fusion event, but common descent certainly is not refuted by the presence of a fusion event. The question now stands, does this fusion event provide any evidence for common ancestry between humans and apes? The answer to that question is no.
This is explained in figure 1 below:
Figure 1. This animated gif shows how even if the empirical genetic evidence mandates a chromosomal fusion event, this doesn’t tell you anything about whether or not humans share ancestry with apes. The “Separate Ancestry” slide shows that the chromosomal fusion event may have simply taken place in a separately-designed basic type which, initially, had 48 chromosomes. The “Common Ancestry” slide shows how the chromosomal fusion event may have also taken place in a line which led back to a hypothetical common ancestor of humans and modern apes. The point is that all we have is evidence for a fusion event, but that fusion event is equally compatible with either separate ancestry from apes, or common ancestry with apes. The fusion event itself does not provide any independent evidence for common ancestry with apes. To argue that it is evidence for common ancestry requires special pleading.
Miller’s “prediction” of Neo-Darwinian evolution turns out to not be a hard prediction at all: if common ancestry is true, Miller predicts (albeit wrongly) that there must have been a fusion event. But the converse is not true. The presence of this fusion event in no way requires that common ancestry is true.
It only gets worse for Neo-Darwinism
Under Neo-Darwinism, genetic mutation events (including chromosomal aberrations) are generally assumed to be random and unguided. Miller’s Cold-Fusion tale becomes more suspicious when one starts to ask harder questions like “how could a natural, unguided chromosomal fusion event get fixed into a population, much less how could it result in viable offspring?” Miller’s account must overcome two potential obstacles:
(1) In most of our experience, individuals with the randomly-fused chromosome can be normal, but it is very likely that their offspring will ultimately have a genetic disease. A classic example of such is a cause of Down syndrome.
(2) One way around the problem in (1) is to find a mate that also had an identical chromosomal fusion event. But Valentine and Erwin imply that such events would be highly unlikely:
“[T]he chance of two identical rare mutant individuals arising in sufficient propinquity to produce offspring seems too small to consider as a significant evolutionary event.”
(Erwin, D..H., and Valentine, J.W. “‘Hopeful monsters,’ transposons, and the Metazoan radiation”, Proc. Natl. Acad. Sci USA, 81:5482-5483, Sept 1984)
In other words, Miller has to explain why a random chromosomal fusion event which, in our experience ultimately results in offspring with genetic diseases, didn’t result in a genetic disease and was thus advantageous enough to get fixed into the entire population of our ancestors. Given the lack of empirical evidence that random chromosomal fusion events are not disadvantageous, perhaps the presence of a chromosomal fusion event is not good evidence for a Neo-Darwinian history for humans.
Miller may have found good empirical evidence for a chromosomal fusion event. But all of our experience with mammalian genetics tells us that such a chromosomal aberration should have resulted in a non-viable mutant, or non-viable offspring. Thus, Neo-Darwinism has a hard time explaining why such a random fusion event was somehow advantageous.
If it were to turn out that the fusion of two chromosomes can only result in a viable individual if the fusion event takes place in a highly unlikely and highly specified manner, then we may actually be looking at a case for a non-Darwinian intelligent design event in the history of the human genus. | https://evolutionnews.org/2005/10/and_the_miller_told_his_tale_ken_miller_/ |
From what age did you realise you wanted to be an artist?
Well it’s not quite as simple as that, I was blessed with being good at lots of things, so being an artist was an option of many, and as it turned out the schooling system didn’t allow you to do science and art at A level. I couldn’t follow everything, so art was something that I had to give up. I dropped it when I was 16. I was a natural, but I guess I didn’t value it at the time, certainly my parents didn’t, they thought I should pursue my scientific abilities. I ended up applying to study medicine, but I didn’t get the A-Levels for it, so I went to university and ended up studying bio-chemistry.
I liked biology and I liked chemistry, but I didn’t realise that bio-chemistry was the most boring bits of both, so cut forward another four years and I came down to London and I didn’t know what to do. I remembered that I could draw, but it was hard to find a voice at that point. I did a few life drawing classes and did an exhibition in Brixton, in a pub on Acre Lane, and I didn’t sell anything. That was it, I thought ‘this is rubbish’ I didn’t try very hard to keep going with art, but a few years after that my wife (well, she was my girlfriend then) said ‘well you can do cartoons can’t you? Why don’t you have a go at being a cartoonist?’
With a bit of help from her financially that got me started on being a cartoonist which then got me more into illustration and then finally, years later I have found time to think about painting again.
So, you are back to exploring it again?
Yes, but with all that experience in between.
What were you trying to achieve with these abstract paintings?
When you are a young artist, you are quite often very attracted by representational art and you think that it is amazing that someone can draw what is in front of them and it looks exactly like it. That is what I would have been interested years ago, but I completely turned around now and I am bored with anything that is representational and I want to do work in abstract ways, but still with a hint of representational art in there.
These ones are purely abstract, they aren’t meant to represent anything. What I like about abstract art is that the human brain is so attuned to looking for patterns and looking for shapes that you can look at an abstract painting and each time you look at it you will see something in the form, and it will perhaps set off an emotion in you. When I show these paintings people tell me about what they see in the picture and it is always very interesting. It’s not at all what I would see in the picture but that is their brain seeing things.
The ambiguity leads to the viewer getting a reflection of their own mind in the shapes, like a Rorschach ink blot test.
Yes, it is like that. It always bemuses me when people talk about abstract paintings having meaning. I’ve been standing in front of abstract paintings (not mine) and people have said to me ‘well, what does it mean?’ and I thought ‘what a silly question’. I didn’t want to offend them but I tried to point out that it was an abstract painting and that it probably didn’t mean anything, it means what you get from it, or what it sets off in your own head. The artist is not trying to tell you anything, if he wanted to tell you it he would have used something a bit more obvious. So, abstract painting is a bit more exciting for me, each time you come to it and look at it, it could mean something different, and it could be anything. You can get so much more from it, whereas with representational paintings you will always get the same story.
So is it making the viewer ask a question as opposed to giving them an answer?
Yes, I’m not one to over intellectualise painting. An abstract painter I know used to make up stories about what his paintings meant, because people would forever ask him what it was about. Because he worked in a completely spontaneous way and he would get his canvas and just splash paint all over, there was no conscious thought, maybe something subconscious in his brain but no conscious thought during the painting process. The finished painting would set off ideas in his head, so the story would come after the painting was finished.
Why do you think the general public are so determined to negotiate some sort of meaning out of the artwork?
I think that applies to everything in life; everyone wants to know the meaning of life, of why did I get cancer instead of that bad guy, people always ask questions about meaning and often there is no meaning. I think there is just coincidence of events and timing and the rest of it. I am quite happy with that, but a lot of people want to have a meaning and they will grab one even if it’s a load of rubbish. They just want to have a simple answer and life is not simple, it’s really complicated.
Do you think that is a fear of the unknown? Because they can’t place something they want to put it in a folder in their head, put it away and to rest?
That’s one way of looking at it. Who has the time to think about all of these things too much, but it is quite satisfying that things can fit in boxes and you can put it away and be finished with it and move onto the next thing.
Who would you say is your biggest influence when it comes to abstract work?
I am a big fan of Richard Diebenkorn’s work, he wasn’t always an abstract painter, he did a lot of representational stuff but he actually tries to combine abstract with representational work. That would be my ideal, to have a painting whereby you really aren’t quite sure whether it is representational or abstract, you have a bit of both, on the cusp. So I could say to people there is something in that painting, and there is a real story and you could just make it out if you were given the clues.
So with the spontaneity of the abstraction, but also you are pointing people in the right direction.
It would be very difficult to cheat because I work in two different ways, these paintings were just done without thought, where with my other paintings I have something in front of me and I am trying to paint that.
So it’s automatic painting, like the surrealists, in the absence of control.
Yes.
How do you enforce that? Every time I have tried to do automatic painting I have passed a half way point and have noticed patterns which I then start work with, some sort of conscious decision does begin to work
Yes, well each painting is individual for me, and obviously that can and does happen, but with abstract painting you don’t know how it is going to turn out and if you are keen to work with it you have to do lots and lots of them and accept that 99% of them will probably be rubbish.
It’s experimentation.
Absolutely, and if you find you are doing certain things and you don’t like but you can’t help it you have to find a way to force yourself out of that habit, being conscious of certain movements.
You are going for abstraction, but there is an aesthetic contemplation within each piece, in the sense that you are waiting for the one that works.
Yes, it’s one of those situations that you don’t know until you have done it you can’t plan it. And if you like it, you like it. If you don’t you should probably destroy it.
What would you say has been the most pivotal moment in your art career so far?
I think coming to the studios here at Make Space, because prior to that I was working at home and the isolation of being by yourself didn’t suit me at all. It was fine for my illustration work, I was working for four, five magazines every week so I had plenty of work to do and it was fine for that, but artistically it was not very helpful.
Around the same time my wife took on the job of Principal of Hampstead School of Art, and she encouraged me to enrol in some of the classes there. Being exposed to different disciplines and getting back into painting after years of just using a computer was great for me. I did life drawing, portrait classes and abstract painting classes. The abstract class was a real eye opener for me after all those representational life drawings and really hard for me to let myself go.
Between those two things and me being here in the studio where I could practice art and it’s a messy business, not something you want to do at home.
What do you hope for the future of your art?
I am trying to go away from representation and more towards abstraction. I think I am slowly developing these ideas, unfortunately mostly in my head at the moment, because I am not finding the time to paint, as I am working on animations which take a very long time. Interestingly my ideas for painting feed into what I do, they are all visual so I get ideas from one area which will feed into another. I also, do a bit of sculpture as well, so there are three dimensional aspects which go into it.
I hope to find more time for painting and to make money and have the time. If I didn’t have to earn money I would spend all day painting, but as long as I have got paid work to do I shall be doing that.
So maybe to get paid more for the painting?
Yes, if my paintings sell then I shall do more of them. Some people keep pushing paintings out and not selling them, in fact hundreds of artists do that, and I presume they are painting because they want to do them and they have the time, that’s fine. In fact that is the best reason, but given that I don’t have that much time, if they don’t sell then I won’t push it as I need to be practical as well.
Ultimately I would like a great big huge studio. I always remember thinking when I was younger that I wanted to be an abstract expressionist and the idea of flinging great pots of paint around really appealed to me, but to get to that point you have got to have tons of money.
I am also keen to do more sculpture, but it’s difficult as I am being pulled in different directions, it’s hard to concentrate on one
Malcolm WIllett shall be exhibiting his abstract paintings in Focus LDN's 2016 Winter Exhibition.
For free tickets click here. | https://www.focusldn.com/interviews/malcolmwillett |
The Local newsletter is your free, daily guide to life in Colorado. For locals, by locals. Sign up today!
Before Arden Lewis climbed his way up New York City’s culinary ladder—studying at the former French Culinary Institute (now called the International Culinary Center), honing his skills under star chefs like Brad Farmerie (Saxon & Parole, Public) and César Ramirez (Chef’s Table at Brooklyn Fare), and eventually becoming a partner in a Brooklyn catering company—he worked in information technology at Goldman Sachs on Wall Street.
In his new role as executive chef of Comal Heritage Food Incubator in RiNo, you could say that Lewis has come full circle. Only now he’s building networks for the budding entrepreneurs who run Focus Points Family Resource Center’s nonprofit lunch and catering kitchen—all of whom are immigrant women from Mexico, Ethiopia, and Syria. In turn, these women are educating Lewis in the art of international cuisine, considering that “some of them have probably been cooking for longer than I’ve been alive,” he jokes. “Certainly longer than I’ve been cooking!”
In fact, when we recently spoke, less than two weeks after he arrived at Comal, Lewis told me he had just received a crash course in making tortillas. “This is going to be a journey for me, a humbling opportunity to lead while learning,” he says. That’s exactly what he’d hoped for when he moved to Denver to live with his girlfriend. “I wasn’t looking for a chef gig unless it was worth my while,” he admits. “I was looking for something else—another way to use my talents that would actually help people. This job was a direct conduit to the community.”
In that light, it makes sense that Lewis’ first simple (but critical) order of business was to closely observe the participants of the job-training program. “I’m just seeing how they work, what they’re cooking—assessing their skill and confidence levels,” Lewis says. Like everyone else in the city, he’s already enamored. “On my first full day, I took home a chicken, mushroom, and corn dish,” he recalls. “And I was like, ‘This is a very maternal meal. I feel secure, I feel safe.’”
So far, Lewis has learned how dedicated Comal’s cooks are to their craft. “Even with rice and beans, you notice that they put themselves into it,” he says. “They’ll cook the same dish, and you’ll taste differences. Finding out why it’s different is my next challenge.”
Which isn’t to say that Lewis intends to “take anything away from them” when it comes to the women’s creative vision. Rather, he says, “I’m here as a facilitator and a motivator. My job is to help them build their repertoire and their business.” Which means teaching Comal’s trainees how to scale recipes, build relationships with vendors, check invoices, fill out licensing and permitting applications, and “understand the efficiencies and the urgencies” of the hospitality industry, among other things.
But above all, being a mentor is a matter of empowerment. “I left my last job because I reached a ceiling,” Lewis says. “I want these women to have that same level of confidence when they leave Comal: ‘I’ve learned everything I can, and I’m ready to go.’”
If you go: Comal Heritage Food Incubator is located at 3455 Ringsby Ct. | https://www.5280.com/2019/06/meet-arden-lewis-comal-heritage-food-incubators-new-executive-chef/ |
A friend of mine is a musician and always seems to be learning new instruments, new tunes, and new ways of making music in cool ways. At the weekend, he loves to go into Central Park in the center of Nagoya during the daytime where lots of Japanese bands perform. Now, some of these bands are really really good, and some of them are – how shall I say this – a little less good. One of the things that my friend likes about watching all the bands is that it is free! And as he says to me, “Because something is expensive, that doesn’t necessarily mean that it’s good… and if something is free, that doesn’t necessarily mean that it has no value. You have to listen and look yourself and find out what is valuable for you. And of course, as you listen and look, you may learn very different things to someone else.”
So my friend goes every week when the weather is fine, and he says that he learns something from every single band! When he watches and listens to the really good bands, he says that he learns new riffs from the guitar player and cool rhythms from the funky drummers. I guess that it’s not surprising that you can learn a lot by watching excellent performers. | https://teachingstories.briancullen.net/2014/06/24/learning-from-the-bands/ |
- "我买了五块水果蛋糕。"
"我买了五块水果蛋糕。"
Translation:I bought five pieces of fruit cake.
21 Comments
- 1058
The English translation is slightly misleading, ask for a slice of fruit cake in English and you'll get a thick dense spiced brick, made with nuts, and dried and candied fruit. I think what most Chinese mean by 水果蛋糕 would probably best be described as a "fresh fruit sponge cake".
I think it depends on the size of the cake. Wu kuai could be five square cakes or five squares of cake. Five pieces of fruit cake or five fruit cakes should both be acceptable.
The character for "le" is pronounced "liang" when you tap on it. I know that that is one pronunciation of the character, but not in this context.
- 36
Why is there different characters for the same word and same tone, like "gāo". Isn't this too much: Many letters plus tones plus many characters for the same tone.
Can't 块 also mean "Yuan"? Couldn't this also mean "five Yuan of fruitcake"? 谢谢
- 659
No, here it's a measure word for portions of food (i.e. piece), not money. Five yuan of fruitcake is nonsense in Chinese and in English.
That it is, but this idea isn’t the same as what “fruitcake” is in English... (see KTo288’s comment)... so using that word here might be less accurate than saying “fruit cake”, i.e. a cake with fruit
"I bought five fruit cakes" should be accepted. Moreover, the correct answer "I bought 5 pieces of fruit cakes." is wrong, should be just cake, since it's already 5 pieces.
If you have eaten cake before, you know that the cake can be cut up into slices and then each slice can be sold independently. In here, the sentence says that "I bought 5 slices of fruit cake", not 5 whole cakes, because there is the classifier 块, so "I bought five fruit cakes" is unacceptable.
If you want to say you bought 5 whole cakes, say 我买了五個水果蛋糕。
Sebast1ans is correct in pointing out that "pieces of fruit cakeS" is incorrect, though. | https://forum.duolingo.com/comment/26021856/%E6%88%91%E4%B9%B0%E4%BA%86%E4%BA%94%E5%9D%97%E6%B0%B4%E6%9E%9C%E8%9B%8B%E7%B3%95%E3%80%82 |
1.. Introduction {#s1}
================
Mutually beneficial interactions among species are ubiquitous in nature. They can take many forms of service--resource interactions such as pollination and seed-dispersal mutualisms, and resource--resource interactions including plant--mycorrhiza interactions. They are geographically and evolutionarily omnipresent, with mutualist partners found in various organisms and in all ecosystems \[[@RSOS150630C1]\]. Traditionally, mutualisms have been viewed as tightly coevolved interactions between a pair of species. However, accumulated evidence now makes it clear that highly specific, one-to-one relationships are rarely observed \[[@RSOS150630C2]\]. Instead, often dozens or even hundreds of species with different levels of specialization to their partners form complex networks of interdependence. How the complexity evolved, is maintained, and affects mutualistic interactions are fundamental questions in ecology, but we did not have the methodology to deal with this complexity until recently.
In the last two decades, network representation has emerged as an important tool for analysing complex ecological interactions, and several network characteristics are now well described \[[@RSOS150630C3]--[@RSOS150630C5]\]. The networks formed by plant--animal mutualisms, such as pollination and seed dispersal, are typically described as bipartite graphs, in which species in one taxonomic category, guild or trophic level, e.g. animals, interact with species in a second category, e.g. plants \[[@RSOS150630C3]\] ([figure 1](#RSOS150630F1){ref-type="fig"}*a*). Analyses of empirical datasets have revealed several common characteristics of and variation among mutualistic networks such as nestedness, modularity, specialization and heterogeneity \[[@RSOS150630C3]--[@RSOS150630C6]\]. More recent studies have focused on spatial or temporal variations in these characteristics \[[@RSOS150630C7]--[@RSOS150630C10]\], mechanisms that are responsible for the patterns \[[@RSOS150630C11]--[@RSOS150630C14]\] and relationships among these characteristics \[[@RSOS150630C15]\]. Figure 1.Plant--animal interaction networks. (*a*) An example of plant--animal interactions visualized as a bipartite graph. The networks formed by plant--animal mutualism are typically described as bipartite graphs, in which species of animals (a1--a5) interact with species of plants (p1--p5). (*b*) Interaction matrix of the network (*a*) with histograms showing degree distribution of plants (left) and animals (above). Black squares indicate interactions between plant and corresponding animal species. In the matrix and histograms, the plant and animal species are ranked in decreasing number of interactions per species (degree). In this network, degree distributions of plants and animals are identical (1 − *E*~P~ = 1 − *E*~A~ = 0.057). (*c*) An example of plant--animal interaction network with an animal hub. The hub species is indicated by a white asterisk. Degree distribution among animals is more heterogeneous (1 − *E*~A~ = 0.19) than that among plants (1 -- *E*~P~ = 0.017). (*d*) A network with a plant hub. (*e*,*f*) Network representation of two actual pollination networks. (*e*) Flores, Azorean forest, Macronesia (P43 in electronic supplementary material, table S1) with an animal hub (1 − *E*~P~ = 0.039, 1 − *E*~A~ = 0.12), and (*f*) Llao Llao, Cerro López, Nahuel Huapi National Park in Rio Negro, Argentina (P37 in electronic supplementary material, table S1) with a plant hub (1 − *E*~P~ = 0.21, 1 − *E*~A~ = 0.038).
In the network sciences, the degree distribution or the distribution of the number of links per species in the case of ecological networks, is a widely used measurement of the topology of complex networks. Degree distributions and their causes and consequences have been studied in both food webs and mutualistic networks \[[@RSOS150630C5],[@RSOS150630C16]--[@RSOS150630C19]\]. Some mutualistic networks exhibit a power-law degree distribution (a decaying straight line in a log--log plot of cumulative number of species per degree category versus degree), while a majority exhibits a 'truncated power-law' (a straight line in a log--log plot with a sharp cut-off at high degree values \[[@RSOS150630C5]\]). In other words, the majority of species interact with few partner species, while a small number are highly connected \[[@RSOS150630C3],[@RSOS150630C5]\]. These generalist species form network hubs and are proposed to play an important role in community stability \[[@RSOS150630C3]\] and to reduce the probability of secondary species extinction \[[@RSOS150630C20]\]. Comparatively less attention, however, has been paid to the questions whether the degree distribution differs between the two parties of a bipartite network, whether different types of mutualism differ with respect to their degree distribution, and whether there are differences between geographical regions.
In this study, we investigate the degree distribution of 56 pollination and 28 seed-dispersal networks. In bipartite networks of plants and animals, we do not have a reason to assume that the degree distributions of plants and animals change synchronously ([figure 1](#RSOS150630F1){ref-type="fig"}). Therefore, we evaluated the degree distributions of the plant and animal sides separately, and tested for geographical variation. We then explored to what extent the observed patterns are explained by (i) variation in the degree of specialization and (ii) possible selective interactions between the species. For this analysis, we used the 28 pollination and 16 seed-dispersal datasets with quantitative measurements. To address (i), we examined changes in the degree distribution along with existing variation in the specialization among networks. To address (ii), we conducted a randomization analysis to investigate the extent to which the observed networks differed from those expected from random interactions of plants and animals.
2.. Material and methods {#s2}
========================
2.1.. Datasets {#s2a}
--------------
We compiled a total of 56 pollination and 28 seed-dispersal networks obtained from the literature and Web databases (electronic supplementary material, table S1). Datasets with fewer than eight animal or plant species were excluded from the analysis because they were likely to produce statistical artefacts. The networks were represented in binary matrix form, with the plant species in rows and the animal species in columns ([figure 1](#RSOS150630F1){ref-type="fig"}*b*). The matrix elements were 1 when an interaction of a plant and an animal species was observed and 0 when interactions were absent. The datasets were categorized into the following five groups based on geographical region: (i) arctic and boreal (latitude \> 55°); (ii) temperate (23° \< latitude \< 55°, altitude \< 1600 m); (iii) tropics and subtropics (latitude \< 23°, altitude \< 1600 m); (iv) alpine (altitude \> 1600) and (v) oceanic islands (New Zealand, Flores in Azores and Ile aux Aigrettes in Mauritius). For 28 pollination and 16 seed-dispersal datasets, quantitative measurements of interaction frequencies, such as number of animal visits per plant, were also available. They were used to evaluate network specialization and the selectivity of interactions (see below) and to examine robustness of the results (electronic supplementary material, figure S2).
2.2.. Metrics used for degree distribution {#s2b}
------------------------------------------
We used an evenness index to evaluate the skewed degree distribution of links among plant and animal species (distribution of the number of interacting species among plants and animal species). An important requirement of the index for this study was robustness to variation in rare taxa, given the stochastic nature of the presence or absence of the least abundant species in the dataset. Some evenness indices change substantially when a single individual of a new taxon is added to a sample with a large number of individuals that are evenly distributed among species \[[@RSOS150630C21]\]. Beisel \[[@RSOS150630C21]\] found four evenness indices that satisfied the condition (electronic supplementary material, table S2).
The other critical index property is independence from sample sizes or species richness. This is because we used datasets that differed in sampling effort and species richness of the community, so the number of observed interactions varied by several orders of magnitude among datasets. In most cases, the evenness index is correlated with species richness, and the strength of the correlation depends on both the type of index and the relative species abundance (e.g. \[[@RSOS150630C22]\]). To assess the dependence of the four indices on species richness in measuring the link distribution, we plotted the indices against the number of species for plants and animals separately (electronic supplementary material, figure S1). Among the four, *E*~Pielou~ \[[@RSOS150630C23]\] and $E_{- \ln\, D}$ \[[@RSOS150630C24]\] showed no significant correlation with the number of species. Therefore, they satisfied the requirements of this study. We chose *E*~Pielou~ because of its popularity, although the two indices provided highly correlated values (for degree distribution among plant species, correlation coefficient = 0.99, *p* \< 0.0001; for animals, correlation coefficient = 0.96, *p* \< 0.0001).
Using the index *E*~Pielou~, the evenness of the degree distribution for plants (*E*~P~) and animals (*E*~A~) was calculated as follows: $$E_{P} = \frac{- \sum_{i = 1}^{N}{x_{i} \cdot \ln(x_{i})}}{\ln(N)}\quad{and}\quad E_{A} = \frac{- \sum_{j = 1}^{M}{y_{j} \cdot {\ln(}y_{j})}}{{\ln(}M)},$$ where *N* and *M* represent the numbers of plant or animal species, respectively, and *x~i~* and *y~j~* are the proportions of links that belong to the plant species *i* and animal species *j* relative to the total number of links in the network. The numerical evenness values are between 0 and 1, with 1 representing complete evenness. Because in this paper, we emphasize heterogeneity instead of evenness, we define the level of heterogeneity as 1−*E*~P~ and 1−*E*~A~, with values ranging from 0 to 1.
The metrics are robust against variation in sampling effort. We examined the possible dependence of 1−*E*~P~ and 1−*E*~A~ on sampling effort by randomization using the 44 networks with quantitative measurement (electronic supplementary material, table S1). We imitated a 50% reduction in sampling effort by randomly removing half of the visit records and calculating evenness. The procedures were repeated 1000 times for each network. The reduction of the samples caused a decrease in the number of plant and animal species in the networks by 9.7 ± 7.9% and 15.8 ± 11.2%, respectively, and a decrease of the links by 26.3 ± 9.6% (mean ± s.d. of 44 networks). However, the average evenness indices calculated for the reduced samples were highly correlated and did not show large deviations from the original values (electronic supplementary material, figure S2).
2.3.. Metrics used for network specialization {#s2c}
---------------------------------------------
Blüthgen *et al*. \[[@RSOS150630C25]\] introduced a quantitative index using interaction frequencies to describe the degree of specialization, based on information theory. This measure ($H_{2}^{\prime}$) is derived from Shannon entropy and characterizes the level of specialization of the entire network. The metric is standardized and ranges from 0 for the most generalized to 1 for the most specialized network. Because we aimed at comparing the most unbiased estimates of network specialization, we used a double standardized specialization index $\Delta H_{2}^{\prime} = H_{2}^{\prime} - H_{2{ran}}$, where *H*~2ran~ represents the mean $H_{2}^{\prime}$ of 1000 randomized networks (see \[[@RSOS150630C7],[@RSOS150630C8]\]). Randomizations were performed with the Patefield algorithm, which randomly redistributes interaction events among all cells of the network while constraining total interaction strength per species. Therefore, the model assumes that partners associate randomly in the absence of any specialization. Calculation of $H_{2}^{\prime}$ and the Patefield algorithm were implemented as the function 'H2fun' and 'r2dtable', respectively, in the package 'bipartite' for R statistical software \[[@RSOS150630C26]\].
We note that the definition of 'specialization' of species or communities differs among authors and studies. While $\Delta H_{2}^{\prime}$ evaluates the deviation of the focal network from random interactions, other indices are based on the average numbers of interacting partner species \[[@RSOS150630C27],[@RSOS150630C28]\] and network modularity \[[@RSOS150630C9]\].
2.4.. Adjustment of plant--animal ratio {#s2d}
---------------------------------------
The numbers of plant and animal species varied greatly between pollination and seed dispersal as well as among networks. To examine whether the large variation in the ratios of plant and animal species substantially affects the results, we reduced the variation by the following procedure and repeated the analysis with the altered networks.
The log-transformed ratio of animal species to plant species ranged from −0.94 to 2.14 for pollination and −1.53 to 0.98 for seed dispersal. If this ratio was lower than 0.0 or higher than 1.0 for a given network, we randomly removed surplus plant or animal species from the network, respectively. The removal of plant species often made some animal species unconnected or vice versa, and we also removed the unconnected species from the network. We repeated the procedure 1000 times for each network and recorded averages of 1 − *E*~P~, 1 − *E*~A~ and plant--animal ratio. The procedure significantly reduced the standard deviation of the ratio from 0.72 to 0.33 among pollination and from 0.62 to 0.20 among seed-dispersal networks.
2.5.. Randomization {#s2e}
-------------------
We conducted a randomization analysis to investigate the extent to which the observed networks differed from those expected from random interactions of plants and animals using the 28 pollination and 16 seed-dispersal datasets with quantitative measurements (electronic supplementary material, table S1). For each dataset, we generated 1000 random networks with the same distribution of observation frequencies among species, and 1 − *E*~P~ and 1 − *E*~A~ of observed networks were compared with averages of those networks created by randomization. Again, the Patefield algorithm was used to generate random matrices.
3.. Results {#s3}
===========
3.1.. Variation of 1 − *E*~P~ and 1 − *E*~A~ {#s3a}
--------------------------------------------
1 − *E*~P~ and 1 − *E*~A~ of pollination networks are significantly different among geographical regions (results of Kruskal--Wallis rank sum test for 1 − *E*~P~, Kruskal--Wallis *χ*^2^ = 16.1, d.f. = 4, *p* = 0.0028; for 1 − *E*~A~, Kruskal--Wallis *χ*^2^ = 19.9, d.f. = 4, *p* = 0.0005), whereas we did not detect significant north--south differences. Temperate communities have higher 1 − *E*~P~ than 1 − *E*~A~, whereas the tropics and islands show the opposite pattern. As a result, the magnitude of the relationship between 1 − *E*~P~ and 1 − *E*~A~ changes among geographical regions ([figure 2](#RSOS150630F2){ref-type="fig"}*a*). Significant geographical variation in 1 − *E*~P~ and 1 − *E*~A~ was not observed for seed dispersal (for 1 − *E*~P~, Kruskal--Wallis *χ*^2^ = 4.8, d.f. = 4, *p* = 0.19; 1 − *E*~A~, Kruskal--Wallis *χ*^2^ = 2.1, d.f. = 4, *p* = 0.55). Figure 2.Relationships between 1 − *E*~P~ and 1 − *E*~A~ of pollination and seed dispersal. Geographical regions are distinguished by colour, as indicated in the figure.
1 − *E*~P~ and 1 − *E*~A~ had strong negative correlation among pollination networks ([figure 2](#RSOS150630F2){ref-type="fig"}*a*, *ρ* = −0.45, *p* = 0.0005, *n* = 56, Spearman\'s rank correlation test), and the relationship remained unchanged after adjustment of the ratio of animal to plant species (electronic supplementary material, figure S3*a, ρ* = −0.31, *p* = 0.018). On the other hand, the correlation between 1 − *E*~P~ and 1 − *E*~A~ was positive and significant in seed dispersal ([figure 2](#RSOS150630F2){ref-type="fig"}*b, ρ* = 0.43, *p* = 0.018, *n* = 28), while the correlation was weaker and not statistically significant for adjusted networks (electronic supplementary material, figure S3*b*, *ρ* = 0.28, *p* = 0.149, for seed dispersal).
3.2.. Change of *E*~P~ and *E*~A~ along specialization gradient {#s3b}
---------------------------------------------------------------
The specialization index $\Delta H_{2}^{\prime}$ of pollination matrices ranged from 0.18 to 0.79, while that of seed dispersal was much smaller and less variable ranging from 0.13 to 0.46. As for relationships between $\Delta H_{2}^{\prime}$ and the heterogeneity of degree distributions, we found that 1 − *E*~P~ significantly increased and 1 − *E*~A~ significantly decreased along the specialization gradient in pollination ([figure 3](#RSOS150630F3){ref-type="fig"}*a*, for 1 − *E*~P~, *ρ* = 0.38, *p* = 0.047; for 1 -- *E*~A~, *ρ* = −0.59, *p* = 0.0011; *n* = 28, Spearman\'s rank correlation test). On the other hand, no correlation was found for seed-dispersal networks ([figure 3](#RSOS150630F3){ref-type="fig"}*b,* for 1 − *E*~P~, *ρ* = 0.10, *p* = 0.71; for 1 − *E*~A~, *ρ* = 0.01, *p* = 0.98, *n* = 16). Figure 3.Changes of 1 − *E*~P~ and 1 − *E*~A~ along specialization gradient. (*a*) Pollination. The relationships were estimated by a generalized additive model, and the estimates and 95% confidential intervals are shown by solid and dotted lines, respectively. We used the mgcv package \[[@RSOS150630C29]\] implemented in R \[[@RSOS150630C26]\] for the additive model analysis. (*b*) Seed dispersal.
3.3.. Comparison with random networks {#s3c}
-------------------------------------
In pollination networks, differences of 1 − *E*~P~ and 1 − *E*~A~ of observed networks from those created by randomization ranged from −0.042 to 0.124 and from −0.060 to 0.093, respectively ([figure 4](#RSOS150630F4){ref-type="fig"}). 1 − *E*~P~ was larger than that of random ones with marginal significance (Wilcoxon signed-rank test, *V* = 282 *p* = 0.074, *n* = 26) and 1 − *E*~A~ was significantly lower (Wilcoxon signed-rank test, *V* = 111, *p* = 0.036). In seed-dispersal networks, deviations were small compared with those of pollination networks (1 − *E*~P~, −0.035 to 0.019; 1 − *E*~A~, −0.016 to 0.061).
Significant negative correlation between 1 − *E*~P~ and 1 − *E*~A~ found in pollination networks (Spearman\'s rank correlation test, *ρ* = −0.68, *p* = 0.0001, electronic supplementary material, figure S4*a*) was not observed among randomly generated networks (*ρ* = 0.22, *p* = 0.27, electronic supplementary material, figure S4*c*). For seed dispersal, however, there is a positive correlation between 1 − *E*~P~ and 1 − *E*~A~ that is marginally significant for observed networks (*ρ* = 0.49 *p* = 0.054, *n* = 28, electronic supplementary material, figure S4*b*) and significant for random networks (*ρ* = 0.56, *p* = 0.026, electronic supplementary material, figure S4*d*).
4.. Discussion {#s4}
==============
This study revealed remarkable differences between pollination and seed dispersal by investigating variation of the degree distributions of mutualistic networks. For pollination, we found a strong negative correlation between 1 − *E*~P~ and 1 − *E*~A~ ([figure 2](#RSOS150630F2){ref-type="fig"}*a*). Temperate pollination communities are characterized by relatively even degree distribution in animals (low 1 − *E*~A~) and heterogeneous degree distribution in plants (high 1 − *E*~P~), whereas the tropics and islands show the opposite pattern ([figure 2](#RSOS150630F2){ref-type="fig"}*a*). In other words, temperate pollination networks have 'plant hubs', whereas the tropics and islands have 'animal hubs'. Absence of the negative correlations between 1 − *E*~P~ and 1 − *E*~A~ among random pollination networks (electronic supplementary material, figure S4) suggests that the negative correlation observed in networks is the result of selective processes. In contrast with pollination, we found no geographical differences among seed-dispersal networks, and the correlation between 1 − *E*~P~ and 1 − *E*~A~ was positive ([figure 2](#RSOS150630F2){ref-type="fig"}*b*). The difference is remarkable, because these two major types of mutualistic networks are often discussed in parallel and their qualitative differences have rarely been reported. Our supplementary analysis indicates that the positive correlation in seed dispersal is due to some structural constraints, but the negative correlation in pollination is not (electronic supplementary material, note S1).
The results suggest that the structures of pollination and seed-dispersal networks are built by different ecological mechanisms. An important aspect of plant--pollinator interactions distinct from seed dispersal is that network structure strongly affects the fitness of individual plants. Pollinators that are specialized to a certain plant species have a high rate of conspecific pollen transport, whereas the efficiency of pollination is low for generalist pollinators that are shared by different plant species \[[@RSOS150630C30],[@RSOS150630C31]\]. It may be advantageous for plants to exclude generalist pollinators, which have a low rate of conspecific pollen transfer. On the other hand, efficiency of seed delivery to suitable germination sites is not affected by the level of specialization of the dispersal agent \[[@RSOS150630C32]\]. This difference was previously suggested to be a reason of greater degrees of specialization in pollination networks than that of seed dispersal \[[@RSOS150630C6],[@RSOS150630C32]\]. However, how specialization modifies degree distributions of mutualistic networks and if it differs between plants and animals, or between pollination and seed dispersal has not been studied yet.
To examine how specialization associates with the degree distributions, we examined changes in the degree distribution along the gradient of the network-level specialization. For pollination, we found that $\Delta H_{2}^{\prime}$ is negatively correlated to animal heterogeneity, 1 − *E*~A~, and positively correlated to plant heterogeneity, 1 − *E*~P~ ([figure 3](#RSOS150630F3){ref-type="fig"}*a*). These results are difficult to explain, in particular, due to the limited knowledge of the processes that cause variation of specialization among communities. Here, we cautiously interpret the results from an evolutionary perspective. Let us consider a baseline community network with low levels of specialization, and let us assume that selection in this community favours plant species that interact with efficient pollinators, i.e. pollinators that are shared with few or no other plant species. In such a situation, we expect that evolution drives the network to higher levels of specialization, and that this increase is accompanied by decreasing 1 − *E*~A~. Such an evolutionary scenario may explain the negative correlation between $\Delta H_{2}^{\prime}$ and 1 − *E*~A~ if there is variation among communities in the strength of selection. On the contrary, the positive correlation between $\Delta H_{2}^{\prime}$ and 1 − *E*~P~ may be due to the difference in the advantage generalist and specialist plant species get from specialization (or exclusion of inefficient pollinators). For a generalist plant species pollinated by many animal species, the advantage from excluding an inefficient pollinator is low because the proportion of the pollen delivered by the pollinator species is small. On the other hand, for a specialist plant species, which only has a few pollinator species, the advantage of excluding an inefficient pollinator is large compared with a generalist species, as long as the plant receives a sufficient amount of pollinator visits. Obviously, such processes would promote the differentiation of generalist and specialist plant species, and, further, may explain why 1 − *E*~P~ increases with $\Delta H_{2}^{\prime}$. It is an open question whether such an evolutionary framework is responsible for the correlation pattern of $\Delta H_{2}^{\prime}$ with 1 − *E*~A~ and 1 − *E*~P~. Whatever the real cause, however, it suggests that network specialization is key to understand the negative correlation between 1 − *E*~A~ and 1 − *E*~P~. We remark that, unlike pollination, we did not find clear association of 1 − *E*~A~ and 1 − *E*~P~ with $\Delta H_{2}^{\prime}$ in the seed-dispersal networks ([figure 3](#RSOS150630F3){ref-type="fig"}*b*). It is consistent with the supposition that plants do not have a preference for specialists or generalist seed dispersers because seed-dispersal efficiency is not directly related with the width of the food plants of the dispersal agents. Figure 4.Deviation of 1 − *E*~P~ and 1 − *E*~A~ of original matrices from random ones. Thick horizontal lines are medians, bars indicate 25 and 95 percentiles, whiskers indicate the data range and the circles are outliers.
For pollination networks, we also explored how selective interactions relate to network heterogeneity using a randomization analysis. The null hypothesis in the analysis assumes that plants and animals randomly interact with each other without discriminating partners. The analysis allows to directly test how selective interactions modify the degree distribution for a given distribution of interactions among species. We found that the directions of the deviations are consistent with the direction of the changes in the former analysis. 1 − *E*~P~ of the original matrices was higher than that of random ones and 1 − *E*~A~ was lower ([figure 4](#RSOS150630F4){ref-type="fig"}). This suggests that the correlations of 1 − *E*~P~ and 1 − *E*~A~ with $\Delta H_{2}^{\prime}$ are at least in part due to selective processes.
Given close relationships between the specialization and degree distributions, the geographical variation of 1 − *E*~P~ and 1 − *E*~A~ we found may arise from different network-level specialization among regions. Geographical variation in community-level specialization of plant--pollinator interactions and its ecological correlates are topics of long-standing interest \[[@RSOS150630C33],[@RSOS150630C34]\], while attempts to quantify the variation have only recently begun \[[@RSOS150630C6],[@RSOS150630C8],[@RSOS150630C25],[@RSOS150630C27],[@RSOS150630C28],[@RSOS150630C35]\]. On oceanic islands, biologists repeatedly found 'super-generalist' pollinators and much generalized interactions \[[@RSOS150630C36]--[@RSOS150630C38]\]. More recently, Schleuning *et al*. \[[@RSOS150630C8]\] have reported an increase in the specialization with the latitude both in pollination and seed dispersal, contrary to the notion that biological interactions are more specialized in species rich tropical community.
Variation in specialization in plant--pollinator networks has frequently been explained in connection with relative species richness or relative abundance of plants and pollinators. Generalized interactions on oceanic islands are often attributed to paucity of pollinator fauna \[[@RSOS150630C36]\]. Similarly, Schleuning *et al*. \[[@RSOS150630C8]\] suggest higher plant diversity in the lower latitudes as a cause of the generalized relationships; reduced densities of resource plants associated with species diversity may lead to longer search times during foraging and constrain the specialization of animals as predicted from optimal foraging theory \[[@RSOS150630C39]\]. There are also theoretical studies suggesting that insufficient pollinators or pollination prevent specialization to reduce the cost of pollinator sharing \[[@RSOS150630C40],[@RSOS150630C41]\]. It is because specialization, i.e. exclusion of a part of the flower visitors, decreases the plant reproductive success if a part of the pollen remains undispersed at the end of flowering, even if the pollination efficiency of the excluded visitors is low.
Although geographical variation in pollinator abundance or pollination service availability has not been tested directly, there is circumstantial evidence that may indicate some differences between tropics and temperate, and between islands and continental regions. First, fruit set of tropical plants tend to be low compared with temperate plants \[[@RSOS150630C42]\], and reproduction is more pollination limited in the tropics and on islands compared with other regions \[[@RSOS150630C27],[@RSOS150630C28]\]. In addition, frequency of vertebrate pollination is higher in the tropics and on islands \[[@RSOS150630C36],[@RSOS150630C43],[@RSOS150630C44]\]. It could be interpreted as adaptation by plants to pollinator shortages. Pollinator paucity might, therefore, be a common feature of the tropics and islands.
There are other environmental factors that could independently affect specialization and degree distributions. Phenology of plants and pollinators is suggested to be an important factor to determine the specialization level of pollination networks \[[@RSOS150630C45]\]. In temperate latitudes, active periods of the pollinators and flowering periods of the plants are often limited to a particular season. It may cause higher specialization at the network level in the higher latitudes \[[@RSOS150630C46]\]. In a tropical climate, highly social pollinators such as honeybees and stingless bees are abundant throughout the year and are the most important pollinators in the community \[[@RSOS150630C8],[@RSOS150630C47]\], while only few plants flower continuously \[[@RSOS150630C48],[@RSOS150630C49]\]. The contrast may explain why tropical networks have animal hubs. On the other hand, species richness of insect pollinators shows great seasonal fluctuation in seasonal climate (e.g. \[[@RSOS150630C50]\]). Plants that flower at the peak of pollinator activities may attract more diverse visitors than others and appear as network hubs in temperate communities.
5.. Conclusion {#s5}
==============
Potential asymmetries between plants and animals have largely been overlooked in the studies of mutualistic networks, though effects of the network structure on the fitness of the two parties are often very different. In pollination, we found geographical shifts of network hubs between plants and animals, which are substantially different in the flexibility of partner choice and other ecological characteristics. Pollinator animals could actively choose and change plants to visit depending on environmental factors such as resource availability and competition with other species \[[@RSOS150630C51]\], while changes of pollinator fauna from plant side is possible only through evolutional changes in the floral characteristics \[[@RSOS150630C2]\]. How the identity of network hubs affects the stability and resilience of the community is an important question for our understanding of evolution and maintenance of inter-specific mutualisms as well as for the management of an essential ecosystem service of pollination.
Supplementary Material
======================
###### Figure S1. Correlations between the number of species and the four evenness indices.
Supplementary Material
======================
###### Figure S2. (a) 1--EP and (b) 1--EA of the networks with reduced samples plotted against the corresponding values of the original networks
Supplementary Material
======================
###### Figure S3. Relationships between 1--EP and 1--EA for the networks with adjusted plant-animal ratio of (a) pollination and (b) seed dispersal.
Supplementary Material
======================
###### Figure S4. Plots of 1--EP and 1--EA of original networks for (a) pollination and (b) seed dispersal and random networks for pollination (c) and (d) seed dispersal.
Supplementary Material
======================
###### Note S1. Comparison of observed and potential maximum values of 1--E.
Supplementary Material
======================
###### Table S1. List of the 56 plant-pollinator networks and 22 plant-seed disperser network analyzed by this study.
Supplementary Material
======================
###### Table S2. Four evenness indices that are robust to changes in rare species and that respond moderately to changes in abundance of median and dominant species identified by Beisel \[21\].
We thank M. Kondoh for valuable advice throughout the study; P. Hammerstein, A. Onuma and N. Yamamura for discussions; M. Ushio for analytical assistance; S. Armitage, T. Kiers, D. H. Hembry, M. Ushio, G. Benadi and an anonymous reviewer for comments on the earlier version of the manuscript; and the Interaction Web Database (<http://www.nceas.ucsb.edu/interactionweb/>) for providing part of the datasets used here.
Data accessibility {#s6}
==================
The datasets and R scripts supporting this article are available from Dryad Digital Repository (<http://dx.doi.org/10.5061/dryad.kv09p>).
Authors\' contributions {#s7}
=======================
S.S. and Y.T. initiated and carried out the meta-analysis. S.S. and A.T. designed the study, wrote the paper and contributed equally to the study. S.M. assisted data analysis and contributed to the interpretation of the results. All authors discussed the results and commented on the manuscript, and gave final approval for publication.
Competing interests {#s8}
===================
We have no competing interests.
Funding {#s9}
=======
Funding to S.S. was provided by the Research Institute for Humanity and Nature Project (P5-3), the FY 2011 Researcher Exchange Program between JSPS and DAAD, and the Ministry of Education, Science, Sports and Culture, Japan (grant no. 20405009). A.T. was supported by the Evolutionary Biology Initiative of the Volkswagen Foundation.
[^1]: These authors contributed equally to this study.
| |
President Nicolas Sarkozy told his Chinese counterpart Hu Jintao that France is standing by China's side after a massive earthquake struck the southwest of the country killing nearly 10,000 people.
"I would like to let you know that I am deeply moved and would like to assure you of France's support for the Chinese people in this difficult moment," Sarkozy said in a letter made available to AFP late on Monday.
"You can also count on my personal support," the French president added.
Sarkozy said he was constantly informed of developments in the area and hoping that the "scale of the disaster will be as limited as possible".
"I trust that China will be able to cope with this disaster," he added.
The quake, with a magnitude of 7.8, struck close to densely populated areas of Sichuan shortly before 2:30 pm (1200 IST) on Monday.
It is the worst to hit China since the 1976 earthquake in the city of Tangshan near Beijing, which left 242,000 people dead, Xinhua said.
However, the death toll could rise dramatically as rescuers are yet to reach areas near the epicenter at the city of Wenchuan, state media reports said. | https://www.hindustantimes.com/world/sarkozy-pledges-french-support-after-chinese-quake/story-eAq8oBxBcDxOEAI5IOrfnO.html |
Transportation is the largest source of greenhouse gas emissions in California. In order to achieve the government’s goals of carbon neutrality by 2045 and avoid the worst effects of climate change, the decarbonization of this sector is essential. However, such a transition is unlikely to happen quickly without major political intervention.
A team of transportation and policy experts from the University of California today released a report to the California Environmental Protection Agency (CalEPA) setting out policy options to significantly reduce transport-related fossil fuel demand and emissions. When these policy options are combined, they could lead to a carbon-free transport system by 2045 while improving equity, health and the economy. A second study, led by UC Santa Barbara, was published concurrently. Strategies for the reduction of the state oil production parallel to the reduction of the demand are defined.
The state funded the two studies through the 2019 Budget Act. The studies are designed to identify ways to reduce transport-related fossil fuel demand and emissions, while at the same time managing a strategic, responsible decline in the transport-related supply of fossil fuels.
The University of California’s demand study was conducted by researchers from the UC Institute of Transportation Studies, a network with offices at UC Davis, UC Berkeley, UC Irvine, and UCLA. The UC Davis Policy Institute for Energy, Environment, and Business coordinated policy management for the report, and the UC Davis Center for Regional Change led the research on equity and environmental justice for the study.
Creating a carbon-free transportation future will be challenging but not impossible, the report said. This requires urgent action and a long-term perspective. Importantly, a large upfront investment in clean transportation through incentives and new charging and hydrogen infrastructure will soon pay off in net economic savings for the California economy. The net savings over a decade will grow to tens of billions of dollars a year by 2045.
The report recommends flexible policy approaches that can be adjusted over time as technologies evolve and knowledge is gained.
“This report is the first to fully assess a path to climate-neutral transportation for California by 2045,” said Dan Sperling, director of the UC Davis Institute of Transportation Studies. “We find that such paths are possible, but rely on major changes to existing guidelines and the introduction of some new guidelines. The study also prioritizes the equity, health and workforce impact of the transition to carbon-free transport. “
Researchers from UC Davis directed the scenarios, equity, light trucks, and fuels portions of the report. The scenarios chapter estimates that a move to low-carbon transportation will save billions of dollars by 2045.
The equity aspects of the study identified policy options to ensure that the benefits of low-carbon options reach the communities most in need first. In the light commercial vehicle and fuel sections, specific technological and policy pathways have been identified that will contribute to a carbon-free transport system while supporting improved mobility.
Important political strategies
Zero Emission Vehicles: Many of the report’s policy options focus on a rapid transition to Zero Emission Vehicles (ZEV), which aims to drastically reduce greenhouse gas emissions and improve local air pollution as the state’s power grid is also decarbonised.
Light and heavy commercial vehicles are responsible for 70 percent and 20 percent of the state’s greenhouse gas emissions, respectively. The report suggests a combination of expanded mandates, incentives and investments in public fees and hydrogen infrastructure to accelerate ZEV rollout. Key policy priorities for medium and heavy duty vehicles include increasing the availability of charging stations for long-haul freight, reforming electricity prices to make charging at depots more affordable, and prioritizing lanes and restricting access for zero-emission trucks.
Vehicle miles traveled: Even with widespread use of ZEV, a reduction in the total vehicle miles traveled is necessary in order to reduce traffic congestion and emissions from vehicle manufacturing and to improve the benefits for quality of life and land use related to traffic. The report suggests guidelines that encourage active, shared, and micromobile transportation. Teleworking; and land use changes that reduce people’s reliance on automobiles and improve connectivity in the community.
Fuels: Around 86 percent of transport fuel is petroleum. The move to low carbon clean energy requires significant investments in electricity and hydrogen. Low-carbon liquid fuels compatible with internal combustion engines are needed to reduce emissions as the transition to ZEVs proceeds, as well as in some specialized applications such as aerospace. California can support the necessary investment in clean fuels with mandatory blending levels and new incentives and credits to encourage investment in very low carbon liquid fuels for aerospace, marine and end-of-life vehicles with internal combustion engines.
Become zero: In each scenario examined, some residual emissions remain. According to the report, at least 4 to 5 million tons of negative emissions capacity (equivalent to 2.5 percent of current transport emissions) are required by 2045 to counteract these residual emissions. These could come from carbon capture and sequestration projects that pull carbon from the air to store it underground, as well as capture by natural or work areas.
Services
In addition to direct economic benefits from around 2030, policies to decarbonise transport could also lead to health, equity and environmental justice, as well as benefits for workers and workers.
Health: Transportation is a major contributor to local air pollution as well as climate change. Particulate matter damages the lungs and heart, while nitric oxide compounds contribute to ozone pollution and other health effects. The report found that cleaner heavy-duty vehicles would significantly reduce pollution in many of the state’s most vulnerable communities. The health benefits of reducing local pollution will increase with the use of clean transportation technologies and could result in savings of more than $ 25 billion in 2045.
Justice and Environmental Justice: Transportation in California harbors a legacy of inequality and harm to disadvantaged communities. In these communities, there is often a lack of high-quality public transport or suitable transport options. Highways were built without considering shifts and many color communities were divided by highways, continuing historical segregation policies such as redlining. The report identifies options that prioritize equity in transportation investments and policies.
These include:
- Supporting EV incentives for lower income buyers and underserved communities, including used vehicles.
- Prioritize the use of electric heavy-duty vehicles in disadvantaged communities and magnetic systems such as B. commercial warehouses in these communities.
- Support for transit and emission-free services and charging stations in disadvantaged communities. This can help reduce vehicle miles traveled and improve accessibility while avoiding displacement.
- Avoid locating plants for the production of non-renewable fuels in disadvantaged communities, involve communities that are disproportionately affected by emissions from the transport sector in decisions about the location of new infrastructures and investments in connection with achieving CO2 neutrality and monitor them and continue to carefully control local pollutants.
“We must face the legacy of the lack of public and private investment where Blacks, Indians and Colored People (BIPOC) live and work,” said Bernadette Austin, acting director of the UC Davis Center for Regional Change. “This report highlights ways to strategically invest in sustainable infrastructure while intentionally avoiding disruptive and harmful infrastructure in our most vulnerable and disadvantaged communities.”
Workforce: The transition to a climate neutral transport system will disrupt jobs in some sectors and create new jobs in other sectors, e.g. B. in the manufacture of clean vehicles and in the infrastructure for electric and hydrogen fuels. The report suggests that California is prioritizing the needs of affected workers. Wherever the expansion of the ZEV industry creates high quality jobs, government policy should focus on creating generally accessible career paths.
Economy: The transition to ZEV is expected to lead to savings for consumers and businesses well before 2045. Within this decade, the cost of owning and operating ZEV is expected to fall below that of a traditional vehicle (both gasoline and diesel powered). This is because the cost of batteries, fuel cells and hydrogen will continue to fall. The cost of electricity will be much less than the cost of petroleum fuel. and the maintenance costs of ZEVs will be lower. These savings can be invested elsewhere by households and companies. | https://thedailyconstructionnews.com/the-best-way-to-decarbonize-california-transportation-by-2045/ |
Vials of decades-old smallpox found at National Institutes of Health
WASHINGTON >> A government scientist cleaning out a storage room at a lab on Bethesda, Md., campus of the National Institutes of Health found decades-old vials of smallpox last week, the second incident involving the mishandling of a highly dangerous pathogen by a federal health agency in a month.
The vials, which appear to date from the 1950s, were flown Sunday night by government plane to the Centers for Disease Control and Prevention headquarters in Atlanta, officials said Tuesday. Initial testing confirmed the presence of smallpox virus DNA. Further testing, which could take up to two weeks, will determine whether the material is live. The samples will be destroyed after the testing is completed.
There is no evidence that any of the vials had been breached or that workers in the lab, which has been used by the Food and Drug Administration for decades, were exposed to infection. Nevertheless, employees apparently had not received official communication about the discovery. One scientist who works in the building and declined to be identified for fear of retaliation said he learned about it when his supervisor read a media report Tuesday.
The Federal Bureau of Investigation and the CDC’s division of select agents and toxins are investigating. “Due to the potential bio-safety and bio-security issues involved, the FBI worked with CDC and NIH to ensure safe packaging and secure transport of the materials,” said FBI spokesman Christopher Allen.
This is the first time that the deadly virus has been discovered outside the only two facilities in the world where smallpox samples are allowed, by international agreement, to be stored — a highly secure lab at CDC headquarters in Atlanta and a virology and biotechnology research center in Novosibirsk, Russia.
Smallpox vanished from the United States just after World War II and was eradicated globally by 1980. But the disease killed hundreds of millions of people in the 20th Century alone.
“It was considered one of the worst things that could happen to a community to have a smallpox outbreak,” said Michael Osterholm, a bioterrorism expert and director of the Center for Infectious Diseases Research and Policy at the University of Minnesota. “It’s a disease that’s had a major impact on human history.”
There is no cure for smallpox, and historically about one-third of people who contract it die from the disease. Though not as readily contagious as some other diseases, such as influenza, smallpox promises plenty of misery once contracted. Symptoms include high fever, fatigue and fluid-filled lesions that often ooze and crust over, leaving survivors irreversibly scarred.
Last month, a safety lapse involving three CDC labs in Atlanta led to the accidental release of live anthrax bacteria, an incident that required as many as 84 employees to get a vaccine or take antibiotics as a precaution and resulted in the reassignment of one lab director. Scientists failed to take proper precautions to inactivate bacteria samples before transferring them to other labs not equipped to handle live anthrax.
The biggest mystery about the smallpox discovery is how the samples ended up in Building 29A on the NIH campus. The building is an FDA lab, one of several that FDA has operated on the NIH campus since 1972. The vials were discovered while employees were preparing for the lab’s move to the FDA’s main campus at White Oak, Md.
An FDA scientist found a cardboard box on July 1 containing glass vials, each several inches long, sealed with melted glass. The box was lined with cotton padding, CDC spokesman Tom Skinner said. Several vials were labeled flu virus or other specimens. Sixteen other vials were either labeled “variola,” or smallpox, or suspected of containing smallpox virus. All the vials were immediately secured in a containment laboratory. The 16 suspect vials were flown to Atlanta. Testing confirmed the presence of smallpox virus DNA in six.
“This was a lab that didn’t realize it had these vials,” said Skinner. Because the vials are made of glass and sealed with melted glass, officials say the vials appear to date to the 1950s. He said the material could have been sitting around in the storage room “unbeknownst to the people up there for many years.”
About 18,000 people work on the sprawling NIH campus in Bethesda. An NIH spokeswoman said the agency is planning a comprehensive search of all laboratory spaces. She said officials did not notify employees about the discovery because the vials were checked and found to have no breaches.
The CDC notified the World Health Organization. A spokeswoman for the WHO said any samples of the smallpox virus found outside of those two locations must be moved to those locations or destroyed.
Bioterrorism expert Osterholm likened the discovery to finding a long-forgotten trunk in an attic and said that biologists are no different from other people, collecting things and storing them.
He said government officials handled the discovery appropriately and acted quickly and cautiously. “I’m not convinced this will be the last of these potential situations,” he said. “I wouldn’t be surprised if somewhere else in the world this same type of thing happens again.”
An accidental release of the virus potentially could sicken a small number of people who come into contact with it, though he said such an outbreak likely could be contained rapidly given today’s vaccine supplies and antiviral drugs. The more worrisome prospect, he said, would be if someone with bad intentions were able to aerosolize the virus and spread it over a large metropolitan area. “That could be a global crisis,” he said.
When smallpox was officially declared eradicated in late 1979, an agreement was reached under which any remaining stocks of the virus would either be destroyed or sent to one of two secure laboratories — one at the CDC in Atlanta and another at the State Research Centre of Virology and Biotechnology in Russia. Any samples found outside those two places were to be moved to those locations or destroyed.
In the decades since, the scientific community has wrestled over whether to destroy the remaining stockpiles of the smallpox virus or hang onto them in case they are needed for research.
Those who argue in favor or destroying the remaining smallpox samples — a group that includes D.A. Henderson, who led a worldwide effort to eradicate the disease decades ago — point out that an effective vaccine already exists and that maintaining live samples only risks accidental infections, or worse, vials falling into the hands of terrorists. But other scientists, including officials at the CDC and NIH, have insisted that there is more valuable research to be done before scientists can say confidently that adequate protections exist against any future smallpox threats.
The World Health Assembly, the WHO’s decision-making body, once again revisited the question this spring at a meeting in Geneva over whether to destroy the remaining stockpiles of smallpox. Amid sharply divided opinions on the issue, the group postponed a final decision. | https://www.nhregister.com/connecticut/article/Vials-of-decades-old-smallpox-found-at-National-11371194.php |
Why I love math
Tonight a friend on Facebook asked me: why do you like math? I knew that any suitable answer to that question would be a long one, and as I was cooking at the time and logged into Facebook chat on my phone, and so I deferred. After dinner I began typing a response on Facebook, but then I realized that this is worth its own blog post. I think it’s evident from this blog that I do love math, but I seldom pause to discuss why I love it.
This is what I said three years ago:
For those who don’t understand how someone can be so excited about math, the best way I can describe it is like being closer to God. I don’t necessarily believe in God, but I imagine that what I feel when I’m exploring mathematical concepts is the same feeling pious people get when they do whatever it is pious people do to feel closer to God. And math truly is the language of the universe. If God does exist, in one form or another, then understanding math helps one understand the universe and, in a way, get closer to God and creation.
Well, in the intervening time I have crossed that dark gulf between agnosticism and atheism, but the metaphor still holds. Mathematics is, ultimately, the most powerful tool we have for understanding and interacting with existence itself. There is mathematics behind anything you care to name: music, art, poetry, prose; there’s math in the swing of a baseball bat or in the spiral of a football. So the idea that we can express the fundamental nature of existence through mathematics is incredibly compelling—and also, I think, incredibly beautiful.
Mathematics is a form of communication. When I tell people that my two teachable subjects are math and English, they almost invariably furrow their brows and say something like, “Those aren’t a common combination!” And that might be true, but the implication—that math and English are somehow polar opposites—is not. Both are languages; both are about expressing ideas using an agreed-upon vocabulary, syntax, grammar. One just happens to be the modern world’s lingua franca, while the other has been placed on this pedestal: “Oh, I can’t do math! I just don’t have that kind of brain!”
I don’t recall any particular event that triggered my love of math. I remember favouring it over many of the other subjects when I played school as a child; and of course, it probably helps that I am rather good at it. It’s true too that some people have a talent for math while others struggle—I’m never going to be a star athlete—but I reject the idea that there is a “mathematical brain” as a social construct rather than a neurological edict. After all, I like to read and write too: there is more to me than my left hemisphere, thank you very much. My ability in mathematics helps, but it’s not the sole reason I love math. I love math for the same reasons I love philosophy or physics—for their deeper thought and what they can say about this world, about all possible worlds—and that I majored in math rather than physics or philosophy is perhaps more of a fluke than anything else.
Of course, even though I laud math for its role in our relationship with the physical world, I make no secret of the fact that I love “pure” mathematics. I prefer the dialect of rings and groups over that of differential equations or probability densities. I love the really abstract stuff, the ideas that verge upon being philosophy of mathematics instead of mathematics itself; I love discussing the theories behind the theories. That sort of love isn’t something you can really justify in words. It’s like asking writers where they get their ideas: we can provide a multitude of answers, but the real answer is that we don’t know. Everywhere, and nowhere.
Maybe it’s genetic. Maybe it’s environmental. Maybe the government put a chip in my head. Why do I like math? I don’t have a damn clue. | https://tachyondecay.net/blog/2011/09/2721/ |
---
abstract: 'By combining Pauli algebra with distribution theory, we give a very compact and conceptually simple formulation of Huygens’ principle in classical electrodynamics. The Stratton-Chu and Kottler-Franz representations of an electromagnetic field as surface integrals are derived with minimal effort and maximal clarity. They are then generalized by allowing the integration surfaces to move freely, so that charge distributions in arbitrary motion are represented.'
author:
- |
Gerald Kaiser\
Signals & Waves, Austin, TX\
http://www.wavelets.com
title: |
Huygens’ principle in classical electrodynamics:\
a distributional approach
---
Electrodynamics with the Pauli algebra {#S:Pauli}
======================================
The Pauli algebra is a generalization of vector analysis in $\rr3$. One defines the products of two vectors $\3A,\3A'$ by $$\begin{aligned}
\lab{pauli}
\3A\3A'=\3A\cdot\3A'+i\3A\times\3A'.\end{aligned}$$ Thus $\3A\3A'$ consists of a scalar part and a (pseudo-) vector part, the latter represented by an imaginary axial vector, which is actually the *oriented area spanned by $\3A$ and $\3A'$: $$\begin{aligned}
\la\3A\3A'\ra_s=\3A\cdot\3A',\qq \la\3A\3A'\ra_v=i\3A\times\3A'.\end{aligned}$$ The two common bilinear expressions are thus united into a single complex entity. A general element of the algebra, here called a *Pauli number, is represented by a complex scalar plus a complex vector $$\begin{aligned}
\4A=A_0+\3A,\qq A_0\in\4C,\qq \3A\in\cc3,\end{aligned}$$ and the product of two such elements is $$\begin{aligned}
\lab{4A}
\4A\4A'=A_0A_0'+\3A\cdot\3A'+A_0\3A'+\3AA_0'+i\3A\times\3A'\end{aligned}$$ A concrete representation of the algebra is given in terms of $2\times 2$ matrices by the correspondence[^1]**
$$\begin{aligned}
\lab{rep}
\4A\lra\lb\begin{matrix}
A_0+A_3&A_1+iA_2\\ A_1\!-iA_2& A_0-A_3
\end{matrix}\rb,\qq A_0,A_1,A_2,A_3\in\4C,\end{aligned}$$
where $\4A\4A'$ is represented by the matrix product. Define the spacetime differential operators $$\begin{aligned}
\4D&=\pl_t+\grad \ \ \hbox{and}\ \ \bbar D=\pl_t-\grad,\end{aligned}$$ which act on a Pauli-valued field $\4A\0x=\4A\xt$ by $$\begin{aligned}
\lab{del}
\4D\4A&=(\pl_t+\grad)(A_0+\3A)=(\dot A_0+\div\3A)+(\dtb A+\grad A_0+i\curl\3A)\\
\bbar D\4A&=(\pl_t-\grad)(A_0+\3A)=(\dot A_0-\div\3A)+(\dtb A-\grad A_0-i\curl\3A),\nt\end{aligned}$$ where $\dot A_0=\pl_t A_0, \dtb A=\pl_t\3A$, and whose product is the scalar wave operator: $$\begin{aligned}
\bbar D\4D=\4D\bbar D=\pl_t^2-\grad^2=\Box.\end{aligned}$$ Now consider the scalar wave equation $$\begin{aligned}
\lab{wave0}
\Box f\0x=g\0x\end{aligned}$$ where $g\0x$ is a given source function which, for convenience, is assumed to be a distribution of compact support. The wave *radiated by $g$ is the unique *causal [^2] solution $$\begin{aligned}
\lab{sol0}
f\0x=\int_\rr4\dd^4x'\,P(x-x')g(x')=P*g\0x,\end{aligned}$$ where $*$ denotes spacetime convolution and $P$ is the retarded propagator, which is the wave radiated by $g\0x=\d\0x\=\d\ox\d\0t$: $$\begin{aligned}
\lab{P}
P\0x=P\xt=\frac{\d(t-|\3x|)}{4\p|\3x|},\qq \Box P\0x=\d\0x.\end{aligned}$$ Hence the wave operator is invertible on the space of such fields, with $$\begin{aligned}
\Box\inv=P*.\end{aligned}$$ Since $\Box$ is a scalar operator, it operates on Pauli fields $\4A\0x$, expressed in Cartesian coordinates, by $$\begin{aligned}
\Box\4A\0x=\Box A_0\0x+\Box\3A\0x.\end{aligned}$$ Thus we may extend the wave equation to Pauli fields as $$\begin{aligned}
\lab{wave1}
\Box\4F\0x=\4G\0x\end{aligned}$$ where $\4G\0x$ is a Pauli-valued distribution with compact support. The unique causal solution is $$\begin{aligned}
\lab{sol1}
\4F\0x=P*\4G\0x=\int_\rr4\dd^4x'\,P(x-x')\4G(x').\end{aligned}$$**
We now apply the Pauli algebra to classical electrodynamics, more or less following . To minimize the appearance of unnecessary parameters, we use *natural Lorentz-Heaviside units, where $\e_0=\m_0=c=1$. An electromagnetic field in free space consists of two vector fields $\3E\0x,\3H\0x$ satisfying Maxwell’s equations $$\begin{aligned}
&\dtb E-\curl\3H=-\3J&&\div\3E=\r\lab{inhom}\\
&\dtb H+\curl\3E=\30&&\div\3H=0\lab{hom}\end{aligned}$$ where $(\r,\3J)$ is a given charge-current density. The obvious symmetry of these equations suggest combining the two fields into a single complex field $$\begin{aligned}
\lab{FEH}
\3F\0x=\3E\0x+i\3H\0x,\end{aligned}$$ for which Maxwell’s equations reduce to $$\begin{aligned}
\lab{Max}
&\dtb F+i\curl\3F=-\3J && \div\3F=\r.\end{aligned}$$ Now interpret $\3F\0x$ as a Pauli field with vanishing scalar component. Then shows that further reduces to the single equation $$\begin{aligned}
\lab{Max1}
\4D\3F=\r-\3J\=\4J.\end{aligned}$$ The homogeneous equations state that the source $\4J$ is real, but it will be useful to allow $\4J$ to be complex: $$\begin{aligned}
\lab{Jem}
\4J=\4J_e+i\4J_m&&\4J_e=\r_e-\3J_e&&\4J_m=\r_m-\3J_m\end{aligned}$$ where $\4J_e$ and $\4J_m$ represent electric and magnetic sources, respectively. Although Maxwell’s equations require $\4J_m=0$, *virtual magnetic sources will be needed in the formulation of the general Huygens principle.**
To solve for $\3F$, apply $\bbar D$: $$\begin{aligned}
\lab{wave2}
\Box\3F=\bbar D\4D\3F=\bbar D\4J\end{aligned}$$ and note that $$\begin{aligned}
\lab{dJ}
\bbar D\4J=(\pl_t-\grad)(\r-\3J)=(\dot\r+\div\3J)+(i\curl\3J-\grad\r-\dtb J).\end{aligned}$$ Since the left side of is a pure vector field, the scalar component of the right side of must vanish. This gives the continuity equation $$\begin{aligned}
\lab{cont}
\la\bbar D\4J\ra_s=\dot\r+\div\3J=0,\end{aligned}$$ whose real and imaginary parts state that electric and magnetic charge are conserved. Assuming the initial condition $\3F(\3x,-\8)=\30$, we obtain the unique causal solution $$\begin{aligned}
\lab{sol2}
\3F=P*(\bbar D\4J)=\bbar D\,(P*\4J),\end{aligned}$$ where the last equality follows because $\Box$ commutes with $\4D$ and $\bbar D$. Thus $$\begin{aligned}
\lab{FDA}
\3F\0x=\bbar D\4A\0x\end{aligned}$$ where the Pauli field $$\begin{aligned}
\lab{APJ}
\4A=P*\4J=\F-\3A\ \ \hbox{with}\ \ \F=P*\r\ \ \hbox{and}\ \ \3A=P*\3J,\end{aligned}$$ representing the 4-potential, is the causal solution of the wave equation $$\begin{aligned}
\lab{DAJ}
\Box\4A=\4D\bbar D\4A=\4D\3F=\4J.\end{aligned}$$ In fact, $$\begin{aligned}
\lab{sol3}
\3F=\bbar D\4A=(\dot \F+\div\3A)-\grad \F-\dtb A+i\curl\3A \end{aligned}$$ shows that $\4A$ satisfies the *Lorenz gauge condition[^3] $$\begin{aligned}
\lab{lor}
\dot \F+\div\3A=0.\end{aligned}$$ If $\4J$ is complex as in , then so is $\4A$: $$\begin{aligned}
\lab{Aem}
\4A=\4A_e+i\4A_m&&\4A_e=\F_e-\3A_e&&\4A_m=\F_m-\3A_m.\end{aligned}$$ The free Maxwell field is then given by $$\begin{aligned}
\lab{EHA}
\3E&=\re\3F=-\grad \F_e-\dtb A_e-\curl\3A_m\\
\3H&=\im\3F=-\grad \F_m-\dtb A_m+\curl\3A_e.\nt\end{aligned}$$ Of course, the homogeneous Maxwell equations require $\4J_m\!=\4A_m\!=0$. But the expressions with a *virtual magnetic 4-potential $\4A_m$ will be used to formulate Huygens’ principle.**
Electromagnetic Huygens principle {#S:Huygens}
=================================
The assumption that $\4J\0x$ is compactly supported was made for convenience and can be relaxed. While it is reasonable to assume that the *spatial support of $\4J$ is bounded at any time, we want to allow sources persisting in time, for example a set of charged particles following world lines or extended charged systems evolving in time. This includes, among other things, time-harmonic systems. The above results remain valid provided the integrals converge.*
Let the sources be *spatially bounded. To simplify the analysis, assume that the spatial support of $\4J\xt$ is contained in the interior of a closed surface $S\subset\rr3$ at all times $t$.[^4] We assume that $S$ is a smooth manifold, at least of class $C^2$. Denote the exterior of $S$ by $E$ and its interior by $E'$. Let $\l\ox$ be a $C^2$ function such that[^5] $$\begin{aligned}
\lab{EE}
\3x\in E&\imp\l\ox>0\\
\3x\in S&\imp \l=0\ \ \hbox{and}\ \ |\grad\l|=1\nt\\
\3x\in E'&\imp\l\ox<0.\nt\end{aligned}$$ The characteristic functions $\c$ and $\c'$ of $E$ and $E'$ may be written in terms of the Heaviside step function $H$ as [^6] $$\begin{aligned}
\c\ox&=H(\l\ox)=\begin{cases}
1,&\!\!\!\! \3x\in E\\0,&\!\!\!\! \3x\in E'
\end{cases} \qq\qq\qq
\c'\ox=H(-\l\ox)=\begin{cases}
0,&\!\!\!\! \3x\in E\\ 1,&\!\!\!\! \3x\in E'.
\end{cases}\end{aligned}$$ Then $$\begin{aligned}
\lab{N}
\3N\ox\=\grad\c\ox=-\grad\c'\ox=\d\6S\ox\3n\ox\end{aligned}$$ where $$\begin{aligned}
\3n\ox=\grad\l\ox\ \ \hbox{and}\ \ \d\6S\ox=H'(\l\ox)=\d(\l\ox).\end{aligned}$$ Thus $\3n$ is the outward unit normal on $S$ and $\dd^3\3x\,\d\6S\ox$ is the 2D area measure on $S$: $$\begin{aligned}
\lab{dSt}
\dd^3\3x\,\d\6S\ox=\dd S\ox.\end{aligned}$$ **Remark: Since the characteristic function $\c\ox$ does not depend on the choice of $\l$, neither does the distributional field $\3N=\grad\c$. The introduction of $\l$ is thus seen to be merely a *convenience which makes the concepts easier to understand by using the relation $H'=\d$. Similar remarks apply when $\l\xt$ is time-dependent, allowing for moving boundaries.****
Let $\3F'$ be an *interior field whose source $$\begin{aligned}
\lab{DF'}
\4J'\=\4D\3F'\end{aligned}$$ is spatially supported in the exterior region $E$. (This includes the case $\4J'=0$, where $\3F'$ is *globally sourceless.) Since the spatial support of $\4J'$ is by definition *closed, it must actually be contained in some closed set $V\subset E$. Hence $\3F'$ is defined and sourceless in an open neighborhood of $S$ as well as in its interior $E'$. Thus both $\3F$ and $\3F'$ are defined and sourceless on a neighborhood of $S$.***
We shall construct a field $\3F\9S$ whose sources are concentrated on $S$ at all times and which coincides with the given field $\3F$ in $E$ and with $\3F'$ in $E'$. The two partial fields are ‘glued’ into a single field defined by $$\begin{aligned}
\lab{partn}
\3F\9S\0x=\c\ox\3F\0x+\c'\ox\3F'\0x,\qq x=\xt\in\rr4,\end{aligned}$$ and the source of $\3F\9S$ is *defined by applying $\4D$ in a distributional sense: $$\begin{aligned}
\lab{JS}
\4J\9S=\r\9S-\3J\9S\=\4D\3F\9S.\end{aligned}$$ Note that $\4D\c=\grad\c=\3N$ and $$\begin{aligned}
\4D(\c\3F)&=(\4D\c)\3F+\c\4D\3F=\3N\3F+\c\4D\3F.\end{aligned}$$ Similarly, since $\4D\c'=\grad\c'=-\grad\c=-\3N$, $$\begin{aligned}
\4D(\c'\3F')=-\3N\3F+\c'\4D\3F'.\end{aligned}$$ Therefore $$\begin{aligned}
\lab{JS0}
\4J\9S=\3N\3F^j+\c\4J+\c'\4J'\end{aligned}$$ where $$\begin{aligned}
\lab{Fj}
\3F^j=\3F-\3F'=\3E^j+i\3H^j&&
\3E^j=\3E-\3E',\ \3H^j=\3H-\3H'\end{aligned}$$ is the *jump field across $S$. Since $\4J$ is supported in $E'$ and $\4J'$ is supported in $E$, we have the global identities $$\begin{aligned}
\c\4J\=0\ \ \hbox{and}\ \ \c'\4J'\=0.\end{aligned}$$ Hence $$\begin{aligned}
\lab{JS1}
\4J\9S=\3N\3F^j=\3N\cdot\3F^j+i\3N\times\3F^j=\d\6S(\3n\cdot\3F^j+i\3n\times\3F^j)\end{aligned}$$ is a distributional (4D) charge-current density supported on $S$, with a *surface charge-current density $(\s,\3K)$ given by $$\begin{aligned}
\lab{rJ}
\r\9S&=\d\6S\,\s&&\s=\3n\cdot\3F^j\\
\3J\9S&=\d\6S\,\3K&&\3K=-i\3n\times\3F^j.\nt\end{aligned}$$ Like $\4J$, $\4J\9S$ satisfies the distributional continuity equation $$\begin{aligned}
\lab{cons}
\la\bbar D\4J\9S\ra_s=\dot\r\9S+\div\3J\9S=0,\end{aligned}$$ which states that charge, now restricted to flow on $S$, is conserved.***
Note that even though $\4J$ is real, $\4J\9S$ is in general *complex, consisting of electric and magnetic sources on $S$: $$\begin{aligned}
\lab{JSem}
\4J\9S=\4J\9S_e+i\4J\9S_m&&\4J\9S_e=\r\9S_e-\3J\9S_e&&\4J\9S_m=\r\9S_m-\3J\9S_m\end{aligned}$$ with $$\begin{aligned}
\r\9S_e&=\d\6S\s_e,\ \ \s_e=\3n\cdot\3E^j&&
\3J\9S_e=\d\6S\3K_e,\ \ \ \3K_e=\3n\times\3H^j\lab{surfe}\\
\r\9S_m&=\d\6S\s_m,\ \s_m=\3n\cdot\3H^j&&
\3J\9S_m=\d\6S\3K_m,\ \3K_m=-\3n\times\3E^j.\lab{surfm}\end{aligned}$$ If we wish to construct a physically realizable surface source $\4J\9S$, then the absence of magnetic monopoles requires it to be real: $$\begin{aligned}
\lab{hom1}
\4J\9S_m=0\iff\3n\cdot\3H^j=0 \ \ \hbox{and}\ \ \3n\times\3E^j=\30\ \ \hbox{on}\ \ S.\end{aligned}$$ That is, the normal component of $\3H\9S$ and tangential components of $\3E\9S$ must be continuous across $S$. It can be shown[^7] that the scalar condition follows from the vector condition and Maxwell’s homogeneous vector equation. Since we are free to choose any sourceless interior field $\3F'$, and can be viewed as a set of *boundary conditions for $(\3E',\3H')$ with $(\3E,\3H)$ given. Thus we look for an interior field $\3F'=\3E'+i\3H'$ such that $$\begin{aligned}
\dtb F'+i\curl\3F'=\30\ \ \hbox{in}\ \ E'\nt \\
\3n\times\3E'=\3n\times\3E\ \ \hbox{and}\ \ \3n\cdot\3H'=\3n\cdot\3H\ \ \hbox{on}\ \ S.\lab{BC}\end{aligned}$$ (Recall that $\3F'$ actually extends as a sourceless field to a neighborhood of $S$.) This boundary-value problem has a unique solution if $\3F$ is continuous in an open neighborhood of $S$, which will be the case if $\4J$ is continuous in time.[^8] (Recall that we have also assumed $S$ to be of class $C^2$.) For this unique interior field, and are the *jump conditions on the interface between the interior and exterior regions .***
If the interior field does *not satisfy , then the Huygens representations we are developing, while useful *mathematically for expressing the given ‘real’ field $\3F$ (with $\4J_m=0)$ in terms of surface integrals, cannot be realized *physically by actual surface sources. This is what was meant by saying that the magnetic sources $\4J\9S_m$ are ‘virtual.’ In either case, we now derive the Huygens representations.***
The 4-vector potential for $\3F\9S$ is given by and as $$\begin{aligned}
\lab{FAS}
\F\9S\0x&=P*\r\9S\0x
=\int_\rr4\dd^4x'\,\d\6S(\3x')P(x-x')\3n(x')\cdot\3F^j(x')\\
&=\frac1{4\p}\int_S\dd S(\3x')\,r\inv\lb\3n\cdot\3F^j\rb\nt\\
\3A\9S\0x&=P*\3J\9S\0x\nt
=-i\int_\rr4\dd^4x'\,\d\6S(\3x')P(x-x')\3n(x')\times\3F^j(x')\nt\\
&=\frac1{4\p i}\int_S\dd S(\3x')\,r\inv\lb\3n\times\3F^j\rb,\nt\end{aligned}$$ where $r=|\3x-\3x'|$ and $$\begin{aligned}
[u]=u(\3x', t-r),\qqq [\3v]=\3v(\3x', t-r)\end{aligned}$$ denote retarded expressions. Hence the electric and magnetic 4-potentials are $$\begin{aligned}
\lab{FASem}
\F\9S_e\0x&=\frac1{4\p}\int\dd S(\3x')\,r\inv\lb\3n\cdot\3E^j\rb\\
\3A\9S_e\0x&=\frac1{4\p }\int\dd S(\3x')\,r\inv\lb\3n\times\3H^j\rb\nt\\
\F\9S_m\0x&=\frac1{4\p}\int\dd S(\3x')\,r\inv\lb\3n\cdot\3H^j\rb\nt\\
\3A\9S_m\0x&=-\frac1{4\p }\int\dd S(\3x')\,r\inv\lb\3n\times\3E^j\rb.\nt\end{aligned}$$ Substituting these into gives $$\begin{aligned}
\lab{SC}
\sh{-2}\bx{\3E\9S=-\grad\F\9S_e-\dtb A\9S_e-\curl\3A\9S_m \qqq
\3H\9S=-\grad\F\9S_m-\dtb A\9S_m+\curl\3A\9S_e.}\end{aligned}$$ If we choose $\3F'=\30$ and assume $\3x\in E$, then $\3F^j=\3F$ and reduce to the *Stratton-Chu equations . Since $\3F'=\30$ does not satisfy except in the trivial case $\3F=\30$, the Stratton-Chu formulation of Huygens’ principle requires virtual magnetic sources.*
However, if $\3F'$ is chosen to be the unique solution of , the Stratton-Chu equations reduce to the simpler expressions $$\begin{aligned}
\lab{SC1}
\3E\9S&=-\grad\F\9S_e-\dtb A\9S_e && \3H\9S=\curl\3A\9S_e.\end{aligned}$$
Returning to the general case and , note that $\3A\9S$ involves only the tangential components of $\3F^j$ on $S$ while $\F\9S$ involves only the normal components. The latter can be eliminated as follows. Begin with $$\begin{aligned}
\dtb F\9S&=-i\curl\3F\9S-\3J\9S
=-i\curl(i\curl\3A\9S-\grad\F\9S-\dtb A\9S)-\3J\9S\\
&=\curl\curl\3A\9S+i\curl\dtb A\9S+i\3N\times\3F^j.\end{aligned}$$ This involves only the tangential component $\3n\times\3F^j$ of $\3F^j$ on $S$, and it can be integrated using the initial condition $\3A\9S(\3x,-\8)=\30$ to obtain $$\begin{aligned}
\lab{KF0}
\3F\9S=\curl\curl\pl_t\inv\3A\9S+i\curl\3A\9S+i\3N\times\pl_t\inv\3F^j\\
\ \ \hbox{where}\ \ \pl_t\inv\3A\9S\xt=\int_{-\8}^t\dd t'\,\3A\9S(\3x, t').\nt\end{aligned}$$ If we choose $\3F'=\30$ and assume $\3x\in E$, then reduce to the *Kottler-Franz equations : $$\begin{aligned}
\lab{KF}
\bx{\3E\9S=\curl\curl\pl_t\inv\3A\9S_e-\curl\3A\9S_m \qqq
\3H\9S=\curl\curl\pl_t\inv\3A\9S_m+\curl\3A\9S_e.}\end{aligned}$$ However, note that are *global, remaining valid when $\3x\in E'$ (where $\3F\9S=\3F'$) and, in a distributional sense, even when $\3x\in S$ as indicated by the last term.**
Like the Stratton-Chu equations, involve virtual magnetic sources on $S$. If we assume that the interior field satisfies the physical boundary conditions , then simplify to $$\begin{aligned}
\lab{KF1}
\3E\9S=\curl\curl\pl_t\inv\3A\9S_e&& \3H\9S=\curl\3A\9S_e.\end{aligned}$$
Moving sources {#S:moving}
==============
The above can be generalized to sources in arbitrary motion simply by letting $\l$ depend on time, so that the 2D surface $$\begin{aligned}
S_t=\{\3x: \l\xt=0\}\subset\rr3\end{aligned}$$ enclosing the source $\4J\xt$ at time $t$ is time-dependent. The 3D hypersurface $$\begin{aligned}
\2S=\{\xt:\l\xt=0\}\subset\rr4\end{aligned}$$ now represents the *history of $S_t$. It is the oriented boundary separating the exterior and interior spacetime regions: $$\begin{aligned}
\2E=\{x:\l\0x>0\},\qq \2E'=\{x:\l\0x<0\},\qq \2S=\pl\2E'=-\pl\2E.\end{aligned}$$ Define the Huygens field $$\begin{aligned}
\lab{partn2}
\3F\9{\2S}\0x=\c\0x\3F\0x+\c'\0x\3F'\0x\end{aligned}$$ where $$\begin{aligned}
\c\0x=H(\l\0x)\ \ \hbox{and}\ \ \c'\0x=H(-\l\0x)=1-\c\0x\end{aligned}$$ are the characteristic functions of $\2E$ and $\2E'$. Then the same arguments as above give $$\begin{aligned}
\lab{JS2}
\4J\9{\2S}\=\4D\3F\9{\2S}=(\4D\c)\3F^j=\d\6{\2S}(\dot\l\3F^j+\3n\cdot\3F^j+i\3n\times\3F^j)\end{aligned}$$ with charge- and current distributions $$\begin{aligned}
\lab{rJS1}
\r\9{\2S}=\d\6{\2S}\,\3n\cdot\3F^j,\qq \3J\9{\2S}=-\d\6{\2S}(\dot\l\3F^j+i\3n\times\3F^j)\end{aligned}$$ where $$\begin{aligned}
\lab{dS2}
\d\6{\2S}\0x=\d(\l\0x)\end{aligned}$$ is a distribution supported on $\2S$, whose interpretation is given by the measure $$\begin{aligned}
\dd^4 x\,\d\6{\2S}\0x=\dd t\,\dd^3\3x\,\d(\l\xt)=\dd t\,\dd S_t\ox.\end{aligned}$$ The term $-\dot\l\3F^j$ is a *drag current on generated by its motion. Since $$\begin{aligned}
-\dot\l\3F^j=\dot\l\3n\times(\3n\times\3F^j)-\dot\l\3n(\3n\cdot\3F^j),\end{aligned}$$ it has both normal and tangential component. Equations generalize to $$\begin{aligned}
\lab{FAS2}
\F\9{\2S}\0x&=\int_\rr4\dd^4x'\,\d\6{\2S}(x')P(x-x')\3n(x')\cdot\3F^j(x')\\
\3A\9{\2S}\0x&=-\int_\rr4\dd^4x'\,\d\6{\2S}(x')P(x-x')\LB\dot\l(x')\3F^j(x')+i\3n(x')\times\3F^j(x')\RB\nt\end{aligned}$$ The electric and magnetic 4-potentials are the real and imaginary parts, and the Stratton-Chu equations for a moving surface are obtained exactly as in . Enforcing the homogeneous Maxwell equations on $\2S$ gives the boundary conditions $$\begin{aligned}
\lab{BCt}
\3n\cdot\3H^j=0\ \ \hbox{and}\ \ \dot\l\3H^j+\3n\times\3E^j=0.\end{aligned}$$ Note that the vector condition implies the scalar condition if $\dot\l\ne 0$. (As stated earlier, this is also true when $\dot\l=0$, though not as obviously.) It can then be used to determine the interior field.**
Local partitions and nonlinearity {#S:part}
=================================
The expression defines a global field $\3F\9S$ using a *partition of spacetime into the exterior and interior regions separated by the interface $\2S$: $$\begin{aligned}
\rr4=\2E\cup\2S\cup\2E'.\end{aligned}$$ This can be generalized to a finite (or even infinite) sum of partial fields $\3F_k$ defined on regions $\2E_k$ with characteristic functions $\c_k$: $$\begin{aligned}
\lab{partn3}
\3F\0x=\sum_k\c_k\0x\3F_k\0x,\end{aligned}$$ where the superscript $\2S$ has been dropped. We assume that $\3F_k$ is a sourceless field in an open spacetime region $\5O_k$ containing the *closure of $\2E_k$, thus extending beyond its boundary. Since $$\begin{aligned}
\c_k\4D\3F_k=0\qq\forall k,\end{aligned}$$ the source of $\3F$ is the distribution $$\begin{aligned}
\lab{JJ}
\4J\=\4D\3F
=\sum_k(\4D\c_k)\3F_k=\sum_k\LB\dot\c_k\3F_k+\grad\c_k\cdot\3F_k+i\grad\c_k\times\3F_k\RB\\
\imp\r=\sum_k\grad\c_k\cdot\3F_k\ \ \hbox{and}\ \
\3J=-\sum_k\LB\dot\c_k\3F_k+i\grad\c_k\times\3F_k\RB.\nt\end{aligned}$$ Since $\4D\c_k$ is supported on $\pl\2E_k$, $\4J$ is supported on the ‘cellular’ boundary[^9] $$\begin{aligned}
\lab{cell}
\2S=\bigcup_k\pl\2E_k.\end{aligned}$$ Furthermore, since[^10] $$\begin{aligned}
\lab{Ekl}
x\in\pl\2E_k\cap\pl\2E_l \imp \4D(\c_k+\c_l)=0,\end{aligned}$$ $\4J$ depends only on the jump fields $$\begin{aligned}
\3F^j_{kl}=\3F_k-\3F_l\end{aligned}$$ across the interfaces between adjoining regions $\2E_k,\2E_l$. Thus $$\begin{aligned}
\lab{Huy3}
\3F=\bbar D\4A\ \ \hbox{where}\ \ \4A=P*\4J\end{aligned}$$ gives a generalized Huygens representation of $\3F$ in terms of sources supported on $\2S$. Furthermore, the *projection property [^11] $$\begin{aligned}
\lab{proj}
\c_l\0x\c_m\0x=\d_{lm}\c_l\0x\end{aligned}$$ implies that nonlinear expressions in $\3F$ have similar partitions. For example, the scalar Lorentz invariant $$\begin{aligned}
\3F^2=\3F\cdot\3F=\3E^2-\3H^2+2i\3E\cdot\3H\end{aligned}$$ has the local partition $$\begin{aligned}
\3F^2=\sum_k\c_k\3F_k^2,\end{aligned}$$ and the electromagnetic energy-momentum density $$\begin{aligned}
\lab{ES}
\4S\=\frac12\3F\3F^*=\frac12\LB\3F\cdot\3F^*+i\3F\times\3F^*\RB=U+\3S\\
U=\frac12\lp\3E^2+\3H^2\rp,\qq \3S=\3E\times\3H\nt\end{aligned}$$ has the local partition $$\begin{aligned}
\4S=\sum_k\c_k\4S_k\qqq U=\sum_k\c_kU_k\qqq\3S=\sum_k\c_k\3S_k.\end{aligned}$$ Hence the local power density (rate of increase of energy density) is $$\begin{aligned}
\la\4D\4S\ra_s&=\dot U+\div\3S=\sum_l\LB\dot\c_k U_k+\grad\c_k\cdot\3S_k\RB
+\sum_k\c_k\LB\dot U_k+\div\3S_k\RB.\end{aligned}$$ Since $\3F_k$ is sourceless in $\5O_k$, it follows from Poynting’s theorem that $$\begin{aligned}
\dot U_k+\div\3S_k=0\ \ \hbox{in}\ \ \5O_k\end{aligned}$$ and thus $$\begin{aligned}
\lab{Poyn1}
\bx{\dot U+\div\3S=\sum_k\LB \dot\c_kU_k+ \grad\c_k\cdot\3S_k\RB.}\end{aligned}$$ Here $\dot\c_kU_k$ is the rate of increase in the energy density coming into $\2E_k$ due the motion of the boundary $\pl\2E_k$, and $ \grad\c_k\cdot\3S_k$ is that due to the incoming momentum flowing through $\pl\2E_k$. Due to , the right side of involves only the *differences $$\begin{aligned}
U_{kl}^j=U_k-U_l\ \ \hbox{and}\ \ \3S_{kl}^j=\3S_k-\3S_l\ \ \hbox{on}\ \ \pl\2E_k\cap\pl\2E_l.\end{aligned}$$ Since the general partition allows arbitrary choices of sourceless fields $\3F_k$ in domains $\5O_k$ containing the closure of $\2E_k$, these differences need not vanish. By enforcing boundary conditions on any interface $\pl\2E_k\cap\pl\2E_l$, the corresponding terms can be made to vanish. But then that interface can be removed, thus merging the two cells into one.****
It is instructive to confirm using the expression for the surface current $\4J$. Recall that $\4J$ is generally complex, including magnetic as well as electric sources: $$\begin{aligned}
\4J=\4J_e+i\4J_m.\end{aligned}$$ The generalized Poynting theorem for a complex surface current density is derived by applying the distributional Maxwell equations $$\begin{aligned}
\dtb F+i\curl\3F=-\3J&& \dtb F^*-i\curl\3F^*=-\3J^*\end{aligned}$$ to $$\begin{aligned}
\dot U+\div\3S
=\frac12\LB\dtb F\cdot\3F^*+\3F\cdot\dtb F^*+i\curl\3F\cdot\3F^*-i\3F\cdot\curl\3F^*\RB,\end{aligned}$$ which gives $$\begin{aligned}
\lab{Poyn}
\dot U+\div\3S=-\frac12\lp\3J\cdot\3F^*+\3F\cdot\3J^*\rp=-\3J_e\cdot\3E-\3J_m\cdot\3H.\end{aligned}$$ The right side is, like $\3J$, a distribution supported on $\2S$. The partitions $$\begin{aligned}
-\3J=\sum_k\LB\dot\c_k\3F_k+ i\grad\c_k\times\3F_k\RB && \3F=\sum_l\c_l\3F_l\end{aligned}$$ give $$\begin{aligned}
-\3J\cdot\3F^*
&=\sum_{kl}\LB \c_l\dot\c_k\3F_k\cdot\3F_l^*+ i\c_l\grad\c_k\times\3F_k\cdot\3F_l^*\RB.\end{aligned}$$ Using $\grad\c_k\times\3F_k\cdot\3F_l^*=\grad\c_k\cdot\3F_k\times\3F_l^*$, gives $$\begin{aligned}
\dot U+\div\3S
&=\frac12\sum_{kl}\LB (\c_l\dot\c_k+\c_k\dot\c_l)\3F_k\cdot\3F_l^*+ i(\c_l\grad\c_k+\c_k\grad\c_l)\cdot\3F_k\times\3F_l^*\RB.\end{aligned}$$ But the projection property implies the distributional identities $$\begin{aligned}
\c_l\dot\c_k+\c_k\dot\c_l=\d_{kl}\dot\c_k\ \ \hbox{and}\ \ \c_l\grad\c_k+\c_k\grad\c_l=\d_{kl}\grad\c_k,\end{aligned}$$ therefore $$\begin{aligned}
\dot U+\div\3S=\sum_k\LB \dot\c_kU_k+ \grad\c_k\cdot\3S_k\RB\end{aligned}$$ in agreement with . This confirms the consistency of our computations involving bilinear distributional expressions.[^12] It gives reason to hope that partition methods could be useful in the synthesis of global solutions to nonlinear equations from local solutions.
Acknowledgements {#acknowledgements .unnumbered}
================
I thank David Colton and Thorkild Hansen for helpful discussions, and Arje Nachman for his sustained support of this work, most recently through AFOSR Grant \#FA9550-08-1-0144.
W E Baylis, *Electrodynamics: A Modern Geometric Approach. Birkhäuser Progress in Mathematical Physics vol 17, Boston, 1999*
D Colton and R Kress, *Inverse Acoustic and Electromagnetic Scattering Theory. Springer, Berlin, 1992*
D Hestenes, *Space-Time Algebra. Gordon and Breach, New York, 1966*
T B Hansen and A Yaghjian, *Plane-Wave Theory of Time-Domain Fields: Near-Field Scanning Applications. IEEE Press, 1999*
J D Jackson, *Classical Electrodynamics, third edition. John Wiley & Sons, New York, 1999*
[^1]: Along with complex numbers and quaternions, the Pauli algebra is one of the simplest examples of *Clifford algebra. Although its first application to physics was in quantum mechanics, it has also turned out to be useful in other fields, especially classical electrodynamics . The relation to Pauli matrices is found by choosing $A_0=0$ and $\3A_k=\grad x_k$ to be the unit vector in the direction of $x_k$. The matrix representing $\3A_k$ is then the Pauli matrix $\s_k$.*
[^2]: In this context, causality simply means that $f$ is supported in the future region of $g$. If $g$ vanishes at $t=-\8$ as assumed here, it suffices to take the ‘initial condition’ $f(\3x,-\8)=0$.
[^3]: Evidently, the Lorenz gauge is selected by causality.
[^4]: This will be generalized to sources in arbitrary motion in Section \[S:moving\] by allowing $\l$ to depend on time. Here we assume a fixed surface $S$, as is commony done in the derivation of Huygens’ principle.
[^5]: An example of a function with these properties is $$\begin{aligned}
\l\ox=\begin{cases}
\ \ d\ox,&\3x\in E\\ \qq\qq 0,&\3x\in S\\-d\ox,&x\in E'.
\end{cases}\end{aligned}$$ where $d\ox$ is the shortest distance from $\3x$ to $S$.
[^6]: For $\3x\in S$, we define $\c\ox=\c'\ox=1/2$; but this singular case will not be needed in the sequel.
[^7]: This follows in the frequency domain from Equation (6.38) in .
[^8]: This is a sufficient but not necessary condition, as follows from the properties of the propagator . Due to the factor $\d(t-r)$, the spread of $\4J$ in both time and space tends to smooth $\3F$.
[^9]: Since $\pl\2E_k$ is oriented by the unit normal pointing into its *interior $\2E_k$, each interface $\pl\2E_k\cap\pl\2E_l$ between adjoining regions occurs *twice in , with opposite orientations. Hence the oriented sum (*chain) $\sum_k\pl\2E_k$ vanishes but the set-theoretic union $\2S$ does not.***
[^10]: It makes no sense to say that $\4D\c_k=-\4D\c_l$ since $\4D\c_k$ and $\4D\c_l$ are both infinite on $\pl\2E_k\cap\pl\2E_l$. On the other hand, $\c_k+\c_l$ is the characteristic function of $\2E_k\cup\2E_l\cup(\pl\2E_k\cap\pl\2E_l)$, hence makes sense.
[^11]: Equation fails *numerically on $\pl\2E_k\cap\pl\2E_l$ where $\c_k\0x=\c_l\0x=1/2$, but it holds *weakly, in the sense of distributions, $$\begin{aligned}
\int\dd^4 x\,\c_l\0x\c_m\0x f\0x=\d_{lm}\int\dd^4x\,\c_l\0x f\0x\end{aligned}$$ for any continuous function $f$ with compact support or rapid decay (needed when $\2E_k$ or $\2E_l$ are unbounded).**
[^12]: Quadratic expressions in singular distributions such as $\d\0x$ do not make sense, but evidently products such as $\c_l\dot\c_k$ and $\c_l\grad\c_k$ do, due to the mild nature of the singularity of $\c_l$ (its finite jump discontinuity).
| |
For the third year in a row, the head chef at one of Cork's best-loved gastropubs will hold an event to provide toys and food for hundreds of kids this Christmas.
Bryan Clarke of the Briar Rose in Douglas is again organising a big Toy Drive at the pub and locals are being asked to drop off as many toys or presents as possible because they will be needed this year more than ever.
Bryan and his team have helped Edel House, which recently celebrated its 50th year in operation, over the festive period for the past two years with close to 170 kids needing aid in 2021.
But this year, due to the housing and also the cost of living crisis, they expect that number to climb to close to 250 children.
"The first year was a great success but last year went to a new level," Clarke told CorkBeo.
"But this year we are expecting it to be even bigger as there is an extra demand now because of the housing crisis and the cost of living crisis.
"We helped almost 170 kids last year but this year we are expecting between 200 and 250. So far we have already received lots of presents from people in the community and we even had a woman drop up gifts all the way from Killarney.
"There is a great community spirit that you can feel already and we hope that will continue over the next few weeks."
Brian and the team recently launched their Toy Drive and it will run right up to the 22nd of December. They can be dropped at the Briar Rose in Douglas any day and at any time before then on the condition that they are new.
The crew at the Briar will also be making up Christmas dinners for each and every child and parent on Christmas morning.
The chef values the efforts of those working with Edel House and holds the organisation close to his heart having also spent Christmas in a refuge with his mother when he was only four years old.
Sadly, Bryan's mother passed away in 2020 aged just 57.
“I wanted to do something in her name," he added. "As a child, I spent time in a women’s refuge with my mam when my parents separated.
“We got housed three weeks before Christmas and it burned down due to faulty Christmas lights and we were back into the refuge for Christmas. I know the great work they do for people.”
After the success of last year's table quiz and fundraising, Bryan was able to donate over €10,000 to aid the recently completed extension of Edel House.
A threepeat event will take place this year at the Douglas pub, with people able to buy raffle tickets and make donations even if they cannot attend the event on the 22nd of December.
Prizes currently include a jersey signed by Roy Keane and a ball signed by the Munster rugby team so the hope is that they will raise more much-needed funds than the previous years.
Read More: | https://www.corkbeo.ie/news/local-news/cork-gastropub-chef-looking-toys-25657778 |
Q:
Fault attack on RSA-CRT
I am trying to understand fault attack on RSA-CRT, and I found some example, which I don't know how to solve it.
I know public modulus $N$, public exponent $e$, a value of faulty signature (where one of the two partial signatures was incorrect) and the value of correct signature. The message $m$ is signed by RSASSA-PKCS1-v1_5 (signature transformation is RSASP1).
I have already read the documentation of RSASSA and RSASP1, and I have also read some articles about how to attack this problem. However, I don't understand how to get a message which I need for calculating $p$, because I should get $p = \operatorname{gcd}(\text{faultySignature}^{exponent} - m, N)$
Could someone help me?
A:
In order to have a successful fault attack on RSA-CRT, you need to work with known values of $e, N$ and of the message $m$, but you should be knowing them already, since you cannot verify the signature without knowing these values.
So, at first you should be knowing the public key of the signer: $(e,N)$. Then the signer signs a message $m$, which you should know in order to verify it. But if the signer instead issues a faulty signature, you can try and recover its private key as you said using the following method.
You can first recover the value $p$ as you mentioned using
$$p = \operatorname{gcd}(\text{faultySignature}^{e} - m, N)$$
once this is done, you can get the second prime $q$ by dividing $N$ by $p$:
$$q=\frac{N}{p}$$
and you can finally compute the value $d$ by computing $\phi(N)=(p-1)(q-1)$ (assuming we are working with a 2 prime factors RSA modulus) and by finally computing $$d=e^{-1}\mod{\phi(N)}$$
Now, when using RSASSA-PKCS1-v1_5, what you are signing is not directly the message, to avoid the malleability issues and such, but instead the padded hash thereof. You can see the exact process of deriving the signed hash from the message in RFC3447 section 8.2.1 and following. But basically, what you need to do is to:
Convert the message M into its encoded form of length k octets EM = EMSA-PKCS1-V1_5-ENCODE (M, k).
Convert the encoded message EM to an integer which can be used with RSA: m = OS2IP (EM)
Use this integer value m as being your value $m$ in your computations.
| |
A machine takes 4.8 hours to make 8 parts. At that rate, how many parts can the machine make in 24.6 hours? The answer is D or 41 parts because 24.6 divided by 4.8 is 5.125. And 5.125 multiplied by 8 equals 41 aka D.
-
math
Suppose that the time (in hours) required to repair a machine is an exponentially distributed random variable with parameter λ (lambda) = 0.5. What's the probability that a repair takes less than 5 hours? AND what's the
-
statisticss
The time taken by a man to deliver milk is normally distributed with, mean 12 minutes and standard deviation 2 minutes. He delivers milk everyday estimate the probability that he takes. (a) longer than 17 minutes (b) between 9 and
-
computer science
I need help with my Java homework! Write a program that calculates a customer's monthly bill. It should ask the user to enter the letter of the package the customer has purchased (A, B, or C) and the number of hours that were
-
mathematics
in a certain commercial bank customers may withdraw cash through one of the two tellers at the counter on average one teller takes three minutes while the other teller takes five minutes to serve a customer if two tellers start to
-
math
Angela, Mary and Tiff are all standing near the intersection of University and 42nd streets. Mary and Tiff do not move, but Angela runs toward Tiff at12 ft/sec along a straight line, as pictured. Assume the roads are50 feet wide
-
math
A cyclist travels for 60km at x km/h and 180km at y km/h and takes 10 hours altogether for the journey. If the speed are interchange, the journey takes 8.6 (8 whole number 2 over 3) hours. Find x and y.
-
Algebra
Maria and Charlie can deliver 50 papers in 2 hours. How long would it take them to deliver 35 papers? formula please
-
linear programming
help please thx paint fair company advertises its weekly sales in newspapers, television, and radio. Each hundred dollars spent in advertising in newspapers is estimated to reach an exposure of 14 buying customers, and each
-
math
Power companies typically bill customers based on the number of kilowatt-hours used during a single billing period. A kilowatt is a measure of how much power (energy) a customer is using, while a kilowatt-hour is one kilowatt of
-
Statistic
The number of customers who enter a supermarket each hour is normally distributed with a mean of 600 and a standard deviation of 200. The supermarket is open 16 hours per day. what is the probability that the total number of
You can view more similar questions or ask a new question. | https://www.jiskha.com/questions/107757/nahana-takes-2-hours-to-deliver-newspapers-to-her-125-customers-angela-delivers-the-same |
Interesting facts about our furry friends that everyone can observe from their pet. In this post, we provide answers to some of the most popular questions. Start watching and get a charge of positive emotions.
What does it mean to be a cat?
Let’s start with how and what the cat sees when it leaves the house for a walk. If you didn’t know yet, a cat does not distinguish all the colours that a person can distinguish. Her favourite colours are blue and green. In addition, she sees more shades of grey. Although, perhaps, less than 50. And the fact that cats see in continuous darkness is a myth. To see, they need at least a faint light source.
Cats are incorrigible egoists. Or is it slander?
Dog owners love to contrast their favourite pets with cats. Compared to dogs, they are, they say, hardened egoists, they only need to devour from a person.
Yes, cats do not care about your flower bed, and they can only consider flowers in a pot on the windowsill as an object of valiant fun – to dig, gnaw, scatter.
But then how to interpret the habit of domestic cats to bring gifts to their owners (decapitated mice, bunnies, birds, chipmunks, etc.)? In general, with cats, everything is not so simple.
Is it important for cats to know the mood of their owners?
With cats, at least one thing we know for sure: people have a special liking for cats. But how cats relate to people is not entirely clear.
Compared to dogs so devoted to us, cats seem rather indifferent, as if they do not care about human affairs at all. But, as you may have guessed, this is not true. Cats just know how to hide their feelings.
Why we think cats are unfriendly and arrogant
We continue to expose the seeming self-centeredness of the cats. Outwardly – especially in comparison with dogs, which rejoice like crazy at any sign of attention from the owner – cats are very arrogant. It seems that they are sick of the very idea that they can have a master at all. No, of course, they are the owners.
Therefore, it often seems to us that it is much more difficult to make friends with cats than with dogs. But maybe we just don’t understand them?
Why do cats live on their own and not in a pack?
Here is another interesting article about single cats who prefer to walk by themselves. Why are they, in fact, on their own? After all, it would seem that life in a pack has a lot of advantages (the article lists these advantages in great detail).
And yet, among felines, only lions prefer to live in a pack. Cats are not like that. Even stray, courtyard cats living in basements do not stray into a flock. Yes, they have communities, but they are fickle, and, in fact, they are not a group – cats simply divide the territory in which they raise their offspring.
However, as scientists say, all this is gradually starting to change. After all, cats are also lions, only small ones.
Why are cats so fond of ruining Christmas trees?
And here’s another question that can be compared in popularity to such as “is there life on Mars?” The relationship between cats and Christmas trees is as old as the habit of decorating a Christmas tree for the New Year. In a word, this is a serious question and requires thoughtful analysis. | https://pettime.net/interesting-facts-and-details-about-cats/ |
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
Many electronic devices such as cellular phones, MP3 players and miscellaneous portable audio devices require the use of external audio earphones, head phones or a head set in order to hear media sound. A consumer may need a microphone in order to talk to a caller on a mobile phone, when, for example, the head set is connected to the mobile phone.
This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The apparatus comprises a housing, wherein the housing comprises a circular cavity; and at least two longitudinal grooves placed in separate corner portions of the housing and around the circular cavity. Further, the apparatus comprises an electric contact associated with each longitudinal groove of the at least two longitudinal grooves.
Many of the attendant features will be more readily appreciated as they become better understood by reference to the following detailed description considered in connection with the accompanying drawings.
Like reference numerals are used to designate like parts in the accompanying drawings.
The detailed description provided below in connection with the appended drawings is intended as a description of the present examples and is not intended to represent the only forms in which the present example may be constructed or utilized. However, the same or equivalent functions and sequences may be accomplished by different examples.
Usually a circular cavity is provided in audio devices for connecting a signal plug, such as an audio/video plug, in order to hear audio sound and/or, for example, provide a connection for transmitting video signals. In electronics, a signal plug is typically used for analog signals, primarily audio. It is cylindrical in shape, typically with two, three, four or five contacts. The signal plug, being a male connector, can be connected to a jack, which is a female connector. The jack may have one electric contact corresponding to each contact of the signal plug. The electric contact functions as a spring which presses towards a contact of the signal plug. This spring function is important because good connection is needed between the electric contact of the jack and the contact of the signal plug. One example of a jack is an audio/video jack, which is often called an AV jack.
Each contact comprises one contact surface for transmitting a signal to the signal plug or vice versa. For example, the contacts may comprise “left channel”, “right channel”, “ground”, “microphone” and “switch”. If only mono audio is needed, only two or three contacts are needed. The ground eliminates or at least alleviates the noise in the audio signal. The switch may give feedback information to program software of a device comprising an audio/video jack. The program software may switch the audio signal from the device speakers into the external head set, connected to the audio/video jack. The switch may also launch, or control the functions of, a media player when the signal plug is connected.
Electric contacts may be manufactured by metal stamping. Usually in metal stamping the manufacturer uses high tonnage presses and stamping dies to forge sheets of metal into complete or semi-complete parts. Precision metal stamping improves the speed and accuracy of complex stamping applications by allowing the stamping, folding, drawing, or piercing of a product in a single operation or a series of operations. The operations may be automated.
There are three types of signal plugs, such as audio/video plugs, that may be most commonly used in electronic equipment such as portable devices. The outside diameter of a “sleeve” plug is ¼ inch (6.35 mm). This 6.35 mm plug is most commonly used, for example, in electric guitars, loudspeakers, microphones and line-level audio equipment. In bigger equipment, the size of the signal plug is not necessarily a critical feature. A “mini” plug has a diameter of 3.5 mm (approx. ⅛ inch) and a “sub-mini” plug has a diameter of 2.5 mm (approx. 3/32 inch). The 3.5 mm plug is maybe the most widely used, for example, in mobile devices. An outer end of the signal plug is usually coned. This feature enables the locking of the signal plug inside the jack by means of the coned part.
Some users desire that a device having a signal plug is waterproof. In this instance, a housing of the apparatus comprising a cavity for the signal plug may also have to be waterproof. When a slot or a groove is structured in the housing for an electric contact, adequate wall thickness must be left between the slot or groove and the housing. This wall thickness is needed for the mechanical strength, and generally a uniform wall is needed in waterproof applications. Needs from consumers for smaller and lighter electronic products and needs from the electronic industry for developing new and smaller devices lead to miniaturization. Even minor size reduction of the housing may be a key factor when manufacturing the apparatus. In some devices, the electric contacts are placed on the same side of the housing or on two sides of the housing. This leads to an increase in the width of the housing on the side where the electric contacts are placed.
FIG. 1A
FIG. 1A
1
2
1
1
1
2
3
4
4
4
5
5
5
2
3
1
6
6
6
4
4
4
4
4
4
3
6
6
6
4
4
4
6
6
6
4
4
4
4
4
4
6
6
6
2
2
a
a
a
a
a
b
c
a
b
c
a
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
is an example illustration of an apparatus , where a housing of the apparatus has a partial cut-out. The apparatus in is illustrated with a partial cut-out in order to see the parts inside the apparatus . The housing comprises a circular cavity and at least two longitudinal grooves , , placed in separate corner portions , , of the housing and around the circular cavity . Further, the apparatus comprises electric contacts , , associated with each longitudinal groove , , . The at least two longitudinal grooves , , are structured to open into the circular cavity . Each electric contact , , is individually positioned into its associated longitudinal groove , . One electric contact , , is provided in each longitudinal groove , , . The longitudinal grooves , , maintain the electric contacts , , firmly in place. The external appearance of the housing and the transversal cross-section of the housing are structured to be substantially rectangular.
FIG. 1B
FIGS. 2C and 3B
1
7
7
3
3
1
7
3
7
7
1
3
a
a
a
is an example illustration of the apparatus into which a signal plug is inserted. The signal plug is inserted into the cavity and locked with a locking mechanism near a bottom of the cavity by pushing the signal plug with an external force F applied by a user in the direction of the arrow. The apparatus is structured to releasably receive the signal plug within the cavity . The signal plug can be, for example, an audio/video plug. A second external force Fr is needed, when the signal plug is removed from the apparatus . The second external force Fr applied by the user is directed naturally away from the cavity . The second external force Fr is illustrated with a dashed arrow. The operation of the locking mechanism is illustrated in more detail in .
FIG. 1C
FIG. 1C
FIG. 1B
FIG. 1C
FIG. 4
6
4
6
7
7
3
7
8
6
7
4
7
6
6
8
7
6
1
8
6
6
6
6
7
a
a
a
a
a
a
a
a
a
a
a
a
a
a
b
c
is a partial enlargement illustration of an electric contact in a longitudinal groove . illustrates the portion indicated with a circle in . The electric contact may be structured to function as a spring which presses towards a contact surface of the signal plug , when the signal plug is inserted into the cavity . When the signal plug is inserted, an edge of the electric contact moves away from the signal plug along the longitudinal groove in the direction of the arrow while contact between the signal plug and the electric contact is maintained. As the electric contact functions as a spring, a sufficient contact is formed between the edge and the signal plug . Although illustrates only one electric contact , the apparatus may comprise additional electric contacts having a similar edge as the electric contact . The connections between the electric contacts , , and the signal plug are illustrated in more detail in .
FIG. 2A
FIG. 2A
FIG. 2A
FIG. 2A
1
3
1
4
4
4
9
9
2
4
4
4
6
6
6
5
5
5
2
1
6
2
2
5
5
5
5
5
5
6
6
6
6
9
9
6
9
6
6
6
6
10
10
10
10
2
9
9
5
5
5
10
10
10
4
4
4
2
1
2
1
1
6
6
6
5
5
5
2
a
a
a
b
c
a
b
c
a
b
c
a
b
c
a
c
a
b
c
a
b
c
a
b
c
c
a
c
c
a
b
c
a
b
c
d
a
b
c
a
b
c
a
b
c
a
a
a
a
b
c
a
b
c
is an example illustration of the apparatus from the open end direction of the cavity of the apparatus . illustrates an example where each longitudinal groove , , is placed at least partially on the diagonal , ′ of the transversal cross-section of the housing . By placing the longitudinal grooves , , and the electric contacts , , in the separated corner portions , , , a reduction of the width W of the housing is accomplished. A compact size of the apparatus is an advantage and is a significant factor in equipment. Further, another solution is to place the electric contact ′ in immediate vicinity of the diagonal of the transversal cross-section of the housing . The housing comprises at least two corner portions , , . In , the first corner portion , the second corner portion and the third corner portion are utilized for the electric contacts , , . An electric contact ′ which is placed next to the diagonal , is illustrated with a dotted line in . In this solution, the size of the electric contact ′ which is placed next to the diagonal may have to be smaller than the third electric contact in order to keep the sufficient wall thickness. As the largest space for the electric contacts , , is near the corners , , , of the housing , the most preferable place is on the diagonals , ′. There are separate corner portions , , between the dashed lines and the corners , , of the housing. In this way, the largest wall thickness is left around the longitudinal grooves , , . It is also possible to implement a fourth electric contact on the upper right corner of the housing (not illustrated). When there is no fourth contact, one side of the apparatus may be manufactured rounded. This may be a useful feature when good appearance is needed for an electronic apparatus comprising the apparatus . For example, the housing may be placed in to the corner of a device with a rounded edge, and rounding the fourth corner may accommodate a rounded device edge. The rounding may not be necessary if the apparatus is not placed near a corner or a side of an electronic device comprising the apparatus . By placing the electric contacts , , in the separate corner portions , , of the housing , effective use of space in the apparatus can be achieved. This also minimizes the width W.
FIG. 2B
FIG. 2B
FIG. 2B
FIG. 2B
11
1
11
7
3
12
12
11
12
12
13
3
11
12
12
1
a
a
b
a
b
a
b
a.
is an example illustration of a locking mechanism inside the apparatus . is a sectional view of the cut-out V-V. The locking mechanism is configured to lock a signal plug within the cavity with at least one lock plate , . The locking mechanism disclosed in comprises two lock plates , opposing each other in the inner end portion of the cavity . This locking mechanism illustrated in may have the switch function and therefore at least two lock plates , are needed in the structure of the apparatus
FIGS. 3A and 3B
FIG. 3A
FIG. 2B
FIG. 3B
FIG. 3B
1
7
12
12
7
3
29
30
6
6
6
12
12
12
12
13
13
24
7
13
13
7
13
13
12
12
12
12
12
12
a
a
b
a
b
c
a
b
a
b
a
b
a
b
a
b
a
b
a
b
a
b
are example illustrations of the apparatus , when a signal plug is connected. illustrates the direction of the section view VI-VI. When comparing and , it can be noticed that the lock plates , in have been bent or flattened when the signal plug is pushed inside the cavity . This is indicated with horizontal arrows and . Similarly to the electric contacts , , , the lock plates , also function as springs. The lock plates , comprise locking portions , , which are configured to be compressed when a conical part of the signal plug presses towards the locking portions , . When the signal plug is removed, the locking portions , move back to their original position due to the spring function of the lock plates , . The lock plates , may function as the “switch” which was explained earlier. The lock plates , may also function as a fourth electric contact at the same time.
FIG. 3C
FIG. 3C
FIG. 3B
FIG. 3B
FIG. 4
FIG. 4
1
7
1
1
12
1
1
24
13
29
7
12
1
1
7
2
6
6
6
12
12
7
6
6
6
7
6
6
6
7
7
7
3
c
c
a
b
c
c
b
b
c
a
a
b
c
a
b
a
b
c
a
b
c
is an example illustration of the apparatus , when a signal plug is connected. The apparatus in is similar to the apparatus in with the exception that only one lock plate ′ is provided. In apparatus the switch function is not enabled and therefore one lock plate may be left out from the structure of the apparatus . As already illustrated in the conical part presses towards a locking portion ′ in the direction of the arrow ′, when the signal plug is connected. When only one lock plate ′ is provided, the switch function may not be needed in the apparatus . is an example illustration of the apparatus with the signal plug inserted and without the housing . clearly illustrates how the electric contacts , , and the lock plates , connect to the signal plug . Each electric contact , , is configured to be in contact with the signal plug , and the electric contacts , , may transmit signals to the signal plug or may receive signals from the signal plug when the signal plug is received into the cavity . The signals may comprise, for example, a mono audio signal or a stereo audio signal and/or a video signal.
7
1
a
14
a
a first contact surface is the “microphone”
14
b
a second contact surface is the “ground”
14
c
a third contact surface is the “right channel”
14
6
14
6
14
6
14
12
12
14
12
12
d
a
a
b
b
c
c
a
b
d
a
b
a fourth contact surface is the “left channel” and the “switch”.
In this example, the first electric contact connects to the first electric contact surface , the second electric contact connects to the second contact surface , the third electric contact connects to the third contact surface , and the lock plates , connect to the fourth contact surface . When the lock plates , also function as a signal transmitter, no separate contact is needed for providing the “switch” function.
In one example, the connections between the signal plug and the apparatus are configured as follows:
FIG. 5
FIG. 4
6
6
8
6
28
8
25
6
14
6
a
a
a
a
a
a
a
a
is an example illustration of an electric contact . The electric contact and an edge of the electric contact may be manufactured by metal stamping. A round surface of the edge may comprise a contact point . The contact point of the electric contact connects to the contact surface illustrated in . All electric contacts in the apparatus may be identical, with the exception that each electric contact has a unique length. The electric contact may be made out of metal.
FIG. 6
12
12
13
12
17
18
17
12
12
a
a
a
a
a
a
is an example illustration of a lock plate . The lock plate may be manufactured by metal stamping. In this example, a locking portion of the lock plate is structured to have a triangular profile . When a tip of the triangular profile is pressed downwards, the lock plate flattens. The lock plate may be made out of metal.
FIG. 7A
1
6
6
6
19
2
31
32
6
6
6
6
6
6
19
21
21
2
2
21
21
6
6
6
a
a
b
c
a
b
c
a
b
c
a
b
c
is an example illustration of an apparatus showing the back side of the apparatus. The electric contacts , , extend through a bottom of the housing . The bottom comprises openings , , through which each electric contact , , is led. In this way, it is possible to transmit the signals from the electric contacts , , further to an electronic device. On the bottom , an insulating gasket can be provided when the housing has to be waterproof. With the insulating gasket and with the closed structure of the housing , it is possible to make the housing insulated and thereby waterproof. The insulating gasket may be manufactured with ultra violet (UV) resin potting. At the same time, the insulating gasket may fix the electric contacts , , firmly in place. Ultraviolet potting materials cure in a tack free manner in seconds upon exposure to UV/visible light. Each potting compound is designed to bond different substrates, offering tenacious adhesion to plastics and metals. UV potting compounds are ideal for shallow component potting and typically used for sealing of connectors, inductors, detectors, capacitors, relay screws, sensors, etc.
FIG. 7B
1
22
22
19
21
22
6
6
6
22
1
22
6
6
6
a
a
b
c
a
a
b
c
is an example illustration of an apparatus having a connecting circuitry . The connecting circuitry may be mounted on the bottom or on top of the insulating gasket . The connecting circuitry may be, for example, a flexible printed circuit board, which is widely used in the electronic devices. Each electric contact , , is in contact with the connecting circuitry for transmitting signals outside the apparatus , for example to an external apparatus which is configured to receive the signals. The connecting circuitry collects the signals from the electric contacts , , and leads them, for example, further to a connecting circuit of an electronic device.
FIG. 8
FIG. 8
1
1
6
6
6
4
4
4
3
22
19
20
20
20
20
6
6
6
19
4
4
4
2
a
a
a
b
c
a
b
c
a
b
c
d
a
b
c
a
b
c
is an explosive view of an example of an apparatus . The explosive view illustrates how the apparatus is assembled. In this example, the apparatus is manufactured by inserting the electric contacts , , into the longitudinal grooves , , via the open end of the cavity . The connecting circuitry is connected to the bottom with shoulders , , , . In another example, the electric contacts , , may be inserted via the bottom (not illustrated in ) into the longitudinal grooves , , . In this solution the housing may be manufactured from two or more pieces.
FIG. 9A
FIG. 9A
FIG. 9A
1
1
2
1
1
1
4
4
4
1
2
3
5
5
5
3
1
6
6
6
5
5
5
6
6
6
5
5
5
1
5
5
5
5
5
5
5
6
6
6
5
5
5
6
6
6
2
6
6
6
2
23
23
23
6
6
6
2
23
23
23
26
26
26
6
6
6
27
27
27
5
5
5
23
23
23
27
27
27
2
2
b
b
b
b
a
b
a
b
c
a
b
b
a
b
c
b
b
a
b
c
a
b
c
a
b
c
a
b
c
b
a
b
c
d
a
b
c
a
b
c
a
b
c
a
b
c
b
a
b
c
b
a
b
c
a
b
c
b
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
b
b
is an example illustration of an apparatus . The apparatus represents a non-waterproof solution. Therefore, the structure of a housing of the apparatus may be more open compared to the structure of the apparatus illustrated in the above examples. The apparatus in does not comprise similar longitudinal grooves , , as was illustrated in the above examples relating to the apparatus . The housing comprises a cavity and at least two corner portions ′, ′, ′ around the cavity . Further, the apparatus comprises an electric contact ′, ′, ′ associated with each corner portion ′, ′, ′. Each electric contact ′, ′, ′ is at least partially contained inside the corner portion ′, ′, ′. In , the apparatus comprises four corner portions ′, ′, ′, ′. Corner portion ′, ′ and ′ comprise corresponding electric contacts ′, ′, ′. In other words, one electric contact is located in each corner portion ′, ′, ′. The electric contacts ′, ′, ′ may be already placed inside the mold when the housing is manufactured, and thereby the electric contacts ′, ′, ′ are partially inside the housing. One suitable manufacturing method for manufacturing the housing is insert molding. Spaces , , may be left between the electric contacts ′, ′, ′ and the housing to leave room for the electronic contacts to bend and move. Each space , , may be located between a side , , of each electric contact ′, ′, ′ and a slot , , in each corner portion ′, ′, ′. The spaces , , and the slots , , may be formed in the housing when the housing is manufactured.
FIG. 9B
1
19
2
1
b
a
b
b.
is a back view illustration of an apparatus . A bottom of the housing may be left open and no insulating gasket is needed for the apparatus
6
6
6
1
1
1
4
4
4
5
5
5
5
2
2
1
1
1
6
6
6
5
5
5
6
6
6
6
6
6
1
1
1
1
1
1
1
1
1
1
1
1
a
b
c
a
b
c
a
b
c
a
b
c
d
b
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
a
b
c
In one or more of the above examples, the electric contacts , , of the apparatus , , are arranged in the longitudinal grooves , , , which are placed in separate corner portions , , , of the housing , . This feature enables a reduction in the width of the apparatus , , . By placing the electric contacts , , in the separate corner portions , , of the housing and by using metal stamping for manufacturing the electric contacts , , , the required space for the electric contacts , , may be minimized and thereby the reduction of the width can be accomplished. The width of the apparatus , , may be for example 3.9 mm. Further, the apparatus , , has a simple and reliable structure. Simple and well known manufacturing methods may be used to manufacture the apparatus , , . Further, the apparatus , , may be manufactured to be waterproof or alternatively non-waterproof, having a more open structure.
6
6
6
a
b
c
Metal stamping can be highly automated, making the manufacturing process well-suited for high-volume, because labor costs drop as the production levels rise. 3D-models of the attendant manufactured part may be easily implemented for manufacturing purposes. Efficient material use is a key advantage when manufacturing very small parts from expensive metals. Stamping is more cost efficient (per piece part) than machining, because stamping generates significantly less scrap than removing material by milling or grinding. By manufacturing the electric contacts , , only with metal stamping, no bending phase is needed in the manufacturing process. This may decrease the manufacturing costs and make the manufacturing process less complicated.
1
1
1
1
1
1
1
1
1
1
2
2
2
2
a
b
c
a
b
c
a
b
a
b
b
b
The apparatus , , disclosed in the examples above is useful in a solution where the apparatus , , is used as an audio/video jack for an electronic communication device, such as a smart phone or a tablet. The apparatus , , is particularly useful when the electronic communication device utilizes the 3.5 mm audio/video plug. One useful location to place the apparatus , is in a corner or a side portion of the electronic communication device. The rounding of the housing , may be designed according to the housing of the electronic communication device in order to accomplish good appearance, or the rounding may be left out from the housing , completely.
FIGS. 1A-9B
1
1
1
1
1
1
a
b
c
a
b
c
Although describe the apparatus , , operating with audio and/or video signals, the apparatus , , may be used also for other types of signals additionally or alternatively.
An embodiment of an apparatus comprises a housing comprising: a circular cavity; and at least two longitudinal grooves placed in separate corner portions of the housing and around the circular cavity; and an electric contact associated with each longitudinal groove of the at least two longitudinal grooves.
In one example, the apparatus comprises a locking mechanism configured to lock a signal plug within the cavity.
In one example, the locking mechanism comprises at least one lock plate in an inner end portion of the cavity.
In one example, the locking mechanism comprises at least two lock plates opposing each other in an inner end portion of the cavity, wherein the at least two lock plates comprise a locking portion configured to be compressed when a conical part of a signal plug is pressed towards the locking portion.
In one example, the at least two longitudinal grooves are structured to open into the circular cavity.
In one example, each longitudinal groove is placed at least partially on the diagonal or in immediate vicinity of the diagonal of the transversal cross-section of the housing.
In one example, each electric contact is individually integrated into its associated longitudinal groove.
In one example, the apparatus is structured to releasably receive a signal plug within the cavity, wherein each electric contact is configured to be in contact with the signal plug when the signal plug is received into the cavity.
In one example, each electric contact is configured to be in contact with a signal plug or an audio/video plug when the signal plug is received into the cavity.
In one example, each electric contact is structured to function as a spring which presses towards a contact surface of the signal plug, when the signal plug is received into the cavity.
In one example, the electric contact comprises an edge for connecting with a signal plug, wherein the electric contact and the edge are manufactured by metal stamping.
In one example, the housing comprises a bottom configured to receive the electric contacts through openings in the bottom, wherein each electric contact is fixed in place with an insulating gasket applied to the bottom and thereby insulating the bottom and the housing.
In one example, the housing comprises a bottom to which the electric contacts are fixed.
In one example, the bottom is insulated with an insulating gasket.
In one example, the bottom is insulated with ultraviolet resin potting.
In one example, the housing is insulated.
In one example, the transversal cross-section of the housing is structured to be substantially rectangular.
In one example, the apparatus comprises a connecting circuitry installed in the bottom of the housing, wherein each electric contact is in contact with the connecting circuitry.
In one example, the apparatus is an audio/video jack.
In one example, the apparatus is an audio/video jack of an electronic communication device.
In one example, an electronic device comprises the apparatus.
In one example, the apparatus further comprises an electronic device, the electronic device comprising the housing and the electric contacts.
A manufacturing method is disclosed for an apparatus comprising a housing comprising a circular cavity having an open end; and at least two longitudinal grooves placed in separate corner portions of the housing and around the circular cavity, and an electric contact associated with each longitudinal groove, wherein the apparatus is manufactured by inserting the electric contacts into the longitudinal grooves via the open end of the cavity.
One example comprises applying an insulating gasket to a bottom of the housing, thereby fixing each electric contact at least partially in place and insulating the housing.
In one example comprises manufacturing the insulating gasket with ultraviolet resin potting.
An embodiment of an apparatus comprises a housing comprising: a cavity; and at least two corner portions of the housing and around the cavity; and an electric contact associated with each corner portion of the at least two corner portions, wherein each electric contact is at least partially inside the corner portion.
In one example, the housing of the apparatus is manufactured with insert molding.
In one example, the housing of the apparatus comprises a rounded corner.
Although the subject matter has been described in language specific to structural features and/or acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as examples of implementing the claims and other equivalent features and acts are intended to be within the scope of the claims.
It will be understood that the benefits and advantages described above may relate to one embodiment or may relate to several embodiments. The embodiments are not limited to those that solve any or all of the stated problems or those that have any or all of the stated benefits and advantages.
Aspects of any of the examples described above may be combined with aspects of any of the other examples described to form further examples without losing the effect sought.
The term ‘comprising’ is used herein to mean including the method blocks or elements identified, but that such blocks or elements do not comprise an exclusive list and a method or apparatus may contain additional blocks or elements.
It will be understood that the above description is given by way of example only and that various modifications may be made by those skilled in the art. The above specification, examples and data provide a complete description of the structure and use of exemplary embodiments. Although various embodiments have been described above with a certain degree of particularity, or with reference to one or more individual embodiments, those skilled in the art could make numerous alterations to the disclosed embodiments without departing from the spirit or scope of this specification. In particular, the individual features, elements, or parts described in the context of one example may also be connected in any combination to any other example.
DESCRIPTION OF THE DRAWINGS
The present description will be better understood from the following detailed description read in light of the accompanying drawings, wherein:
FIG. 1A
is an example illustration of an apparatus, where a housing of the apparatus has a partial cut-out.
FIG. 1B
is an example illustration of an apparatus, where a signal plug is inserted.
FIG. 1C
is a partial enlargement illustration of an electric contact in a longitudinal groove of an apparatus.
FIG. 2A
is an example illustration of an apparatus from the open end direction of a cavity of the apparatus.
FIG. 2B
is an example illustration of a locking mechanism inside an apparatus.
FIG. 3A
is an example illustration of an apparatus, where a signal plug is connected.
FIG. 3B
is an example illustration of an apparatus, where a signal plug is connected.
FIG. 3C
is an example illustration of an apparatus, when a signal plug is connected.
FIG. 4
is an example illustration of an apparatus without a housing with a signal plug inserted.
FIG. 5
is an example illustration of an electric contact.
FIG. 6
is an example illustration of a lock plate.
FIG. 7A
is an example illustration of an apparatus from the back side of the apparatus.
FIG. 7B
is an example illustration of an apparatus, where a connecting circuitry is connected.
FIG. 8
is an explosive view of an example of an apparatus.
FIG. 9A
is an example illustration of an apparatus.
FIG. 9B
is a back view illustration of an apparatus. | |
Chapter 8 What are the effects of dietary restriction?
8.1 About this Workflow Demonstration
This Workflow Demonstation (WD) is primarily a supplement to the material in the book Insights from Data with R by Petchey, Beckerman, Cooper, and Childs. If you don’t understand something here, have a look at that book (perhaps again), or search for help, or get in touch with us.
At the time of publication (early 2021) there are likely some improvements that could be made to this demonstration, in terms of the description of what we do in it, why we do it, and how we do it. If anything seems odd, unclear, or sub-optimal, please don’t hesitate to get in touch, and we will quickly make improvements.
8.2 Introduction
In this final Workflow Demonstration we, your instructors take a step back, and invite you to be more independent. In fact, we ask you, perhaps even demand more independence. In a sense then, this is less of a Workflow Demonstration, and more of a Workflow Challenge. We will outline the overall task, and then give a list of things for you to do, with some hints. (And we give the solutions, though in concise fashion.)
8.3 The question
For this Workflow Challenge we turn to published data from a study of the effects of dietary restriction (DR). For some general background on dietary restriction, please look here https://www.nia.nih.gov/health/calorie-restriction-and-fasting-diets-what-do-we-know
The particular study we work with is described in the article Reconciling nutritional geometry with classical dietary restriction: effects of nutrient intake, not calories, on survival and reproduction. Moatt JP, Fyfe MA, Heap E, Mitchell LJM, Moon F, Walling CA (2018) Aging Cell, Volume 18, e12868. The article is here https://doi.org/10.1111/acel.12868. And the data is here: https://doi.org/10.5061/dryad.g12p0j2
The Abstract of the article reads: “Here, using a novel nonmodel vertebrate system (the stickleback fish, Gasterosteus aculeatus), we test the effect of macronutrient versus calorie intake on key fitness‐related traits, both using the GF and avoiding dietary dilution. We find that the intake of macronutrients rather than calories determines both mortality risk and reproduction. Male mortality risk was lowest on intermediate lipid intakes, and female risk was generally reduced by low protein intakes. The effect of macronutrient intake on reproduction was similar between the sexes, with high protein intakes maximizing reproduction.”
Important: There are two available versions of some of the datasets for this study. Some of the original (non-updated) versions contained some very minor errors that the researchers then corrected. In this Workflow Challenge we first ask you to find the errors in the original datasets, and then to check the updated datasets do not contain them errors, and to then continue with those updated datasets.
Important: The findings presented in the original paper are robust to the small differences between original and updated versions of the datasets.
8.4 Before working in R
Be clear about the general question: How does diet composition and amount of food individually and in combination affect individual characteristics related to health and fitness?
There is an awful lot we could look at in this study, so lets narrow down a bit further by telling you to focus on the following response variables individual characteristics:
- Fitness: “mortality”
- Fitness: “reproductive behaviour (time spent courting)”
- Fitness: “Female reproduction (total egg production)”
- Health: “We use change in fish length as our measure of growth.”
- Health: “As a proxy for overall health, we use body condition index, which is a measure of the weight of an individual relative to its length”
Q1. What type of variables (e.g. binary, discrete, numeric, continuous) would you expect these to be?
8.5 What was the experimental design?
Read the paper and answer the following questions:
Q2. How many fish were experimented on, and how many of each sex? Q3. What exactly was manipulated? I.e. how many treatments were there, and how many treatment combinations.
8.6 What are the features of the data?
Write something about each of the important features of a dataset (i.e. number of variabels, number of observations, variables describing manipulations, correlations among variables, independence of observations). You may wish to come back to this question after having a look at the data, but you already know a fair amount about them.
8.7 Acquire and import the necessary datafiles.
Important: do not use the versions of the datafiles that have the word “udpated” in their name. We will look at those later.
Q5. Have a look at the data files on the dryad repository. Which data files are required for which response variables you are focusing on?
8.8 Explore and understand the datafiles
Q6. Look at the
data file key word document in the dryad repository. Which variables tell us about the experimental design (including the explantory variables) and when observations were made?
Q7. Which variables in which dataset can be used to calculate each of the five response variables?
- Mortality:
status, 0 = alive, 1 = Dead, in
Moatt_et_al_Data_S1.csv
- Time spent courting:
Total_court– Total time courting across all trials, in
Moatt_et_al_Data_S5.csv.
- Female reproduction egg production:
Total_egg– Total number of eggs produced, in
Moatt_et_al_Data_S6.csv.
- Change in fish length: Ln – Length of individual in mm, in
Moatt_et_al_Data_S15.csv.
- Body condition index: CI – Condition Index for each individual,
Moatt_et_al_Data_S15.csv.
Q8. How many rows are in each dataset?
Moatt_et_al_Data_S1.csv: 33’049 rows, 24 variables
Moatt_et_al_Data_S5.csv: 228, 16
Moatt_et_al_Data_S6.csv: 269, 14
Moatt_et_al_Data_S15.csv:6000, 18
8.9 Check the data import
Check that the number of rows and columns are as expected. Check variable types are as expected. Check for dates and fix as appropriate.
Q9. Which of the datasets are tidy and which are not?
8.10 Make more informative variable names (and discard variables not obviously of use):
Q10. Rename the following variables to be more intepretable:
- FID
- Diet
- Level
- Size
- Ln
- Wt
- CI
- Week_F
(Make sure you use consistent naming across the four datasets.)
8.11 Replace codes with informative words
Q11. Replace codes with informative words, for at least the
Diet variable (or what you renamed it to), the
Fish_size variable, the
Sex variable, and the
Status variable. Do this identically across all the datasets.
8.12 Checking for duplicates
Q12. which of the four datasets contains an odd duplicate entry? And which fish is involved? What should we do next?
8.13 NAs, variable entries, e.g. levels of characters, ranges of numerics, numbers of “things”
Q13. How many missing values in the courtship dataset (remember to reduce the variables to those mentioned above)?
Q14. Which variable(s) contain missing values in the courtship dataset?
Q15. Which fish have missing values in the courtship dataset?
Q16. How many different entries are there in the
Shelf_stack variable in the courtship dataset?
Q17. What are the mean and median of the
Total_court variable?
Q18. What are the units of the
Total_court variable? (This is a trick/sneaky question.)
Q19. How many fish are in each of the datasets?
8.14 Independence
Q20. Which of the datasets contains only one observation per fish, and which contain repeated (i.e. multiple) observations of each fish?
8.15 Balance in experimental design
Q21: From the description of the experiment in the paper, how many fish are there per treatment combination?
8.16 Calculate response variable(s) (if required)
The courtship and eggs datasets already contain the response variable.
Q22. Calculate the response variable for the change in fish length and change in body condition from the
length_weight_condition dataset, and the time of death (or no death [censored]) from the
mortality dataset.
8.17 Merge all datasets together and check for correct number of rows
Q23. Merge all the datasets.
Q24. Bring in and merge the diet composition dataset (
diet_comp_treatments.csv).
Q25. Reorder the
Diet_comp variable, and make the
Prov_level a factor with appropriate order.
8.18 Something a bit weird…
Q26. There are some irregularities in this merged dataset. Can you spot them? (A hint is immediately below.)
Hint: What would we expect males to not be doing, and females to not be doing?
8.19 Import the updated versions of the datasets.
Q27. Now use the versions of the datafiles that have the word “udpated” in their name. And repeat below that code the necessary steps that you already performed on the non-updated data. And check there are no fish doing what they shouldn’t be!
8.20 Inspect shapes (distributions)
Q28. Write a few sentences about the distribution of each of the five response variables. | https://insightsfromdata.io/WFD-diet-restrict.html |
TECHNICAL FIELD
Embodiments of the present disclosure relate to the communications field, and more particularly, to an information acquisition method and apparatus, an electronic device, a terminal device, and a computer-readable storage medium.
BACKGROUND
Fig. 1
With vigorous development of the 5th Generation (5G) mobile communications technology, new trends of network construction are emerging and thriving, a significant one of which is network co-construction for win-win cooperation. Since China Unicom and China Telecom have announced their 5G co-construction initiative, it is expected that more operators in the world will team up to jointly build 5G networks. As a network architecture strongly advocated by the 3rd generation partnership project (3GPP), 5G network co-construction is likely to be a major trend in the future from the perspective of costs and revenue of operators. An infrastructure of 5G Multi-Operator Core Network (5G MOCN) provided by 3GPP, as shown in , is exactly a use case where one radio base station can be shared by multiple operators. The operators can negotiate specific agreements on how to share resources of the base station. In this way, the operators' costs in construction of radio base stations are greatly reduced, and the 5G MOCN architecture proves to be a good model of an architecture for 5G win-win cooperation.
SUMMARY
An embodiment of the present disclosure provides an information acquisition method and apparatus, an electronic device, a terminal device, and a computer-readable storage medium.
In accordance with an aspect, an embodiment of the present disclosure provides an information acquisition method, which includes: acquiring paging identifiers corresponding to M cards respectively from global unique temporary user equipment identities (GUTIs) allocated by networks corresponding to the M cards; where M is an integer greater than or equal to 2; and in response to determining that paging identifiers corresponding to N cards among the paging identifiers corresponding to the M cards are the same, selecting (N-1) cards from the N cards and triggering networks corresponding to the selected (N-1) cards to re-allocate GUTIs; where N is an integer greater than or equal to 2 and less than or equal to M.
In accordance with an aspect, an embodiment of the present disclosure provides an electronic device, which includes: at least one processor; and a memory storing at least one program which, when executed by the at least one processor, causes the at least one processor to carry out any information acquisition method described above.
In accordance with an aspect, an embodiment of the present disclosure provides a terminal device, which includes: at least two card slots for accommodating cards; at least one processor; and a storage device storing at least one program which, when executed by the at least one processor, causes the at least one processor to carry out any information acquisition method described above.
In accordance with an aspect, an embodiment of the present disclosure provides a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to carry out any information acquisition method described above.
BRIEF DESCRIPTION OF DRAWINGS
Fig. 1
is a schematic diagram of a 5G network sharing architecture provided by an existing technology;
Fig. 2
is a schematic diagram of structures of a 5G S-Temporary Mobile Subscriber Identity (5G-S-TMSI) and a 5G Global Unique Temporary UE Identity (5G-GUTI) provided by an existing technology;
Fig. 3
is a flowchart of an information acquisition method provided by an embodiment of the present disclosure;
Fig. 4
is a flowchart of an information acquisition method provided by an example of an embodiment of the present disclosure;
Fig. 5(a)
is a schematic diagram of a GUTI allocated by a core network of China Unicom for card 1 according to an example of an embodiment of the present disclosure;
Fig. 5(b)
is a first schematic diagram of a GUTI allocated by a core network of China Telecom for card 2 according to an example of an embodiment of the present disclosure;
Fig. 5(c)
Fig. 5(a)
is a schematic diagram of a 5G-S-TMSI of card 1 acquired from the GUTI of according to an example of an embodiment of the present disclosure;
Fig. 5(d)
Fig. 5(b)
is a first schematic diagram of a 5G-S-TMSI of card 2 acquired from the GUTI of according to an example of an embodiment of the present disclosure;
Fig. 5(e)
is a second schematic diagram of a GUTI allocated by a core network of China Telecom for card 2 according to an example of an embodiment of the present disclosure;
Fig. 5(f)
Fig. 5(e)
is a second schematic diagram of a 5G-S-TMSI of card 2 acquired from the GUTI of according to an example of an embodiment of the present disclosure;
Fig. 5(g)
is a schematic diagram of a GUTI re-allocated by a core network of China Unicom for card 1 according to an example of an embodiment of the present disclosure;
Fig. 5(h)
Fig. 5(g)
is a schematic diagram of a 5G-S-TMSI of card 1 acquired from the GUTI of according to an example of an embodiment of the present disclosure; and
Fig. 6
is a block diagram of an information acquisition apparatus provided by an embodiment of the present disclosure.
The accompanying drawings are used to facilitate further understanding of the embodiments of the present disclosure and constitute a part of the description. The accompanying drawings are intended to explain the present disclosure together with the embodiments of the present disclosure, and do not constitute a restriction on the present disclosure. The above and other features and advantages will become more apparent to those having ordinary skill in the art from description of detailed and illustrative embodiments with reference to the accompanying drawings.
DETAILED DESCRIPTION
Example:
In order to make those having ordinary skill in the art better understand the technical scheme of the present disclosure, an information acquisition method and apparatus, an electronic device, a terminal device, and a computer-readable storage medium provided by the present disclosure are described in detail below with reference to the accompanying drawings.
Embodiments will be described in detail below with reference to the accompanying drawings but the example embodiments may be embodied in different forms and should not be interpreted as being limited to the embodiments set forth in this specification. These embodiments are provided to make the present disclosure thorough and complete and therefore make those having ordinary skill in the art fully understand the scope of the present disclosure.
Embodiments of the present disclosure and features in the embodiments may be combined with each other in a non-conflicting manner.
As used in this specification, the term "and/or" includes any and all combinations of at least one related items listed.
Terms used in this specification are used only to describe embodiments and are not intended to limit the present disclosure. As used in this specification, singular forms "a/an" and "the" are also intended to include plural forms, unless clearly indicated otherwise. It should be further understood that the terms "comprise" and/or "include", when used in this specification, indicate presence of features, entities, steps, operations, elements and/or components, but do not exclude presence or addition of at least one further feature, entity, step, operation, element, component and/or group.
Unless otherwise limited, all terms used in this specification (including technical and scientific terms) have the same meaning as would generally be understood by those of ordinary skill in the art. It should be further understood that terms defined in common dictionaries should be construed as having meanings consistent with their meanings in the context of the existing technology and the present disclosure, and will not be construed as having idealized or over-formal meanings unless expressly so defined in this specification.
Fig. 1
For a 5G network sharing architecture shown in , a potential risk warning is given in 3GPP TS 38.501, that is, once a radio base station is shared by core networks of a plurality of operators, there is a possibility that the same 5G-S-TMSI will be used by different operators at the same time. Although the 3GPP considers that the probability is quite low, the risk does exist.
The causes and consequences of a collision between different operators caused by the 5G-S-TMSI are described below.
Firstly, the causes of the collision between different operators caused by the 5G-S-TMSI are analyzed here. A network element with the strongest correlation with a terminal device in the 5G core network is an Access and Mobility Management Function (AMF) network element, which is responsible for allocating 5G-GUTIs to terminal devices. A 5G-GUTI is globally unique without duplication because the 5G-GUTI includes Public Land Mobile Network (PLMN) information of an operator, which includes a Mobile Country Code (MCC) and a Mobile Network Code (MNC). However, the 5G-GUTI is used in a Non-Access Stratum (NAS) message for interaction between the terminal devices and the core network. Once a NAS signaling connection and a Radio Resource Control (RRC) connection are released, the network can no longer use the 5G-GUTI to identify a terminal device, but may use a 5G-S-TMSI to identify the terminal device. A main idea of this design is that 5G-S-TMSI, as a subset of 5G-GUTI, is shorter in length and can therefore reduce an overhead of signaling bytes. Further, as the main idea of 5G-GUTI comes from GUTI in the 4th generation (4G), 5G encounters the problem brought by network sharing which is not considered in the 4G era.
Fig. 2
As shown in , a 5G-GUTI includes a Globally Unique AMF ID (GUAMI) and a 5G-TMSI, where the GUAMI includes an MCC, an MNC, an AMF Region Identifier (AMF Region ID), an AMF Set Identifier (AMF Set ID), and an AMF Pointer.
With an MCC, an MNC, and an AMF Region ID of 5G-GUTI excluded, the 5G-S-TMSI lacks information such as a geographical location of a core network of an operator and attribution to the operator. Therefore, it is possible that a 5G-S-TMSI is assigned to the same value by different operators.
Scenario 1: The user X and the user Y are users of two different mobile phones. Assuming the user Z calls the user X from another place at this time, both the mobile phones of the user X and the user Y would ring, as both of the phones deem that the paging is directed to themselves. As a result, the user Y would receive a phone call that should not be received.
Scenario 2: The user X and the user Y are users of a dual-card mobile phone (with both a card of China Unicom and a card of China Telecom inserted). It is possible that these two cards are allocated the same 5G-S-TMSI when registering with base station A. In this case, if the user Z calls the user X, the user Y of the dual-card mobile phone shared with the user X is also called at the same time, and it is possible that the phone line is busy or the two cards receive a call from the same user at the same time.
Secondly, the consequences of the collision between different operators caused by 5G-S-TMSI are analyzed. It is assumed that a base station A is shared by core networks of China Telecom and China Unicom, but for some reason, there is a deviation in network design, which leads to a same 5G-S-TMSI being allocated to mobile phones of users X and Y. In other words, mobile phone numbers of the user X and the user Y are mapped to the same 5G-S-TMSI. Then, when the user X is called by a user Z, there are the following two scenarios:
Such situations would not arise in the 4G mobile communication technology, because one base station corresponds to one operator in the 4G era, avoiding any confusion. However, such situations may occur in the 5G era, causing a severe result, although with a low probability.
A suggestion given by the 3GPP is that operators should avoid such collision during core network planning and deployment, and further seek solutions from other aspects to resolve the 5G-S-TMSI collision during core network deployment by the operators.
Scenario 1 is more dependent on a network side to resolve the problem, and details will not be described herein. Scenario 2 can be avoided from the perspective of the terminal device. The embodiments of the present disclosure will resolve the problem in Scenario 2 from the perspective of a dual-card terminal device or a multi-card terminal device.
Although the embodiments of the present disclosure are proposed based on problems existing in 5G, the embodiments of the present disclosure are also applicable to other communication systems with base station sharing, such as 4G, or a future mobile communications system, for example, 6G, 7G, etc.
In addition, in order to adapt to future mobile communications technologies, for example, development of 6G and 7G, in the embodiments of the present disclosure, 5G-GUTI in 5G and corresponding identifiers in other communication systems are collectively referred to as GUTI, and 5G-S-TMSI in 5G and corresponding identities in other communication systems are collectively referred to as a paging identifier. In other words, a paging identifier refers to an identifier that can be used to identify a terminal device when the terminal device is called (that is, being paged) after entering an idle state. After the network uses a paging identifier to page the terminal device, the terminal device determines, by verifying the paging identifier delivered by the network, whether the network is paging the terminal device.
Fig. 3
is a flowchart of an information acquisition method provided by an embodiment of the present disclosure.
Fig. 3
In accordance with an aspect, referring to , an embodiment of the present disclosure provides an information acquisition method, including the following steps.
At step 300, paging identifiers corresponding to M cards are acquired respectively from GUTIs allocated by networks corresponding to the M cards, where M is an integer greater than or equal to 2.
In some illustrative embodiments, acquiring paging identifiers corresponding to M cards respectively from GUTIs allocated by networks corresponding to the M cards means that: for each card, a paging identifier corresponding to the card is acquired from a GUTI allocated by the network corresponding to the card. In other words, the GUTI allocated by the network corresponding to the card with an MCC, an MNC, an MNC, and an AMF Region ID removed is the paging identifier corresponding to the card.
In some illustrative embodiments, a network corresponding to the card refers to a network registered by the card.
At step 301, in response to determining that paging identifiers corresponding to N cards among the paging identifiers corresponding to the M cards are the same, (N-1) cards are selected from the N cards and networks corresponding to the selected (N-1) cards are triggered to re-allocate GUTIs; where N is an integer greater than or equal to 2 and less than or equal to M.
In some illustrative embodiments, re-allocation of GUTI may be triggered in a manner of initiating a re-registration process, initiating a handover process, or initiating signaling related to mobility management to trigger the network to update the GUTI, or in other triggering manners. A triggering manner is not intended to limit the protection scope of the embodiment of the present disclosure, and details will not be repeated herein.
In some other illustrative embodiments, in response to determining paging identifiers corresponding to any two cards among the paging identifiers corresponding to the M cards are different from each other, the process ends.
According to the information acquisition method provided by the embodiment of the present disclosure, in response to determining that paging identifiers corresponding to N cards among the paging identifiers corresponding to the M cards are the same, (N-1) cards are selected from the N cards and networks corresponding to the selected (N-1) cards are triggered to re-allocate GUTIs. Since re-allocated GUTIs are very likely to differ from the previously allocated GUTIs, re-acquired paging identifiers are also very likely to differ from the previously acquired paging identifiers. This can reduce a possibility of a collision between paging identifiers corresponding to any two cards in the paging identifiers corresponding to M cards.
In some illustrative embodiments, after the network corresponding to the (N-1) cards is triggered to re-allocate GUTIs, the method further includes:
continuing the step of acquiring paging identifiers corresponding to M cards respectively from GUTIs allocated by networks corresponding to the M cards, until paging identifiers corresponding to any two cards among the paging identifiers corresponding to the M cards are different from each other.
The embodiment of the present disclosure continuously triggers the re-allocation of GUTIs, until paging identifiers corresponding to any two cards among the paging identifiers corresponding to the M cards are different from each other, thereby avoiding a collision between the paging identifiers.
In some illustrative embodiments, it is first determined whether the M cards are camped on one and the same cell and whether the cell is shared by operators corresponding to the M cards. In response to determining that the M cards are camped on one and the same cell, which is shared by the operators corresponding to the M cards, paging identifiers corresponding to M cards are respectively acquired from GUTIs allocated by networks corresponding to the M cards.
In response to determining that the M cards are not camped on one and the same cell or the cell is not shared by the operators corresponding to the M cards, the process ends.
In some other illustrative embodiments, there may be no need to determine whether the M cards are camped on one and the same cell and whether the cell is shared by operators corresponding to the M cards, and paging identifiers corresponding to M cards are respectively acquired from GUTIs allocated by networks corresponding to the M cards directly.
In some illustrative embodiments, it may be determined, according to a network broadcast message of the base station, whether the M cards are camped on one and the same cell and whether the cell is shared by the operators corresponding to the M cards. For example, when the network broadcast message includes a Cell Identifier (CI), if a specific card camps on the cell, the card will receive the CI. Then, it can be determined, according to CIs of the M cards, whether the M cards are camped on one and the same cell. In some embodiments, the same CGI of the M cards indicates that the M cards are camped on one and the same cell. When the network broadcast message includes a PLMN list including PLMNs (the PLMN includes an MCC and an MNC) of all operators sharing the base station, it may be determined, according to MNCs in the PLMN list, whether a cell is shared by the operators corresponding to the M cards. In some embodiments, when the MNCs in the PLMN list indicate the operators corresponding to the M cards, it is indicated that the cell is shared by the operators corresponding to the M cards.
According to the embodiment of the present disclosure, by first determining whether the M cards are camped on one and the same cell and whether the cell is shared by the operators corresponding to the M cards, unnecessary operation procedures can be reduced.
In some illustrative embodiments, selecting (N-1) cards from the N cards includes:
selecting (N-1) cards from the N cards according to service statuses of the N cards.
In some illustrative embodiments, selecting (N-1) cards from the N cards according to service statuses of the N cards includes:
in response to determining that all the N cards are in a service idle state or all the N cards are processing a non-real-time service, randomly selecting (N-1) cards from the N cards.
In some other illustrative embodiments, selecting (N-1) cards from the N cards according to service statuses of the N cards includes:
in response to determining that one of the N cards is performing a real-time service, selecting, from the N cards, (N-1) cards except the card which is performing the real-time service.
In some other illustrative embodiments, selecting (N-1) cards from the N cards according to service statuses of the N cards includes:
in response to determining that one of the N cards is in a non-service idle state and the remaining (N-1) cards are in a service idle state, selecting the (N-1) cards in the service idle state from the N cards.
In some illustrative embodiments, a non-real-time service may refer to an Internet service.
In some illustrative embodiments, a real-time service may refer to a phone call service, a real-time video communication service, or a real-time audio communication service.
Certainly, there may be other selection strategies, such as randomly selecting (N-1) cards without making any judgment. A specific selection strategy is not used to limit the protection scope of the embodiment of the present disclosure and will not be described herein.
In the embodiment of the present disclosure, re-allocation of GUTI is triggered while interruption to critical services (such as telephone service) of a user is avoided as far as possible, so that the problem of a collision between paging identifiers can be solved for the user in a perception-free way, improving user experience.
An implementation process of a method for acquiring a paging identifier of the embodiment of the present disclosure will be described in detail below by an example, which is only for illustrative convenience and cannot be used to limit the protection scope of the embodiment of the present disclosure.
It is assumed that a user has a 5G dual-card mobile phone, with a Universal Subscriber Identity Module (USIM) card of China Unicom (referred to as card 1 below) and a USIM card of China Telecom (referred to as card 2 below) inserted therein, and the terminal device at this time is handed over to a shared 5G base station A in a mobile process. It is assumed that the shared 5G base station A is jointly built and shared by China Unicom and China Telecom. At this time, the shared 5G base station A informs the terminal device through a network broadcast message that the base station is currently shared by two operators, China Unicom and China Telecom, and broadcasts a PLMN list, which contains a PLMN of China Unicom: 46001 (MCC is 460, and MNC is 01), and a PLMN of China Telecom: 46011 (MCC is 460, and MNC is 11).
Fig. 4
FIG. 4
is a flowchart of an information acquisition method according to the example. Referring to , the method includes the following steps.
Fig. 5(a)
At step 400, a card 1 of a terminal device initiates a registration process or a handover process with a core network of China Unicom through the base station A, and upon completion of the registration or handover process, the core network of China Unicom allocates a GUTI to the card 1, as shown in .
Figs. 5(b) and 5(e)
At step 401, a card 2 of the terminal device initiates a registration process or a handover process with a core network of China Telecom through the base station A, and upon completion of the registration or handover process, the core network of China Telecom allocates a GUTI to the card 2, as shown in .
Fig. 5(c)
Fig. 5(b)
Fig. 5(d)
Fig. 5(e)
Fig. 5(f)
At step 402, a 5G-S-TMSI of the card 1 is acquired from the GUTI of the card 1, as shown in ; and a 5G-S-TMSI of the card 2 is acquired from the GUTI of the card 2, to be specific, a 5G-S-TMSI acquired from the GUTI shown in is shown in , and a 5G-S-TMSI acquired from the GUTI shown in is shown in .
At step 403, it is determined whether the 5G-S-TMSI of the card 1 is the same as the 5G-S-TMSI of the card 2, and the process is ended in response to determining that the 5G-S-TMSI of the card 1 is different from the 5G-S-TMSI of the card 2. In response to determining that the 5G-S-TMSI of the card 1 is the same as the 5G-S-TMSI of the card 2, the process proceeds to step 404.
Figs. 5 (c) and 5 (d)
Figs. 5 (c) and 5 (f)
For example, it can be seen from that the 5G-S-TMSI of the card 1 is different from the 5G-S-TMSI of the card 2, while it can be seen from that the 5G-S-TMSI of the card 1 is the same as the 5G-S-TMSI of the card 2.
At step 404, the terminal device checks service statuses of the two cards, and continues to execute step 405 in response to determining that the two cards have not carried out any phone call service or Internet service, that is, both cards are in a service idle state. In response to determining that the card 1 is carrying out a phone call service and the card 2 is in a service idle state, the terminal device proceeds to execute step 406. In response to determining that the card 1 is carrying out a phone call service and the card 2 is downloading a movie, the terminal device proceeds to execute step 407. In response to determining that the card 1 is downloading a movie and the card 2 is in a service idle state, the terminal device proceeds to execute step 406.
At step 405, the terminal device randomly selects one of the cards to initiate a process, specified in the 3GPP, which can trigger 5G-GUTI re-allocation (for example, to initiate a re-registration process, or initiate signaling related to mobility management to trigger the network to update the 5G-GUTI).
Fig. 5(g)
For example, the card 1 initiates a re-registration process with the core network of China Unicom, and a re-allocated 5G-GUTI is shown in (since a network architecture has not changed, only the part of randomly allocated 5G-TMSI part has changed).
Fig. 5(g)
Fig. 5(h)
Fig. 5(f)
Fig. 5(h)
A 5G-S-TMSI acquired from the GUTI of the card 1 in is shown in . It can be seen from and that the 5G-S-TMSI of card 1 at this time is different from the 5G-S-TMSI of the card 2.
At step 406, the terminal device selects the card 2 to trigger the network to re-allocate a 5G-GUTI.
At step 407, the terminal device selects the card 2 to trigger the network to re-allocate a 5G-GUTI. After the card 2 re-acquires a 5G-GUTI, a movie downloading process is resumed without affecting a real-time phone call service of the user.
at least one processor; and
a storage device storing at least one program which, when executed by the at least one processor, causes the at least one processor to carry out any information acquisition method described above.
In accordance with an aspect, an embodiment of the present disclosure provides an electronic device, including:
Here, the processor is a device having a data processing capability, which includes but is not limited to a central processing unit (CPU), or the like. The storage device is a device having a data storage capability, which includes but is not limited to random access memory (RAM, more specifically an SDRAM, a DDR, etc.), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a flash memory (FLASH).
In some embodiments, the processor and the storage device are connected to each other through a bus, and are further connected to other components of a computing device.
In accordance with an aspect, an embodiment of the present disclosure provides a terminal, including: at least two card slots for accommodating cards; at least one processor; and a storage device storing at least one program which, when executed by the at least one processor, causes the at least one processor to carry out any information acquisition method described above.
In accordance with an aspect, an embodiment of the present disclosure provides a computer-readable storage medium storing a computer program which, when executed by a processor, causes the processor to carry out any information acquisition method described above.
Fig. 6
is a block diagram of an information acquisition apparatus according to an embodiment of the present disclosure.
Fig. 6
a paging identifier acquisition module 601 configured to respectively acquire paging identifiers corresponding to M cards respectively from GUTIs allocated by networks corresponding to the M cards, where M is an integer greater than or equal to 2; and
a GUTI re-allocation module 602 configured to: in response to determining that paging identifiers corresponding to N cards among the paging identifiers corresponding to the M cards are the same, select (N-1) cards from the N cards and trigger networks corresponding to the selected (N-1) cards to re-allocate GUTIs, where N is an integer greater than or equal to 2 and less than or equal to M.
In accordance with an aspect, referring to , an embodiment of the present disclosure provides an information acquisition apparatus including:
In some illustrative embodiments, after the GUTI re-allocation module 602 executes the step of triggering networks corresponding to the selected (N-1) cards to re-allocate GUTIs, the paging identifier acquisition module 601 is further configured to:
continuing the step of acquiring paging identifiers corresponding to M cards respectively from GUTIs allocated by networks corresponding to the M cards, until paging identifiers corresponding to any two cards among the paging identifiers corresponding to the M cards are different from each other.
In some illustrative embodiments, the paging identifier acquisition module 601 is further configured to:
in response to determining that the M cards are camped on one and the same cell, which is shared by operators corresponding to the M cards, continue the step of acquiring paging identifiers corresponding to M cards respectively from GUTIs allocated by networks corresponding to the M cards.
In some illustrative embodiments, the GUTI re-allocation module 602 is configured to carry out the selection of (N-1) cards from the N cards in the following manner:
selecting (N-1) cards from the N cards according to service statuses of the N cards.
In some illustrative embodiments, the GUTI re-allocation module 602 is configured to carry out the selection of (N-1) cards from the N cards according to service statuses of the N cards in the following manner:
in response to determining that all the N cards are in a service idle state or all the N cards are processing a non-real-time service, randomly selecting (N-1) cards from the N cards.
In some illustrative embodiments, the GUTI re-allocation module 602 is specifically configured to carry out the selection of (N-1) cards from the N cards according to service statuses of the N cards in the following manner:
in response to determining that one of the N cards is performing a real-time service, selecting, from the N cards, (N-1) cards except the card which is performing the real-time service.
In some illustrative embodiments, the GUTI re-allocation module 602 is configured to carry out the selection of (N-1) cards from the N cards according to service statuses of the N cards in the following manner:
in response to determining that one of the N cards is in a non-service idle state and the remaining (N-1) cards are in a service idle state, selecting the (N-1) cards in the service idle state from the N cards.
An implementation process of the information acquisition apparatus is the same as that of the information acquisition method of the above embodiment, and details will not be repeated herein.
It can be understood by those having ordinary skill in the art that all or some of the steps of the methods, systems and functional modules/units in the devices disclosed above can be implemented as software, firmware, hardware and appropriate combinations thereof. In a hardware embodiment, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, a physical component may have multiple functions, or a function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, a digital signal processor or a microprocessor, or as hardware, or as an integrated circuit, such as an application-specific integrated circuit. Such software can be distributed on computer-readable media, which can include computer-readable storage media (or non-transitory media) and communication media (or transitory media). As well known to those of ordinary skill in the art, the term computer-readable storage medium includes volatile and nonvolatile, removable and non-removable media implemented in any method or technique for storing information, such as computer-readable instructions, data structures, program modules or other data. A computer-readable storage medium includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technologies, CD-ROM, digital versatile disk (DVD) or other optical disk storage, cassettes, magnetic tapes, magnetic disk storage or other magnetic storage devices, or any other medium that can be configured to store desired information and can be accessed by a computer. Furthermore, it is well known to those of ordinary skill in the art that communication media typically contain computer-readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transmission mechanism, and can include any information transmission media.
Illustrative embodiments have been disclosed in this specification in which specific terms are used, but they are only used and should only be interpreted in a general illustrative sense and are not intended to impose limitation. In some examples, it is apparent to those having ordinary skill in the art that, unless otherwise expressly specified, characteristics, features and/or elements described in particular embodiments may be used alone or used in combination with characteristics, features and/or elements described in other embodiments. Therefore, those having ordinary skill in the art should understand that various changes in forms and details may be made without departing from the scope of the present disclosure as set forth by the appended claims. | |
Firstly, since your series is consists of visits in the form of 1 5 30, therefore applying time-series modeling techniques such as ARIMA, ETS, etc won't be of much use as these require a continuous series to be inputted and their output is a forecast for the very first day of 144th week which is useless in this situation.
Secondly, The following are a couple of my suggestions:
- Generate new features from the data for the number of visits, visits on various days of the week, longest break between two visits, average number of visits per week and much more. Think about the features that may be useful for a human forecaster to make this sort of a prediction!
- For this kind of a data, It will be better to employ Multinomial Logistic Regression or Neural Network models where the input layer will consist of all the generated attributes and the output layer will be a set of probabilities for the 7 days of the 144th week.
The day with the highest probability for each visitor_id will the likeliest day for a future visit in the 144th week. | https://stats.stackexchange.com/questions/309189/use-machine-learning-to-predict-a-next-day-of-visit-for-customer |
What does eigenvalue Decomposition do?
Decomposing a matrix in terms of its eigenvalues and its eigenvectors gives valuable insights into the properties of the matrix. Certain matrix calculations, like computing the power of the matrix, become much easier when we use the eigendecomposition of the matrix.
How is Eigen decomposition involved in PCA?
Eigenvalues are coefficients applied to eigenvectors that give the vectors their length or magnitude. So, PCA is a method that: Measures how each variable is associated with one another using a Covariance matrix. Understands the directions of the spread of our data using Eigenvectors.
Does every matrix have eigenvalue Decomposition?
For instance, every complex matrix has an eigenvalue. Every real matrix has an eigenvalue, but it may be complex. In fact, a field K is algebraically closed iff every matrix with entries in K has an eigenvalue. You can use the companion matrix to prove one direction.
What are eigenvalues used for?
Originally used to study principal axes of the rotational motion of rigid bodies, eigenvalues and eigenvectors have a wide range of applications, for example in stability analysis, vibration analysis, atomic orbitals, facial recognition, and matrix diagonalization.
Is Eigen decomposition unique?
◮ Decomposition is not unique when two eigenvalues are the same. ◮ By convention, order entries of Λ in descending order. Then, eigendecomposition is unique if all eigenvalues are unique.
What is the difference between Eigen decomposition and SVD?
In the eigendecomposition, the entries of D can be any complex number – negative, positive, imaginary, whatever. The SVD always exists for any sort of rectangular or square matrix, whereas the eigendecomposition can only exists for square matrices, and even among square matrices sometimes it doesn’t exist.
Why eigen vectors are used in PCA?
The eigenvectors and eigenvalues of a covariance (or correlation) matrix represent the “core” of a PCA: The eigenvectors (principal components) determine the directions of the new feature space, and the eigenvalues determine their magnitude.
What is eigenvalue and eigenvector in PCA?
The Eigenvector is the direction of that line, while the eigenvalue is a number that tells us how the data set is spread out on the line which is an Eigenvector. Line of best fit drawn representing the direction of the first eigenvector, which is the first PCA component.
What is Eigen basis?
An eigenbasis is a basis of Rn consisting of eigenvectors of A. Eigenvectors and Linear Independence. Eigenvectors with different eigenvalues are automatically linearly independent. If an n × n matrix A has n distinct eigenvalues then it has an eigenbasis. Eigenspaces.
What is eigenvalue example?
For example, suppose the characteristic polynomial of A is given by (λ−2)2. Solving for the roots of this polynomial, we set (λ−2)2=0 and solve for λ. We find that λ=2 is a root that occurs twice. Hence, in this case, λ=2 is an eigenvalue of A of multiplicity equal to 2.
Why are eigenvalues called eigenvalues?
Exactly; see Eigenvalues : The prefix eigen- is adopted from the German word eigen for “proper”, “inherent”; “own”, “individual”, “special”; “specific”, “peculiar”, or “characteristic”.
Is eigendecomposition same as diagonalization?
Similarly, for the eigendecomposition (also known as eigenvalue decomposition, spectral decomposition, or diagonalization), I would say the following: An eigendecomposition describes the effect of a matrix A on a vector as a different 3-step process A=QΛQ−1: An invertible linear transformation (Q−1) A scaling (Λ)
What is an eigenvalue used for?
Communication systems: Eigenvalues were used by Claude Shannon to determine the theoretical limit to how much information can be transmitted through a communication medium like your telephone line or through the air.
What is matrix eigendecomposition?
There are different approaches to decompose a matrix. However, perhaps the most commonly used one is matrix eigendecomposition which is decomposing a matrix using its eigenvectors and eigenvalues. In this tutorial, you will learn: The definition of eigendecomposition The concepts of eigenvectors and eigenvalues The benefits of decomposing a matrix
What is eigendecomposition in PCA?
Well, matrix decomposition is about the factorization of a matrix into a product of matrices. It breaks down a matrix into constituent parts to make certain operations on the matrix easier to perform. Of the many matrix decompositions, PCA uses eigendecomposition. ‘ Eigen’ is a German word that means ‘own’.
Can degenerate eigenvalues be eigendecomposed?
In the case of degenerate eigenvalues (an eigenvalue appearing more than once), the eigenvectors have an additional freedom of rotation, that is to say any linear (orthonormal) combination of eigenvectors sharing an eigenvalue (in the degenerate subspace), are themselves eigenvectors (in the subspace). then A can be eigendecomposed.
How many eigenvalues and eigenvectors can a matrix have?
A square matrix can have one eigenvector and as many eigenvalues as the dimension of the matrix. For example, a 4×4 matrix will have 4 eigenvalues. | https://www.curvesandchaos.com/what-does-eigenvalue-decomposition-do/ |
- *Correspondence:
- Solomon BT , Chairman, Xodus One Foundation, 815 N Sherman St., Denver, CO 80203, USA, Tel: 310- 666-3553; E-mail: [email protected]
Received: December 06, 2016; Accepted: January 06, 2017; Published: January16, 2017
Citation: Solomon BT, Beckwith AW. Probability, Randomness, and Subspace, with Experiments. J Space Explor. 2017;6(1):110.
Abstract
Quantum theory does not have a mechanism that explains how nature implements probabilities. Thus, the main objective of this paper is to present new directions in the understanding of probabilities and randomness with the eventual objective of controlling photon localization (in a future paper). The expectation is to improve photon collection and loss mitigation. The conservation of energy within the photon’s transverse electromagnetic wave requires that energy is transferred between spacetime (x,y,z,t) and subspace (x,y,z). This paper proposes that it is in this subspace that nature implements probabilities. The paper analyses the differences between probabilities and randomness and infers that all particles have internal clocks C, that is the mechanism for randomness. A glass thought experiment is used to clarify how probabilities are effected and as a result it is proposed that the random distribution of photons across the Point Spread Function or Airy Pattern (not Airy Disc) is not due to the photon probability but due to the random behaviour of electron shells receiving the photon localization. Finally, 5 experiments are proposed.
Keywords
Photon localization; Photon probability; Born’s interpretation; de Broglie; Airy Pattern; Photon propagation; Randomness; Probability; Schrödinger wave function; Bell’s theorem probability
Introduction
One of the objectives of this paper is to provide an alternative model to the fundamentals of physics, the precursor or prerequisite to quantum theory. It is not about building a better quantum theory. That is unlikely given that over the last 100 years, thousands of expert physicists have checked, double and triple checked this theory as it stands. With an alternative to the foundations of physics one can then falsify (technical usage) quantum theory with three possible outcomes. (i) The foundations of quantum theory are correct and alternative fundamentals are incorrect, resulting in a strong better quantum theory, (ii) The proposed foundations of physics lead to a different and better version of quantum theory or (iii) The interplay between both version, contemporary and proposed foundations, lead to more questions than answers.
Quantum theory describes both mass-based particles and massless particles as exhibiting wave-particle duality. Experimental confirmation of this duality can be found such that
• The photon particle behaviour can be demonstrated by the photoelectric effect (given a work function W) of energy E with frequency ν as,
E = hν -W (1)
• The electron’s wave behaviour can be described by Compton’s scattering. A photon scattered at angle θ has a longer wavelength λ1 given the electron’s Compton wavelength λe, and
λ1- λ= λ1 (1-cosθ) (2)
(3)
• The de Broglie’s matter wave, that mass matter and massless light satisfy the same energy-momentum and momentum-wavelength (p-λ) relationship,
(4)
Quantum theory’s wave mechanics is described by the Schrödinger wave equation Ψ (x,t) per
(5)
Giving Born’s interpretation of |Ψ|2 as the probability density of finding system at space time location (x, t),
(6)
Such that the probability density can be moved around, but cannot be created or destroyed in the absence of explicit creative or destructive physical processes. As the physical states in quantum mechanics are linear waves they can be superposed to form other waves using Fourier transforms. And a wave of any kind satisfies the uncertainty relation that for matter waves is the Heisenberg uncertainty principle
(7)
Therefore, one notes that quantum theory is essentially a wave theory used to describe particle behaviour, with all non-wave properties (probabilities for example) described in terms of this wave nature. Photons in particular are also modelled using wave equations known as Bessel functions. As Roychoudhuri proposed, “We need to embark anew on comprehensive foundational studies about generation, propagation, and detection of EM waves across the entire spectrum. Huygens- Fresnel’s wave picture and Einstein-Dirac’s indivisible quanta represent one of the strongest unresolved issues in physics.”
While the authors agree with his premise for the need for foundational studies, Roychoudhuri has undertaken these foundational studies using wave equations. In this paper the authors take a different approach, by laying the ground work required to model photon behaviour in terms of probabilities instead of wave equations or Bessel functions. How is this possible?
In Operations Research, there is a class of mathematic search techniques, mathematical programming, that have a unique property known as primal-dual formulation. Mathematical programming consists of an objective function that is matrix row, a matrix of constraints whose inequalities form a matrix column of boundary conditions, known as the Primal problem. The dual problem occurs when the constraint matrix rows and columns are swapped, and concurrently, the objective function is swapped with the boundary conditions. It turns out that the solution to the Primal formulation is identical to the solution of the Dual formulation. That is, two apparently different formulations of the same problem have identical solutions.
The point spread function (PSF), here termed Airy Pattern (not Airy Disc), of photons projected through a pin hole to a screen, is the basis of this deconstruction. However, the modern definition of this type of PSF is a Bessel function expressed only in terms of wave functions and therefore not suitable for the proposed deconstruction, as the Bessel functions have entirely removed the photon’s probabilistic behaviour. The wave Bessel functions can be considered the primal formulation. To determine the probabilistic behaviour, the dual formulation, one must go back to the older formulation (Appendix A and B) of the Airy Pattern. As proof that this dual formulation exists, the probabilistic dual formulation should give identical results to the Primal Bessel formulation. This will be shown correct in a later paper (Figure. A1).
Roychoudhuri summarizes that there are two types of photon models, (a) Huygens-Fresnel’s wave and (b) the Einstein-Dirac’s indivisible quanta. As Roychoudhuri states, the definition of a photon by quantum electrodynamics is something like an indivisible packet of energy but represented by a Fourier monochromatic mode of the vacuum which is problematic, for the following reasons
(i) Such individual photons cannot be localized in space and time.
(ii) An infinitely long Fourier mode violates the principle of conservation of energy
(iii) Superposition of many Fourier frequencies creating a space-finite pulse in free-space to model pulsed light is an invalid conjecture because waves cannot interact and regroup their energies in the absence of interacting materials.
(iv) It assigns rich properties to “vacuum” and yet relativity and quantum physics do not explicitly recognize space as a physical medium.
(v) The quantum photon’s indivisibility directly contradicts the immensely successful HF diffraction theory.
Solomon pointed to the need for a more sophisticated space time. Using Roychoudhuri’s critique as a basis for comparison, one can state that this paper lays the ground work for a third model derived from the Airy Pattern, an infinitely thin disc whose plane (x-y axes) is orthogonal to the photon’s motion vector along the z-axis, that is not infinite (per ii), and based on a “richer” (per iv) property of space time, one that involves both deformable space time (x, y, z, t) and deformable subspace (x, y, z).
Further, there is in physics research, what is known as the pilot model , which has a specific re-interpretation of probability, and not just on the basis of wave interference. “The Copenhagen interpretation is essentially the assertion that in the quantum realm, there is no description deeper than the statistical one. When a measurement is made on a quantum particle, and the wave form collapses, the determinate state that the particle assumes is totally random. According to the Copenhagen interpretation, the statistics don’t just describe the reality; they are the reality. “
The research in this paper is to determine another layer of statistical inference, as an alternative to the Copenhagen interpretation, and that is what the offered aim of this paper is.
Definition of Kenos
This paper proposes that photon localization is not due to the wave function collapse per quantum theory is a result of• the αβ join between the α space time and the β subspace. To do this it is necessary to deconstruct the photon’s wave function ψP into its probability density function φP and remaining components.
Is there evidence for both the spacetime α kenos and subspace β kenos? Yes, it is found in the conservation of energy within• a photon. See Appendix A and B for discussion on a proposed particle structure.
For a, given photon wavelength λ the electric ηE and magnetic ηM field energy densities along the z-axis are given by,
(8)
(9)
Where EA and BA are the maximum amplitudes of the electric and magnetic fields respectively in spacetime, and kψ is the wave function constant,
(10)
As the transverse wave’s electric EA and magnetic BA field oscillates in unison, the energy densities (8) and (9) oscillate between 0 and maximum (or 100%), thus breaking conservation of energy at any specific point in the transverse wave in spacetime.
One approach to solving this oscillating energy is to propose that the electromagnetic transverse wave’s electric EA and magnetic BA vectors are the projections of the electric ESA and magnetic BSA super vectors rotating orthogonally about their axis of motion, between the spacetime α kenos and the subspace β kenos.
This is equivalent to a rotating clock hand in the x-y plane moving along the z-axis, with the projection of this clock hand on the y-z plane is 90° out of phase with that in the x-z plane. Thus, these α and β kenos projections of the electromagnetic wave are 90° out of phase.
Then the strengths of their respective electric αESA and βESA and magnetic αBSA and βBSA field projections in their respective α kenos and β kenos are given by,
(11)
(12)
(13)
(14)
This paper proposes that the energy in space time is the same as energy in subspace. The total electrical energy density TηE and total magnetic energy density TηM are the sum of their respective electrical αηE and βηE and magnetic αηM and βηM energy density components in the space time kenos α and subspace kenos β, respectively, such that these total energy densities are always constant,
(15)
Where,
(16)
(17)
And,
(18)
Where,
(19)
(20)
Thus, both the total electric TηE and total magnetic TηM field energy densities are constant at any given point along the transverse wave displacement. Note that, the electromagnetic energy Eem is not a function of the field strength of these field vectors per (21). It is purely a function of the field super vectors’ rotation about the axis of motion which one observes as a frequency projection ν in spacetime.
(21)
That is, as the super vectors rotate, the amplitudes of these field vector projections oscillate, within their respective spacetime α kenos and subspace β kenos. Thus, so do their field energy densities in their respective kenoses. Therefore, a strict treatment of conservation of field energy within the photon proves that both the spacetime α kenos and subspace β kenos exists. Equally important, one notes field energy conservation holds because energy can be transferred between kenoses.
The question that quantum theory does not ask is, how does Nature implement probabilities? Photon localization events are space but not time dependent as probability fields are time invariant. Therefore, the probability field is a region of space or kenos where time does not exist thus Solomon proposed that nature implements probabilities in the subspace β kenos and not in the spacetime α kenos. And therefore, for a localization event to occur between the subspace β kenos probability field• and the spacetime α kenos localization, a join must occur between subspace β kenos and space time α kenos at that location.
Of course, much work remains to done as to the properties of subspace and these super vectors. This, however, raises another question, energy in spacetime is usually associated with motion as in kinetic energy, how then is field energy expressed in subspace that does not have the time dimension? One possibility is potential energy. Since the only two observable properties are electric and magnetic field energies and probabilities that are 90° out of phase, one could infer that this potential energy takes the form of a probability structure in subspace, just as gravitational energy is observed as a structure of space time. Thus, equating electric field energy (electric field energy density αηE x volume VE occupied by this electric field) (15) to probability density PψP, from C5 and B8 in Appendix C and B, respectively,
(22)
(23)
Where k1 and kV are some coefficients. Further work will be published in a future paper as this research is still in its infancy. This paper proposes new directions in investigating how probabilities are implemented in Nature.
A definition for localization and randomness
To extricate additional probabilistic relationships a Glass Thought Experiment (GTE) was proposed [5,6]. Figure. 1 illustrates this GTE. Photons having passed through the transparent screen form Airy Patterns on the opaque screen with their respective envelope probability density function φA,T and φA,O. This GTE illustrates several properties
(i) ΦA, O ≠ 0: Figure. 1a shows that for any distance between pinhole and screen, moving the opaque screen back and forth demonstrates that the photon probabilistic envelope probability density function φA exists in the space between the pinhole and opaque screen.
(ii) φA,T ≡ φA,O: Figure. 1(a) shows that the PSF Airy Pattern on the opaque screen demonstrates that the photon’s probability distribution is intact after having passed through the transparent screen.
(iii) hν: In the transparent screen, the Airy Pattern are not discernible as the electromagnetic function does not interact with the screen. In the opaque screen, the electromagnetic function does interact with the screen to form• the PSF Airy Pattern. That is the electromagnetic energy hν and therefore frequency ν is a necessary criterion for• interaction.
(iv) Ai ≠ f(Pi): the electromagnetic function’s ability to interact Ai with the material is independent of the photons envelop probability function or its probability to interact Pi. This is because the photon interacts (Ai=1) with the opaque but not (Ai=0) with the transparent visual plane even if the two planes are attached together, φA,T=φA,O or when they are far apart, φA,T ≠ φA,O.
(v) Pi = f(φP) ≠ f(Ai): On both screens the probability to interact Pi is determined by the envelop probability density function and not by the material. This is because the probability to interact Pi is independent of the opaque screen and is present even when no interaction is observed. Ignoring edge diffraction effects to keep it simple, Figure. 1b shows that an opaque barrier can effectively neutralize the photon probability distribution in that region where the barrier exists.
(vi) ∫ Pi dx=1, in a confined space the φA distribution along all and any radii x must total 1.
By iii) given that the photon frequency is the appropriate frequency, one notes that by iv) the ability to interact Ai=1 is independent of the probability to interact Pi by v). This raises an interesting inference. Probabilities exists in nature but to effect photon localization a trigger is required. Since photons only localize on the electron shell, given iii), a unique and individual atom’s electron shell experiences a trigger event such that for any given identical set of atoms in the local vicinity, the one with this trigger event will receive the photon while the others are not ready to do so. The proof of this trigger event can be seen as individual specs that form the Airy Pattern. There are billions of atoms in the opaque screen that are capable of receiving the photon, but only one receives it at any one time, not the others.
What is this trigger? It is proposed that it is the αβ join between spacetime α kenos and subspace β kenos. When this αβ join occurs in the electron shell, the electron shell is able to interact with the photon’s envelope probability density function φA and is captured by this electron shell. That is, in the presence of the photon’s probability density function φA, localization is the process of the photon capture due to the formation of an αβ join between spacetime α kenos and subspace β kenos in the electron shell.
Therefore, two inferences are in order. First, in a dynamic electron shell, spacetime α kenos and subspace β kenos, αβ joins are continuously created (open or Ai=1) and destroyed (closed or Ai=0). Second, the spatial randomness of the photon specs on the PSF Airy Pattern is the result of the uniform distribution of electron shells that observe a temporal randomness of the opening and closing of these joins by individual electron shells. That is, the act of randomness is not the effect of the photon’s probability density function φP, but of how a collective of electron shells respond to photon arrivals. Which raises the question, is it possible to accelerate αβ joins in a specific region of the opaque screen as to demonstrate a spot within the PSF Airy Pattern?
Therefore, as Nature has demonstrated the spacetime-subspace αβ joins, these αβ joins are technologically feasible. However, experiments are required to describe how to influence these αβ joins.
A theoretical formulation for randomness and probability
Khrennikov has stated “Bell's theorem rejects only local hidden variable models, i.e. models preventing faster than light communications.” Bell’s theorem is limited to spacetime. However, as shown in this paper, the conservation of energy within the electromagnetic transverse wave requires both the existence of the spacetime and subspace. In this light Bell’s theorem is inapplicable.
Much of the discussion in the section is either borrowed from, extends, or modifies the discussion presented by Khrennikov .
Axiom 1, States η: Fundamental states η (for example particle spin) must have Nη unique values,
(24)
And not be correlated or associated i.e. they are independent of each other. If any two states, for example η1 and η2 are not independent then at least one of them is a pseudo-state. They may both be dependent on a third state η3, and in general,
for i≠j (25)
From the perspective of randomness,
i>1
As when i=0 no states exist, and when i=1 the state does not change.
Axiom 2, Receptacle ρ: A receptacle ρ is a fundamental carrier of the states ηi,
(27)
Axiom 3, collection Σ: A collection Σ (for example a fundamental particle) is a collection of Nρ receptacles ρi,
(28)
Axiom 4, true independence: True independence occurs when, within the same collection Σm, any state j of receptacle i or state l of another receptacle k is independent of each other,
for i≠k and j≠l (29)
Axiom 5, sequence Θ: A sequence Θ is a set of states that are associated in space or time. Necessarily, by the earlier discussion, this sequence of each state i must belong to different collections Σm.
(30)
Axiom 6, spatial randomness: In addition to (25) and (29), given a local space δl,
for i≠j (31)
Even though,
for i≠j (32)
For example, spatial randomness is the localization of a photon i at electron shell i and is independent of the localization of photon j at electron shell j, separated by a local spatial distance δl, even if both photon-electron-shell localizations are identical processes. This can be extended to multiple sets of photo-electron-shell interactions.
Axiom 7, temporal randomness: In addition to (25) and (29), given a local time difference δt,
for i≠j (33)
Even though,
for i≠j (34)
For example, temporal randomness is the localization of a photon i at electron shell i and is independent of the localization of photon j at electron shell j, separated by a local spatial time δt, even if both photon-electron-shell localizations are identical processes. This can be extended to multiple sets of photo-electron-shell interactions.
These axioms 1 to 6, necessarily imply that the change in the value of a state η is independent of the world outside the receptacle ρ and is only a function of time tc or the receptacle’s internal clock C,
(35)
Obviously, in a flat spacetime, these internal clocks C do not change with spatial distances or else the laws of physics would not be the same everywhere. That is, von Neumann’s principle of sufficient cause does not operate at the level of states.
Therefore, one infers that randomness originates from fundamental particle internal clocks C. A generic definition of a clock is a stable and precise repeating process or a mechanism. Examples are rotation and simple harmonic motion. Therefore, frequency would be a suitable candidate for an internal clock. This suggests that photons do not have a process (38) of converting internal clocks to random states η. i.e. photons on their own, are not capable of generating random states. This is because, in the absence of particle based external structures, photons are observed to be very stable. Examples include atomic spectral lines from any star from any galaxy in the Universe. This stability points to the lack of the process (38) of converting internal clocks to random states η. One infers unlike Khrennikov that probabilities and randomness are different phenomena.
Per Axiom 6 (31) and (32), the Airy Pattern B1, Appendix B, screen can be defined as a 2-dimensional spatial sequence ΘA, which causes the randomness. The relevant states ηJ=(0,1) are the αβ spacetime-subspace joins closed/inactive or open/active, respectively. Some inferences come to mind.
• In this Airy Pattern sequence ΘA, the number ηJ0 of closed states is much greater than the number nJ1 of open states, otherwise rAU would not be very, very large as photons would be captured “quickly”.
• These join states ηJ are truly random else they would alter the Airy Pattern probability distribution, and different screen materials would evidence different Airy Patterns (Table B1).
Since, localization occurs when ηJ=1, the Airy Pattern localization event LA can be written as a series of recursive transformations in terms of the photon probability PP and transformations ∇n at each step n that transforms this probability,
(36)
The recursive transformations ∇n where n>0 is such that,
(37)
With n=0 is the state ηJ. Or,
(38)
P0 is the process that converts this internal clock to Join states of η=0 or η=1, and ∇0 (=∇ψ,J) is the transformation that converts the Join states into probability functions that can interact with the external probability field. Unlike the recursive function presented in Khrennikov which leads to complexity, the finite (n is small approximately n ≤ 8) recursive function (37) unravels by decreasing n. That is, n is not a very large number and this limits the complexity observable in nature. Therefore, the random nature of states η due to the internal clocks C, are the source of randomness. That is, von Neumann’s principle of sufficient cause only operates for n>0. It also means that the Copenhagen interpretation “there is no description deeper than the statistical one” is no longer valid.
Therefore, one can infer some necessary conditions.
• n=0: P0 converts the state η into a form that ∇0 can be transformed into a wave function form.
• n=1: This is the transformation of the distorted photon’s wave function’s ψA interaction, the Airy Pattern on the opaque screen, with the states η to probabilities, i.e. the first contact with the random event P0(∇0)=ηJ.
• n>1: transformation of the various probability densities into other probability densities.
• Last n: transformation of the last probability density into the final photon wave function ψP.
• Probability Density: Ville’s Principle states that “a random sequence should satisfy all properties of probability one.” Thus, given a probability density function ψP along a radius rP,
(39)
as PψP (=4/π, see Appendix C) is a pre-calculated known constant. Therefore, given a density Dr, (39) can be rewritten as,
(40)
For example, the point probability along a radius rP must sum 1. The probability Pθ of any radius must also sum to 1, and is• given by,
(41)
That there is recursion,
(42)
Where Ln and Un are the lower and upper limits of the integrals at stage n and xn is the variable integrated. (42) is equivalent• to (37). That is, Ville’s Principle is correct under strict conditions that each stage n is derived from the previous n-1 stage, but probability PP is not the source of internal clock’s C randomness and therefore C by itself, does not obey Ville’s Principle. From a particle structure perspective, one notes that all particles must have, as a part of their construction, internal clocks C. That is, it is the wave function in contact with an open join at an electron shell interacts with it. These open joins are caused by the randomness of electron shell states. Probability distributions on the other hand, spread the possibility of this interaction• over a spatial region. This spread is determined by the presence or absence of other transformations ∇i in its vicinity.
Propagation versus probability
If the photon is directed at the PSF Airy Pattern opaque screen its arrival time tA should be the distance dA between pinhole and opaque screen, divided by the velocity of light c.
(43)
The Solomon proposed that the basic particle structure is an infinitely thin wave function disc C1 (Appendix C), that is orthogonal to the particle’s motion vector (like a flat umbrella with other particle properties added to this structure). In terms of the space wave χP, the envelope probability density function φP this ψP wave function when projected on to the opaque screen forms the Airy Pattern ψA (44) and its corresponding space wave χA (45), and envelope probability density function φP (46), given the pinhole aperture diameter wA, the distance between pin hole and screen dA and angular displacement θ from pinhole a radial position rA on the screen,
(44)
(45)
(46)
Where, for small θ,
(47)
That is, there is a transformation of the particle’s ψP wave function C1 Appendix C, to the Airy Pattern ψA pattern (44). See• Figure. 2.
Figure 2: Probabilistic wave solution ψ (solid red) and its 2 components, χ (dashed grey) and φ (dot-dash green).
As this projected wave function (44) travels the distance dA this paper proposes that all photon arrivals are equal and requires a time of tA to arrive at the opaque disc. The path from pin hole to an orthogonal displacement at the opaque screen can be divided into two parts. First, the propagation from pinhole to opaque screen, and second, translocation, the orthogonal probabilistic localization in zero time at a radial displacement from pinhole axis. The experimental proof would be to prove that all photon arrival times (43) are only dependent of the distance between pinhole and opaque screen, and independent of• the hypotenuse travel path i.e. independent of their localization distance along the radius from the axis of propagation.
Proposed experimental tests
This paper proposes four new experiments that photonics researchers can conduct to confirm or disprove the probability control hypothesis presented in this paper.
Test for subspace
As noted in section 2, the electromagnetic vector rotates between spacetime and subspace, and these are out of phase by 90°. Therefore, it should be possible to demonstrate that the electric field induced voltage is out of phase with photon localization• by 90° as depicted in Figure. 3.
Test for probability versus propagation
If the envelope probability and the space wave are the cause of the interference and diffraction patterns, then one would expect, as depicted in Figure. 4, that the hypotenuse travel time th and the direct travel time td, should be equal,
(48)
The inference is that the electromagnetic function and the combined envelope probability and the space wave are primal-dual. In operations research’s, primal-dual solutions are identical where the primal problem is defined by an objective (row) function, a constraint matrix and column of limiting values of each constraint in the matrix. The dual problem exists when the columns and rows are swapped.
Test for probability versus randomness
If probability and randomness are two separate phenomena, with randomness due to the material, then it is in theory possible to modify the randomness of selected parts of the PSF Airy Pattern, and demonstrate (i) a bright spot on the PSF Airy Pattern with decreased localization in the remaining PSF Airy Pattern, and (ii) a dark spot on the PSF Airy Pattern with increased localization in the remaining PSF Airy Pattern. See Figure. 5a and Figure. 5b respectively. The bright spot would be caused by materials whose join occurs more frequently than the opaque screen, and vice versa, the dark spot caused by a material whose join occurs less frequently than the opaque screen .
A test for the mechanism behind quantum entanglement
Locality demands the conservation of causality, meaning that information cannot be exchanged between two space-like separated parties or actions . Quantum entanglement can be described as non-local interactions or the idea that distant particles do interact without hidden variables.
There are two possible alternative explanations that do not require hidden variables. First, that subspace is the carrier of this entangled information, and second is the envelope function φP based spatial probability distribution. Note, since photons do not exhibit randomness, the process (38) of converting the internal clock to Join states of η=0 or η=1, are not present and therefore, entanglement cannot be due to internal clocks C. The spatial probability distribution is so large, that entanglement occurs while the entangled photons’ probability fields overlap. The joint probability Pij,(x,y,z) (49) at coordinates (x, y, z) of photon i interacting with its entangled photon j is the product of the individual probabilities Pi,(x,y,z) and Pj,(x,y,z).
(49)
Given that these particle probabilities obey the envelope function φP C3, (49) can be written as (50),
(50)
The normalized probabilities PN would take the form,
(51)
with,
(52)
(53)
Assuming that the particle must arrive at the detector, the denominator is the field of interaction FI,A’. This is the area FI,A’ of the curved surface of the detectors used in the experiments. This denominator can be simplified to FI,A by only considering photon arrivals through the cross section of the detector aperture as opposed to detector surface.
If entanglement is due to the joint probabilities of the envelope function φP then two scenarios can be formulated
• Two un-entangled independent photons i and j with their envelope terms φPi and φPj pass through their respective double slits, will exhibit the normal interference patterns. Mathematically, by linear superposition, these are the straight sum ΣnψPn of their respective, probabilistic wave solution ψPn, for n=i and j, and A5 would hold, such that (Figure 6),
(54)
• If two entangled photons i and j exhibit joint probabilities, then their envelope terms φPi and φPj are replaced by their joint probability envelop term φPJ, (55), such that the joint probabilistic wave solution ψPJn by linear superposition and A5, would take the form (Figure 7).
(55)
For ease of illustration, Figure 6 and 7, the photons i and j are separated by 1m with the probabilistic wave functions mapped out on a 10m square screen, positioned 1m away from their apertures.
It is clear that the resulting interference patterns are different and therefore a test of the validity of subspace versus joint probability. If subspace is the carrier of entangled information one should observe interference patterns similar to Figure 6, else if joint probabilities are the carrier than one should observe interference patterns similar to Figure 7.
Conclusion
To understand the fundamentals of particle behavior, this paper has proposed that (i) all particles have internal clocks, (ii) and some particles can convert this internal clock into random states necessary for photon localization. The particle wave equations and probabilistic behavior are primal-dual problem formulations. Therefore, this paper proposes that probabilities and randomness are two different phenomena that can be traced back to particle properties. Finally, the paper proposes several experiments to test the thesis that probabilities are implemented in subspace, and a test for how entanglement could be implemented in Nature.
References
- Wong CW. A review of quantum mechanics, review notes prepared for students of an undergraduate course in quantum mechanics. Department of physics and astronomy, University of California, Los Angeles, CA2006;2016.
- Roychoudhuri C. Causal physics: Photons by non-interactions of waves, CRC Press, Boca Raton; 2014.
- Solomon BT. New evidence, conditions, instruementsandexperiments for gravitational theories.J Mod Phys. 2013;4:183-96.
- Bohm D. A suggested interpretation of the quantum theory in terms of hidden variables, II". Phys Rev. 1952;85(2):180-93.
- http://news.mit.edu/2014/fluid-systems-quantum-mechanics-0912
- Solomon BT. Non-Gaussian photon probability distributions, in the proceedings of the space, propulsion and energy sciences international forum (SPESIF-10). Robertson GA, editor. AIP conference proceedings 1208, Melville, New York; 2010.
- Solomon BT. Super physics for super technologies: Replacing Bohr, Heisenberg, Schrödinger and Einstein. Propulsion Physics Inc. Denver; 2015.
- Khrennikov A. Randomness: Quantum versus classical. Quantum Physics; 2015.
- Solomon BT, Beckwith AW. Photon probability control with experiments. Physics Essays; 2016.
- Eisaman MD, Goldschmidt EA, Chen J, et al. Experimental test of nonlocal realism using a fiber-based source of polarization-entangled photon pairs. Phys Rev. 2008;77:032339p.
- Howell JC, Bennink RS, Bentley SJ, et al. Realization of the Einstein-Podolsky-Rosen paradox using momentum and position-entangled photons from spontaneous parametric down conversion. Phys Rev Lett. 2004;92(21):1-4. | https://www.tsijournals.com/articles/probability-randomness-and-subspace-with-experiments.html |
Susan thought, "If I read 15 pages a day, I will read the whole book in 8 days. “How many pages would she have to read a day if she wanted to finish the book on the 6th day from the start of reading? And how many pages does the book have?
Correct answer:
Did you find an error or inaccuracy? Feel free to write us. Thank you!
Thank you for submitting an example text correction or rephasing. We will review the example in a short time and work on the publish it.
Tips to related online calculators
Do you have a linear equation or system of equations and looking for its solution? Or do you have a quadratic equation?
Do you want to convert time units like minutes to seconds?
Do you want to convert time units like minutes to seconds?
You need to know the following knowledge to solve this word math problem:
Related math problems and questions:
- Reading
If I read 15 pages a day, I will read the whole book in 18 days. How long will it take to read a book if I only read 9 pages every day?
- Book reading
Suzan reads a book. If she read half an hour a day, she would read it in nine days. How many minutes does he have to read a day if he wants to read it three days earlier?
- Book reading
If we read the book at a speed of 15 pages a day, we read it 3 days before we read it at a speed of 10 pages per day. If I read at 6 pages per day, how many days will I read the book?
- Painting rooms
If Dano paints three hours daily, he complete in 7.5 days. How many hours a day would have to work to finish the job 1.5 days earlier?
- A lot of hay
Martin's grandfather weighed a lot of hay and calculated that for 15 rabbits, it last in 100 days. How many days will this lot be enough for 25 rabbits?
- Pumps
Four identical pumps fill the tank in 40 hours. How many pumps would we have to use if we wanted to save 8 hours?
- Painters
Ten painters paint the school in 20 days. How many days do four painters paint the school at the same pace of work?
- Cook on gas
The gas cylinder will last for 30 weekends for 2 hours of daily cooking. How many days will we be able to cook on a new cylinder when we cook for 3 hours a day?
- Hectares of forest
12 workers plant 24 ha of forest in 6 days. In how many days will 15 people and 12 people plant the same area?
- The farmer
The farmer calculated that the supply of fodder for his 20 cows was enough for 60 days. He decided to sell 2 cows and a third of the feed. How long will the feed for the rest of the peasant's herd last?
- Working time
At 10 hours work shift, work is done in 16 days. How many days will the work be done at 8 hours shifts?
- Six workers
Six workers earned a total of CZK 12,600 per week on the construction site (5 working days). How much do 7 workers earn in 10 days with the same daily average salary?
- Workers
Two workers A and B, will be done work together for 15 days. They worked together for 13.5 days. Then A worker became ill, and worker B finish the job alone for 7.5 days. If every worker was working alone, how many days took whole work for worker A and B?
- If Jada
If Jada read 75 pages in four hours how long would it take her to read it 250 pages?
- The orchard
4 temporary workers harvested the orchard in 9 days. How many temporary workers we need for six days?
- Mr. Ben
Mr. Ben drives bricks to the construction site. If he drove three times a day, he would make bricks in 8 days. How many times a day would he go every day to be done 2 days earlier?
- Five combers
Five combers harvest 12 rows of strawberries in 4 hours. How many rows of strawberries will two combers harvest in 10 hours? | https://www.hackmath.net/en/math-problem/31591 |
Bill DetailsOfficial information provided by the Congressional Research Service. Learn more or make a suggestion.
The Congressional Research Service writes summaries for most legislation. These summaries are listed here. Countable will update some legislation with a revised summary, title or other key elements.
Title
Early Intervention for Graduation Success Act of 2013
Official Title
A bill to amend the school dropout prevention program in the Elementary and Secondary Education Act of 1965.
Summary
Early Intervention for Graduation Success Act of 2013 - Amends the Elementary and Secondary Education Act of 1965 to revise provisions concerning programs to reduce school dropout rates and increase school reentry and secondary school graduation rates. Replaces the existing grant program with an early intervention for graduation success program awarding competitive, renewable, five-year early intervention grants to states and, through them, subgrants to partnerships between local educational agencies and early childhood education providers that serve a high percentage of students who bear the risk factors for dropping out of school. Requires state grantees to: (1) create and periodically update a research-based plan that addresses the factors associated with the risk of not graduating from high school; (2) provide technical assistance to subgrantees; and (3) assist subgrantees in accessing data from appropriate state agencies to identify and direct effective services to children, from birth through elementary school, who are at risk of not graduating from high school. Permits states to use grant funds to: (1) provide tuition assistance to students who agree to teach in an early childhood education program, (2) increase and monitor the quality of early childhood education, (3) design and implement a progression of aligned performance standards across all domains of learning from prekindergarten through postsecondary education, and (4) expand access to high-quality early childhood education for children most at risk of low proficiency in school. Requires subgrantees to: (1) use the data relevant to risk factors for non-graduation a made available by state agencies and other sources to implement research-based, individualized interventions for at-risk students; (2) develop and implement individual learning plans for each at-risk early childhood, elementary, and secondary school student; (3) provide teacher training; (4) integrate community and family support services; and (5) foster students' high expectations and improve their chances for academic success. Authorizes appropriations for FY2014-FY2019. | https://www.countable.us/bills/s1109-113-early-intervention-for-graduation-success-act-of-2013 |
Skewer brats lengthwise onto soaked bamboo skewers. Use a pairing knife to cut each brat in a spiral fashion, cutting to skewer and making cuts about 1-inch apart. lightly brush with olive oil. Grill over medium direct heat for 10 to 12 minutes or until internal temperature reaches 165 degrees.
Recipe
Main Dish
Spiral Beer Brats
Primary Media
Save Options
Description
Upgrade your grilling recipes with these spiral beer brats served with homemade beer cheese.
Servings and Ingredients
Ingredients
Serves 6
|Quantity||Ingredient||Add|
|6 Hy-Vee beer bratwursts|
|Gustare Vita olive oil, for brushing|
Things To Grab
- 6 bamboo skewers
- Pairing knife
- Silicone pastry brush
- Meat thermometer
Directions
Hyvee Culinary Expert TipIf using bamboo skewers, soak skewers in water for 30 minutes before using.
Nutrition facts
Servings
330 Calories per serving
Amounts Per Serving
- Total Fat: 20g
- Cholesterol: 70mg
- Sodium: 790mg
- Total Carbohydrates: 16g
- Protein: 16g
Daily Values
0%
Iron 6%
0%
Calcium 0%
0%
Vitamin D 0%
0%
Potassium 0%
Recipe Source: | https://www.hy-vee.com/recipes-ideas/recipes/spiral-beer-brats |
GENERAL DISTRIBUTION : Wintergreen occurs from Newfoundland and New England south in the mountains to Georgia and west to Minnesota [13,32]. ECOSYSTEMS : FRES10 White - red - jack pine FRES11 Spruce - fir FRES13 Loblolly - shortleaf pine FRES14 Oak - pine FRES15 Oak - hickory FRES17 Elm - ash - cottonwood FRES18 Maple - beech - birch FRES19 Aspen - birch STATES : AL CT DE GA IL IN KY ME MD MA MI MN NH NJ NY NC OH PA RI TN VT VA WV WI MB NB NF NS ON PE PQ BLM PHYSIOGRAPHIC REGIONS : NO-ENTRY KUCHLER PLANT ASSOCIATIONS : K082 Mosaic of K074 and K100 K093 Great Lakes spruce - fir forest K095 Great Lakes pine forest K099 Maple - basswood forest K100 Oak - hickory forest K101 Elm - ash forest K102 Beech - maple forest K103 Mixed mesophytic forest K104 Appalachian oak forest K106 Northern hardwoods K107 Northern hardwoods - fir forest K108 Northern hardwoods - spruce forest K110 Northeastern oak - pine forest K111 Oak - hickory - pine forest SAF COVER TYPES : 1 Jack pine 12 Black spruce 13 Black spruce - tamarack 14 Northern pin oak 15 Red pine 16 Aspen 17 Pin cherry 18 Paper birch 19 Gray birch - red maple 20 White pine - northern red oak - red maple 21 Eastern white pine 23 Eastern hemlock 24 Hemlock - yellow birch 25 Sugar maple - beech - yellow birch 26 Sugar maple - basswood 27 Sugar maple 28 Black cherry - maple 30 Red spruce - yellow birch 32 Red spruce 33 Red spruce - balsam fir 37 Northern white-cedar 38 Tamarack 39 Black ash - American elm - red maple 40 Post oak - blackjack oak 42 Bur oak 43 Bear oak 45 Pitch pine 46 Eastern redcedar 53 White oak 55 Northern red oak 57 Yellow-poplar 60 Beech - sugar maple 62 Silver maple - American elm 73 Southern redcedar 75 Shortleaf pine 79 Virginia pine SRM (RANGELAND) COVER TYPES : NO-ENTRY HABITAT TYPES AND PLANT COMMUNITIES : Wintergreen is commonly found in the understory of pine (Pinus spp.) and hardwood forests of New England. In western Nova Scotia and the Great Lake States, it occurs in jack pine (P. banksiana) and spruce-larch (Picea spp.-Larix spp.) forests [4,20,53,59]. It is a common understory species in maple-oak (Acer spp.-Quercus spp.) forests of upper Michigan . It is a dominant understory shrub of oak-poplar/fern (Quercus spp.-Populus spp./Pteridium spp.) communities of southern New York . Wintergreen is named as a dominant or codominant understory species in the following classifications: Habitat classification system field guide: northern Lake States Region (Upper Peninsula of Michigan and northeast Wisconsin) Forest-type studies in the Adirondack Region Field guide to forest habitat types of northern Wisconsin Vegetation of the Great Smoky Mountains Understory species commonly associated with wintergreen include huckleberries (Gaylussacia spp.), blueberries (Vaccinium spp.), raspberries (Rubus spp.), grapes (Vitis spp.), mountain-laurel (Kalmia latifolia), Virginia creeper (Parthenocissus quinquefolia), witchhazel (Hamamelis virginiana), bog Labrador tea (Ledum groenlandicum), partridgeberry (Mitchella repens), and lily-of-the-valley (Maianthemum canadense), [7,24,35,42].
SPECIES: Gaultheria procumbens
MANAGEMENT CONSIDERATIONS
IMPORTANCE TO LIVESTOCK AND WILDLIFE : Wintergreen is not taken in large quantities by any species of wildlife, but the regularity of its use enhances its importance. Its fruit persists through the winter and it is one of the few sources of green leaves in winter . White-tailed deer browse wintergreen throughout its range, and in some localities it is an important winter food. Other animals that eat wintergreen are wild turkey, sharp-tailed grouse, northern bobwhite, ring-necked pheasant, black bear, white-footed mouse, and red fox. Wintergreen is a favorite food of the eastern chipmunk, and the leaves are a minor winter food of the gray squirrel in Virginia [26,37]. PALATABILITY : NO-ENTRY NUTRITIONAL VALUE : NO-ENTRY COVER VALUE : NO-ENTRY VALUE FOR REHABILITATION OF DISTURBED SITES : NO-ENTRY OTHER USES AND VALUES : The leaves of wintergreen are used to make oil of wintergreen OTHER MANAGEMENT CONSIDERATIONS : Wintergreen is ordinarily plentiful in the woodlands of the Northeast, and no special care is needed to perpetuate it. Seedlings or clones are established by plantings beneath taller shrubs or in other partially shaded sites. When plants have established, fruit production is stimulated by thinning timber stands and removing overtopping vegetation . Wintergreen can be controlled by phenoxy herbicides .
SPECIES: Gaultheria procumbens
BOTANICAL AND ECOLOGICAL CHARACTERISTICS
GENERAL BOTANICAL CHARACTERISTICS : Wintergreen is a spreading, evergreen, rhizomatous shrub which grows 4 to 8 inches (10-20 cm) tall [5,11,28]. Wintergreen creeps along the ground, forming a dense carpet of shiny leaves that are 2 to 6 inches (5-15 cm) long. The small flowers are less than 0.5 inches (1.2 cm) long and are borne at the base of the leaves . The fruit is berrylike capsule with a large fleshy calyx . The roots are 1 inch (2.5 cm) or less in depth [14,31]. RAUNKIAER LIFE FORM : Hemicryptophyte Geophyte REGENERATION PROCESSES : Reproduction in wintergreen is both sexual and asexual. It typically reproduces vegetatively from rhizomes. Vegetative growth is initiated as additional branching on old stems, or as new stems on creeping rhizomes . The long, infrequently branching rhizomes distribute ramets over large areas; it exploits gaps in litter for clonal propagation [23,50]. Bird-disseminated seeds are probably the source of new plants colonizing old fields [32,41]. In the oak-pine upland forest of the Pine Barrens of New Jersey, wintergreen occurrence was positively correlated (p<0.05) with the presence of litter and dead wood . SITE CHARACTERISTICS : As long as the soil is acidic, wintergreen grows well on many substrates including peat, sand, sandy loam, and coal spoils. It has been found growing where soil pH ranged from 3.5 to 6.9 on the surface to 4.0 to 6.9 below the surface. However, a pH of 4.5 to 6.0 has been reported as optimum for growth, with 7.0 the maximum wintergreen tolerates. Wintergreen mainly occurs on moist sites but tolerates moisture conditions ranging from dry to poorly drained [2,32]. In jack pine communities in upper Michigan, wintergreen was present on xeric, transitional, and mesic sites with frequencies of 11, 62, and 86 percent, respectively . In Nova Scotia, wintergreen is found on the tops of ridges and knolls in very shallow soil . SUCCESSIONAL STATUS : Wintergreen is shade tolerant. Fruiting, however, usually occurs in openings [23,32,50]. It is a common understory species in the Northeast . In a Minnesota Norway pine (P. resinosa) forest, wintergreen had greatest abundance of cover under intermediate light intensities . Wintergreen is found in the oldest vegetation in Grass River Bog, an undrained sand plain in the Adirondacks . Wintergreen is part of the understory vegetation in climax pine forests of northern Minnesota . In eastern hemlock (Tsuga canadensis) climax forest in northeastern Pennsylvania, wintergreen frequency ranged from 0 to 6 percent . In the Algonquin Provincial Park, Ontario, wintergreen was present in early and climax stages of forest succession . Frequency in the birch-poplar (Betula spp.-Populus spp.) stage was 58 percent; it was "abundant" in the pine stage. Frequency was 36 percent in the fir-spruce (Abies spp.-Picea spp.) stage. Wintergreen was not present in the sugar maple (Acer saccharum) stage, but frequency was 14 percent in eastern hemlock climax forest . SEASONAL DEVELOPMENT : Wintergreen flowers from the end of May to September depending on geographic location [10,37]. In Illinois, wintergreen flowers initiated during June open in mid-July, with the fruit maturing in September . In New Jersey and Penn Sylvia, the flowering period is from mid-July through early August . The leaves usually persist throughout the winter [27,32]. The fruit may remain attached till the following spring .
SPECIES: Gaultheria procumbens
FIRE ECOLOGY
FIRE ECOLOGY OR ADAPTATIONS : Wintergreen is not well-adapted to fire that removes litter and/or the organic layer of soil. Rhizomes are restricted to the upper 0.8 to 1.2 inches (2-3 cm) of the organic layer, and wintergreen usually does not survive if the organic layer is removed by fire . The rhizomes are especially vulnerable to severe fire . If wintergreen survives, the fire was probably of short duration or light enough that the fire removed only aboveground vegetation and little litter . Wintergreen rhizomes can tolerate brief exposure to high temperatures. In one study its rhizomes were collected in spring, summer, and fall and subjected to wet heat. Maximum shoot growth and number of stems occurred after spring-collected rhizomes were placed in a water bath at 131 degrees Fahrenheit (55 deg C) for 5 minutes. Rhizomes died when subjected to a 140 degrees Fahrenheit (60 deg C) bath for 5 minutes . POSTFIRE REGENERATION STRATEGY : Rhizomatous low woody plant, rhizome in organic mantle Secondary colonizer - off-site seed FIRE REGIMES : Find fire regime information for the plant communities in which this species may occur by entering the species name in the FEIS home page under "Find Fire Regimes".
DISCUSSION AND QUALIFICATION OF PLANT RESPONSE : | https://www.fs.fed.us/database/feis/plants/shrub/gaupro/all.html |
Multiple internal and external factors translate into large-scale transformation programs for an organisation. One primary reason for them to not deliver the outcomes is a lack of a good governance model, its implementation and acceptance within the organisation. Strong governance should not only be practised at a corporate level but also at a business transformation program or project level. The governance operating model and its implementation ensure that the transformation objectives are met, and they are realised in the business-as-usual mode when the transformation program is implemented. Ignorance, lack of commitment or failure to setup a governance model can backfire and be a recipe for transformational disaster.
This article outlines the design considerations for setting up a governance operating model for transformation programs. It also describes a change governance process to further the effective implementation of the transformation program and transition to operations.
A governance operating model defines the methods, structure and interfaces through which governance is mobilised. It is an imperative for transformation programs and enterprise governance boards to enhance their control and enable senior management to implement initiatives.
Provide a streamlined approach to the review mechanisms and create efficiencies for key stakeholder groups and steering committee(s) in making decisions.
Establish clear roles and responsibilities of the members of the governance steering committee and how they interface not only with the enterprise governance board but also other departments and operations once the governance operating model is implemented.
Organise strategic, financial, compliance, operational and program level risk so that the governance committee can guide the program and/or operations to work in compliance with regulations and support the organisation’s objectives.
The governance operating model is crucial in the ability to deliver the program’s services to the organisation. Having an effective governance operating model means that decision rights and service standards are clearly defined, regularly communicated to all stakeholders, well understood and adhered to.
As shown in Figure 1, the Governance Steering Committee for a transformation program is guided and supported by the Enterprise Governance Board, which comprises of CxOs and senior executives. Depending on the size of the change initiative, there could be one governance steering committee for one transformation program and it will have a set of key stakeholders picked dynamically from various teams (e.g. Legal, Compliance, Procurement, Technology, etc.) as deemed relevant for the transformation program and are highly impacted by the program. The governance operating model will guide and support the program stakeholders to deliver the transformation program. It will also further support business-as-usual (BAU) teams once the transformation program has transitioned to operations. Once a transformation program has been absorbed into the company operations, the governance steering committee will cater to the governance issues arising out of the business-as-usual activities.
Identify key stakeholders who will be part of the governance model and which departments in the organisation are impacted.
Define boundaries of business areas which the governance should touch upon in the organisation depending on the scope of the program.
Spread the word about the transformation program & governance operating model and socialise the same with the larger enterprise.
Own and help to resolve changes to the artefact, process, and business capability.
Establish a RACI matrix and get a formal agreement of their roles and responsibilities from these owners and their delegates.
Review and endorsement of crucial updates to existing methodologies and frameworks i.e. insertion of checkpoints to connect with the governance committee if any major change is to be affected to any artefacts, business domains or processes.
Develop a change and communications plan to broadcast the governance operating model & committee and absorb its implementation in the organisation.
Agree on the frequency of governance committee meetings to be scheduled during the transformation and post implementation, log decisions and deviations, and publish the minutes of meetings.
Establish a single source of truth i.e. a repository of decisions taken during the previous governance forums as this will aid in taking future decisions.
Determine interfaces with the enterprise governance board. An enterprise-wide Governance Board will provide guidance and support to the changes across the organisation and help spawn governance committees for transformation programs as and when needed. The enterprise governance board will enable smooth implementation of governance operating model post implementation of transformation.
Establish business ownership of programs and initiatives and establish clear roles and responsibilities and interfaces with the enterprise governance board.
Once the transformation program has reached steady state and transitioned to operations, the governance steering committee will now perform the key governance functions required to sustain the change in business-as-usual mode.
Once the transformation has reached its steady and/or transitioned into its operations and the governance operating model has been implemented, a governance process is required to maintain the operating rhythm of the governance committee. Primary function of governance committee then is to provide guidance to the business architecture activity i.e. ascertain, accept and absorb change into the system. Figure 2 shows a process cycle that ensures than any change to the business processes, business capabilities, and artefacts in purview of the change are seamlessly absorbed into the organisation operations.
Initiate – A request for change can be initiated for a business process, business capability, or an artefact. Any new program, any business unit or any person within the organisation can be a Change Initiator and initiate a request for change. Change Requests can also originate from the discussions in the regular governance meetings.
The owner of the artefact, process, or business capability.
Validate – The request is directed to the Change Owner for the related process, capability or artefact, who will determine if it is a valid request by performing a high-level impact assessment. If it is minor change, and needs no further review, it can be sent directly to the Approve If it is a major change, it needs further work/review. The Change Owner can assign a Change Reviewer to work on the request and loop in additional teams who should be involved in the review.
Collaborate – Once the validation is complete and it is determined that the change requires further review, the Change Reviewer will perform a detailed impact assessment of the change and understand its impact to other business capabilities, processes, and artefacts. More reviewers from the relevant departments can be invited to perform the review of the impact analysis. The Change Owner monitors the progress. Once the Change Reviewer is satisfied, the change request along with the supporting documentation and high level solution recommendation is passed back to the Change Owner. Wherever the change impacts regulatory compliance, the legal staff and auditors will analyse the proposed solutions to ensure that they are within the legal boundaries of the organisation.
Approve – The Change Owner finalises the change. Depending on the impact of the change, the business unit that will be most impacted by the change request will have to own the change and appoint a Sponsor, who is typically the senior executive in the organisation. The Sponsor may call in meetings with the governance committee, change owner and his team to review the change request and finally accept or reject it.
Implement – Once the sponsor is satisfied with the reviews, s/he will set aside some budget for implementing the change and may request a business case for funding the change. This may follow the regular program execution cycle within the organisation. If the Sponsor is not satisfied with the reviews, additional information may be called for. If the Sponsor is still not satisfied or if the need for change has passed due to the changing business scenario, the Sponsor may take up the validity of the change request with the governance committee and Change Initiator and reach an agreement to store it for later use.
Close – Depending on the outcome of the Approve and Implement steps, the decisions taken during the processes are recorded in a governance log for future reference. The person or the program, who initiated the change request will also be notified of the outcome and kept updated throughout the process.
Figure 3 below describes the end-to-end process model for the change governance process.
Better visibility – The governance operating model, gives the enterprise governance board and the governance committee those eyes and ears into the transformation programs and the changes being made to the business capabilities, processes, and artefacts during operations.
Greater coordination and compliance – The end-to-end governance process streamlines the review and approval process for changes to a business capability, process, or an artefact. The governance log of decisions provides visibility of changes with appropriate reasoning. The robust governance processes enhance compliance by involving stakeholders from legal and regulatory departments at the right time thereby reducing risk.
Enhanced effectiveness – The governance operating model reduces the build-up of isolated approaches for managing change. As a result, action items are clearly de-marked for each stakeholder for the overall success of the transformation program and once it has transitioned to operations. The governance operating model ensures that the people aspect of the change is included in the approach and guarantees a greater chance of success once it is in business-as-usual mode.
The success of the governance operating model will be directly proportional to how clearly the objectives of the committee have been outlined by the operating model. An effective governance operating model is an essential element for every successful transformation program. The governance operating model supplements the efficiency and speed at which the organisation embeds the transformation into its operations to achieve productivity, compliance and economies of scale. It also ensures that the right changes are owned and made to the right business capability, processes, and artefacts and those decisions surrounding these changes are clear and relevant to the entire enterprise. Clarity of formal responsibilities assigned to people involved ensures that they are accountable for responsibilities that need to be delivered. Centralised decision-making safeguards alignment of business units towards a common transformational goal. | https://eapj.org/governance-operating-model-a-key-enabler-for-business-transformation/ |
eLearning Best Practices / Training Vs. Rote Memorization In Learning English: What Are The Differences?
Training Vs. Rote Memorization In Learning English: What Are The Differences?
Learning is the conscious effort of rote memorization of facts in English. Training is a subconscious activity of the learner in which he/she develops the skill of thinking in English and speaking in it effortlessly.
The rote memorization technique is based on repetition and memorization of individual items. The idea is that one will be able to quickly recall the meaning of the material the more one repeats it. When we learn all subjects in school, we try to remember information, and rote memorization is the only technique available to this end. However, adults experience frustration in learning a foreign language because they apply rote memorization to it as to all other subjects, and in most cases, they fail.
To explain why an adult can’t learn a foreign language by rote memorization, I need to remind you about two concepts, introduced by Nobel Prize winner Daniel Kahneman. We think slow and fast because we have two different systems of the mind. System 1 operates automatically and quickly, with little or no effort and no sense of voluntary control. System 2 allocates attention to the effortful mental activity and, therefore, is slow. For example, rote memorization belongs to System 2, whereas expression of our feelings and thoughts, i.e. speech, belongs to System 1.
If you learn a foreign language with the objective of communicating in it, you need to develop it as System 1 – communication operates automatically and quickly. That is why the conventional methods of learning a foreign language, which belong to rote memorization, should be substituted with training language skills. Training is the best alternative for adults since it belongs to System 1. Driving a car, figure skating, playing a musical instrument, martial arts skills, or speaking a foreign language – all of these skills are trained as System 1. During training of all these skills, the brain finds and records the patterns that it can perform after training without conscious effort and with minimal attention, i.e. effortlessly.
There is another reason why adults can’t use rote memorization – in adults, the native language comes to dominate the linguistic map space and all incoming information must be translated into the mother tongue to become understandable. This phenomenon is known as "The Tyranny of the Mother Tongue". Most adults, when learning a foreign language, subconsciously revert to cross-translation to and from their mother tongue.
Cross-translation is the main barrier most teachers and educators ignore. When you cross-translate, you think in your native language while trying to speak in a foreign language. This process is slow (System 2) and does not allow you to produce natural speech or understand the spoken language. It is worth bearing in mind that even if the teaching is in the target language exclusively and formally, with no translation drills in class sessions, most adults (about 95%) still revert to subconscious cross-translation. Your speed of talking in a foreign language is an easy check. Your normal talking speed in your native language is probably between 90 and 130 words per minute. If you speak the new language in short sentences with a speed of about 60 words per minute, it is a sign that you have a cross-translation problem. You are constantly reverting to your mother tongue while trying to express your thoughts in a foreign language, although you are not aware of this process.
With only 370 million native English speakers on the planet and over 1.5 billion people using English worldwide, non-native English speakers outnumber native speakers 4:1. The sheer volume of non-native speakers has impacted English so much that it has morphed into a near relative to what we have traditionally taught and understood as English. The new English isn't broken - it's global and the only people who can't be understood in the global village are native English speakers. In spite of the great progress in advancement of English as a global language and spending billions of dollars on learning it, we observe a low English proficiency in such countries as China (#36), Japan (#37), Brazil (#41 out of 80 countries), and many others according to the world's largest ranking of countries by English skills measured annually by EF Education First.
To solve the global problem of low English proficiency we need to find an alternative to the conventional rote memorization methods and implement it as soon as possible. Rote memorization is limited to conscious learning of the facts about a foreign language; it is a typical System 2. Training English skills consist in training the mind to think and speak English as a subconscious process; it is a typical System 1.
"Language acquisition is a subconscious process (System 1 – AZ); language acquirers are not usually aware of the fact that they are acquiring language, but are only aware of the fact that they are using the language for communication. The result of language acquisition, acquired competence, is also subconscious. We are generally, not consciously, aware of the rules of the languages we have acquired. Instead, we have a "feel" for correctness. Grammatical sentences "sound" right, or "feel" right and errors feel wrong, even if we do not consciously know what rule was violated".
The acquisition method did not reach the mainstream of language teaching methods because it lacked the detailed pedagogy that would allow implementing it for self-training English skills. The acquisition method didn’t have any mobile applications, which are mandatory for the digital learners to consider it as the main training tool for acquiring English skills.
Training English skills (System 1) can be achieved by the simultaneous training of reading, listening, and speaking skills. For the sake of brevity, we would call the concurrent triple activity of reading, listening, and speaking as a simultaneous repetition.
Here, we face a strange dilemma: how to explain that repetition, associated with rote memorization, should be avoided; but simultaneous repetition, associated with training language skills, should be used? Here is why. Simple repetition is performed consecutively after listening; it is associated with System 2. Simultaneous repetition is performed concurrently; it is associated with System 1.
Simultaneous repetition results in the habit of thinking in the native language being turned off automatically since performing 3 actions at the same time fully occupies your attention and you cannot do anything else, including cross-translating. Simultaneous repetition helps learners establish direct wiring between words in English and images or associations which they describe without reverting to cross-translation into the native language. Learners start thinking in English from the first lesson. New learning habits of digital learners, the technological and pedagogical advancements in the last decades call for a new definition of training English skills.
I propose the following definition. The training of English skills is a subconscious process, in which all English skills—understanding, reading, listening, speaking, pronunciation, and intuitive grammar—are trained concurrently. The act of speaking combined with reading the text and listening to the recording develops in the learner’s brain the language patterns and intuitive grammar which the learner after multiple repetitions and training drills uses without much effort, i.e. subconsciously.
The best training results are obtained when the same mobile application is used for self-training of English skills and for guided training in the classroom or online courses. The details of such mobile application are described in this article.
Keep in mind that according to this definition, video lessons do not belong to training. The video lessons offered by dozens of companies on the internet should be modified to be considered as a tool for training English skills. They need to implement simultaneous repetition and drills should be modified so as to allow their completion without much effort, i.e. subconsciously. This article demonstrates which modifications should be incorporated into video lessons to make them suitable for training English skills. | https://elearningindustry.com/rote-memorization-in-learning-english-vs-training |
As expected, the Swiss economy continued to recover during the second quarter, if somewhat less vigorously. GDP growth was driven by the service sector. In particular, consumer spending has picked up substantially in leisure, hospitality and travel since the lifting of public health restrictions.
However, the current economic indicators present a mixed picture. Favourable employment data should continue to prop up consumer spending, given that inflation in Switzerland remains modest by international standards. Parts of the domestic economy should therefore continue to recover. Nonetheless, the challenging international environment is likely to exert increasing pressure on the more cyclical segments of export-oriented industries. The group of experts has significantly lowered its expectations for global demand; in particular, growth in the euro zone, the United States and China, Switzerland’s key trading partners, is expected to be weaker than assumed in the June forecast. Overall, the expert group expects Swiss economic growth to lose momentum in the near term.
Beyond that, the general state of the Swiss economy will depend largely on how the situation evolves in the global economy and in regard to energy supplies. The sharp drop in Russian gas flows and the limited availability of French nuclear power stations have raised the risk of energy shortages in Europe. On the other hand, European gas storage facilities have been swiftly replenished so far, and various energy-saving measures by households and companies are set to lower energy consumption considerably over the coming months. The expert group is basing its forecast on the assumption there will not be a severe energy crisis with widespread production stoppages.
Against this backdrop, the expert group projects economic growth for Switzerland of 2.0% in 2022 (GDP adjusted for sporting events). The downward revision since the June forecast (2.6%) is partially explained by the fact that, according to the latest data, the recovery in 2021 was stronger than initially thought, thereby leaving less catch-up potential overall.
|For the year 2023, the expert group has lowered its GDP growth forecast significantly to 1.1% (adjusted for sporting events; forecast from June: 1.9%). In the context of stronger price dynamics and a tighter monetary policy, demand abroad up to the end of the forecast horizon is likely to expand less than assumed in the June forecast. This is a burden on the Swiss export economy. Moreover, rising energy prices means that Switzerland can also expect higher infla- tion rates than originally projected (upward revision of the inflation forecast to 3.0% for 2022 and 2.3% for 2023). In turn, this is likely to result in a cooling of domestic demand.
|
Following a strong first half of the year, employment growth is expected to wane in line with the economic slowdown, with unemployment starting to edge up in the fourth quarter. The average annual unemployment rate is projected to come in at 2.2% for 2022, followed by 2.3% in 2023.
Economic risks
The Swiss economy would be severely affected if there were to be serious gas or electricity shortages in Europe with large-scale production stoppages and a marked downturn. Such a negative scenario2 would likely lead to high domestic price pressures and, at the same time, a downward trend in the economy.
In the face of rising interest rates, the risks associated with the surge in global debt are inten- sifying. There is an increased probability of financial market corrections. In real estate, too, risks remain both in Switzerland and abroad. At the same time, there is the danger of inflation proving more persistent than previously assumed. This could make it necessary to adopt a tighter monetary policy internationally.
Pandemic-related setbacks cannot be ruled out, for example as a result of new virus variants. In particular, China’s economy could be further weakened by ongoing strict containment measures, with repercussions on the global economy.
It is also possible, however, that the economy will fare better than projected. This could be the case, for example, if the energy situation turns out to be milder than expected or eases more quickly. Such a positive scenario2 would likely mean lower inflation rates and more robust demand at home and abroad. | https://snbchf.com/2022/09/statistics-slowdown-horizon/ |
RTAS is a top-tier conference with a focus on systems research related to embedded systems and time-sensitive systems. The broad scope of RTAS ranges from traditional hard real-time systems to embedded systems without explicit timing requirements, including latency-sensitive systems with informal or soft real-time requirements. RTAS’23 has two main tracks:
- Track 1: Systems and Applications;
- Track 2: Applied Methodologies and Foundations.
RTAS’23 will be part of the CPS-IoT Week in San Antonio, Texas, from May 9-12, 2023.
News
- Artifact Evaluation
The information on Artifact Evaluation is now available on this page.
- Brief Presentation Call-for-Papers
The Brief Presentations (BP) Track offers researchers and practitioners an opportunity to present their industry-relevant experience, ongoing work, published yet not presented papers, and demos, to the RTAS and broader CPS-IoT Week audience. Details on this page.
- Submission is Closed
The RTAS submission deadline has passed and we have closed the submission portal.
We wish the authors good luck with their submissions to RTAS 2023.
- Double-Blind Submission Requirements
RTAS 2023 will follow a double-blind submission process. The double-blind submission requirements can be found on this page.
- The Website is Online
The RTAS 2023 is online! The call for papers is published which is available here.
Sponsors
RTAS is sponsored by the IEEE Computer Society Technical Committee on Real-Time Systems. | http://2023.rtas.org/ |
AI is multiple technologies combined to sense, think, and act as well as to learn from experience and adapt over time.
- Sense refers to pattern recognition, machine perception, biometrics, speech recognition, computer vision, and affective computing.
- Think refers to natural language processing, advanced analytics, knowledge representation and reasoning, machine learning, deep learning, conversational interfaces, and cognitive computing.
- Act refers to search, question answering, recommender systems, expert systems, planning and scheduling, robotic process automation, chatbots, virtual assistants, robots, autonomic computing, and autonomous systems. | http://project10x.com/artificial-intelligence/ |
CROSS-REFERENCE TO RELATED APPLICATION
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
DETAILED DESCRIPTION OF THE INVENTION
This application claims the benefit of U.S. Provisional Application No. 61/256,065, filed Oct. 29, 2009, which application is incorporated herein by reference for all purposes.
This invention relates generally to electric rotary lawnmowers and, more particularly, to a compact battery-operated riding rotary lawnmower powered by two sealed dust-proof air-cooled DC motors wherein one motor drives the cutting blades and the other powers hydraulic motors to drive the rear wheels.
Battery-operated riding mowers are known which have three wheels and reel-type blades in front of the vehicle. The reel blades rotate vertically in response to the forward motion of the mower. These mowers are useful mainly for mowing golf putting greens. Rotary blades are not suitable for these mowers because they would cause a lack of balance and be unstable. U.S. Pat. No. 4,145,864, issued to Brewster, discloses a battery-powered push rotary lawnmower. This lawnmower has a single motor, with a motor controller and potentiometer, which rotates a blade horizontally under the motor. The wheels are not powered by the motor. A battery-operated riding rotary lawnmower is desirable because it would operate cleaner, more dependably, and with less maintenance than a gasoline powered riding rotary lawnmower.
U.S. Pat. No. 7,578,116 discloses a battery-operated riding rotary lawnmower having batteries positioned in a U-shaped array around the right side, left side, and rear end of the chassis. The batteries are above and near the rear wheels to maintain a low center of gravity. The weight of the batteries is evenly distributed over the rear wheels to maintain balance. A single electric motor is positioned within a central portion of the U-shaped array of batteries and drives both the rotary cutting blades and the rear wheels. The use of a single motor in this system requires relatively complex electronics including a motor controller, a speed controller, a potentiometer, and a tachometer, in order to operate the cutting blades and drive transmissions independently. In some cases it may be desirable to simplify the system by using one motor to operate the cutting blade and one motor to operate the drive transmission. However, the use of two motors requires the riding mower to have an excessive length. What is needed is a two-motor system that will allow a compact battery-operated riding rotary mower.
The present invention is a battery-operated riding mower having a chassis with two rear wheels. Each rear wheel has a hydraulic motor attached thereto. The chassis also has front end with two caster-type wheels, a cutting blade deck having one or more rotary cutting blades, and a power compartment having a seat attached thereto. A plurality of batteries are connected in series and positioned evenly on the right side and left side of the chassis to distribute their weight evenly. A first electric motor is positioned near the rear of the power compartment and a second electric motor is positioned near the front of the power compartment. The first electric motor is connected to one or more cutting blades to drive the cutting blades, and the second electric motor is connected to the hydraulic motors to drive the rear wheels. Two motion control levers operate the hydraulic motors, wherein the motion control levers will actuate the hydraulic motors to rotate the rear wheels forward when the motion control levers are pushed in a first direction, to rotate the rear wheels in reverse when pulled in a second opposite direction, to brake the rear wheels when placed in a neutral position, and cause the mower to turn when one motion control lever is pushed or pulled farther than the other motion control lever. The first electric motor has a drive belt or chain to rotate the cutting blades, and the second electric motor has a drive belt or chain to drive the hydraulic motors, wherein the drive belt or chain of the second electric motor is positioned above the drive belt or chain of the first electric motor. The electrical circuit has two switches, each switch having a solenoid system, whereby one switch will turn on or off the first electric motor and the other switch will turn on or off the second electric motor. Each electric motor is sealed to prevent dust from entering the electric motor. The electric motor has an outer circumference with a plurality of cooling fins attached thereto. A fan is attached to one end of a central drive shaft of the electric motor, and a fan duct is positioned over the plurality of cooling fins and attached thereto. The fan will force air through the fan duct and across the cooling fins as the central shaft turns, thereby preventing the electric motor from overheating during operation. A trailer may be hitched to the riding mower, wherein the trailer carries batteries to power the electric motors.
An advantage of the present invention is a compact electric riding mower powered by batteries and driven by two electric DC motors.
Another advantage is a riding mower that uses hydraulic motors to drive the rear wheels forward or in reverse or to brake the wheels.
Another advantage is electric motors that are sealed and air-cooled to protect them from dust accumulation and overheating during operation.
Another advantage is even weight distribution of the batteries and electric motors on the chassis to provide stability and a low center of gravity to the riding mower.
Another advantage is no requirement for complex electronics including a motor controller, a speed controller, a potentiometer, and a tachometer.
Another advantage is an electric riding mower that is simple and inexpensive to manufacture, and easy to maintain and clean.
Another advantage is an electric riding mower that can carry its power supply of batteries on a trailer hitched to the riding mower.
While the following description details the preferred embodiments of the present invention, it is to be understood that the invention is not limited in its application to the details of construction and arrangement of the parts illustrated in the accompanying drawings, since the invention is capable of other embodiments and of being practiced in various ways.
FIG. 1
FIGS. 5-7
10
10
30
10
50
60
11
12
13
14
15
14
16
17
18
19
20
14
70
80
shows a side view of riding mower of the present invention. Mower has 8 6-volt deep cycle batteries wired in series (see ). The mower has a front end and a rear end , a chassis with a pair of, preferably, caster-type front wheels , a pair of rear wheels , a power compartment , a seat positioned on the power compartment , two motion control levers , a cutting blade deck showing a cutting blade , a deck blade pulley , and a deck idler pulley . The power compartment has a front end and a rear end .
FIG. 2
14
21
80
14
21
22
10
17
19
18
20
23
21
22
19
20
21
18
24
21
70
14
24
25
60
10
26
13
26
27
29
25
27
13
29
28
29
25
27
28
23
19
20
22
shows a side view of the arrangement of the motors, pulleys, and drive belts, all of which may be contained in the power compartment . Electric blade motor is positioned near the rear end of the power compartment . Electric blade motor has a pulley . Near the front end of riding mower is the blade deck having blade pulleys attached to blades , and idler pulleys . A drive belt connects blade motor and pulley to the blade deck pulleys and deck idler pulleys so that blade motor can rotate cutting blades (not shown) at a desired rpm. Electric drive motor is positioned in front of blade motor , toward the front end of the power compartment . Electric drive motor has a pulley . At the rear end of riding mower are hydraulic motors which drive the rear wheels to rotate or brake as desired. Hydraulic motors have pulleys . A drive belt connects the drive motor pulley to hydraulic motor pulleys to rotate the rear wheels . The drive belt also engages an idler pulley . The drive belt and pulleys , , and are positioned above drive belt and pulleys , , and .
FIG. 3
19
18
20
21
23
18
26
13
13
24
23
26
13
shows a bottom view of the arrangement of the motors, pulleys, and drive belts. Preferably, there are two blade pulleys attached to cutting blades (not shown) and two idler pulleys . Blade motor drives the drive belt to rotate the cutting blades . There is a hydraulic motor attached to each rear wheel to drive wheels . Drive motor drives the drive belt to power the hydraulic motors to drive the rear wheels .
FIGS. 4-6
FIG. 4
30
14
30
14
80
14
30
13
30
13
21
24
30
70
80
14
show various arrangements of the batteries within and adjacent to the power compartment , with the preferred arrangement shown in . The batteries are positioned in a U-shaped array around the right side and left side of the power compartment , and may also be placed around the rear end of the power compartment . The batteries are placed above and near the rear wheels to maintain a low center of gravity. The weight of the batteries is evenly distributed over the rear wheels to maintain balance. The batteries are connected in series. The electric motors , are, preferably, positioned within a central portion of the array of batteries for balance and are positioned between the front end and rear end of the power compartment .
FIG. 7
21
22
33
31
34
32
30
30
30
21
24
21
24
33
21
34
24
illustrates the electrical wiring of a simple solenoid switch system to turn on and off blade motor and drive motor . A first on/off switch is connected to a first solenoid and a second on/off switch is connected to a second solenoid . The positive terminals of each solenoid are connected to the positive terminal of the series of batteries , and the negative terminal of each solenoid is connected to the negative terminal of the series of batteries . The negative terminal of the series of batteries is connected to the negative terminals of electric motors and , and a positive terminal of each solenoid is connected to the positive terminals of electric motors and . In this manner, the switch can turn on and off cutting blade motor and switch can turn on and off drive motor .
16
26
16
26
26
16
10
16
10
10
16
The motion control levers control the forward, backward, and braking action of the hydraulic motors by methods well known in the art. When the motion control levers are in a neutral position a braking mechanism is activated in the hydraulic drive motors and no fluid passes in either direction through the drive motors . When the motion control levers are pushed forward, for example, the riding mower will move forward. When the motion control levers are pulled backwards, for example, the riding mower will move backwards. The riding mower will turn when one motion control lever is pushed or pulled farther than the other.
FIG. 8
FIG. 9
51
10
51
52
53
11
60
10
30
21
24
51
10
shows a side view of a trailer which can be attached to mower . Trailer has one or more wheels and may be attached by a hitch assembly to the chassis at the rear end of the mower . The trailer may carry one or more batteries to power the motors , . shows a top view of the trailer with an array of batteries to power the riding mower .
A major problem that can occur with riding lawnmowers powered by electric motors is that dust can get into the motor. If dust accumulates in the motor it may overheat and burn out, or otherwise become damaged. A preferred embodiment of the present invention is an electric powered riding lawn mower that has 72-, 48-, 36-, or 24-volt DC brushed sealed dust-proof motors.
FIG. 10
FIG. 11
FIG. 12
90
91
92
93
91
94
95
96
91
97
92
95
97
94
91
92
98
91
92
91
90
shows a perspective view of a sealed dust-proof DC motor assembly of the present invention. The DC motor has a plurality of longitudinal fins attached on the outer circumference of the motor . A top surface has a fan assembly attached to a central drive shaft of motor . A fan duct is positioned over the plurality of cooling fins and is attached thereto. In operation, the fan assembly draws air into the fan duct at the top surface of motor and directs the air flow over the cooling fins and out through the duct at the opposite bottom end of motor . The air flow across the cooling fins prevents the sealed motor from overheating during operation. shows a top view of the sealed dust-proof DC motor assembly , and shows a bottom view thereof.
The foregoing description has been limited to specific embodiments of this invention. It will be apparent, however, that variations and modifications may be made by those skilled in the art to the disclosed embodiments of the invention, with the attainment of some of all of its advantages and without departing from the spirit and scope of the present invention. For example, any suitable type of 6-volt to 12-volt DC batteries can be used to power the electric riding mower of the present invention. DC or AC electric motors may be employed. One or more cutting blades may be used. Any suitable type of instrument panel can be used, and any suitable type of cutting deck lift lever may be used. Any suitable type of sealant may be used to seal the motors. Cooling fins may be constructed of any suitable type of metal. Air may be driven from the bottom end of the motor and out of the fan duct at the top of the motor. Drive chains and sprockets may be used instead of drive belts and pulleys.
It will be understood that various changes in the details, materials, and arrangements of the parts which have been described and illustrated above in order to explain the nature of this invention may be made by those skilled in the art without departing from the principle and scope of the invention as recited in the following claims.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
shows a side view of the riding mower of the present invention.
FIG. 2
shows a side view of the arrangement of the motors, pulleys, and drive belts.
FIG. 3
shows a bottom view of the arrangement of the motors, pulleys, and drive belts.
FIGS. 4-6
show various arrangements of the batteries within and adjacent to the power compartment.
FIG. 7
illustrates the electrical wiring of a solenoid switch system to turn on and off the blade motor and the drive motor.
FIGS. 8-9
illustrate a trailer that can be hitched to the riding mower to carry the batteries which power the electric motors.
FIGS. 10-12
illustrate an air-cooled, DC, brushed, sealed, and dust-proof motor for driving the cutting blades and hydraulic motors of the riding mower. | |
Great location in the heart of Historic Humble. The house is in need of repair. Seller will not do repairs.Washer and dryer stay. The range also stays but needs minor repair.
Sold Price Range:
$50,001 - $60,000
Listing Status:
Sold
Address:
507 4th St
City:
Humble
State:
TX
Zip Code:
County:
Subdivision:
Benders Sec 02 View subdivision price trend
Property Type:
Single Family
Bedrooms:
3 Bedroom(s)
Baths:
1 Full Bath(s)
Garage(s):
1 / Detached
Stories:
1
Style:
Traditional
Year Built:
1939 / Appraisal District
Building Sqft.:
1,512 /Appraisal District
Lot Size:
6,800 Sqft. /Appraisal District
Market Area:
MLS#:
57956324 (HAR)
Rooms/Lot Dimensions
Mstr Bedroom:
10x10
Bedroom:
10x10
3rd Bed:
10x10
Interior Features
Heating:
Space Heater
Cooling:
Window Units
Exterior Features
Roof:
Composition
Foundation:
Block & Beam
Private Pool:
No
Exterior Type:
Wood
Water Sewer:
Public Water, Public Sewer
Selling Agent and Brokerageminimize
Selling Agent
Margie Parker
Click to view phone
Selling Broker
Elite Texas Properties
12320 Barker Cypress #600-224
Cypress, TX 77429
Want to know how much is this home worth?Request Home Value
Property Taxminimize
3 Years of Appraised Values
Cost/sqft based on Tax Value
|Tax Year||Cost/sqft||Tax Assessment||Change|
|2017||$37.77||$57,102||3.57%|
|2016||$36.46||$55,132||-24.32%|
|2015||$48.18||$72,848||--|
2017 Harris County Appraisal District Tax Value
|Market Land Value:||$19,075|
|Market Improvement Value:||$38,027|
|Total Market Value:||$57,102|
|
|
Tax History
|2017 Assessed Value/Appraisal District:||$57,102|
|2016 Assessed Value/Appraisal District:||$55,132|
|2015 Assessed Value/Appraisal District:||$72,848|
2017 Tax Rates
|HUMBLE ISD:||1.5200 %|
|HARRIS COUNTY:||0.4180 %|
|HC FLOOD CONTROL DIST:||0.0283 %|
|PORT OF HOUSTON AUTHORITY:||0.0126 %|
|HC HOSPITAL DIST:||0.1711 %|
|HC DEPARTMENT OF EDUCATION:||0.0052 %|
|N HARRIS-MONT COLLEGE DISTRICT:||0.1078 %|
|HUMBLE CITY OF:||0.2255 %|
|Total Tax Rate:||2.4885 %|
Estimated Mortgage/Taxminimize
$ 405 Monthly
|Estimated Monthly Principal & Interest (Based on the calculation below)||$ 286|
|Estimated Monthly Property Tax (Based on Tax Assessment 2017)||$ 118|
|Home Owners Insurance||Get a Quote|
Neighborhood Factsminimize
2016 Subdivision Facts
Subdivision Name:
BENDERS
County / Zip Code:
77338
Single Family Properties:
198
Average Bedrooms:
2.75
Average Baths:
1.66
Median Square Ft.:
1,320
Median Lot Square Ft.:
6,800
Median Year Built:
1940
Median Appraised Value:
$100,382
Neighborhood Value Range:
$49 - $170 K
Median Price / Square ft.:
$90.05
Schoolsminimize
School information is computer generated and may not be accurate or current. Buyer must independently verify and confirm enrollment. Please contact the school district to determine the schools to which this property is zoned.
ASSIGNED SCHOOLS
Humble Elementary School Elementary . PK - 05 . HUMBLE ISD
Ross Sterling Middle School Middle . 06 - 08 . HUMBLE ISD
Humble High School High . 09 - 12 . HUMBLE ISD
View Nearby Schools ↓
Property Mapminimize
Nearby places and schools.
Drive Time
507 4th St Humble TX 77338 was recently sold. It is a 1,512 SQFT, 3 Beds, 1 Full Bath(s) in Benders Sec 02. | https://www.har.com/507-4th-st/sold_57956324 |
TECHNICAL FIELD
The present invention relates to a sensor device.
RELATED DOCUMENT
PATENT DOCUMENT
Japanese Unexamined Patent Publication No. 2016-6403
Patent Document 1:
Japanese Unexamined Patent Publication No. 2020-16481
Patent Document 2:
BACKGROUND ART
In recent years, various sensor devices such as light detection and ranging (LiDAR) have been developed. A sensor device includes a movable reflection unit such as a micro-electro-mechanical systems (MEMS) mirror. The sensor device scans a target object such as an object existing outside the sensor device by reflecting electromagnetic waves such as infrared radiation toward a predetermined scanning range by the movable reflection unit.
Patent Document 1 describes placing a reflection member at one end of a scanning range of a movable reflection unit in order to find a direction in which laser light reflected by the movable reflection unit is output. The laser light reflected by the reflection member is received by a light receiving unit. Based on the receiving result by the light receiving unit, the distance from the movable reflection unit to the reflection member is calculated. Based on the distance from the movable reflection unit to the reflection member, the direction in which the laser light reflected by the movable reflection unit is output is calculated.
Patent Document 2 describes providing a reflection member on a housing accommodating members constituting a sensor device, such as a movable reflection unit, and detecting a deviation of a scanning position of the movable reflection unit with laser light reflected by the reflection member.
SUMMARY OF THE INVENTION
TECHNICAL PROBLEM
A sensor device may be provided with a detection unit for detecting a deflection angle of a movable reflection unit. However, the sensitivity of the detection unit may have temperature dependence. In this case, a detection result by the detection unit may deviate from a detection result in a design state.
Examples of a problem to be solved by the present invention include amending a deviation of a detection result of a deflection angle of a movable reflection unit by a detection unit from a detection result in a design state.
SOLUTION TO PROBLEM
a movable reflection unit reflecting an electromagnetic wave toward inside a predetermined scanning range;
a detection unit detecting a deflection angle of the movable reflection unit;
a receiving unit receiving the electromagnetic wave reflected or scattered by a structure positioned in the scanning range; and
an amendment unit amending a detection result by the detection unit, based on a receiving result of the electromagnetic wave by the receiving unit, the electromagnetic wave being reflected by the structure.
The invention according to claim 1 is a sensor device including:
BRIEF DESCRIPTION OF THE DRAWINGS
Fig. 1
is a diagram illustrating a sensor device according to an embodiment.
Fig. 2
is a diagram illustrating an example of a relation among a structure, a scanning line of a movable reflection unit, and spots projected on the scanning line.
Fig. 3
Fig. 2
is a graph illustrating an example of signals generated in a receiving unit by a first spot and a second spot that are illustrated in .
Fig. 4
is a graph illustrating an example of changes in a receiving value of the signal generated in the receiving unit by the first spot and a receiving value of the signal generated in the receiving unit by the second spot when a deflection angle of the movable reflection unit in a second direction varies.
Fig. 5
Fig. 4
is a graph illustrating the difference between the two receiving values illustrated in .
Fig. 6
is a graph illustrating an example of changes in a receiving value of a signal generated in the receiving unit by a third spot and a receiving value of a signal generated in the receiving unit by a fourth spot when a deflection angle of the movable reflection unit in a first direction varies.
Fig. 7
Fig. 6
is a graph illustrating the difference between the two receiving values illustrated in .
Fig. 8
is a diagram illustrating an example of a relation among a structure, a scanning line of a movable reflection unit, and spots projected on the scanning line in a sensor device according to a modified example.
Fig. 9
is a graph illustrating an example of changes in a receiving value of a signal generated in a receiving unit by a ninth spot and a receiving value of a signal generated in the receiving unit by a tenth spot when a deflection angle of the movable reflection unit in a first direction varies.
Fig. 10
Fig. 9
is a graph illustrating the difference between the two receiving values illustrated in .
Fig. 11
is a diagram illustrating an example of a relation among the structure, the ninth spot, and the tenth spot in a reference state.
Fig. 12
is a diagram illustrating an example of a relation among the structure, the ninth spot, and the tenth spot when a deflection angle of the movable reflection unit in the first direction is smaller than a deflection angle in the reference state.
Fig. 13
is a diagram illustrating an example of a relation among the structure, the ninth spot, and the tenth spot when the deflection angle of the movable reflection unit in the first direction is greater than the deflection angle in the reference state.
Fig. 14
is a graph illustrating an example of a relation between a deflection angle of the movable reflection unit in a second direction, and the difference between a receiving value of a signal generated in the receiving unit by an eleventh spot and a receiving value of a signal generated in the receiving unit by a twelfth spot.
Fig. 15
is a diagram illustrating an example of a relation among the structure, the ninth spot, the tenth spot, the eleventh spot, and the twelfth spot in the reference state.
Fig. 16
is a diagram illustrating an example of a relation among the structure, the ninth spot, the tenth spot, the eleventh spot, and the twelfth spot when the deflection angle of the movable reflection unit in the second direction is smaller than the deflection angle in the reference state.
Fig. 17
is a diagram illustrating an example of a relation among the structure, the ninth spot, the tenth spot, the eleventh spot, and the twelfth spot when the deflection angle of the movable reflection unit in the first direction is greater than the deflection angle in the reference state.
DESCRIPTION OF EMBODIMENTS
An embodiment of the present invention will be described below by using drawings. Note that, in every drawing, similar components are given similar signs, and description thereof is omitted as appropriate.
Fig. 1
is a diagram illustrating a sensor device 10 according to the embodiment.
Fig. 1
Fig. 1
In , a first direction X and a second direction Y intersect each other and specifically are orthogonal to each other. In , the first direction X is a horizontal direction. A positive direction of the first direction X being a direction of an arrow indicating the first direction X is leftward viewed from a movable reflection unit 120 to be described later toward a scanning range, to be described later, of the movable reflection unit 120. A negative direction of the first direction X being a direction opposite to the direction of the arrow indicating the first direction X is rightward viewed from a side on which the movable reflection unit 120 is positioned toward the scanning range of the movable reflection unit 120. The second direction Y is a vertical direction. A positive direction of the second direction Y being a direction of an arrow indicating the second direction Y is upward. A negative direction of the second direction Y being a direction opposite to the direction of the arrow indicating the second direction Y is downward.
As is obvious from the description herein, the first direction X may be a direction different from the horizontal direction, and the second direction Y may be a direction different from the vertical direction.
Fig. 1
Fig. 1
The sensor device 10 includes an emission unit 110, the movable reflection unit 120, a detection unit 122, a receiving unit 130, a beam splitter 140, an amendment unit 150, a first adjustment unit 162, and a second adjustment unit 164. In , a dotted line extending over the emission unit 110, the movable reflection unit 120, the receiving unit 130, the beam splitter 140, and a scanning line L indicates electromagnetic waves propagating over the emission unit 110, the movable reflection unit 120, the receiving unit 130, the beam splitter 140, and the scanning line L. In , the electromagnetic waves reflected from the movable reflection unit 120 toward the scanning line L are projected toward a roughly central part of a region where the scanning line L is formed.
The emission unit 110 emits electromagnetic waves such as pulse-shaped infrared radiation a certain time intervals. For example, the emission unit 110 is an element, such as a laser diode (LD), that can convert electricity such as current into electromagnetic waves such as light. The electromagnetic waves emitted from the emission unit 110 are reflected by the beam splitter 140 and enters the movable reflection unit 120.
The movable reflection unit 120 reflects electromagnetic waves emitted from the emission unit 110 toward inside a predetermined scanning range. The scanning range of the movable reflection unit 120 is a range on which the electromagnetic waves reflected by the movable reflection unit 120 can be projected. For example, the movable reflection unit 120 is a biaxial MEMS mirror. For example, the movable reflection unit 120 is sinusoidally driven along the first direction X and is driven in a sawtooth wave shape along the second direction Y at a frequency lower than that of the sinusoidal wave along the first direction X. In other words, the first direction X is a resonance drive direction of the movable reflection unit 120, and the second direction Y is a linear drive direction of the movable reflection unit 120.
The detection unit 122 detects deflection angles of the movable reflection unit 120 in the first direction X and the second direction Y. For example, the detection unit 122 is a piezoresistor provided on the movable reflection unit 120. The deflection angles of the movable reflection unit 120 in the first direction X and the second direction Y are controlled based on a detection result by the detection unit 122. Accordingly, when the sensitivity of the detection unit 122 has temperature dependence, the detection result of the deflection angles of the movable reflection unit 120 by the detection unit 122 may vary according to the temperature, and as a result, the deflection angles of the movable reflection unit 120 may vary according to the temperature. As will be described later, a detection result of the deflection angles of the movable reflection unit 120 by the detection unit 122 can be amended by the amendment unit 150, according to the present embodiment.
Some of electromagnetic waves being emitted from the emission unit 110 and being reflected by the movable reflection unit 120 are reflected or scattered by a target object such as an object existing outside the sensor device 10. The electromagnetic waves return to the movable reflection unit 120, enter the receiving unit 130 after sequentially undergoing reflection by the movable reflection unit 120 and transmission by the beam splitter 140, and are received by the receiving unit 130. For example, the receiving unit 130 is an element, such as an avalanche photodiode (APD), that can convert electromagnetic waves such as light into an electric signal such as current.
Some other of the electromagnetic waves being emitted from the emission unit 110 and being reflected by the movable reflection unit 120 are reflected or scattered by a structure 200 positioned closer to the movable reflection unit 120 than the target object is. The electromagnetic waves return toward the movable reflection unit 120, enter the receiving unit 130 after sequentially undergoing reflection by the movable reflection unit 120 and transmission by the beam splitter 140, and are received by the receiving unit 130. Examples of the structure 200 to be used include metal applied with surface treatment, such as plating, with high stability over time.
The distance from the movable reflection unit 120 to the structure 200 is shorter than the distance from the movable reflection unit 120 to the target object. Accordingly, the time elapsed between emission of the electromagnetic waves from the emission unit 110 and receiving of the electromagnetic waves by the receiving unit 130 with reflection of the electromagnetic waves by the structure 200 in between is shorter than the time elapsed between emission of the electromagnetic waves from the emission unit 110 and receiving of the electromagnetic waves by the receiving unit 130 with reflection of the electromagnetic waves by the target object in between. Accordingly, based on the time difference between signals generated in the receiving unit 130, the sensor device 10 can determine whether a signal generated in the receiving unit 130 is a signal caused by the structure 200 or a signal caused by the target object.
The sensor device 10 may include the structure 200. Alternatively, the structure 200 may be provided outside the sensor device 10. When the sensor device 10 includes the structure 200, for example, the structure 200 may be provided in a window part of a housing accommodating members constituting the sensor device 10, such as the emission unit 110, the movable reflection unit 120, the receiving unit 130, and the beam splitter 140, that is, a part between the inside and the outside of the housing through which electromagnetic waves are transmitted. However, a location where the structure 200 is provided is not limited to the window part.
According to the present embodiment, the amendment unit 150, the first adjustment unit 162, and the second adjustment unit 164 represent function-based blocks rather than a hardware-based configuration. The amendment unit 150, the first adjustment unit 162, and the second adjustment unit 164 are provided by any combination of hardware and software centered on a CPU, a memory, a program loaded into the memory, a storage medium storing the program, such as a hard disk, and a network connection interface of any computer. Then, various modifications to the providing method and the device can be made.
The amendment unit 150 amends a detection result by the detection unit 122, based on a receiving result of electromagnetic waves by the receiving unit 130, the electromagnetic waves being reflected or scattered by the structure 200. Amendment by the amendment unit 150 enables amendment of a deviation of a detection result of the deflection angle of the movable reflection unit 120 by the detection unit 122 from a detection result in a design state.
Fig. 2
is a diagram illustrating an example of a relation among the structure 200, the scanning line L of the movable reflection unit 120, and spots projected on the scanning line L.
Fig. 2
In , the scanning line L extends from the positive direction toward the negative direction of the second direction Y, that is, the linear drive direction of the movable reflection unit 120 while being folded back in the first direction X, that is, the resonance drive direction of the movable reflection unit 120.
Fig. 2
illustrate eight spots positioned on the scanning line L, that is, a first spot S1, a second spot S2, a third spot S3, a fourth spot S4, a fifth spot S5, a sixth spot S6, a seventh spot S7, and an eighth spot S8. Each spot is generated by electromagnetic waves being emitted from the emission unit 110 and being reflected toward the structure 200 by the movable reflection unit 120.
Each of the first spot S1, the second spot S2, the third spot S3, and the fourth spot S4 is a spot used for amendment by the amendment unit 150. At least part of the first spot S1, the second spot S2, the third spot S3, and the fourth spot S4 is projected on the structure 200. Note that the first spot S1, the second spot S2, the third spot S3, and the fourth spot S4 may be used for sensing by the sensor device 10. The first spot S1 and the second spot S2 deviate in the linear drive direction of the movable reflection unit 120, that is, the second direction Y. The second spot S2 is positioned outside the first spot S1 in the second direction Y in a region where the scanning line L is formed. The third spot S3 and the fourth spot S4 deviate in the resonance drive direction of the movable reflection unit 120, that is, the first direction X. The fourth spot S4 is positioned outside the third spot S3 in the first direction X in the region where the scanning line L is formed.
Each of the fifth spot S5, the sixth spot S6, the seventh spot S7, and the eighth spot S8 is part of spots used for sensing by the sensor device 10. No part of the fifth spot S5, the sixth spot S6, the seventh spot S7, and the eighth spot S8 is projected on the structure 200. Accordingly, energy of electromagnetic waves projected on the target object is not reduced by the structure 200 for the fifth spot S5, the sixth spot S6, the seventh spot S7, and the eighth spot S8, and sensing of the target object can be efficiently performed. The fifth spot S5 and the sixth spot S6 deviate leftward relative to the first spot S1 and the second spot S2, respectively. The seventh spot S7 and the eighth spot S8 deviate upward relative to the third spot S3 and the fourth spot S4, respectively.
Fig. 2
The structure 200 is positioned outside the region where the scanning line L of the movable reflection unit 120 is formed. Assuming that the movable reflection unit 120 is positioned inside the region where the scanning line L is formed, the sensor device 10 may not be able to detect a target object in a region where the structure 200 is placed, or detection performance of the device may be degraded. On the other hand, in the example illustrated in , a region where the sensor device 10 cannot detect a target object or detection performance of the device is degraded can be limited to outside the region where the scanning line L of the movable reflection unit 120 is formed.
The amendment unit 150 may amend a detection result by the detection unit 122, based on a relation between a first receiving value of electromagnetic waves by the receiving unit 130, the electromagnetic waves being reflected or scattered by a predetermined first part of the structure 200, and a second receiving value of electromagnetic waves by the receiving unit 130, the electromagnetic waves being reflected or scattered by a predetermined second part of the structure 200. In this case, the amendment unit 150 may amend the detection result by the detection unit 122, based on a relation between a relation between the first receiving value and the second receiving value, such as at least either one of the difference and the ratio between the first receiving value and the second receiving value, and a deviation of the detection result by the detection unit 122 from a detection result in a reference state such as a design state or an initial state.
The amendment unit 150 may amend the detection result by the detection unit 122, based on a comparison result between a relation between the first receiving value and the second receiving value, and a relation between a first reference receiving value of electromagnetic waves by the receiving unit 130, the electromagnetic waves being reflected or scattered by the first part of the structure 200 when the detection unit 122 operates in the reference state, and a second reference receiving value of electromagnetic waves by the receiving unit 130, the electromagnetic waves being reflected or scattered by the second part of the structure 200 when the detection unit 122 operates in the reference state. The relation between the first reference receiving value and the second reference receiving value may be a known predetermined reference relation. For example, at least either one of the difference and the ratio between the first reference receiving value and the second reference receiving value may be a known predetermined reference value. In this case, when the sensitivity of the detection unit 122 varies from the sensitivity when the detection unit 122 is in the reference state due to a certain factor such as temperature and, as a result, the deflection angle of the movable reflection unit 120 varies from the deflection angle when the detection unit 122 is in the reference state, the relation between the first receiving value and the second receiving value varies from the predetermined reference relation. The amendment unit 150 may amend the detection result by the detection unit 122 such that the relation between the first receiving value and the second receiving value returns to the predetermined reference relation. For example, the first reference receiving value and the second reference receiving value may be substantially equal to each other.
In one example, the first part of the structure 200 may be a region on the structure 200 on which the first spot S1 is projected and the vicinity of the region, and the second part of the structure 200 may be a region on the structure 200 on which the second spot S2 is projected and the vicinity of the region. In other words, the first part and the second part of the structure 200 may deviate from each other in the linear drive direction of the movable reflection unit 120, that is, the second direction Y.
The first adjustment unit 162 can adjust the position of the structure 200 such that the relation between the first reference receiving value and the second reference receiving value is a predetermined reference relation. For example, the first adjustment unit 162 can move the structure 200 along the second direction Y. Thus, a relation between the first reference receiving value for the first spot S1 and the second reference receiving value for the second spot S2 can be the predetermined reference relation.
In another example, the first part of the structure 200 may be a region on the structure 200 on which the third spot S3 is projected and the vicinity of the region, and the second part of the structure 200 may be a region on the structure 200 on which the fourth spot S4 is projected and the vicinity of the region. In other words, the first part and the second part of the structure 200 may deviate from each other in the resonance drive direction of the movable reflection unit 120, that is, the first direction X.
The second adjustment unit 164 can adjust an emission timing of electromagnetic waves from the emission unit 110 such that the relation between the first reference receiving value and the second reference receiving value is a predetermined reference relation. Thus, a relation between the first reference receiving value for the third spot S3 and the second reference receiving value for the fourth spot S4 can be the predetermined reference relation.
Adjustment of the position of the structure 200 by the first adjustment unit 162 and adjustment of the emission timing of electromagnetic waves from the emission unit 110 by the second adjustment unit 164 may be combined as appropriate. For example, the first adjustment unit 162 may move the structure 200 in the second direction Y to amend a detection result of the deflection angle of the movable reflection unit 120 in the second direction Y by the detection unit 122, and the second adjustment unit 164 may adjust the emission unit 110 to amend a detection result of the deflection angle of the movable reflection unit 120 in the first direction X by the detection unit 122. In this case, the structure 200 may be unmovably fixed along the first direction X. Alternatively, the first adjustment unit 162 may move the structure 200 in both the first direction X and the second direction Y to amend a detection result of the deflection angle of the movable reflection unit 120 in the first direction X and second direction Y by the detection unit 122. In this case, the second adjustment unit 164 may not adjust the emission unit 110.
Fig. 3
Fig. 2
Fig. 4
Fig. 5
Fig. 4
Fig. 6
Fig. 7
Fig. 6
is a graph illustrating an example of signals generated in the receiving unit 130 by the first spot S1 and the second spot S2 that are illustrated in . is a graph illustrating an example of changes in a receiving value S(S1) of a signal generated in the receiving unit 130 by the first spot S1 and a receiving value S(S2) of a signal generated in the receiving unit 130 by the second spot S2 when the deflection angle of the movable reflection unit 120 in the second direction Y varies. is a graph illustrating the difference S(S1) - S(S2) between the receiving values S(S1) and S(S2) illustrated in . is a graph illustrating an example of changes in a receiving value S(S3) of a signal generated in the receiving unit 130 by the third spot S3 and a receiving value S(S4) of a signal generated in the receiving unit 130 by the fourth spot S4 when the deflection angle of the movable reflection unit 120 in the first direction X varies. is a graph illustrating the difference S(S3) - S(S4) between the two receiving values S(S3) and S(S4) illustrated in .
Fig. 3
Fig. 4 to Fig. 6
Fig. 3
In , a signal having a peak value a indicates the signal generated by the first spot S1. A signal having a peak value b indicates the signal generated by the second spot S2. A receiving value of a signal generated in the receiving unit 130 by each spot such as the receiving value S(S1), S(S2), S(S3), or S(S4) in is a peak value of the signal generated in the receiving unit 130 by the spot, such as the peak value a or b in .
Fig. 4
Fig. 4
Fig. 2
Fig. 4
The horizontal axis of the graph in indicates the deflection angle of the movable reflection unit 120 in the second direction Y. The vertical axis of the graph in indicates the intensity of each of the two receiving values S(S1) and S(S2). A solid line labeled "PY" indicates the deflection angle of the movable reflection unit 120 in the second direction Y in the reference state. For example, when the movable reflection unit 120 deflects significantly in the second direction Y in the example illustrated in , the first spot S1 and the second spot S2 move outward, leading to decrease in the area of the first spot S1 projected on the structure 200 and resulting decrease in the receiving value S(S1), and increase in the area of the second spot S2 projected on the structure 200 and resulting increase in the receiving value S(S2). Accordingly, the receiving values S(S1) and S(S2) change in response to the change in the deflection angle of the movable reflection unit 120 in the second direction Y, as illustrated in the graph in .
Fig. 5
Fig. 5
The horizontal axis of the graph in indicates the deflection angle of the movable reflection unit 120 in the second direction Y. The vertical axis of the graph in indicates the difference between the two receiving values S(S1) and S(S2). A solid line labeled "PY" indicates the deflection angle of the movable reflection unit 120 in the second direction Y in the reference state.
Fig. 6
Fig. 6
Fig. 2
Fig. 6
The horizontal axis of the graph in indicates the deflection angle of the movable reflection unit 120 in the first direction X. The vertical axis of the graph in indicates the intensity of each of the two receiving values S(S3) and S(S4). A solid line labeled "PX" indicates the deflection angle of the movable reflection unit 120 in the first direction X in the reference state. As the value on the horizontal axis increases, the deflection of the movable reflection unit 120 in the first direction X increases. For example, when the movable reflection unit 120 deflects significantly in the first direction X in the example illustrated in , the third spot S3 and the fourth spot S4 move outward, leading to decrease in the area of the third spot S3 projected on the structure 200 and resulting decrease in the receiving value S(S3), and increase in the area of the fourth spot S4 projected on the structure 200 and resulting increase in the receiving value S(S4). Accordingly, the receiving values S(S3) and S(S4) change in response to the change in the deflection angle of the movable reflection unit 120 in the first direction X, as illustrated in the graph in .
Fig. 7
Fig. 7
The horizontal axis of the graph in indicates the deflection angle of the movable reflection unit 120 in the first direction X. The vertical axis of the graph in indicates the difference between the two receiving values S(S3) and S(S4). A solid line labeled "PX" indicates the deflection angle of the movable reflection unit 120 in the first direction X in the reference state.
Fig. 4
Fig. 5
Fig. 5
For example, the difference between the first reference receiving value for the first spot S1 and the second reference receiving value for the second spot S2 may be zero. For example, in and , the first reference receiving value is the receiving value S(S1) in the reference state, and the second reference receiving value is the receiving value S(S2) in the reference state. In , S(S1) - S(S2) may be set to be zero in the reference state. When the deflection angle of the movable reflection unit 120 in the second direction Y is smaller than the deflection angle of the movable reflection unit 120 in the second direction Y in the reference state, S(S1) - S(S2) is a positive value. In this case, the amendment unit 150 may amend the detection result by the detection unit 122 such that S(S1) - S(S2) returns to zero, in other words, the deflection angle of the movable reflection unit 120 in the second direction Y increases. When the deflection angle of the movable reflection unit 120 in the second direction Y is greater than the deflection angle of the movable reflection unit 120 in the second direction Y in the reference state, S(S1) - S(S2) is a negative value. In this case, the amendment unit 150 may amend the detection result by the detection unit 122 such that S(S1) - S(S2) returns to zero, in other words, the deflection angle of the movable reflection unit 120 in the second direction Y decreases. Accordingly, amendment of the detection result by the amendment unit 150 amends a drive signal of the movable reflection unit 120, and the deflection angle of the movable reflection unit 120 in the second direction Y is kept to the deflection angle in the reference state.
Fig. 6
Fig. 7
Fig. 7
For example, the difference between the first reference receiving value for the third spot S3 and the second reference receiving value for the fourth spot S4 may be zero. For example, in and , the first reference receiving value is the receiving value S(S3) in the reference state, and the second reference receiving value is the receiving value S(S4) in the reference state. In , S(S3) - S(S4) may be set to be zero in the reference state. When the deflection angle of the movable reflection unit 120 in the first direction X is smaller than the deflection angle of the movable reflection unit 120 in the first direction X in the reference state, S(S3) - S(S4) is a positive value. In this case, the amendment unit 150 may amend the detection result by the detection unit 122 such that S(S3) - S(S4) returns to zero, in other words, the deflection angle of the movable reflection unit 120 in the first direction X increases. When the deflection angle of the movable reflection unit 120 in the first direction X is greater than the deflection angle of the movable reflection unit 120 in the first direction X in the reference state, S(S3) - S(S4) is a negative value. In this case, the amendment unit 150 may amend the detection result by the detection unit 122 such that S(S3) - S(S4) returns to zero, in other words, the deflection angle of the movable reflection unit 120 in the first direction X decreases. Accordingly, amendment of the detection result by the amendment unit 150 amends the drive signal of the movable reflection unit 120, and the deflection angle of the movable reflection unit 120 in the second direction Y is kept to the deflection angle in the reference state.
Fig. 8
Fig. 8
is a diagram illustrating an example of a relation among a structure 200, a scanning line L of a movable reflection unit 120, and spots projected on the scanning line L in a sensor device 10 according to a modified example. is a diagram of a region where the scanning line L is formed, the region being viewed from the movable reflection unit 120 side.
Fig. 8
In , a ninth spot S9 and a tenth spot S10 that are arranged roughly at the center of the region in a second direction Y where the scanning line L is formed and along a resonance drive direction of the movable reflection unit 120, that is, a first direction X are indicated by open circles. An eleventh spot S11 and a twelfth spot S12 that are arranged in an upper part of the region in the second direction Y where the scanning line L is formed and along the resonance drive direction of the movable reflection unit 120, that is, the first direction X are indicated by open circles.
The structure 200 intersects the scanning line L of the structure 200. Specifically, the structure 200 is a member such as a wire linearly extending along the second direction Y. The width of the structure 200 in the first direction X is narrower than the width of a spot in the first direction X, the spot being generated by the movable reflection unit 120. Accordingly, electromagnetic waves attenuated by the structure 200 can be kept low.
Fig. 8
In the example illustrated in , for example, a first part of the structure 200 may be a part of the structure 200 on which the ninth spot S9 is projected. A second part of the structure 200 may be a part of the structure 200 on which the tenth spot S10 is projected. The intensity of a signal generated in a receiving unit 130 by electromagnetic waves reflected by the structure 200, such as a first reference receiving value or a second reference receiving value, varies with a projection area of a spot on the structure 200 and an intensity distribution of the spot.
Fig. 9
Fig. 10
Fig. 9
is a graph illustrating an example of changes in a receiving value S(S9) generated in the receiving unit 130 by the ninth spot S9 and a receiving value S(S10) generated in the receiving unit 130 by the tenth spot S10 when a deflection angle of the movable reflection unit 120 in the first direction X varies. is a graph illustrating the difference between the two receiving values S(S9) and S(S10) illustrated in .
Fig. 9
Fig. 9
The horizontal axis of the graph in indicates the deflection angle of the movable reflection unit 120 in the first direction X. The vertical axis of the graph in indicates the intensity of each of the two receiving values S(S9) and S(S10). A solid line labeled "PX" indicates the deflection angle of the movable reflection unit 120 in the first direction X in a reference state. As the value on the horizontal axis increases, the deflection of the movable reflection unit 120 in the first direction X increases.
Fig. 10
Fig. 10
The horizontal axis of the graph in indicates the deflection angle of the movable reflection unit 120 in the second direction Y. The vertical axis of the graph in indicates the difference S(S10) - S(S9) between the two receiving values S (S9) and S(S10). A solid line labeled "PY" indicates the deflection angle of the movable reflection unit 120 in the second direction Y in the reference state.
Fig. 11
Fig. 12
Fig. 13
Fig. 11 to Fig. 13
is a diagram illustrating an example of a relation among the structure 200, the ninth spot S9, and the tenth spot S10 in the reference state. is a diagram illustrating an example of a relation among the structure 200, the ninth spot S9, and the tenth spot S10 when the deflection angle of the movable reflection unit 120 in the first direction X is smaller than the deflection angle in the reference state. is a diagram illustrating an example of a relation among the structure 200, the ninth spot S9, and the tenth spot S10 when the deflection angle of the movable reflection unit 120 in the first direction X is greater than the deflection angle in the reference state. A double-pointed arrow passing through the ninth spot S9 and the tenth spot S10 in indicates a direction of oscillation of the movable reflection unit 120 in the first direction X.
Fig. 11
Fig. 10
In , the area of the ninth spot S9 projected on the structure 200 is substantially equal to the area of the tenth spot S10 projected on the structure 200. Accordingly, S(S10) - S(S9) in the reference is zero, as illustrated in .
Fig. 12
Fig. 10
In , the area of the tenth spot S10 projected on the structure 200 is greater than the area of the ninth spot S9 projected on the structure 200. Accordingly, S(S10) - S(S9) illustrated in is a positive value, and the deflection angle of the movable reflection unit 120 in the first direction X being smaller than the deflection angle in the reference state can be detected.
Fig. 13
Fig. 10
In , the area of the tenth spot S10 projected on the structure 200 is smaller than the area of the ninth spot S9 projected on the structure 200. Accordingly, S(S10) - S(S9) illustrated in is a negative value, and the deflection angle of the movable reflection unit 120 in the first direction X being greater than the deflection angle in the reference state can be detected.
Fig. 9
Fig. 10
Fig. 10
For example, the difference between the first reference receiving value for the ninth spot S9 and the second reference receiving value for the tenth spot S10 may be zero. For example, in and in , the first reference receiving value is the receiving value S(S9) in the reference state, and the second reference receiving value is the receiving value S(S10) in the reference state. In , S(S10) - S(S9) may be set to be zero in the reference state. When the deflection angle of the movable reflection unit 120 in the second direction Y varies from the deflection angle of the movable reflection unit 120 in the second direction Y in the reference state, and S(S10) - S(S9) is a positive or negative value, the amendment unit 150 may amend a detection result by a detection unit 122 such that S(S10) - S (S9) returns to zero.
Fig. 9 to Fig. 13
Fig. 9 to Fig. 13
An example of using the ninth spot S9 and the tenth spot S10 has been described in . However, use of the eleventh spot S11 and the twelfth spot S12 may be the same as the example described by using .
Fig. 14
is a graph illustrating an example of a relation between the deflection angle of the movable reflection unit 120 in the second direction Y and the difference S(S11) - S(S12) between a receiving value S(S11) of a signal generated in the receiving unit 130 by the eleventh spot S11 and a receiving value S(S12) of a signal generated in the receiving unit 130 by the twelfth spot S12.
Fig. 14
In , the horizontal axis of the graph indicates the deflection angle of the movable reflection unit 120 in the second direction Y. The vertical axis of the graph indicates the difference S(S11) - S(S12) between the receiving value S(S11) of the signal generated in the receiving unit 130 by the eleventh spot S11 and the receiving value S(S12) of the signal generated in the receiving unit 130 by the twelfth spot S12.
Fig. 15
Fig. 16
Fig. 17
Fig. 15 to Fig. 17
is a diagram illustrating an example of a relation among the structure 200 in the reference state, the ninth spot S9, the tenth spot S10, the eleventh spot S11, and the twelfth spot S12. is a diagram illustrating an example of a relation among the structure 200, the ninth spot S9, the tenth spot S10, the eleventh spot S11, and the twelfth spot S12 when the deflection angle of the movable reflection unit 120 in the second direction Y is smaller than the deflection angle in the reference state. is a diagram illustrating an example of a relation among the structure 200, the ninth spot S9, the tenth spot S10, the eleventh spot S11, and the twelfth spot S12 when the deflection angle of the movable reflection unit 120 in the first direction X is greater than the deflection angle in the reference state. In , each of a double-pointed arrow passing through the ninth spot S9 and the tenth spot S10, and a double-pointed arrow passing through the eleventh spot S11 and the twelfth spot S12 indicates a direction of oscillation of the movable reflection unit 120 in the first direction X.
Fig. 15 to Fig. 17
In , the area of the ninth spot S9 projected on the structure 200 is substantially equal to the area of the tenth spot S10 projected on the structure 200.
Fig. 16
Fig. 15
Fig. 14
The difference between the area of the eleventh spot S11 projected on the structure 200 and the area of the twelfth spot S12 projected on the structure 200 in is smaller than the difference between the area of the eleventh spot S11 projected on the structure 200 and the area of the twelfth spot S12 projected on the structure 200 in . Accordingly, as illustrated in , the difference S(S11) - S(S12) when the deflection angle of the movable reflection unit 120 in the second direction Y is smaller than the deflection angle in the reference state is smaller than the difference S(S11) - S(S12) in the reference state. In this case, the amendment unit 150 may amend the detection result by the detection unit 122 such that that the difference S(S11) - S(S12) returns to the difference S(S11) - S(S12) in the reference state.
Fig. 17
Fig. 15
Fig. 14
The difference between the area of the eleventh spot S11 projected on the structure 200 and the area of the twelfth spot S12 projected on the structure 200 in is greater than the difference between the area of the eleventh spot S11 projected on the structure 200 and the area of the twelfth spot S12 projected on the structure 200 in . Accordingly, as illustrated in , the difference S(S11) - S(S12) when the deflection angle of the movable reflection unit 120 in the second direction Y is greater than the deflection angle in the reference state is greater than the difference S(S11) - S(S12) in the reference state. In this case, the amendment unit 150 may amend the detection result by the detection unit 122 such that the difference S(S11) - S(S12) returns to the difference S(S11) - S(S12) in the reference state.
While the embodiment and the modified example have been described above with reference to the drawings, the embodiment and the modified example are exemplifications of the present invention, and various configurations other than those described above may be employed.
For example, the sensor device 10 according to the embodiment is a coaxial LiDAR. However, the sensor device 10 may be a biaxial LiDAR.
Japanese Patent Application No. 2020-062799, filed on March 31, 2020
This application claims priority based on , the disclosure of which is hereby incorporated by reference thereto in its entirety.
REFERENCE SIGNS LIST
10
110
120
122
130
140
150
162
164
200
L
S1
S2
S3
S4
S5
S6
S7
S8
S9
S10
S11
S12
X
Y
Sensor device
Emission unit
Movable reflection unit
Detection unit
Receiving unit
Beam splitter
Amendment unit
First adjustment unit
Second adjustment unit
Structure
Scanning line
First spot
Second spot
Third spot
Fourth spot
Fifth spot
Sixth spot
Seventh spot
Eighth spot
Ninth spot
Tenth spot
Eleventh spot
Twelfth spot
First direction
Second direction | |
Q:
Complex Analysis Inequalities:$\lvert\frac{e^{iz}}{z^2+1}\rvert \le \frac{1}{R^2-1}$
The Problem gave me that: $$f(z) = \frac{e^{iz}}{z^2+1}$$
and it wants me to prove that when let $$z=Re^{i\theta}$$
where $$R>1 , 0 \le \theta \le \pi$$
the following will be true. $$\lvert{f(z)}\rvert \le \frac{1}{R^2-1}$$
I have no idea what should be used here.
A:
Since, $~~R>1$ then you have,
$$0<R^2 -1 = ||z^2|- 1| \le |z^2 +1|\implies \frac{1}{|z^2+1|}\le \frac{1}{R^2-1}$$
Hence, $$ |f(z)|=\frac{|z|}{|z^2 +1|} \le \frac{e^{-R\sin\theta}}{R^2-1} \le \frac{1}{R^2-1}$$
Given that
$$|e^{iz}| = |e^{i(R\cos\theta+iR\sin\theta)}| = \color{blue}{|e^{-Rsin\theta}e^{iR\cos\theta}|=e^{-Rsin\theta}\le 1}$$
Because, $0\le\theta\le\pi$ we have $1\ge \sin \theta\ge 0$ which implies $e^{-Rsin\theta}\le 1$.
| |
This sugar cookie fruit pizza recipe uses a soft cookie base and cream cheese frosting that is perfect with the sliced fruit topping.
Scale
Ingredients
Cookie Crust
- 1/2 cup butter, softened
- 3/4 cup (150 grams) granulated sugar
- 1 large egg
- 1 teaspoon vanilla extract
- 1–1/4 cups (150 grams) flour
- 1/4 teaspoon baking powder
- 1/4 teaspoon salt
Cream Cheese Frosting
- 12 ounces cream cheese, softened
- 1/4 cup butter, softened
- 1 teaspoon vanilla extract
- 1–1/4 cup (120 grams) confectioner’s sugar
Fruit Topping
- Quantity will change based off of your design and fruit choices
- 7–10 strawberries
- 3–5 kiwis
- 1 mango
- 1/2 cup blueberries
- 1/2 cup raspberries
- 1/2 cup blackberries
Instructions
Cookie Crust
- Cream together the sugar and butter together, then add in the vanilla and egg and mix until incorporated.
- Add the flour, baking powder, and salt. Combine well until thoroughly incorporated. The mixture should be smooth and creamy at this point.
- Chill the dough for about 30 minutes.
- Once the dough has been chilled, you can preheat the oven, and line an rimless baking sheet or baking stone with parchment paper. If your pan has edges, you can roll out your dough on the parchment sheet and then carefully transfer the dough to the pan
- Roll out the dough into a circle, or whatever shape you planned for. I rolled my fruit pizza into a 12 inch round. Be sure to measure your pan if you are rolling out the cookie on the counter to make sure it fits on your pan!
- Bake for 12 minutes at 350°F. I rolled the dough to be about 1/4″ thick. If you have thicker dough, you may need additional time to bake. Additionally, if you prefer a firmer cookie, you will need additional time.
- Allow the cookie to cool down completely before applying the cream cheese frosting.
Cream Cheese Frosting
- Cream together the cream cheese and butter.
- Add in the the vanilla and confectioner’s sugar and mix together until smooth and creamy.
- Spread into an even layer onto the cookie crust, and chill in the refrigerator for about 30 minutes to firm up a bit.
- While the cookie is chilling you can slice your fruit into small pieces to arrange onto the fruit pizza.
- Start arranging the design from the center outwards. You can measure out cookie to find the center, or just eyeball it. If you find that you didn’t hit the center of the cookie, you can easily cut the cookie with a knife to clean it up.
- Allow yourself to be as creative as you want when assembling your design.
Notes
Fruit pizza is best served the day it is made. You should store it covered and in the refrigerator when not being served. It should last up to 3 days in the fridge, but the crust will start to get soggy and soft, and the fruit will not be as fresh. | https://whiskingupyum.com/fruit-pizza/print/5138/ |
Predictors of response to tenofovir disoproxil fumarate plus peginterferon alfa-2a combination therapy for chronic hepatitis B.
In patients with chronic hepatitis B, tenofovir disoproxil fumarate (TDF) plus pegylated interferon (PEG-IFN) for 48-weeks results in higher rates of hepatitis B surface antigen (HBsAg) loss than either monotherapy. To identify baseline and on-treatment factors associated with HBsAg loss at Week 72 and provide a model for predicting HBsAg loss in patients receiving combination therapy for 48 weeks. A secondary analysis of data from an open-label study where patients were randomised to TDF (300 mg/day, oral) plus PEG-IFN (PI, 180 μg/week, subcutaneous) for 48 weeks (TDF/PI-48w); TDF plus PEG-IFN for 16 weeks, TDF for 32 weeks (TDF/PI-16w+TDF-32w); TDF for 120 weeks (TDF-120w) or PEG-IFN for 48 weeks (PI-48w). Logistic regression methods were used to identify models that best predicted HBsAg loss at Week 72. Rates of HBsAg loss at Week 72 were significantly higher in the TDF/PI-48w group (6.5%) than in the TDF/PI-16w+TDF-32w (0.5%), TDF-120w (0%) and PI-48w (2.2%) groups (P = 0.09). The only baseline factor associated with response was genotype A. HBsAg decline at Week 12 or 24 of treatment was associated with HBsAg loss at Week 72 (P < 0.001). HBsAg decline >3.5 log10 IU/mL at Week 24 in the TDF/PI-48w group resulted in a positive predictive value of 85% and a negative predictive value of 99% for HBsAg loss at Week 72. HBsAg decline at Week 24 of TDF plus PEG-IFN combination therapy may identify patients who, after completing 48 weeks of treatment, have a better chance of achieving HBsAg loss at Week 72.
| |
What is Schizophrenia?
- Topics: Schizophrenia
- Words: 459
- |
- Page: 1
- This essay sample was donated by a student to help the academic community. Papers provided by EduBirdie writers usually outdo students' samples.
Download
Download
Schizophrenia is a serious mental illness, characterised by symptoms affecting the patient’s perception of reality, emotions, thoughts and behaviour. TraditionalThere is a range of symptoms such as delusion, disturbed and illogical thoughts, irrational behaviour, hallucinations, such as hearing voices, disruption of verbal communication and negative symptoms such as emotional disengagement, social disconnection and absence of normal behaviour.
Paragraph about schizophrenia, types of schizophrenia more about symptoms and what is involved in which one. Among people diagnosed with schizophrenia, 65% describe hearing voices telling them things that no one else can hear (Frith and Fletcher, 1995). Researchers have found that there are two determinants, or ‘causes’ to the disorder, these are referred to as biological and psychological factors. The first one to be discussed is biological factors.
Biological factors are described as the role biology has in schizophrenia. Studies on genetics, neuroanatomy and prenatal and perinatal environments show evidence for the biological determinants. Studies have shown that genetics has an influence on the likelihood of a person developing schizophrenia. Family history is known as the strongest risk factor for schizophrenia, as it increases the risk of developing the disorder by about 5-50 times depending on the extent of genetic similarity (Gottesman, 1991).
While examining the brain structure and activity of closest relatives of patients with schizophrenia, it was found that they share roughly 50% of their genome (Sullivan et al, 2003). Another area of influence in the likelihood of developing schizophrenia is prenatal and perinatal factors. Being exposed to environmental variations during a critical period of brain development, and environmental situations that cause stress can lead to impaired neuronal responses and symptoms of malfunctioning of the prefrontal cortex (the prefrontal cortex is an area of the brain located in the frontal lobe responsible for a variety of complex behaviours and it contributes to the development of the individual’s personality), which provides a link between the environment and the symptoms observed in psychological disorders (Arnsten, A. F., 2009). Finally, another biological area to be emphasised as evidence for the causes of schizophrenia is neuroanatomy.
As soon as neuroimaging techniques were discovered, researchers started to look for anatomical characteristics of the brain in patients with schizophrenia. Observations revealed that in some of the patients, the ventricles were abnormally enlarged, which suggested that there was loss of brain tissue, probably because of an anomaly during the prenatal brain development (Arnold et al., 1998). However, there are some limitations to this theory. Firstly, enlarged ventricles were only found in a minority of patients with schizophrenia. Secondly, it was found that this type of abnormality could be caused by the medications that were prescribed for schizophrenia patients (Gur et al 1998). In addition, it should be noted that there are psychological factors that contribute to schizophrenia.
Introduction Behavior is commonly characterized as a response to stimuli, regardless of whether internal or external, that changes an organism’s response to its habitat. Animals run, stay still, or counterstrike to predators; in response to external and internal stimuli birds construct complex and distinguished nests;...
Schizophrenia is a long-term mental health condition causing a range of different psychological symptoms. It has been described by professionals as a type of psychosis. Psychosis means a person is not always able to determine their own thoughts from actual reality. Some of the symptoms...
Each year, almost 44 million Americans experience a mental disorder. In fact, mental illnesses are among the most common conditions affecting health today. The good news is that most people who have mental illnesses, even serious ones, can lead productive lives with proper treatment. Mental...
Introduction Mental disorders refer to conditions in which patients exhibit altered behavior and thought processes, emotional instability and limited social capacity; different illnesses being presented with different combinations of symptoms. Psychotic disorders, of which schizophrenia is the most studied, are considered by the field of...
Abstract Schizophrenia is not a common mental illness so scientists today still do not know how exactly schizophrenia manifests. The main theory of how schizophrenia comes about is through genes. Although there is no specific gene that causes the disorder itself, it is believed theinterplay...
What is schizophrenia? The often-misjudged mental illness known as schizophrenia is defined as a long-term mental disorder involving the breakdown in the relation between thought, emotion and behavior leading to faulty perception, inappropriate actions, withdrawal from reality into delusions and hallucinations and a sense of...
Those who are at risk of potentially developing schizophrenia could receive an early diagnosis if the early use of brain scans were implemented. Those who have schizophrenia, on average, differ in terms of the total tissue volume and brain activity (Cahn, Hilleke, Hulshoff, & Elleke,...
Why do most of the time think that someone who suffers from Schizophrenia is simply a “crazy” person? We are easy to judge someone because we think that they are just someone who is on drugs and are just simply crazy. Little do we know...
Through “gliotransmitter” release, ACs may be integral to various neural systems, such as the coincidence detection system that is significant for plasticity and map formation in the hippocampus (Min and Nevian, 2012). Similarly, it has been shown that ACs are essential to synaptic function in...
01 / 09
Fair Use Policy
EduBirdie considers academic integrity to be the essential part of the learning process and does not support any violation of the academic standards. Should you have any questions regarding our Fair Use Policy or become aware of any violations, please do not hesitate to contact us via [email protected].
We are here 24/7 to write your paper in as fast as 3 hours. | https://edubirdie.com/examples/what-is-schizophrenia/?format=pdf |
In response to the challenges of global climate change, Chicago’s Sustainable Urban Infrastructure Policies and Guidelines (SUIG) suggests guidelines for planning, designing, constructing, and maintaining a safe, livable, and sustainable city through best management practices and multi-modal planning. In an effort to lead the nation in the innovation and demonstration of sustainable and green infrastructure, SUIG establishes a citywide approach for integrating environmental performance goals into infrastructure design, as well as a five-year implementation plan for all Department of Transportation projects.
The SUIG document is composed of two separate sections: Volume 1 lays out explicit sustainability goals, and illustrates how different strategies complement one another. It describes how the treatment of Chicago’s infrastructure can serve multiple sustainable goals within the realm of the public right of way and how to pull multiple ideas together to form a coherent, effective project. The requirements and policies are described in detail, setting effective dates as they increase in complexity over the next several years. Volume 2 outlines specific strategies, references, and resources to help the audience accomplish the sustainability goals. Technical details, case studies, step-by-step implementation processes, and resource links illustrate each strategy.
SUIG describes the City’s progressive requirements and policies for each infrastructure project type along with detailed strategies that will optimize sustainable impacts. The guidelines are organized around eight categories: water; energy; materials and waste; climate and air quality; beauty and community; urban ecology; and commissioning. Each of the categories has environmental objectives which are implemented through more than 60 specific requirements and 35 policies.
The guidelines are integrated with the City of Chicago’s Complete Streets Chicago Design Guidelines, published in 2013. Together, these documents comprise a progressive vision for implementing sustainable infrastructure for all of Chicago. The SUIG document works to create a comprehensive process, from project selection through maintenance and commissioning, and incorporates a wide range of physical, socio/economic, and environmental data analysis. | https://il-asla.org/award/sustainable-urban-infrastructure-policies-and-guidelines/ |
---
abstract: |
Starting with a flat sheet of paper, points can be constructed as the intersection of two folds. The set of constructible points clearly depends on which folds are admissible. In this paper, we study the situation where a fold is admissible if its slope is admissible and it contains an already constructed or a generator point. We give an explicit characterization of the set of constructible points. We also state several criteria for this set to be a ring. This answers questions originally raised by Erik Demaine and discussed by Butler et al. [@but13] and Buhler et al. [@buh12].
We are grateful to Dmitri Nedrenco for pointing out this problem to us.
author:
- 'Florian Möller[^1]'
bibliography:
- 'origamisets.bib'
title: 'When is an origami set a ring?'
---
Introduction {#sec:intro}
============
Identifying a flat sheet of paper with the Euclidean plane and, subsequently, the Euclidean plane with the field ${{\ensuremath{\mathbb C}}}$ of complex numbers it is possible to describe geometric constructions with algebraic means. This method of algebraization of geometric problems has proved very successful: For instance, in the language of field theory it is easy to precisely describe the points constructible by compass and straightedge. This readily shows that some of the classical compass-and-straightedge construction problems are unsolvable or that the set of compass-and-straightedge constructible points is a subfield of ${{\ensuremath{\mathbb C}}}$.
In this paper we apply the idea of algebraization to a type of construction motivated by origami related questions. In [@but13] Butler et al. ask which points in the plane can be constructed using origami techniques when there is the following limitation on the folds: Starting from the generator points $0,1\in{{\ensuremath{\mathbb C}}}$ only folds through already existing points with prescribed slopes are allowed. We call the set of points obtained in this way an *origami set*.
#### Origami sets and origami rings
We use the following mathematical concepts to model the folding process:
A fold is a straight line, its slope the angle enclosed with the real axis. Obviously, it suffices to only consider angles $\alpha$ with $0\leq\alpha<\pi$.
Fix a subset $U\subseteq[0,\pi[$. We interpret $U$ as the set of prescribed slopes of lines. Throughout this paper we assume that $0\in U$ and that $U$ contains at least three elements.
The set of generator points is given by $M_0:=\{0,1\}\subseteq{{\ensuremath{\mathbb C}}}$. We define sets $M_k$ recursively: If $M_{k-1}$ is already known for some $k\in{{\ensuremath{\mathbb N}}}$, then $M_k$ denotes the set of all intersection points of lines through elements of $M_{k-1}$ with prescribed slopes, i.e. $$M_k:=\bigcup_{\substack{z,z'\in M_{k-1}\\\alpha,\alpha'\in U\text{ with } \alpha\ne\alpha'}} \bigl(z+{{\ensuremath{\mathbb R}}}\cdot\exp(i\alpha)\bigr)\cap\bigl(z'+{{\ensuremath{\mathbb R}}}\cdot\exp(i\alpha')\bigr).$$ Choosing $z=z'$ in the above equation yields $M_{k-1}\subseteq M_k$. The union $$M(U):=\bigcup_{k=0}^\infty M_k$$ is called the *origami set* with respect to the slopes given by $U$. An *origami ring* is an origami set that also is a subring of ${{\ensuremath{\mathbb C}}}$. The intersection $M_{{{\ensuremath{\mathbb R}}}}(U):=M(U)\cap {{\ensuremath{\mathbb R}}}$ is called the *real part* of $M(U)$.
#### Addressing complex numbers
We present a way of addressing complex numbers that is particularly well suited to describe origami sets.
Let $\alpha\in\mathopen]0,\pi[$ denote an angle. Since $\alpha$ is non-zero, there is a uniquely defined intersection point of the line $z+{{\ensuremath{\mathbb R}}}\cdot\exp(i\alpha)$ through $z$ with slope $\alpha$ and the real axis. We denote this point with $\alpha(z)$ and call it the *$\alpha$-projection of $z$*.
For instance, the real part of a complex number $z\in{{\ensuremath{\mathbb C}}}$ is just its $\frac\pi2$-projection.
(-.3,0)–(3,0) node\[font=,right\]
${{\ensuremath{\mathbb R}}}$
; (0,-.5)–(0,2.7) node\[font=,right\]
${{\ensuremath{\mathbb R}}}\cdot i$
; (2,2) circle\[radius=1.5pt\] node\[font=,right\]
$z$
coordinate (z); (1,0)–(2.2,2.4); (1,3pt)–(1,-3pt) node\[font=,below\]
$\alpha(z)$
; (base) at (1,0); (x) at (2,0); ;
It is easily seen that the $\alpha$-projection is a projection in the linear algebraic sense:
\[lem:angleproj\] Let $\alpha\in\mathopen]0,\pi[$ be an angle. Define the map $$\alpha:\;{{\ensuremath{\mathbb C}}}\to{{\ensuremath{\mathbb R}}},\qquad z\mapsto\alpha(z).$$ Then the following statements hold:
1. $\alpha$ is ${{\ensuremath{\mathbb R}}}$-linear: The equations $\alpha(w+z)=\alpha(w)+\alpha(z)$ and $\alpha(\lambda\cdot w)=\lambda\cdot\alpha(w)$ hold for all $w,z\in{{\ensuremath{\mathbb C}}}$ and $\lambda\in{{\ensuremath{\mathbb R}}}$.
2. $\alpha$ is idempotent: The identity $\alpha\bigl(\alpha(z)\bigr)=\alpha(z)$ holds for all $z\in{{\ensuremath{\mathbb C}}}$.
3. The restriction $\alpha|_{{\ensuremath{\mathbb R}}}$ is the identity map. The equality $\alpha(x)=x$ holds if and only $x\in{{\ensuremath{\mathbb R}}}$.
A complex number is uniquely given by two projections:
Let $\alpha,\beta\in\mathopen]0,\pi[$ be two different angles. Then the map $${{\ensuremath{\mathbb C}}}\to{{\ensuremath{\mathbb R}}}^2,\qquad z\mapsto \bigl(\alpha(z),\beta(z)\bigr)$$ is a bijection. We call the pair $\bigl(\alpha(z),\beta(z)\bigr)\in{{\ensuremath{\mathbb R}}}^2$ the *${(\alpha,\beta)}$-coordinates* of $z$.
Vice versa, given two real numbers $r,s\in{{\ensuremath{\mathbb R}}}$ we denote with $\llbracket r,s\rrbracket_{\alpha,\beta}$ the unique complex number $z\in{{\ensuremath{\mathbb C}}}$ fulfilling $\alpha(z)=r$ and $\beta(z)=s$. Hence, $\llbracket r,s\rrbracket_{\alpha,\beta}$ is exactly the complex number with $(\alpha,\beta)$-coordinates $(r,s)$ and fulfills the equation $$\bigl\{\llbracket r,s\rrbracket_{\alpha,\beta}\bigr\}=\bigl(r+{{\ensuremath{\mathbb R}}}\cdot\exp(i\alpha)\bigr)\cap\bigl(s+{{\ensuremath{\mathbb R}}}\cdot\exp(i\beta)\bigr).$$
(-.5,0)–(3.5,0) node\[font=,right\]
${{\ensuremath{\mathbb R}}}$
; (0,-.5)–(0,2) node\[font=,right\]
${{\ensuremath{\mathbb R}}}\cdot i$
; (2,1.5) circle\[radius=1.5pt\] node\[font=,right\]
$z$
coordinate (z); (.5,0) coordinate (phi)–(z); (2.5,0) coordinate (psi)–(z); (.5,3pt)–(.5,-3pt) node\[font=,below\]
$\alpha(z)$
; (2.5,3pt)–(2.5,-3pt) node\[font=,below\]
$\beta(z)$
; (x) at (5,0); ; ;
$\llbracket r,s\rrbracket_{\alpha,\beta}$
coordinate (z); (.5,0) coordinate (phi)–(z); (2.5,0) coordinate (psi)–(z); (.5,3pt)–(.5,-3pt) node\[font=,below\]
$r$
; (2.5,3pt)–(2.5,-3pt) node\[font=,below\]
$s$
; (x) at (5,0); ; ;
The next result follows directly from this definition and Lemma \[lem:angleproj\].
\[lem:anglecoord\] Let $\alpha,\beta\in\mathopen]0,\pi[$ be two different angles. Then the following statements hold, where we write $\llbracket\cdot,\cdot\rrbracket$ instead of $\llbracket\cdot,\cdot\rrbracket_{\alpha,\beta}$ for the sake of readability:
1. For all $r,s\in{{\ensuremath{\mathbb R}}}$ the equations $\alpha\bigl(\llbracket r,s\rrbracket\bigr)=r$ and $\beta\bigl(\llbracket r,s\rrbracket\bigr)=s$ hold. Conversely, for all $z\in{{\ensuremath{\mathbb C}}}$ one has $z=\llbracket\alpha(z),\beta(z)\rrbracket$.
2. Let $r,s$ be real numbers. Then, $\llbracket r,s\rrbracket$ is a real number if and only if $r=s$ holds. In this case one has $r=\llbracket r,r\rrbracket$.
3. As a consequence of (a) it follows that the map $\llbracket\cdot,\cdot\rrbracket:\;{{\ensuremath{\mathbb R}}}^2\to{{\ensuremath{\mathbb C}}}$ is ${{\ensuremath{\mathbb R}}}$-linear: The equations $$\llbracket r,s\rrbracket+\llbracket r',s'\rrbracket=\llbracket r+r',s+s'\rrbracket\quad\text{and}\quad \llbracket \lambda r,\lambda s\rrbracket=\lambda\,\llbracket r,s\rrbracket$$ hold for all real numbers $r,s',r',s',\lambda$. Together with (b) this implies $1=\llbracket1,0\rrbracket+\llbracket0,1\rrbracket$.
#### Notation
Throughout this paper we employ the following notation:
$U\subseteq [0,\pi[$ denotes the set of prescribed slopes. We always assume $0\in U$ and $|U|\geq3$. We write $M$ for the origami set $M(U)$ and $M_{{\ensuremath{\mathbb R}}}$ for its real part. The symbols $\alpha$ and $\beta$ denote angles of $U\smallsetminus\{0\}$ with $\alpha\ne\beta$. We write $\llbracket\cdot,\cdot\rrbracket$ instead of $\llbracket\cdot,\cdot\rrbracket_{\alpha,\beta}$.
The structure of origami sets
=============================
The aim of this section is twofold:
First, we want to give a set theoretic description of origami rings. This is done in Theorem \[thm:mexplicit\] which states that every origami ring is the $M_{{\ensuremath{\mathbb R}}}$-span of $1$ and $\llbracket1,0\rrbracket$. So the structure of $M$ is pretty easy — provided that the real part $M_{{\ensuremath{\mathbb R}}}$ of $M$ is known. We deal with this restriction in Theorem \[thm:mrexplicit\] where we give an explicit description of $M_{{\ensuremath{\mathbb R}}}$ in terms of the elements of $U$. A surprising consequence of this theorem is that $M_{{\ensuremath{\mathbb R}}}$ is always a subring of ${{\ensuremath{\mathbb R}}}$.
Second, we discuss the algebraic structure of $M$. It is well known that $M$ is an additive group. We prove this in Theorem \[thm:mexplicit\]. In Theorem \[thm:ring\] we give several criteria for $M$ to be an origami ring.
Reduction to $M_{{\ensuremath{\mathbb R}}}$ {#reduction-to-m_ensuremathmathbb-r .unnumbered}
-------------------------------------------
Let $z$ be an element of $M$. The projections $\alpha(z)$ and $\beta(z)$ are elements of $M_{{\ensuremath{\mathbb R}}}$ since they are intersections of the admissible lines. Conversely, Lemma \[lem:anglecoord\] shows that the equation $\alpha(z)=\beta(z)=z$ holds for all $z\in M_{{\ensuremath{\mathbb R}}}$. This gives the equality $$\begin{aligned}
\label{eq:mr}
M_{{\ensuremath{\mathbb R}}}=\{\alpha(z),\beta(z) : z\in M\}.\end{aligned}$$ On the other hand, if $r,s$ are elements of $M_{{\ensuremath{\mathbb R}}}$, then $\llbracket r,s\rrbracket$ is an element of $M$. Conversely, by , for any $z\in M$ the $\alpha$- and $\beta$-projections of $z$ are elements of $M_{{\ensuremath{\mathbb R}}}$. Thus, $$\begin{aligned}
\label{eq:m}
M=\bigl\{\llbracket r,s\rrbracket : r,s\in M_{{\ensuremath{\mathbb R}}}\bigr\}.\end{aligned}$$ Equation shows that $M$ can be entirely reconstructed out of $M_{{\ensuremath{\mathbb R}}}$. So, no information is lost when transitioning from $M$ to $M_{{\ensuremath{\mathbb R}}}$.
It is well known that $M$ is an additive subgroup of ${{\ensuremath{\mathbb C}}}$, cf. [@buh12 Thm. 3.1]. The following preparatory lemma states this result for the real part of $M$:
\[lem:mrgroup\] $M_{{\ensuremath{\mathbb R}}}$ is an additive subgroup of ${{\ensuremath{\mathbb R}}}$. Since $0,1\in M_{{\ensuremath{\mathbb R}}}$, it follows that ${{\ensuremath{\mathbb Z}}}\subseteq M_{{\ensuremath{\mathbb R}}}$.
We employ the subgroup test: Let $r,s$ be elements of the non-empty set $M_{{\ensuremath{\mathbb R}}}$ with $s\geq r$. Define $z:=\llbracket r,s\rrbracket$. By definition of the origami set $M$, the intersection point $z'$ of the lines $z+{{\ensuremath{\mathbb R}}}\cdot\exp(i0)$ and $0+{{\ensuremath{\mathbb R}}}\cdot\exp(i\alpha)$ is an element of $M$. Its $(\alpha,\beta)$-coordinates are $(0,x)$ where $x$ denotes an appropriate element of $M_{{\ensuremath{\mathbb R}}}$.
The triangle with vertices $r$, $z$, $s$ is congruent to the triangle with vertices $0$, $z'$, $x$. So, the corresponding sides of both triangles have the same length, giving $s-r=x-0=x\in M_{{\ensuremath{\mathbb R}}}$.
(0,0)–(4.5,0) node\[font=,right\]
${{\ensuremath{\mathbb R}}}$
; (0,0)–(0,2) node\[font=,right\]
${{\ensuremath{\mathbb R}}}\cdot i$
; (2.5,3pt)–(2.5,-3pt) node\[font=,below\]
$r$
; (3.5,3pt)–(3.5,-3pt) node\[font=,below\]
$s$
; (.5,1.5)–(4.5,1.5); (4,1.5) coordinate (z) circle\[radius=1.5pt\] node\[font=,above\]
$z$
; (right) at (5,0); (r) at (2.5,0); (s) at (3.5,0); (r)–(z); ; (s)–(z); ;
\(0) at (0,0); (x) at (1,0); (zs) at (1.5,1.5);
(zs) circle\[radius=1.5pt\] node\[font=,above\]
$z'$
; (0,0)–(1.8,1.8); ;
(0,3pt)–(0,-3pt) node\[font=,below\]
$0$
;
; (4,1.5) coordinate (z) circle\[radius=1.5pt\] node\[font=,above\]
$z$
; (right) at (5,0); (r) at (2.5,0); (s) at (3.5,0); (r)–(z); ; (s)–(z); ;
\(0) at (0,0); (x) at (1,0); (zs) at (1.5,1.5);
; (0)–(zs); (zs) circle\[radius=1.5pt\] node\[font=,above\]
$z'$
; (0,3pt)–(0,-3pt) node\[font=,below\]
$0$
; (1,3pt)–(1,-3pt) node\[font=,below\]
$x$
; ; (x)–(zs);
By considering the point $z''$ defined by $$\{z''\}=\bigl(z+{{\ensuremath{\mathbb R}}}\cdot\exp(i0)\bigr)\cap\bigl(0+{{\ensuremath{\mathbb R}}}\cdot\exp(i\beta)\bigr)$$ one obtains $r-s\in M_{{\ensuremath{\mathbb R}}}$ in a similar fashion.
A consequence of this lemma is the following explicit description of origami sets. We also obtain that origami sets are additive subgroups of ${{\ensuremath{\mathbb C}}}$.
\[thm:mexplicit\] $M$ is the $M_{{\ensuremath{\mathbb R}}}$-span of $1$ and $\llbracket0,1\rrbracket$, i.e. $$M=M_{{\ensuremath{\mathbb R}}}+M_{{\ensuremath{\mathbb R}}}\cdot \llbracket0,1\rrbracket = \bigl\{r+s\cdot \llbracket0,1\rrbracket: r,s\in M_{{\ensuremath{\mathbb R}}}\bigr\}.$$ Together with Lemma \[lem:mrgroup\] this shows that $M$ is an additive subgroup of ${{\ensuremath{\mathbb C}}}$.
Let $z$ be an element of $M$. Then there are $r,s\in M_{{\ensuremath{\mathbb R}}}$ with $z=\llbracket r,s\rrbracket$. Lemma \[lem:anglecoord\] gives $$\begin{aligned}
z&=&\llbracket r,0\rrbracket+\llbracket0,s\rrbracket=r\cdot\llbracket1,0\rrbracket+s\cdot\llbracket0,1\rrbracket\\
&=&r\cdot\bigl(1-\llbracket0,1\rrbracket\bigr)+s\cdot\llbracket0,1\rrbracket=r\cdot 1 + (s-r)\cdot \llbracket0,1\rrbracket.
\end{aligned}$$ Since $s-r\in M_{{\ensuremath{\mathbb R}}}$ by Lemma \[lem:mrgroup\], one obtains $z\in M_{{\ensuremath{\mathbb R}}}+ M_{{\ensuremath{\mathbb R}}}\cdot \llbracket0,1\rrbracket$.
Conversely assume that $r,s\in M_{{\ensuremath{\mathbb R}}}$. Then, again with Lemma \[lem:anglecoord\], $$r+s\cdot \llbracket0,1\rrbracket = \llbracket r,r\rrbracket+s\cdot \llbracket0,1\rrbracket=\llbracket r,r\rrbracket+\llbracket 0,s\rrbracket=\llbracket r,r+s\rrbracket.$$ Since $r+s\in M_{{\ensuremath{\mathbb R}}}$ by Lemma \[lem:mrgroup\], equation gives $r+s\cdot \llbracket0,1\rrbracket\in M$.
The ring structure of ${M_{{\ensuremath{\mathbb R}}}}$ {#the-ring-structure-of-m_ensuremathmathbb-r .unnumbered}
------------------------------------------------------
In this paragraph we show that $M_{{\ensuremath{\mathbb R}}}$ is a subring of ${{\ensuremath{\mathbb R}}}$. The main technique we employ are coordinate transformations: Given any two angles $\gamma,\delta\in U$, we convert $(\alpha,\beta)$-coordinates into $(\gamma,\delta)$-coordinates and vice versa.
The following definition provides a notation that will become handy later on:
Let $\gamma\in U\smallsetminus\{0\}$ be arbitrary. We denote the $\gamma$-projection of $\llbracket0,1\rrbracket$ with $$p(\gamma):=\gamma\bigl(\llbracket0,1\rrbracket\bigr).$$ Equation shows that $p(\gamma)\in M_{{\ensuremath{\mathbb R}}}$, Lemma \[lem:anglecoord\] that $p(\alpha)=0$ and $p(\beta)=1$. Note that if $\gamma\ne\delta$, then $p(\gamma)\ne p(\delta)$. Hence, the map $p:\; U\smallsetminus\{0\}\to M_{{\ensuremath{\mathbb R}}}$ is injective.
(-2,0)–(5,0) node\[right,font=\]
${{\ensuremath{\mathbb R}}}$
; (0,0)–(0,2) node\[right,font=\]
${{\ensuremath{\mathbb R}}}\cdot i$
; (1,1.5) coordinate (z) circle\[radius=1.5pt\] node\[right=2pt,font=\]
$\llbracket0,1\rrbracket$
; (right) at (4,0); (0) at (0,0); (1) at (3,0); (gamma) at (-1.5,0); (delta) at (1.5,0); (0,3pt)–(0,-3pt) node\[below,font=\]
$p(\alpha)$
; (3,3pt)–(3,-3pt) node\[below,font=\]
$p(\beta)$
;
; (0)–(z);
; (1)–(z);
; (gamma)–(z); (-1.5,3pt)–(-1.5,-3pt) node\[below,font=\]
$p(\gamma)$
;
; (delta)–(z); (1.5,3pt)–(1.5,-3pt) node\[below,font=\]
$p(\delta)$
;
The following result describes how coordinates change when transitioning to different pairs of angles:
\[prop:coordtransform\] Let $\gamma,\delta\in U\smallsetminus\{0\}$ be two different angles. Then, for any $r,s\in M_{{\ensuremath{\mathbb R}}}$, the following equations hold:
1. $\displaystyle \llbracket r,s\rrbracket=\bigl\llbracket r+(s-r)p(\gamma), r+(s-r)p(\delta)\bigr\rrbracket_{\gamma,\delta}$,
2. $\displaystyle \llbracket r,s\rrbracket_{\gamma,\delta}=\Bigl\llbracket \frac{sp(\gamma)-rp(\delta)}{p(\gamma)-p(\delta)}, \frac{r-s+sp(\gamma)-rp(\delta)}{p(\gamma)-p(\delta)}\Bigr\rrbracket$.
<!-- -->
1. We know that $p(\gamma)=\gamma\bigl(\llbracket0,1\rrbracket\bigr)$ and $p(\delta)=\delta\bigl(\llbracket0,1\rrbracket\bigr)$. Therefore we obtain $\llbracket0,1\rrbracket=\llbracket p(\gamma),p(\delta)\rrbracket_{\gamma,\delta}$. By Lemma \[lem:anglecoord\], $$\llbracket1,0\rrbracket=1-\llbracket0,1\rrbracket=\llbracket1,1\rrbracket_{\gamma,\delta}-\llbracket p(\gamma),p(\delta)\rrbracket_{\gamma,\delta}=\llbracket 1-p(\gamma),1-p(\delta)\rrbracket_{\gamma,\delta}.$$ The representation of $\llbracket r,s\rrbracket$ in $(\gamma,\delta)$-coordinates is now due to linearity.
2. If $\llbracket r,s\rrbracket_{\gamma,\delta}=\llbracket x,y\rrbracket$ for some $x,y\in M_{{\ensuremath{\mathbb R}}}$, then, by (a), the variables $x$ and $y$ satisfy the linear equation system $$\left\{
\begin{array}{lcl}
x+(y-x)p(\gamma) &=& r\\
x+(y-x)p(\delta) &=& s
\end{array}
\right\}.$$ $\gamma\ne\delta$ implies $p(\gamma)\ne p(\delta)$ and, thus, the existence of a unique solution $(x,y)$ of the system. Solving for $x$ and $y$ gives the claim.
The next lemmas show that all differences $p(\gamma)-p(\delta)$ and quotients $\bigl(p(\gamma)-p(\delta)\bigr)^{-1}$ are elements of $M_{{\ensuremath{\mathbb R}}}$. For reasons of readability we introduce the following notation:
We denote by $\Delta$ the set of all differences $p(\gamma)-p(\delta)$ where $\gamma$ and $\delta$ are two different elements of $U\smallsetminus\{0\}$, i.e. $$\Delta:=\{p(\gamma)-p(\delta) : \gamma,\delta\in U\smallsetminus\{0\}\text{ and } \gamma\ne\delta\}.$$ It is $0\notin\Delta$. Therefore, we can define $$\Delta^{-1}:=\{d^{-1} : d\in \Delta\}=\Bigl\{\frac1{p(\gamma)-p(\delta)} : \gamma,\delta\in U\smallsetminus\{0\}\text{ and } \gamma\ne\delta\Bigr\}.$$
Denote the subring of ${{\ensuremath{\mathbb R}}}$ generated by $\Delta$ with ${{\ensuremath{\mathbb Z}}}[\Delta]$. Then ${{\ensuremath{\mathbb Z}}}[\Delta]\subseteq M_{{\ensuremath{\mathbb R}}}$.
Let $R$ denote the ring ${{\ensuremath{\mathbb Z}}}[p(\gamma):\gamma\in U\smallsetminus\{0\}]$. We first show that $R={{\ensuremath{\mathbb Z}}}[\Delta]$:
It is obvious that $Z[\Delta]\subseteq R$. To prove the opposite inclusion consider an arbitrary element $r\in R$. By definition, $r$ is a sum of addents of the form $$z\cdot p(\gamma_1)\cdots p(\gamma_s)\quad\text{with } z\in{{\ensuremath{\mathbb Z}}}\text{ and } \gamma_1,\ldots,\gamma_s\in U\smallsetminus\{0\}.$$ Since $p(\alpha)=0$ it follows $$z\cdot p(\gamma_1)\cdots p(\gamma_s)=z\cdot \bigl(p(\gamma_1)-p(\alpha)\bigr)\cdots\bigl(p(\gamma_s)-p(\alpha)\bigr)\in {{\ensuremath{\mathbb Z}}}[\Delta].$$ This shows that $r\in{{\ensuremath{\mathbb Z}}}[\Delta]$.
Now we show that $p(\gamma)\cdot M_{{\ensuremath{\mathbb R}}}\subseteq M_{{\ensuremath{\mathbb R}}}$ for all $\gamma\in U\smallsetminus\{0\}$:
Choose $\gamma\in U\smallsetminus\{0\}$ and $s\in M_{{\ensuremath{\mathbb R}}}$ arbitrarily. Then, one has $\llbracket0,s\rrbracket\in M$ and, hence, $\gamma\bigl(\llbracket0,s\rrbracket\bigr)\in M_{{\ensuremath{\mathbb R}}}$. The assertion follows since $\gamma\bigl(\llbracket0,s\rrbracket\bigr)=p(\gamma)\cdot s$ by linearity.
This proves the lemma: As ${{\ensuremath{\mathbb Z}}}$ is a subset of $M_{{\ensuremath{\mathbb R}}}$, repeatingly applying the above result shows that $M_{{\ensuremath{\mathbb R}}}$ contains all products $$z\cdot p(\gamma_1)\cdots p(\gamma_s)\quad\text{with } s\in{{\ensuremath{\mathbb N}}}_0, z\in{{\ensuremath{\mathbb Z}}}\text{, and } \gamma_1,\ldots,\gamma_s\in U\smallsetminus\{0\}.$$ As $M_{{\ensuremath{\mathbb R}}}$ is additively closed, it follows $R\subseteq M_{{\ensuremath{\mathbb R}}}$ and therefore ${{\ensuremath{\mathbb Z}}}[\Delta]\subseteq M_{{\ensuremath{\mathbb R}}}$.
\[lem:zddsubmr\] Denote the subring of ${{\ensuremath{\mathbb R}}}$ generated by $\Delta\cup\Delta^{-1}$ with ${{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$. Then ${{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]\subseteq M_{{\ensuremath{\mathbb R}}}$.
We already know that ${{\ensuremath{\mathbb Z}}}[\Delta]\subseteq M_{{\ensuremath{\mathbb R}}}$. By reasoning in the same fashion as above it suffices to show that $\bigl(p(\gamma)-p(\delta)\bigr)^{-1}\cdot M_{{\ensuremath{\mathbb R}}}\subseteq M_{{\ensuremath{\mathbb R}}}$ for any $\gamma,\delta\in U\smallsetminus\{0\}$ with $\gamma\ne\delta$. This is proved in two steps.
First, we show that $p(\gamma)^{-1}\cdot M_{{\ensuremath{\mathbb R}}}\subseteq M_{{\ensuremath{\mathbb R}}}$ holds for any $\gamma\in U\smallsetminus\{0,\alpha\}$:
Let $\gamma\in U\smallsetminus\{0,\alpha\}$ and $r\in M_{{\ensuremath{\mathbb R}}}$ be arbitrary elements. Then $\llbracket r,0\rrbracket_{\gamma,\alpha}\in M$ and, thus, $\beta\bigl(\llbracket r,0\rrbracket_{\gamma,\alpha}\bigr)\in M_{{\ensuremath{\mathbb R}}}$. By Proposition \[prop:coordtransform\] (b), $$\beta\bigl(\llbracket r,0\rrbracket_{\gamma,\alpha}\bigr)=\frac{r-rp(\alpha)}{p(\gamma)-p(\alpha)}\stackrel{p(\alpha)=0}=\frac1{p(\gamma)}\cdot r\in M_{{\ensuremath{\mathbb R}}}.$$
Now, we show $\bigl(p(\gamma)-p(\delta)\bigr)^{-1}\cdot M_{{\ensuremath{\mathbb R}}}\subseteq M_{{\ensuremath{\mathbb R}}}$:
Choose two different elements $\gamma,\delta\in U\smallsetminus\{0\}$ and $s\in M_{{\ensuremath{\mathbb R}}}$ arbitrarily. Suppose that $\gamma\ne\alpha$. Then $p(\gamma)^{-1} s\in M_{{\ensuremath{\mathbb R}}}$ and, thus, $\llbracket0,p(\gamma)^{-1} s\rrbracket_{\gamma,\delta}\in M$. By Proposition \[prop:coordtransform\] (b), $$\alpha\bigl(\llbracket0,p(\gamma)^{-1} s\rrbracket_{\gamma,\delta}\bigr)=\frac{p(\gamma)^{-1}s\cdot p(\gamma)}{p(\gamma)-p(\delta)}=\frac1{p(\gamma)-p(\delta)}\cdot s\in M_{{\ensuremath{\mathbb R}}}.$$ If $\gamma=\alpha$, then $\delta\ne\alpha$. The claim follows similarly by considering $\alpha\bigl(\llbracket -p(\delta)^{-1} s,0\rrbracket_{\gamma,\delta}\bigr)$.
The following theorem explicitly describes the set $M_{{\ensuremath{\mathbb R}}}$:
\[thm:mrexplicit\] The equality $M_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$ holds. This shows in particular that $M_{{\ensuremath{\mathbb R}}}$ is a subring of ${{\ensuremath{\mathbb R}}}$.
Due to Lemma \[lem:zddsubmr\] we only have to show that $M_{{\ensuremath{\mathbb R}}}\subseteq{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$. This is accomplished inductively by showing that the projections $\alpha(M_k)$ and $\beta(M_k)$ are subsets of ${{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$; here, $M_k$ is defined as in Section \[sec:intro\]. Since $M=\bigcup_{k=0}^\infty M_k$, the claim follows from equation .
If $k=0$, then $\alpha(M_k)=\beta(M_k)=M_k=\{0,1\}\subseteq{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$. Now assume that for some $k\in{{\ensuremath{\mathbb N}}}_0$ both $\alpha(M_k)$ and $\beta(M_k)$ are subsets of ${{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$. Let $z$ be any element of $M_{k+1}$. Then there exist elements $x,y\in M_k$ and angles $\gamma,\delta\in U$ with $\gamma\ne\delta$ such that $$\{z\}=\bigl(x+{{\ensuremath{\mathbb R}}}\cdot\exp(i\gamma)\bigr)\cap\bigl(y+{{\ensuremath{\mathbb R}}}\cdot\exp(i\delta)\bigr).$$ Assume first, that both $\gamma\ne0$ and $\delta\ne0$. Then, by Proposition \[prop:coordtransform\] (a), $$\gamma(x)=\alpha(x)+\bigl(\beta(x)-\alpha(x)\bigr)p(\gamma).$$ As $\alpha(x)$ and $\beta(x)$ are elements of ${{\ensuremath{\mathbb Z}}}\bigl[\Delta,\Delta^{-1}\bigr]$ by induction, it follows that $\gamma(x)\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$. A similar argument shows $\delta(y)\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$. Since $z$ has $(\gamma,\delta)$-coordinates $\bigl(\gamma(x),\delta(y)\bigr)$, it follows from Proposition \[prop:coordtransform\] (b) that $$\begin{aligned}
\llbracket\alpha(z),\beta(z)\rrbracket&=&z=\llbracket\gamma(x),\delta(y)\rrbracket_{\gamma,\delta}\\
&=&\left\llbracket\frac{\delta(y)p(\gamma)-\gamma(x)p(\delta)}{p(\gamma)-p(\delta)},\frac{\gamma(x)-\delta(x)+\delta(y)p(\gamma)-\gamma(x)p(\delta)}{p(\gamma)-p(\delta)}\right\rrbracket.
\end{aligned}$$ So $\alpha(z),\beta(z)\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$.
Now assume that $\gamma=0$. This implies $\delta\ne0$. Assume further that $\delta\ne\alpha$; if $\delta=\alpha$, then one can argue analogously using $\beta$ instead of $\alpha$.
By considering $(\alpha,\delta)$-coordinates one obtains $\delta(x),\delta(y)\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$ in a similar fashion as above. To show that $\alpha(z)\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$ consider the line $x+{{\ensuremath{\mathbb R}}}$:
A point $p\in{{\ensuremath{\mathbb C}}}$ lies on $x+{{\ensuremath{\mathbb R}}}$ iff $$\alpha(p)-\delta(p)=\alpha(x)-\delta(x)$$ because the triangle with vertices $\alpha(x)$, $x$, $\delta(x)$ is congruent to the triangle with vertices $\alpha(p)$, $p$, $\delta(p)$.
(-2,0)–(2,0) node\[right,font=\]
${{\ensuremath{\mathbb R}}}$
; (0,0)–(0,1.5) node\[left,font=\]
${{\ensuremath{\mathbb R}}}\cdot i$
; (-2,1)–(2,1) node\[right,font=\]
$x+{{\ensuremath{\mathbb R}}}$
; (right) at (4,0);
(-1.5,1) coordinate (x) circle\[radius=1.5pt\] node\[above,font=\]
$x$
; (ax) at (-1.7,0); (-1.7,3pt)–(-1.7,-3pt) node\[below,font=\]
$\alpha(x)$
; (bx) at (-.8,0); (-.8,3pt)–(-.8,-3pt) node\[below,font=\]
$\delta(x)$
; (ax)–(x); (bx)–(x);
(.5,1) coordinate (p) circle\[radius=1.5pt\] node\[above,font=\]
$p$
; (ap) at (.3,0); (.3,3pt)–(.3,-3pt) node\[below,font=\]
$\alpha(p)$
; (bp) at (1.3,0); (1.3,3pt)–(1.3,-3pt) node\[below,font=\]
$\delta(p)$
; (ap)–(p); (bp)–(p);
By induction $\alpha(x)\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$; thus, $\alpha(x)-\delta(x)\in {{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]$. The definition of $z$ shows $\delta(z)=\delta(y)$. Since $z\in x+{{\ensuremath{\mathbb R}}}$, it follows $$\alpha(z)=\underbrace{\delta(y)}_{\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]}+\underbrace{\bigl(\alpha(x)-\delta(x)\bigr)}_{\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}]}\in {{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}].$$ By transforming the $(\alpha,\delta)$-coordinates of $z$ according to Proposition \[prop:coordtransform\] (b) we finally see $$\beta(z)=\frac{\alpha(z)-\delta(y)-\alpha(z)p(\delta)}{-p(\delta)}\in{{\ensuremath{\mathbb Z}}}[\Delta,\Delta^{-1}].$$
Due to the symmetry in $\gamma$ and $\delta$, the case $\delta=0$ can be reduced to the case $\gamma=0$. This finishes the proof.
\[ex:mr\] If $U$ contains exactly three elements, then we can write $U=\{0,\alpha,\beta\}$. It follows $$\Delta=\bigl\{p(\alpha)-p(\beta),p(\beta)-p(\alpha)\bigr\}=\{1,-1\}$$ and, subsequently, $\Delta^{-1}=\Delta$. Thus, we end up with $M_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}\bigl[\Delta,\Delta^{-1}\bigr]={{\ensuremath{\mathbb Z}}}$.
If $U$ contains exactly four elements, then we can write $U=\{0,\alpha,\beta,\gamma\}$. It follows $$\begin{aligned}
\Delta&=&\bigl\{p(\alpha)-p(\beta),p(\alpha)-p(\gamma),p(\beta)-p(\alpha),p(\beta)-p(\gamma),p(\gamma)-p(\alpha),p(\gamma)-p(\beta)\big\}\\
&=&\bigl\{-1,-p(\gamma),1,1-p(\gamma),p(\gamma),p(\gamma)-1\}.\end{aligned}$$ Thus, we obtain $M_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}\bigl[\Delta,\Delta^{-1}\bigr]={{\ensuremath{\mathbb Z}}}\bigl[p(\gamma),\frac1{p(\gamma)},\frac1{p(\gamma)-1}\bigr]$.
Origami rings {#origami-rings .unnumbered}
-------------
In this paragraph we give several criteria for an origami set to be an origami ring. We start with a technical lemma:
\[lem:explicitcomputations\]
1. The equalities $$\llbracket0,1\rrbracket=-\frac{\cos\alpha\cdot\sin\beta}{\sin(\alpha-\beta)}-i\cdot \frac{\sin\alpha\sin\beta}{\sin(\alpha-\beta)}\quad\text{and, thus,}\quad \bigl|\llbracket0,1\rrbracket\bigr|^2=\frac{\sin^2\beta}{\sin^2(\alpha-\beta)}$$ hold where $i$ denotes the imaginary unit.
2. It is $\llbracket0,1\rrbracket\cdot \llbracket1,0\rrbracket=\left\llbracket\frac{\sin^2\beta}{\sin^2(\alpha-\beta)},\frac{\sin^2\alpha}{\sin^2(\alpha-\beta)}\right\rrbracket$.
3. For any $\gamma\in U\smallsetminus\{0\}$ one has $p(\gamma)=\frac{\sin(\alpha-\gamma)\cdot\sin\beta}{\sin(\alpha-\beta)\cdot\sin\gamma}$.
Note that all of the above quotients are defined: Since $\alpha,\beta,\gamma\in\mathopen]0,\pi[$ with $\alpha\ne\beta$, it follows $\sin(\alpha-\beta)\ne0$ and $\sin\gamma\ne0$.
By definition, $\bigl\{\llbracket0,1\rrbracket\bigr\} = \bigl(0+{{\ensuremath{\mathbb R}}}\cdot\exp(i\alpha)\bigr)\cap\bigl(1+{{\ensuremath{\mathbb R}}}\cdot\exp(i\beta)\bigr)$. By solving the equation $$\lambda\cdot\exp(i\alpha)=1+\mu\cdot\exp(i\beta) \iff
\left\{\begin{array}{lcl}
\lambda\cdot\cos\alpha & = & 1+\mu\cdot\cos\beta\\
\lambda\cdot\sin\alpha & = & \mu\cdot\sin\beta
\end{array}\right\}$$ one obtains the expression for $\llbracket0,1\rrbracket$ given above. The claim about $|\llbracket0,1\rrbracket\bigr|^2$ follows from this and proves (a).
To show (b), one uses (a) and computes $z:=\llbracket0,1\rrbracket\cdot\llbracket1,0\rrbracket=\llbracket0,1\rrbracket\cdot\bigl(1-\llbracket0,1\rrbracket\bigr)$. The intersections $${{\ensuremath{\mathbb R}}}\cap\bigl(z+{{\ensuremath{\mathbb R}}}\cdot\exp(i\alpha)\bigr)\qquad\text{and}\qquad{{\ensuremath{\mathbb R}}}\cap\bigl(z+{{\ensuremath{\mathbb R}}}\cdot\exp(i\beta)\bigr)$$ now give the $\alpha$- and $\beta$-projection of $z$, respectively.
The definition of $p(\gamma)$ shows $\{p(\gamma)\}={{\ensuremath{\mathbb R}}}\cap\bigl(\llbracket0,1\rrbracket+{{\ensuremath{\mathbb R}}}\cdot\exp(i\gamma)$. Using (a) and solving the system $$\left\{\begin{array}{lcl}
\lambda&=& -\frac{\cos\alpha\cdot\sin\beta}{\sin(\alpha-\beta)}+\mu\cos\gamma\\
0&=& -\frac{\sin\alpha\sin\beta}{\sin(\alpha-\beta)} + \mu\sin\gamma
\end{array}\right\}$$ shows (c).
We can now state our main result:
\[thm:ring\] For an origami set $M$ the following statements are equivalent:
1. $M$ is an origami ring.
2. The complex number $\llbracket0,1\rrbracket$ is integral over $M_{{\ensuremath{\mathbb R}}}$ of degree two, i.e. there exists a monic irreducible quadratic polynomial $f\in M_{{\ensuremath{\mathbb R}}}[X]$ such that $f\bigl(\llbracket0,1\rrbracket)=0$.
3. Both $\frac{\sin^2\beta}{\sin^2(\alpha-\beta)}$ and $2\cdot \frac{\cos\alpha\cdot\sin\beta}{\sin(\alpha-\beta)}$ are elements of $M_{{\ensuremath{\mathbb R}}}$.
4. Both $\frac{\sin^2\alpha}{\sin^2(\alpha-\beta)}$ and $\frac{\sin^2\beta}{\sin^2(\alpha-\beta)}$ are elements of $M_{{\ensuremath{\mathbb R}}}$.
5. $\llbracket0,1\rrbracket\cdot \llbracket1,0\rrbracket$ is an element of $M$.
For the sake of readability, we set $e:=\llbracket0,1\rrbracket$. Then $\llbracket1,0\rrbracket=1-e$.
Assume (a). Then $e^2\in M$. By Theorem \[thm:mexplicit\], there exist $r,s\in M_{{\ensuremath{\mathbb R}}}$ with $e^2=r+se$. Thus, the monic quadratic polynomial $f:=X^2-sX-r\in M_{{\ensuremath{\mathbb R}}}[X]$ has $e$ as a zero. Since $e$ is not a real number, $f$ is irreducible. This shows (b).
Assume (b). Since $f$ is a real polynomial, the complex conjugate $\overline e$ of $e$ is also a zero of $f$. It follows $$f=(X-e)(X-\overline e) = X^2-2\operatorname{Re}(e)\cdot X + |e|^2\in M_{{\ensuremath{\mathbb R}}}[X].$$ So, $2\operatorname{Re}(e), |e|^2\in M_{{\ensuremath{\mathbb R}}}$. Lemma \[lem:explicitcomputations\] (a) now shows (c).
Assume (c). Using the angle difference identities one obtains $$\frac{\sin^2\alpha}{\sin^2(\alpha-\beta)}=1+2\frac{\cos\alpha\cdot\sin\beta}{\sin(\alpha-\beta)}+\frac{\sin^2\beta}{\sin^2(\alpha-\beta)}.$$ Since $M_{{\ensuremath{\mathbb R}}}$ is additively closed, this shows $\frac{\sin^2\alpha}{\sin^2(\alpha-\beta)}\in M_{{\ensuremath{\mathbb R}}}$ and proves (d).
Assume (d). Then the $(\alpha,\beta)$-coordinates of $e(1-e)$ are elements of $M_{{\ensuremath{\mathbb R}}}$ by Lemma \[lem:explicitcomputations\] (b). This shows $e(1-e)\in M$ and proves (e).
Assume (e). Since $e\in M$, the additive group structure of $M$ gives $$e^2=e-e+e^2=e-e(1-e)\in M.$$ Therefore there are $r,s\in M_{{\ensuremath{\mathbb R}}}$ such that $e^2=\llbracket r,s\rrbracket$. To prove that $M$ is a subring of ${{\ensuremath{\mathbb C}}}$ we only have to show that $M$ is multiplicatively closed. To this end, let $x,y$ be arbitrary elements of $M$. By Theorem \[thm:mexplicit\], there exist $a,b,c,d\in M_{{\ensuremath{\mathbb R}}}$ such that $x=a+be$ and $y=c+de$. It follows $$\begin{aligned}
xy&=&ac + (ad+bc)\cdot e+bd\cdot e^2 = ac\cdot\llbracket1,1\rrbracket+(ad+bc)\cdot\llbracket0,1\rrbracket+bd\cdot\llbracket r,s\rrbracket\\
&\stackrel{\text{Linearity}}=& \llbracket ac+bdr, ac+ad+bc+bds\rrbracket.
\end{aligned}$$ Due to the ring structure of $M_{{\ensuremath{\mathbb R}}}$ both the $\alpha$- and the $\beta$-projection of $xy$ are elements of $M_{{\ensuremath{\mathbb R}}}$. This shows $xy\in M$ and proves (a).
We discuss the situation when additional angles are added to the set $U$:
If the set $U'\subseteq[0,\pi[$ contains $U$, then obviously $M\subseteq M(U')$. Choosing $\alpha,\beta\in U$ and using criterion (e) of Theorem \[thm:ring\] readily yields
\[cor:ringstable\] If $M$ is an origami ring and if $U'\subseteq[0,\pi[$ contains $U$, then $M(U')$ is an origami ring, too. Hence, the ring property of $M$ is preserved under extensions of $U$.
The next result deals with the question whether every origami set is a subset of an origami ring:
If the set $U$ of prescribed slopes contains $\frac\pi3$ and $\frac{2\pi}3$, then $M$ is an origami ring.
This and Corollary \[cor:ringstable\] show: By allowing at most two additional slopes, every origami ring “extends” to an origami ring. In particular, every origami set is contained in an origami ring.
Set $\alpha:=\frac\pi3$ and $\beta:=\frac{2\pi}3$. Then $$\frac{\sin^2\alpha}{\sin^2\bigl(\alpha-\beta\bigr)}=1=\frac{\sin^2\beta}{\sin^2\bigl(\alpha-\beta\bigr)}.$$ Hence, $M\bigl(U\cup\{\alpha,\beta\}\bigr)$ is an origami ring by Theorem \[thm:ring\] (d).
There exist sets $U$ such that, regardless of the choice of $\gamma\in[0,\pi[$, the origami set $M\bigl(U\cup\{\gamma\}\bigr)$ is not an origami ring. Thus, in the general case we cannot expect a one-angle version of the above corollary.
An example of such a set $U$ can be found by constructing angles $\alpha,\beta\in\mathopen]0,\pi[$ that fulfill the conditions $$\text{(I)}\;\;\frac{\sin^2\alpha}{\sin^2\bigl(\alpha-\beta\bigr)}=\sqrt2\qquad\text{and}\qquad \text{(II)}\;\; \frac{\sin^2\beta}{\sin^2\bigl(\alpha-\beta\bigr)}\text{ is transcendental over ${{\ensuremath{\mathbb Q}}}$}.$$ To this end, let $\alpha\in\mathopen]0,\pi[$ be arbitrary. Set $\beta:=\alpha-\arcsin\Bigl(\frac1{\sqrt[4]2}\cdot\sin\alpha\Bigr)$ and consider $\beta$ a function with respect to $\alpha$. Since the derivative of $\beta$ is always positive, it follows that $\beta\in\mathopen]0,\pi[$. Moreover, this choice of $\beta$ fulfills equation (I) and always gives $\alpha\ne\beta$. Now, consider the continuous function $$f:\; ]0,\pi[\to{{\ensuremath{\mathbb R}}},\qquad \alpha\mapsto \frac{\sin^2\beta}{\sin^2\bigl(\alpha-\beta\bigr)}.$$ As $f$ is non-constant, there exists $\alpha\in\mathopen]0,\pi[$ such that $f(\alpha)$ is transcendental over ${{\ensuremath{\mathbb Q}}}$. Thus, we have found angles $\alpha,\beta\in\mathopen]0,\pi[$ with $\alpha\ne\beta$ that fulfill (I) and (II).
Set $U:=\{0,\alpha,\beta\}$. Example \[ex:mr\] shows that $M(U)_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}$. So $M(U)$ is not an origami ring by Theorem \[thm:ring\] (d). Let $\gamma\in[0,\pi[$ be arbitrary. We may assume that $\gamma\notin U$. Then $$M\bigl(U\cup\{\gamma\}\bigr)_{{\ensuremath{\mathbb R}}}\stackrel{\text{Ex.~\ref{ex:mr}}}={{\ensuremath{\mathbb Z}}}[p(\gamma),\frac1{p(\gamma)},\frac1{p(\gamma)-1}\bigr]\subseteq{{\ensuremath{\mathbb Q}}}\bigl(p(\gamma)\bigr),$$ where ${{\ensuremath{\mathbb Q}}}\bigl(p(\gamma)\bigr)$ denotes the subfield of ${{\ensuremath{\mathbb R}}}$ generated by $p(\gamma)$.
We now show that $\gamma$ cannot be chosen in a way such that $M\bigl(U\cup\{\gamma\}\bigr)$ becomes an origami ring. To this end assume that Theorem \[thm:ring\] (d) is fulfilled. Then, by (II), ${{\ensuremath{\mathbb Q}}}\bigl(p(\gamma)\bigr)$ contains a transcendental element. Hence, $p(\gamma)$ must be transcendental. But then ${{\ensuremath{\mathbb Q}}}\bigl(p(\gamma)\bigr)$ is a purely transcendental extension of ${{\ensuremath{\mathbb Q}}}$ that does not contain $\sqrt2=\frac{\sin^2\alpha}{\sin^2(\alpha-\beta)}$.
Some Examples
=============
In this section we further illustrate our notation and results by giving examples of origami sets and rings.
#### Discrete origami sets
It is well known that an origami set $M(U)$ is dense in ${{\ensuremath{\mathbb C}}}$ if and only if $U$ contains more than three elements, cf. [@ned15 Cor. 10] or [@bah16 Thm. 3.7]. This fact also follows from the proof of our next result which classifies the origami sets that are discrete subsets of ${{\ensuremath{\mathbb C}}}$.
For an origami set $M:=M(U)$ the following statements are equivalent:
1. $M$ is a discrete subset of ${{\ensuremath{\mathbb C}}}$.
2. $|U|=3$.
3. $M_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}$.
4. There exists an element $z\in M$ such that $M={{\ensuremath{\mathbb Z}}}+z\cdot{{\ensuremath{\mathbb Z}}}$.
Assume that (b) does not hold. Then $|U|\geq4$, and we can write $U=\{0,\alpha,\beta,\gamma,\ldots\}$ with pairwise different elements $\alpha,\beta,\gamma\in\mathopen]0,\pi[$. By considering $p(\gamma)$ or $p(\gamma)^{-1}$ we see that $M_{{\ensuremath{\mathbb R}}}\cap\mathopen]0,1[\ne\varnothing$. The ring structure of $M_{{\ensuremath{\mathbb R}}}$ shows that $0\in M_{{\ensuremath{\mathbb R}}}$ is a limit point of $M_{{\ensuremath{\mathbb R}}}$. Since $M_{{\ensuremath{\mathbb R}}}$ is a subgroup of ${{\ensuremath{\mathbb R}}}$, it follows that $M_{{\ensuremath{\mathbb R}}}$ ist dense in ${{\ensuremath{\mathbb R}}}$. The map $\llbracket\cdot,\cdot\rrbracket:\;{{\ensuremath{\mathbb R}}}^2\to{{\ensuremath{\mathbb C}}}$ is surjective and, as it is linear, continuous. Hence, $M=\llbracket M_{{\ensuremath{\mathbb R}}},M_{{\ensuremath{\mathbb R}}}\rrbracket$ is a dense subset of ${{\ensuremath{\mathbb C}}}$. Therefore (a) does not hold.
Assume (b). Then (c) follows from Example \[ex:mr\].
Assume (c) and set $z:=\llbracket 0,1\rrbracket$. Then Theorem \[thm:mexplicit\] gives $M=M_{{\ensuremath{\mathbb R}}}+z\cdot M_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}+z\cdot{{\ensuremath{\mathbb Z}}}$.
Assume (d). Then $M$ is a lattice and, thus, a discrete subset of ${{\ensuremath{\mathbb C}}}$. So, (a) holds.
Discrete origami sets were studied in detail by Nedrenco [@ned15]. In this special case his Theorem $2$ corresponds to our Theorem \[thm:mexplicit\] and his Remark $4$ matches criterion (c) of our Theorem \[thm:ring\].
#### An origami ring with $|U|=4$
Bahr and Roth [@bah16] consider the origami set $M:=M(U)$ with $U=\bigl\{0,\frac\pi3,\frac\pi4,\frac\pi5\}$. They ask whether $M$ is an origami ring and strongly suspect that it is not. In fact, it is:
Set $\alpha:=\frac\pi3$, $\beta:=\frac\pi4$, and $\gamma:=\frac\pi5$. One obtains $$\frac{\sin^2\alpha}{\sin^2(\alpha-\beta)}=6+3\sqrt3 \qquad\text{and}\qquad \frac{\sin^2\beta}{\sin^2(\alpha-\beta)}=4+2\sqrt3.$$ It readily follows that $M$ is an origami ring if and only if $\sqrt3\in M_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}\Bigl[p,\frac1p,\frac1{p-1}\Bigr]$ where $$p:=p(\gamma)=\frac{\sin(\alpha-\gamma)\cdot\sin\beta}{\sin(\alpha-\beta)\cdot\sin\gamma}=\bigl(1+\sqrt3\bigr)\cdot\sqrt{2+\frac2{\sqrt5}}\cdot\sin\Bigl(\frac{2\pi}{15}\Bigr).$$ Note that $p$ is algebraic over ${{\ensuremath{\mathbb Q}}}$; its minimal polynomial is given by $$\mu=X^8+4X^7-8X^6-20X^5+\frac{104}5X^4+16X^3-8X^2-\frac{16}5X+\frac{16}{25}\in{{\ensuremath{\mathbb Q}}}[X].$$ Since $M_{{\ensuremath{\mathbb R}}}\subseteq{{\ensuremath{\mathbb Q}}}(p)$, a necessary condition for $M$ to be a ring is $\sqrt3\in{{\ensuremath{\mathbb Q}}}(p)$. This can be checked with a computational algebra system such as MAGMA [@magma]. One obtains that the polynomial $X^2-3\in{{\ensuremath{\mathbb Q}}}(p)[X]$ splits, showing that the necessary condition is fulfilled.
Now we show that even $\sqrt3\in M_{{\ensuremath{\mathbb R}}}$ holds. Since $$M_{{\ensuremath{\mathbb R}}}={{\ensuremath{\mathbb Z}}}\bigl[p,\frac1p,\frac1{p-1}\Bigr]=\Bigl\{\frac{f(p)}{p^a\cdot(p-1)^b} : f\in{{\ensuremath{\mathbb Z}}}[X] \text{ and } a,b\in{{\ensuremath{\mathbb N}}}_0\Bigr\},$$ $\sqrt3$ is an element of $M_{{\ensuremath{\mathbb R}}}$ if and only if there are $f\in{{\ensuremath{\mathbb Z}}}[X]$ and $a,b\in{{\ensuremath{\mathbb N}}}_0$ such that the equation $\sqrt3\cdot p^a (p-1)^b=f(p)$ is fulfilled.
We briefly sketch how $f$, $a$, and $b$ can be found: Choose random parameters $a,b$ and check if the polynomial $X^2-3p^{2a}(p-1)^{2b}$ splits over ${{\ensuremath{\mathbb Q}}}(p)$. If it does, its roots can be represented as polynomials in $p$ with rational coefficients. We are only interested in the case where the denominators of these coefficients are $1$, or $5$, or $25$. This case occurs, for instance, for $(a,b)=(5,4)$ and gives $$\sqrt3\cdot p^5(p-1)^4=80p^7-82p^6-\frac{1573}5 p^5+\frac{1278}5 p^4+\frac{1224}5 p^3-\frac{524}5 p^2-\frac{1208}{25} p+\frac{232}{25}.$$ Now, $\mu$ can be used to get rid of these denominators. We explain the procedure with the aid of the coefficient $\frac{232}{25}$. Note that $\frac{232}{25}+23\cdot\frac{16}{25}=24\in{{\ensuremath{\mathbb Z}}}$. Thus, we can “lift” the coefficient $\frac{232}5$ into the set of integers by computing $$\begin{aligned}
\sqrt3\cdot p^5(p-1)^4&=&\sqrt3\cdot p^5(p-1)^4+23\cdot 0=\sqrt3\cdot p^5(p-1)^4+23\cdot\mu(p)\\
&=&23 p^8+172p^7-266p^6-\frac{3873}5 p^5+734p^4\\
&&\quad+\frac{3064}5 p^3-\frac{1444}5 p^2-\frac{3048}{25}p+24.\end{aligned}$$ Using this technique several times, one finally gets the equation $$\begin{aligned}
\sqrt3&=&\frac1{p^5\cdot(p-1)^4}\cdot\Bigl(-20p^{13}-80p^{12}+140p^{11}+305p^{10}-338p^9+110 p^8+292p^7\\
&&\quad-194 p^6-825 p^5+46p^4+424p^3-28p^2-56p+8\Bigr)\in M_{{\ensuremath{\mathbb R}}}.\end{aligned}$$ This equality can now easily be verified with the help of a technical computing system such as Mathematica. By Theorem \[thm:ring\] (d), $M$ is an origami ring.
[^1]: [email protected]
| |
How to read a bevel protractor?
A bevel protractor is a tool used to measure the angle of objects. It can typically be seen used in conjunction with other tools such as jigs when someone is producing engineering or machine drawings.
Bevel protractors are different from regular protractors in that the tool is adjusted to fit the angle. To measure using a bevel protractor you place the base on the bottom side of the angel and move the blade to match the angles opposite side.
Guide to Reading a Bevel Protractor
In this bevel protractor guide, we talk you through how you read a bevel protractor to get accurate measurements of your angles.
Step 1 - Count Number of Full Degrees
Count the number of full degrees between the 0-degree mark on the degrees scale and the 0-minute mark on the vernier scale. This forms the first part of the angle.
Step 2 - Count Number of Minutes
Count the number of minutes on the vernier scale from the 0-minute mark until you reach a minute mark which matches up exactly to a degree mark on the degree scale. This forms the second part of the angle. This will give you the angle, which will read in the form of “x degrees, x minutes”.
It is important that the vernier scale is read in the same direction that the primary scale is being read. The correct direction will depend on which way the angle you are measuring faces.
What are Digital Bevel Protractors?
Just with a range of other tools over the years innovation has now led to the creation of digital angle readers. This digital alternative works through automatically reading the angle and displaying it on a digital screen.
Some of these digital angle readers resemble bevel protractors whilst others look as simple as a small box that read the size of an angle from being placed on a surface. These tools are known as digital angle gauges or digital inclinometers and are widely available. | https://www.wonkeedonkeetools.co.uk/protractor-sets/how-to-read-a-bevel-protractor |
Q:
Solr date field tdate vs date?
So I have a question about Solr's field date types which is pretty straight forward: what's the difference between a 'date' field and a 'tdate' one?
The schema .xml claims that 'For faster range queries, consider the tdate type' and 'A Trie based date field for faster date range queries and date faceting. '
Fair enough... but what's the precisionStep="6" all about? should i change this? does it change the way i would create the query in case I use the tdate? What's the real advantage or what does Solr do that makes it better?
P.S went through google, Solr manual, solr wiki and the java docs without any luck so I'd appreciate a kind and explanatory answer :)...
Also checked:
http://www.lucidimagination.com/blog/2009/05/13/exploring-lucene-and-solrs-trierange-capabilities/
http://web.archiveorange.com/archive/v/AAfXfqRYyLnDFtskmLRi
A:
Trie fields make range queries faster by precomputing certain range results and storing them as a single record in the index. For clarity, my example will use integers in base ten. The same concept applies to all trie types. This includes dates, since a date can be represented as the number of seconds since, say, 1970.
Let's say we index the number 12345678. We can tokenize this into the following tokens.
12345678
123456xx
1234xxxx
12xxxxxx
The 12345678 token represents the actual integer value. The tokens with the x digits represent ranges. 123456xx represents the range 12345600 to 12345699, and matches all the documents that contain a token in that range.
Notice how in each token on the list has successively more x digits. This is controlled by the precision step. In my example, you could say that I was using a precision step of 2, since I trim 2 digits to create each extra token. If I were to use a precision step of 3, I would get these tokens.
12345678
12345xxx
12xxxxxx
A precision step of 4:
12345678
1234xxxx
A precision step of 1:
12345678
1234567x
123456xx
12345xxx
1234xxxx
123xxxxx
12xxxxxx
1xxxxxxx
It's easy to see how a smaller precision step results in more tokens and increases the size of the index. However, it also speeds up range queries.
Without the trie field, if I wanted to query a range from 1250 to 1275, Lucene would have to fetch 25 entries (1250, 1251, 1252, ..., 1275) and combine search results. With a trie field (and precision step of 1), we could get away with fetching 8 entries (125x, 126x, 1270, 1271, 1272, 1273, 1274, 1275), because 125x is a precomputed aggregation of 1250 - 1259. If I were to use a precision step larger than 1, the query would go back to fetching all 25 individual entries.
Note: In reality, the precision step refers to the number of bits trimmed for each token. If you were to write your numbers in hexadecimal, a precision step of 4 would trim one hex digit for each token. A precision step of 8 would trim two hex digits.
A:
Basically trie ranges are faster. Here is one explanation. With precisionStep you configure how much your index can grow to get the performance benefits. To quote from the link you are referring:
More importantly, it is not dependent on the index size, but instead the precision chosen.
and
the only drawbacks of TrieRange are a little bit larger index sizes, because of the additional terms indexed
A:
Your best bet is to just look at the source code. Some of the things for Solr aren't well documented and the fastest way to get a trustworthy answer is to simply look at the code. If you haven't been in the code yet, that too is to your benefit. At least in the long run.
Here's a link to the TrieTokenizerFactory.
http://www.jarvana.com/jarvana/view/org/apache/solr/solr-core/1.4.1/solr-core-1.4.1-sources.jar!/org/apache/solr/analysis/TrieTokenizerFactory.java?format=ok
The javadoc in the class at least hints at the purpose of the precisionStep. You could dig futher.
EDIT: I dug a bit further for you. It's passed off directly to Lucene's NumericTokenStream class, which will used the value during parsing the token stream. Probably worth closer examination. It seems to deal with granularity and is probably a tradeoff between size in the index and speed.
| |
As Mt. Hood National Forest staff rebuild in the aftermath of the Riverside Fire, they will focus on removing hazardous trees from 152 miles of roadways within the burn area.
On Tuesday, Aug. 10, a Roadside Danger Tree Decision Memo was released for the Clackamas River Ranger District, where the 140,000 acre Riverside Fire burned last September and reached within a half mile of Estacada city limits.
Work outlined in the memo will focus on sections of 17 roads considered very high priority, and sections of 72 roads considered high priority.
Very high priority roads are primary access routes to the forest, such as Roads 46 and 57, as well as roads that access Timber Lake Job Corps and the Ripplebrook area. High priority roads are system roads that access large portions of the forest, including collector roads, arterial roads, and roads that access communication towers, powerlines, and primary trailheads.
Highway 224 was not included in the report, since it is managed by the Oregon Department of Transportation. The closed highway is the primary access point to many locations on the forest near Estacada.
"These projects are rooted in our agency's core value of safety, underscored in our policy and direction for ensuring known dangers are mitigated along open roads," said Mt. Hood National Forest Supervisor Duane Bishop. "We're looking forward to starting this work so safe access to these roadways and public lands can be restored. These project decisions are a critical first step in addressing safety hazards and making these beloved areas safe again for the public and our employees."
The memo noted that although the projects may take years to complete, implementation will begin as soon as local resources are available and new contracts are developed or existing contracts modified to accomplish this important work.
The plan focuses on fire-killed or weakened trees that are within one tree-height of the roadways.
"Danger tree removal will occur where fire-killed or weakened trees pose a known safety risk to the public, employees, or infrastructure. The vast majority of fire-killed or weakened trees that do not threaten roads, property, or infrastructure will be left standing. Additionally, trees within riparian reserves and known cultural sites are generally left on-site, " the report stated. "Felled trees may be used to assist with erosion control, restoration projects, cultural or community use, and may also be sold for commercial uses to better enable the Forest to pay for danger tree removal, reforestation, stream and riparian restoration, and other recovery work."
Additional analysis to address other fire-killed or weakened trees that are beyond one tree-height of the roadway that are a safety threat will likely occur within the next few months.
To read the Clackamas River Ranger District Roadside Danger Tree Decision Memo, click here.
You count on us to stay informed and we depend on you to fund our efforts. Quality local journalism takes time and money. Please support us to protect the future of community journalism. | https://pamplinmedia.com/en/30-news/518520-414085-forest-service-prioritizes-152-miles-of-road-after-riverside-fire?tmpl=component&print=1 |
'Holy See' means the see of the bishop of Rome. 1,000. Constructed over a period of 80 years and consecrated in 1626, the basilica is the largest Christian church in the world - capable of holding some 60,000 people. For the most part, the press accepted the population lobby’s caricature of the Vatican at Cairo as anti … About 1 billion people worldwide profess the Catholic faith. Perhaps it would be possible to get more up to date data. Although the Holy See, as distinct from the Vatican City State, does not fulfill the long-established criteria in international law of statehood—having a permanent population, a defined territory, a stable government, and the capacity to enter into relations with other states —its possession of full legal personality in international … Please make sure you have read our Mapping Populations overview page before choosing and downloading a dataset. As such, the Holy See’s authority extends over Catholics throughout the world. country comparison to the world (CIA rank, may be based on non-current data): 236. Holy See (Vatican City) ranked #7 for literacy > male amongst Christian countries in 2013. Vatican City (officially, the Vatican City State) has no administrative divisions. (June 2010) This entry gives an estimate from the US Bureau of the Census based on statistics from population censuses, vital statistics registration systems, or sample surveys pertaining to the recent past and on assumptions about future trends. The official language of the Vatican is Italian, while Latin is the official language of the Holy See. What is the population of Holy See? Nationality Noun. Population. Key demographic indicators for Holy See: Under-Five Mortality Rate, Population. Holy See - Population Counts WorldPop produces different types of gridded population count datasets, depending on the methods used and end application. №1. ( 2 ) Census reports and other statistical publications from national statistical offices, ( 3 ) Eurostat: Demographic Statistics, ( 4 ) United Nations Statistical Division. The city has an area of roughly 44 hectares and a population of 842, making it the smallest country in the world. none. Archbishop Bernardito Auza, the Holy See’s Permanent Observer to the United Nations in New York, addressed a meeting reviewing progress made since the International Conference on Population and Development (ICPD) 24years ago. The United States maintained a presence in Rome throughout the nineteenth century. Vatican is easily traveled by foot; however, most of this area is inaccessible to tourists. At an April 12 event sponsored by the Mission of the Holy See to the UN entitled “Migration, Population and the 2030 Agenda” experts on immigration said migrants and refugees need greater visibility because many times they fall through the cracks and fail to be counted. Can you make it able to calculate smaller areas, I want to see the population of small towns and small neighborhoods, not just this humongous area. The Roman Catholic Church is uniquely positioned toinfluence international deliberation on a wide range of issues, includingpopulation, family planning, and women's rights. The current population of Southern Europe is 152,101,343 as of Saturday, December 26, 2020, based on the latest United Nations estimates. Numbers generally reflect the city population, rather than the urban areas, municipality, or urban agglomeration. Definition: This entry provides the population of the capital and up to five major cities defined as urban agglomerations with populations of at least 750,000 people. File Size. Population: 825 (2019) GDP (PPP) GDP per capita of $21,198: GDP (Nominal) ——— Currency: Euro: Time zone: UTC +2: Date format: dd/mm/yyyy: Mains Electricity ————– Driving side: Right: Calling code +39: ISO 3166 code : Internet TLD : Political Parties: none: Independence Day: 1929– (Lateran Treaty with Italy) Tallest Building —————-Richest Persons ——— Holy See population density We can thus readily understand how Holy See came be the technical term for the pope, the central ecclesiastical government, and the actual abode of the same. French is used as a diplomatic language, while the Swiss Guard uses German. With an area of 0.49 sq. Answer: The population of The Holy See Vatican City is 0. ; Southern Europe population is equivalent to 1.95% of the total world population. adjective: none. [See George Weigel, “What Happened at Cairo,” FT, February 1995-eds.] World Population Prospects: 2019 Revision. Check out our country profile, full of essential information about Vatican City (Holy See)'s geography, history, government, economy, population, culture, religion and languages. By Not Your Dad on 26th October 2020. Population: 1,000 (2019 est.) Dimensions. The Holy See has been recognized, both in state practice and in the writing of modern legal scholars, as a subject of public international law, with rights and duties analogous to those of States. ; The population density in Southern Europe is 118 per Km 2 (304 people per mi 2). Holy See (Vatican City) ranked first for urbanization > urban population amongst Landlocked countries in 2010. The Holy See is the universal government of the Catholic Church and operates from Vatican City State, a sovereign, independent territory. 800 On 01 Jul 2016 Holy See Vatican population will be 801 people. Factbook > Countries > Holy See (Vatican City) > Demographics. Visiting the official website of the Holy See one can browse: the Magisterium of the Supreme Pontiffs (from Pope Leo XIII to Pope Francis); the fundamental texts of Catholicism in various languages (the Sacred Bible, the Catechism of the Catholic Church, the documents of the Second Vatican Council and the Code of Canon Law); the documents of Dicasteries, Bodies and Institutions of the Roman Curia Holy See: total population (both sexes) №4. Ethnic groups: Page last updated on January 27, 2020. [see also: Population country ranks ] Nationality: noun: none. The total population of Holy See is 800 as of 1-Jan-14 , which represents 0.00% of global population and ranks Holy See # 195 worldwide. 1-Jan-14 The World's 8th Smallest Country - Saint Kitts and Nevis. The Holy See is the diplomatic representative of the Roman Catholic Church and the Pope with its headquarters in Vatican City. The Pope is the ruler of both Vatican City State and the Holy See. Population: 1,000 (2017) Control Form: Ecclesiastical Monarchy; Area: 0.44 km²; Currency: euro; Language. The Holy See is the name given to the government of the Roman Catholic Church, which is led by the pope as the bishop of Rome. The attic or upper story displays statues of Christ, his apostles, and St. John the Baptist. km, and a population of just 825 residents, Vatican City is the world’s smallest independent nation-state and the residence of the spiritual leadership of the Roman Catholic Church. The Holy See is the central governing body of the entire Roman Catholic Church located within th… , which represents It’s +0.12% (1 people) compared with the population of Holy See Vatican on 01 Jul 2015. worldwide. Holy See Statistics. Vatican City is officially not independent. Its sovereignty is held by the Holy See, the only unit of public international law that has diplomatic relations with almost every nation around the globe. Therefore, the term refers to the city-state of Vatican because it happens to be the territory in which the Pope resides. Since the inception of theUnited Nations, the Roman Catholic Church has been an active participant innumerous international conferences organized by this powerful organization.Recently the Church has been involved in the 1992 United Nations Conference onEnvironment and Development, the 1993 Vienna Conference on Human Rights, a… It's ranking among other countries is 196. The papal reservations of benefices , customary in the Middle Ages , made necessary a more exact knowledge of the location of the "Holy See", e.g. Holy See (Vatican City) has ranked last for marriage, divorce and children > marriages since 1970. ; Southern Europe ranks number 3 in Europe among subregions ranked by Population. Holy See population grow rate №8. The population data for Canada (at least the Toronto area) seems to be from the 2001 census. Infoplease has everything you need to know about Vatican City (Holy See). Nationality Adjective. Present concerns of the Holy See include religious freedom, international development, the Middle East, terrorism, interreligious dialogue and reconciliation, and the application of church doctrine in an era of rapid change and globalization. The Holy See’s efforts to correct that skewed emphasis never got through to the public. Holy See (Vatican City) Major cities - population. At 104 square miles (slightly smaller than … The Holy See, as the supreme body of government of the Catholic Church, is a sovereign juridical entity under international law.
Symbole Puissant De Protection
,
Mort De Lancelot
,
Panneau Photovoltaique Autofinancement Edf
,
Le Bistro Régent Nîmes
,
Nice Vannes Voiture
,
Fos Provence Basket Centre De Formation
,
Restaurant Insolite Nice
,
Salaire Alessandra Sublet Canteloup
,
Digbeu Cravate Et Sa Famille
,
France 3 Sud Ouest
, | https://quatuorparisii.com/ii98fwq/holy-see-population-542e2f |
Week of 7/26/2021 –
How many times have you tripped over something you did not see or turn around and get startled because someone was in your area that you were not aware of? It happens to many of us often. Depending on what is preoccupying our mind, our emotions, the distractions around us, the noise levels in our area, etc. will determine how much of our ability to be observant is affected. The less able we are to be observant, the higher our chances are to be injured on the job by an unrecognized hazard.
How to Improve on Being Observant at Work
- Eliminate distractions from your work area. Whether it is someone talking to you or excessive noise, try to get rid of anything distracting you from your work. Also, consider good housekeeping practices as a tool to eliminate unnecessary distractions in your work areas.
- Take the time before starting a task to stop and look around your work area. Really focus on the different tools or equipment in that area. Are there hazards you are missing? Do you have everything you need?
- While completing a work task monitor your thoughts. Is your mind truly on the task? For example, think of a time when you were driving and can barely remember the trip. How observant do you think you were while operating your vehicle?
Week of 7/19/2021 – In summer weather and other hot, humid working conditions, drinking enough water is vital to preventing heat illness. The most serious illness, heat stroke, can be fatal. It occurs when the body’s cooling system fails because of moisture and minerals lost to sweating. To prevent heat illness under hot work condition. Wear clothing that allows air circulation. If possible, try to stay out of the sun. Take breaks when you can and drink water frequently. Don’t drink a large quantity of water at once, just keep on sipping. Drinking enough water helps keep the body’s digestive and elimination systems working properly. What is enough water? Eight glasses (eight fluid ounces or about .25 of a liter each) is probably as good a starting point as any. Drinking other beverages and eating waterlogged produce such as lettuce also supplies some of your water requirements. Then adjust your water intake for what seems right for you.
Week of 7/12/2021 – Whether your barbecue uses charcoal, wood, propane or natural gas, making sure it’s safe is important. Ensure that your grill is clean prior to use. Grease buildup can cause a fire that cannot be easily extinguished. For gas grills soapy water on connections and fittings can reveal an unwanted leak. Keep your grill at least 10 feet away from your home or other structure. Don’t use gasoline or paint thinner to start your fire. You may hurt your finely groomed hair and ego in the process. Use starter fluid sensibly. When using a gas grill NEVER turn the gas on with the lid closed. An accumulation of gas can result in a horrendous explosion. Keep children away from the grill. Enjoy your time with family and friends and ensure everyone is safe.
.
Week of 7/5/2021 – As the summer season rapidly approaches the use of various fans is going to increase. Fans helps move the air around us and help keep us cooler. However, there are some important safety items we need to look at as the summer approaches. Today as you are around your house or work, take a look at each of the fans you have. Is the guard in place? Fans that are less than 7 feet off the ground must have a guard on them to prevent injury. The opening needs to be ½ inch or less. Ensure the guards are in place and secure. Several years ago there was an injury where an employee jumped up to adjust a fan and the guard came loose and they hit the blades. Is the fan clean? Fan blades that are clean and free of dust and dirt build-up actually move more air than a dirty blade and will keep you cooler. Is the plug in good condition? Check the plug and cord and make sure all the electrical prongs are in place and the cord isn’t frayed. Make sure the motor cover is in place securely. Keep Cool, Stay Safe!
. | http://www.scssafety.com/resources/ |
Environment and human beings are inter-related. The environment gives us food, water, fuel, medicines, building materials, etc. Though science and technology have advanced and because of that we have benefitted a lot but it also introduced pollution and damaged the environment. The impact of this is also on human beings like health-related issues and socio-economic development.
Further, to this, we will study the relationships between human beings and the environment and how we use environmental resources.
By environment, we understand the surrounding of the place, natural world of land, sea and atmosphere and its characteristics in which we live. Human beings interact with this environment when they first walked on the Earth.
People can live and flourish when they have a good climatic condition with accessible clean water, fertile soil, etc. Whereas, it becomes difficult for people to survive on a very hot climate, limited water resources and infertile land.
We also get affected on the natural calamities like floods, drought, and earthquakes which damage the agriculture, properties, homes and water sources, pipelines, etc. These causes dislocation of people, loss of life, destruction, etc. Waterborne diseases, water contamination can be caused due to damage of water sources.
Another change which is affecting our environment is due to industrialization. We use various types of things to do our things which have increased the human impact on the environment.
Though the relationship between human activities and the environment are multifaceted they can be grouped in major two types of activities.
Use of natural resources like land, water, soils, food, minerals, animals and plants.
Production of waste like agriculture, industry and mining and from our own bodies.
In our daily lives, we use different types of natural resources. We require food and water for our living and energy for various different uses like cooking or industrial processes. We require different types of resources for the production of clothes, transport, building, etc. A simple example of natural resources is the production of a notebook. To manufacture a paper we require raw materials like wood and water and energy for the production process. The wood we are getting from the trees which require soil, water and land to grow on. There are other components in the notebook like ink or metal staples which require other types of resources.
Thus, the need for resources is infinite and it is growing with the increase of population and consumption with socio-economic progress.
Resources can be classified as renewable and non-renewable resources. Renewable resources can be replenished by natural means like solar energy is powered by heat from the sun and never runs out. Oxygen, water, solar energy and biomass are some examples of renewable resources.
Whereas, non-renewable resources cannot be replenished by natural means and quickly as the rate they are consumed like minerals and fossils fuels such as oil, coal and gas which are produced over several of years by natural processes from decayed plants and animals.
Over-exploitation of natural resources damages the eco-system. By eco-system we understand, all the living organisms like human beings, animals, plants, etc. and their physical environments like soil, water, air and land and the connections between them. If one of the components is detached of the system, then it affects the other part as well.
Another, issue that affecting the natural resources is deforestation, which happens when the trees are cut down from the forests or not allowed to re-grow. If there are no forests it also has a significant impact on water supply. The roots of the trees reach deep into the soil and create space between the particles which further increases the soil, allowing rainwater to soak and replenish groundwater.
Renewable and non-renewable resources play a major role in energy resources. For global industrialization, fossil fuels are the main energy source, but as they are non-renewable the quantity is limited and are not sustainable for longer period. Another main cause of climatic change is due to the burning of fossil fuels. The wood we know is a renewable source, when we cut the trees, it will re-grow but this also causes deforestation.
Solar power is another renewable energy source that converts the sun’s energy into electricity.
The use of unnecessary water from rivers and groundwater for domestic, agricultural and industrial use decreases the amount of water availability for current and future generations.
Water is also important for biodiversity. Rivers, lakes and wetlands are important for wildlife and need water. It will become a problem if the demand for water exceeds the supply. The demand of water supply in many parts of the world and is above sustainable water supply. By sustainable water supply we understand, the adequate supplies, in both quality and quantity which meets both the current and future requirements of people.
Warming of climate is due to the increased rate of evaporation from the lake.
The impact of inadequate sanitation, waterborne diseases in water and food has been contaminated by the wastes from infected people. Not only has these, industry, agriculture and energy production all generated wastes that pollute the air, water and soil.
Human beings have produced many several types of wastes that pollute the environment. One of the major examples is e-waste, which is caused by discarded electronic gadgets like mobile phones, computers, televisions, microwaves, etc. It has many toxic substances that pollute groundwater, soil and air unless and until they are disposed in a well-managed way.
We conclude this article on a positive note…human beings also contribute to the environment positively to sustain it. When we do wastewater treatment on plants, it protects the species and replants the forests. It gives a positive impact on our environment. With some developmental programme like reforestation, the environment has benefitted and improved a lot. | https://ugcnetpaper1.com/human-and-environment-interaction/ |
I needed to have a long training run this week, prior to the Compton Downland 40 miler.
The Boudicca Way looked like the ideal trail.
Headed a few miles out of Norwich and tried to find the start. Just past Lakenham on the Stoke Road is where it was supposed to be.
Heading over the A47 via a bridge I quickly found the first route marker.
And headed off up the road looking for the next one.
Into Arminghall
I missed the next marker, but backtracked after it looked like I was getting too close to the B1332.
Finally I was off-road on the trail
After a mile or so I was back on the road 🙁
Then the route ran through a farm yard and onto a track – much better
Eventually I reached Shotesham and continued until the Garmin said 10 miles, at which point I headed back to Shotesham and stopped at the local ale house, to top up on drinking water. While I was there I had a quick bitter shandy, I would have been rude not to…
Sufficiently refuelled I retraced my steps and rounded off a 20 mile run in 3:35 (3:19 moving time) at an average pace of 10:43 min/mile
Here’s the “nutrition” I consumed during the run
Calorie breakdown:
- Sports bar = 215 cals x 2
- Sesame bites = 142 cals x 2
- High 5 energy gel = 80 cals
- 1 pint bitter shandy = 150(?) cals
Total = 944 cals
This was only just enough, another bar and/or energy gel would have really helped for the last few miles. I also took 1 s-cap per hour.
The off-road sections of this were really nice and for another outing I’ll consider starting at Shotesham instead. | http://www.ultradistance.co.uk/trail-running/boudiccas-way-adventure/ |
For a second year, the organizer of the Curacao North Sea Jazz Festival (CNSJF) commissioned the Dick Pope Sr. Institute for Tourism Studies (DPITS) to prepare a report on perceptions of attendees of the festival. Additionally, the project investigated the value of the event as well as the economic benefits the event brings to Curacao. A survey instrument was designed and used to assess the perceptions of perceived value of event attendees. The survey was completed during the event which was held September 2-3, 2011. A total of 400 surveys was collected and analyzed by DPITS. The survey revealed that the CNSJF was successful from a destination perspective as well as a management perspective, despite the constraints confronted in terms of accessibility to the island as well as availability of accommodation. The organizer spent US$4.9 million, which entails an increase of US$1.7 million compared to the previous year. The 53 percent increase in investment paid handsomely in terms of economic benefits to Curacao. The total economic benefits increased by an astounding 311 percent for a total amount of US$16,338,601. This exponential increase of economic benefits is reflected by a substantial growth in the degree of affluence of the attendees to the CNSJF. The festival attracted 4,930 tourists, more than twice the amount of the previous year. On average, this group stayed on the island for 7.3 days and spent US$1,716, a 93 percent and 52 percent increase respectively compared to the previous year. The festival's attendees spent US$233.00 per day, which is more than twice the amount spent per day (US$107.00) by the typical tourist patronizing Curacao. The spending per day of attendees seems to be correlated by a group of highly affluent tourists attracted to the festival. For example, 30.6 percent of all respondents enjoyed a salary of over US$75,000, while the category of US$40,000 and up saw an increase of 31 percent compared to the previous year. In addition to the economic benefits, the festival was also successful in another dimension. This year, the CNSJF seems to confirm the prediction of our previous study in terms of loyalty. Fifty-nine percent of tourists attending the CNSJF have visited Curacao before. Close to half of this group (28 percent) has attended the first edition of the festival in 2010, indicating a significant loyalty component to the festival. Similarly to the previous year, the CNSJF is the main draw for visiting Curacao as eighty-four percent of tourists indicated the main reason to come to Curacao was the festival. Overall, the perception of enjoyment at the festival is highly positive. The means of all of the service value items were higher than 6 on a 7 point Likert scale. This suggests that attendees are highly satisfied with the way the festival was set up in terms of staff, performance, and safety. In fact, they perceived that the festival was worth the money, time, and effort they spent during the festival. Compared to the previous year, the score means of twenty- eight value items were higher. In particular, attendees showed a stronger feeling toward cultural and social value. Attendees felt that the festival helped them to enrich their knowledge of Curacao, to make friends, to share time with people from different backgrounds, and to represent the culture of Curacao. They also think that future generations should have the right to enjoy this festival. In addition, attendees felt that the price of entry and goods at the festival was better than expected. This indicates that attendees felt that they received good value for the money they paid for entry, food, and goods. The price structure of the festival is considered therefore to be effective. Overall, the CNSJF possesses unique characteristics that set it apart from other tourism activities on the island. The combination of the event's performers, venue, services, and attendees has made the CNSJF a major social event that represents the heritage and spirit of Curacao. It seems that the CNSJF allows its visitors to interact with interest and curiosity the virtues of the Curacao culture, residents, and visitors alike. But more importantly, it generated higher loyalty towards the event. The results of the survey reveal that the higher the attendees perceived their enjoyment at the festival and the more the festival offered the opportunity to socialize, the more likely attendees are to come back to the CNSJF, give good references to others, encourage family and friends to come, consider the CNSJF their first choice to attend a festival next year, and recommend to others. In comparison to 2010, this year the attendees loyalty towards the festival increased significantly. Such display of loyalty towards the festival presents new possibilities for the organizer. The CNSJF displayed an impressive ability to spurt an affluent, repeat tourist that makes investment in the festival one of the most cost effective investments in the island's tourism development. The festival contribution goes beyond the economic impact during the event and potential repeat patronage. Its value is also reflected in the significant brand extension that Curacao receives due to this event. Although at this time, it is impossible to quantify the financial value of the brand equity, current performance suggest that this will ripple significantly in terms of recognition, fit, association, and reducing search costs.
Keywords
Curacao, Curacao North Sea Jazz Festival, CNSJF
Prepared For
Curacao Tourism Board
Publisher
The Dick Pope Sr. Institute for Tourism Studies
College
Rosen College of Hospitality Management
Publication Date
10-26-2011
Document Type
Report
Format
application/pdf
Identifier
DP0025801
Language
English
Place
Curacao
Rights
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior written permission from The Dick Pope Sr. Institute for Tourism Studies. All copyright, confidential information, design rights and all other intellectual property rights of whatsoever nature contained herein are and shall remain the sole and exclusive property of The Dick Pope Sr. Institute for Tourism Studies. The information furnished herein is believed to be accurate and reliable. However, no responsibility is assumed by The Dick Pope Sr. Institute for Tourism Studies for its use, or for any infringements of other rights of third parties resulting from its use. The UCF and The Dick Pope Sr. Institute for Tourism Studies name and logo are trademarks or registered trademarks of the University of Central Florida.
Number of Pages
22 p.
Type
report
Recommended Citation
Rivera, Manuel A. and Croes, Robertico R., "The Signature Event in Curacao: A Source of Brand Equity and Economic Significance" (2011). Dick Pope Sr. Institute Publications. 12. | https://stars.library.ucf.edu/dickpope-pubs/12/ |
Q:
Dynamic Call to WCF Service
We would like to provide the ability for customers to enter in a web service, our application would inspect the service, provide them with the input parameters and type, the customer would the input parameters and our application would call that web service. I have found code examples which will dynamically inspect and invoke .asmx services, examples in 3.5 which rely on a shared interface, and examples in 4.0 using the new 4.0 assemblies.
What I am missing is a way to dynamically inspect a WCF service using .NET 3.5 without exchanging a shared interface. I have been able to determine the service name and method, but the value parameters are not coming through on the WSDL.
Here is my simple service:
[OperationContract]
string GetDataInt(int value);
[OperationContract]
string GetDataStringInt(int value, string stringValue);
[OperationContract]
string GetDataStringIntBool(int value, string stringValue, bool boolValue);
And here is what is coming through as parameters on the WSDL (for the parameters):
<wsdl:message name="IService1_GetDataInt_InputMessage">
<wsdl:part name="parameters" element="tns:GetDataInt"/>
</wsdl:message>
<wsdl:message name="IService1_GetDataInt_OutputMessage">
<wsdl:part name="parameters" element="tns:GetDataIntResponse"/>
</wsdl:message>
<wsdl:message name="IService1_GetDataStringInt_InputMessage">
<wsdl:part name="parameters" element="tns:GetDataStringInt"/>
</wsdl:message>
<wsdl:message name="IService1_GetDataStringInt_OutputMessage">
<wsdl:part name="parameters" element="tns:GetDataStringIntResponse"/>
</wsdl:message>
The parameter types are not coming through on the wsdl. Is there a way in .NET 3.5 to inspect a WCF service and invoke it?
A:
Parameters are of course coming in WSDL but WSDL is not flatten (unless you are using WCFExtras which provide flattened WSDL). You must look for WSDL and XSD imports - those points to another files containing rest of WSDL related information.
| |
Q:
Oracle SQL Query to Distribute a value into different rows based on priority
I want to write SQL query which distribute or adds a value into different rows based on priority.
Here is my scenario.
I have table called M_FLIGHT with below data.
DEPARTURE_DATE FLIGHT_NO FAIR_TYPE PRIORITY AVAILABLE_SEATS MAX_CAPACITY RETURN_SEAT
============== ========= ================= ======== =============== ============ ===========
05-DEC-14 SC-917 Normal Fair 1 7 10 4
05-DEC-14 SC-917 Maharaja Standard 2 8 10 0
05-DEC-14 SC-917 Maharaja Special 3 9 10 0
A flight can have different fair types( i.e Normal Fair, Maharaja Standard, Maharaja Delhi Special so on) with priorities 1, 2 and 3 respectively.
If user cancels/returns the booked seats then I need to add RETURN_SEAT value to the AVAILABLE_SEATS value such that it should not exceed the MAX_CAPACITY value for that fair type.
If it exceeds then add remaining value to next priority(i.e to next fair type).
So, the final result should be as below
DEPARTURE_DATE FLIGHT_NO FAIR_TYPE PRIORITY AVAILABLE_SEATS MAX_CAPACITY RETURN_SEAT
============== ========= ================= ======== =============== ============ ===========
05-DEC-14 SC-917 Normal Fair 1 10 10 4
05-DEC-14 SC-917 Maharaja Standard 2 9 10 0
05-DEC-14 SC-917 Maharaja Special 3 9 10 0
A:
You can calculate the occupied space using a cumulative sum:
select f.*, sum(max_capacity-available_seats) as occupied,
sum(max_capacity-available_seats) over (order by priority) as cumeocc
from m_flight f;
With this information, you can allocate v_Num new seats:
select f.*,
(case when v_Num >= cumeocc - occupied
then greatest(v_num - (cumeocc - occupied), occupied)
else occupied
end) as new_occupied
from (select f.*, (max_capacity-available_seats) as occupied,
sum(max_capacity-available_seats) over (order by priority) as cumeocc
from m_flight f
) f;
Then the next step is to merge this information back. That is a bit hard to express, because you don't have an obvious key on each row. I would suggest you add a single-column primary key to the table.
| |
The best way to deal with Runtime 216 Error error message
Click on this link to start an instant diagnostic scan for Runtime 216 Error as well as connected errors.
Runtime 216 Error error codes are usually caused in one way or another by corrupt files within the Microsoft Windows operating-system.
|
|
To Repair (Runtime 216 Error) errors you should follow these steps:
|
|
Step 1:
|Download (Runtime 216 Error) Repair Update|
|
|
Step 2:
|Click on the “Scan Now” link|
|
|
Step 3:
|Finally, click ‘Repair‘. The Repair done.|
|
|
*File size: 1MB
If you have Runtime 216 Error error then we firmly advise that you perform an error scan.
The following document provides advice that tells you the right way to repair any MS windows Runtime 216 Error errors either by hand and / or automatically. Furthermore, this page will help you to resolve any regularly occurring error messages related to Runtime 216 Error error code which you could be sent.
Note: This guide was originally posted as WIKI_Q191424
What exactly is Runtime 216 Error error code?
The Runtime 216 Error error code is the number and letter format of the error message prompted. This is the normal error message format employed by Windows as well as other Microsoft Windows compatible applications and driver providers.
This computer code can be used by the manufacturer to diagnose the error code made. This Runtime 216 Error error message has a numeric value and also a specialised explanation. Occasionally the error code might have more parameters in Runtime 216 Error format .This additional numerical code will be the address of your storage sections where the instructions are loaded during the time of the error.
What causes Runtime 216 Error error message?
Typically, the Runtime 216 Error error code is often caused by Windows system data file corruption. Damaged system files are often a real threat to the life of a personal computer.
There can be several events which can cause a system file error. An incomplete install, a partial uninstall, incorrect erasure of programs or devices. It can also be caused in the event your machine is infected by malware or adware attack or through an incorrect shutdown of the machine. Any one of the previously mentioned actions may end up in the deletion or corruption of Windows system files. That corrupted system file will lead to absent or erroneously linked documents and records necessary for the optimal operation of the system.
How to quickly repair Runtime 216 Error error?
There are two methods to correct Runtime 216 Error error message:
Advanced Computer User Method (manual):
1) Start up the laptop or computer and then login as the administrator.
2) Then click the Get started button then click Programs, Accessories, System Tools, and after that click on System Restore.
3) In the new window, select “Restore my system to a previous date” and then click Next.
4) Pick the latest restore point in the “select a restoration date” listing, and then click Next.
5) Click ‘Next’ within the confirmation screen.
6) Restart your computer after the restoration has finished.
Beginner User Solution (totally automated):
1) Download and open the (Runtime 216 Error) fix software program.
2) Setup software program and just click Scan button.
3) Simply click the Fix Errors button as soon as the diagnostic scan is successfully completed.
4) Restart the laptop or computer.
Here is a link to another Runtime 216 Error fix utility you may try if the preceeding tool doesn’t work anymore. | http://www.pcrpr.com/runtime-216-error.php |
Q:
Sound of a limited wave after removing main frequency?
From my old studies in signals I can remember that "a signal limited in frequency domain is unlimited in time domain" and viceversa (a signal limited in time domain is unlimited in frequency domain).
So, if I take a window over a sinusoidal signal:
The result is that we change the "pure frequency" domain to a domain with other frequencies:
Well, how do "those extra frequencies" sound? So in practice, the limited signal will be some set of frequencies centered around the main frequency. I want to know how does that sound when removing the frequencies nearest to the main frequency but leaving all others.
I'm asking for (approximate) sound of:
You are allowed to shift those frequencies and to normalize the amplitude in order to bring them into an "audible range".
EDIT: I'm not sampling a sinus wave in a limited time, but sampling it in a long time with a limited signal.. in example:
If accidentally this question helps to find a way to syntethize some kind of noise (highly doubt, but), it will be already covered by stackexchange contents license.
A:
Fourier transform is a linear operation. This means that the infinite sinusoidal signal can be written as the sum of the sinus in the window plus the sinus outside the window. If $f(t)$ is your window function this means
$$
\underbrace{\sin(t)}_{g_0(t)} = \underbrace{\sin(t) f(t)}_{g_+(t)} + \underbrace{(1-f(t)) \sin(t)}_{g_-(t)}
$$
or in the fourier domain
$$
g_0(\omega)= g_+(\omega) + g_-(\omega)
$$
What you are asking for is in frequency domain $g_+(\omega)-g_0(\omega)$, which is in the time domain just
$$
g_+(t)-g_0(t) = (f(t)-1)\sin(t) = -g_-(t)
$$
So the "silence" sounds like a simple sine with a pause.
The spectra also look somewhat different than what you have drawn. The finite sinus has a finite power spectrum and no delta peak. The "silence" contains the delta peak.
The other possible way to understand your questions is that we look at the fourier transform of the windowed sinus and apply a filter in the frequency domain to cut out the main finite peak. The resulting spectrum would look like this.
Here I took a broader window function than in the first figure.
The signal in the time domain then looks like this
and sounds like this.
A:
OK, so you start off with a monochromatic sinusoidal function at frequency $\omega_0$ and period $T=2\pi/\omega_0$,
$$f(t)=A\sin(\omega_0t)$$
whose Fourier transform is a pair of delta functions:
$$
\tilde f(\omega)
=\mathcal F[f](\omega)
= \frac{1}{\sqrt{2\pi}}\int_{-\infty}^\infty f(t)e^{i\omega t}\mathrm dt
= \frac{A}{2i}\left(\delta(\omega+\omega_0)-\delta(\omega-\omega_0)\right).
$$
After this, you cut off a finite-size part of the sinusoid, down to
$$g(t)=A\sin(\omega_0t)\chi_{[0,\tau]}(t),$$
using the characteristic function which is $1$ between $0$ and $\tau$, and zero elsewhere. As you note, the Fourier transform of this is no longer a pair of delta functions, because if the signal is limited to a finite timespan it can no longer be monochromatic.
However, your impression of how the added spectrum actually looks isn't particularly accurate (and in fact it's pretty awful). For the boxcar-times-sine function at hand, luckily, the Fourier transform is rather easy to calculate:
\begin{align}
\tilde g(\omega)
& = \mathcal F[g](\omega)
= \frac{1}{\sqrt{2\pi}}\int_{-\infty}^\infty g(t)e^{i\omega t}\mathrm dt
= \frac{A}{\sqrt{2\pi}}\int_{0}^\tau \sin(\omega_0t)e^{i\omega t}\mathrm dt
\\ & = \frac {A}{i\sqrt{2\pi}}\left[
e^{i(\omega+\omega_0)\tau/2}\frac{\sin((\omega+\omega_0)\tau/2)}{\omega+\omega_0}
-
e^{i(\omega-\omega_0)\tau/2}\frac{\sin((\omega-\omega_0)\tau/2)}{\omega-\omega_0}
\right],
\end{align}
i.e. a sinc function centered around $\omega_0$ and its symmetry-required conjugate at negative frequency.
The sinc function is a relatively sharp peak followed by a bunch of oscillations, and the width of the first peak is exactly $4\pi/\tau$, with each subsequent lobe of width $2\pi/\tau$. As the signal length $\tau$ gets longer and longer, the sinc peaks get taller and narrower, limiting to a delta function as they need to do. However, this signal is very regular and orderly, rather distinct from the noisy lump you drew.
Luckily, the fact that the lobes in the spectrum are neatly laid out mostly enables us to narrow down what you're asking for, which is (unless I'm mistaken) the sinc spectrum above with its central lobe flattened out, i.e. a function with the spectrum
\begin{align}
\tilde g_-(\omega)
& = \tilde g(\omega) \times (1-\chi_{[\omega_0-2\pi/\tau,\omega_0+2\pi/\tau]}(|\omega|)).
\end{align}
If you then want the time-domain version of this function, you simply need to Fourier transform this: you want
$$
g_-(t) = \mathcal F^{-1}[\tilde g_-](t) = \frac{1}{\sqrt{2\pi}}\int_{-\infty}^\infty \tilde g_-(\omega) e^{-i\omega t}\mathrm d\omega.
$$
Of course, this is rather more easily said than done, but in the end all you have is a bunch of sines and cosines, so it has to be possible in closed form (though it may involve the sine integral function, $\mathrm{Si}(x) = \int_0^x \frac{\sin(\xi)}{\xi}\mathrm d\xi$).
At this point it's worth remarking that the central lobe carries most of the energy for the function, with
$$
\frac{ \int_{0}^\infty\sin(\xi)/\xi \: \mathrm d\xi }{ \int_{\pi}^\infty\sin(\xi)/\xi \: \mathrm d\xi }
= 1-\frac{2}{\pi}\mathrm{Si}(2\pi)
\approx 9.7\%
$$
of the energy on the sidelobes.
Having said that, there is in fact an easier way to get the time-domain signal $g_-(t)$, and it relies on the convolution theorem: since the Fourier transform of $g_-(t)$ is a product of two functions, the back Fourier transform will be the convolution of the time-domain transforms of the two factors:
$$
g_-(t) = (g * \mathcal F^{-1}[1-\chi_{[\omega_0-2\pi/\tau,\omega_0+2\pi/\tau]}-\chi_{[-\omega_0-2\pi/\tau,-\omega_0+2\pi/\tau]}])(t).
$$
Here the second factor is all boxcars, so it has a direct expression
\begin{align}
\mathcal F^{-1}[1- & \chi_{[\omega_0-2\pi/\tau,\omega_0+2\pi/\tau]}-\chi_{[-\omega_0-2\pi/\tau,-\omega_0+2\pi/\tau]}](t)
\\ & =
\frac{1}{\sqrt{2\pi}} \int_{-\infty}^\infty
[1-\chi_{[\omega_0-2\pi/\tau,\omega_0+2\pi/\tau]}(\omega)-\chi_{[-\omega_0-2\pi/\tau,-\omega_0+2\pi/\tau]}(\omega)] e^{-i\omega t}
\mathrm d\omega
\\ & =
\frac{1}{\sqrt{2\pi}}\delta(t)
-\frac{2}{t}\sin(2\pi t/\tau)e^{-i\omega_0 t}
-\frac{2}{t}\sin(2\pi t/\tau)e^{+i\omega_0 t}
\\ & =
\frac{1}{\sqrt{2\pi}}\delta(t)
-4\cos(\omega_0 t)\frac{\sin(2\pi t/\tau)}{t}
\end{align}
OK, so that's one of the ingredients. How does the convolution actually look? The convolution with the delta is obviously just the identity transformation, so it's probably better to just focus on the signal from the single central lobe,
$$
\tilde g_+(\omega) = \tilde g(\omega) \times \chi_{[\omega_0-2\pi/\tau,\omega_0+2\pi/\tau]}(|\omega|),
$$
and then we can reconstruct $g_-(t) = g(t)-g_+(t)$ afterwards. As it happens, the convolution needs to be normalized a bit weirdly (since the normalization can only work cleanly for the inverse transform or the convolution theorem, but not for both), so in this case we have
\begin{align}
g_+(t)
& =
(g * \mathcal F^{-1}[\chi_{[\omega_0-2\pi/\tau,\omega_0+2\pi/\tau]}+\chi_{[-\omega_0-2\pi/\tau,-\omega_0+2\pi/\tau]}])(t)
\\ & =
\frac{1}{\sqrt{2\pi}} \int_{-\infty}^\infty g(t') \times \mathcal F^{-1}[\chi_{[\omega_0-2\pi/\tau,\omega_0+2\pi/\tau]}+\chi_{[-\omega_0-2\pi/\tau,-\omega_0+2\pi/\tau]}] (t-t') \mathrm d t'
\\ & =
\frac{1}{\sqrt{2\pi}} \int_{-\infty}^\infty g(t') \times 4\cos(\omega_0 (t-t'))\frac{\sin\left(\frac{2\pi}{\tau}(t-t')\right)}{t-t'} \mathrm d t'
\\ & =
\frac{A}{\sqrt{2\pi}} \int_{0}^\tau \sin(\omega_0 t') \times 4\cos(\omega_0 (t-t'))\frac{\sin\left(\frac{2\pi}{\tau}(t-t')\right)}{t-t'} \mathrm d t'
\\ & =
\frac{4A}{\sqrt{2\pi}} \int_{t-\tau}^{t} \sin(\omega_0 (t-t'')) \cos(\omega_0 t'')\frac{\sin\left(\frac{2\pi}{\tau}t''\right)}{t''} \mathrm d t''.
\end{align}
Past that point, calculating $g_+(t)$ is just an exercise in putting together all the trigonometric functions of $t''$ and then encasing any relevant integrals into sine and cosine integrals, $\mathrm{Si}(x)$ and $\mathrm{Ci}(x)$. This needs to be done separately for the cases $\omega_0\tau>2\pi$ and $\omega_0\tau<2\pi$, ant it can be a little bit tricky to handle because $\mathrm{Ci}$ turns out to have a branch cut on the negative real axis which butts its ugly head in. Generally,though, you're interested in a pulse that's more than one half-cycle, so you can safely take $\omega_0\tau>2\pi$.
\begin{align}
\DeclareMathOperator{Si}{Si}
\DeclareMathOperator{Ci}{Ci}
g_+(t)
& =
\frac{A}{\sqrt{2\pi}}\mathrm{Re}\left[
\cos(\omega_0 t)\left(
\Ci\left(\left(\frac{2\pi}{\tau}-2\omega_0\right)(t-\tau)\right)
-\Ci\left(\left(\frac{2\pi}{\tau}+2\omega_0\right)(t-\tau)\right)
\right. \right. \\ & \qquad \qquad \qquad \qquad \qquad \left. \left.
+\Ci\left(\left(\frac{2\pi}{\tau}+2\omega_0\right)t\right)
-\Ci\left(\left(\frac{2\pi}{\tau}-2\omega_0\right)t\right)
\right)
\right. \\ & \qquad \qquad \quad \left.
+\sin(\omega_0 t)\left(
2\Si\left(\frac{2\pi}{\tau}t\right)
-2\Si\left(\frac{2\pi}{\tau}(t-\tau)\right)
\right. \right. \\ & \qquad \qquad \qquad \qquad \qquad \left. \left.
+\Si\left(\left(\frac{2\pi}{\tau}+2\omega_0\right)t\right)
+\Si\left(\left(\frac{2\pi}{\tau}-2\omega_0\right)t\right)
\right. \right. \\ & \qquad \qquad \qquad \qquad \qquad \left. \left.
-\Si\left(\left(\frac{2\pi}{\tau}+2\omega_0\right)\right)
-\Si\left(\left(\frac{2\pi}{\tau}-2\omega_0\right)(t-\tau)\right)
\right)
\right]
\end{align}
if I haven't mucked up the algebra.
This is a bit of a tricky expression because, while the sine integral
$\Si(x) = \int_0^x \frac{\sin(\xi)}{\xi}\mathrm d\xi$ is regular at $x=0$, the cosine integral
$$
\Ci(x) = -\int_x^\infty \frac{\cos(\xi)}{\xi}\mathrm d\xi \sim \ln(x)\quad\text{as }x\to 0
$$
is singular at the origin. However, since our initial integrand had a regular factor of $\sin(2\pi t''/\tau)/t''$ then the final integral also needs to be regular, so each pair of $\Ci$'s must have a vanishing singular part. Thus, for example,
\begin{align}
\Ci\left(\left(\frac{2\pi}{\tau}+2\omega_0\right)t\right)
-\Ci\left(\left(\frac{2\pi}{\tau}-2\omega_0\right)t\right)
&\sim
\ln\left(\left(\frac{2\pi}{\tau}+2\omega_0\right)t\right)
\\ & \quad
-\ln\left(\left(\frac{2\pi}{\tau}-2\omega_0\right)t\right)
\\ & =
\ln\left(\frac{2\pi+2\omega_0\tau}{{2\pi}-2\omega_0\tau}\right),
\end{align}
and so on. The logarithm then gives off an imaginary constant that gets ignored by taking the real part.
The analytical expressions are kind of ugly but they exist and numerically they're not particularly problematic, so you can just plot them and that's it. If you do this, you get
for the main lobe, and
for the sidelobes.
Thus far for the interesting case. You might also say, of course, that even the main lobe is already "extraneous" frequencies that were not in the original delta peak, and that really you want to investigate the sinc transform $\tilde g(\omega)$ by removing a delta-function part around $\pm\omega_0$, as
$$
\tilde h_-(\omega) = \tilde g(\omega) -\tilde f(\omega)
$$
\begin{align}
\tilde h_-(\omega)
&= \tilde g(\omega) -\tilde f(\omega)
-
\\ & \qquad \quad
- \frac{A}{2i}\left(\delta(\omega+\omega_0)-\delta(\omega-\omega_0)\right)
,
\end{align}
so you're looking for something like this:
This then leads to why I said only the previous case was interesting, because the Fourier transform is linear and this therefore means that
$$
h_-(t)=g(t)-f(t) = A\sin(\omega_0t)\chi_{(-\infty,0]\cup[\tau,\infty)}(t)
$$
and what you thought were "extraneous" signals actually look like this:
Of course, they simply build up to an interrupted sinusoidal function, which exactly cancels out the monochromatic $f(t)=A\sin(\omega_0 t)$ on the places where $g(t)$ needs to be zero. So, not much going on here.
A:
This is treated in numerous places on the web. For example, you can find it in here.
The formula for the Fourier transform of a cut-off sine wave is $$f(\omega) = \frac{2a}{\omega-\omega_0} sin
\frac{(\omega-\omega_0)\,\tau}{2}, $$
where $\omega$ is the frequency of the original sine wave and
$\tau$ is the widgth of the window.
It basically has a sharp central peak, and the tails are a sine wave decaying inversely with distance from the peak.
So when you remove the central peak, you get a sine wave in the frequency domain that decays with inverse distance from the (removed) peak. I really don't know what this sounds like.
| |
This citrus-filled cold brew is perfect for a hot summer day. It is smooth, refreshing and easy to make in any quantity.
Prep Time
5
mins
Brewing Time
12
hrs
Total Time
12
hrs
5
mins
Course:
Drinks
Cuisine:
American
Keyword:
citrus, cold brew, orange, summer
Servings:
3
8 fluid ounce servings
Calories:
25
kcal
Ingredients
100
grams
coffee
coarsely ground
700
grams
water
ideally filtered
2
oranges
each cut into 8 pieces
Instructions
Place coarsely ground coffee, water and orange slices in a large mason jar or other container.
Set aside for 12-24 hours for brewing.
Filter coffee through cheese cloth or other filter and remove orange slices.
Pour in a glass, garnish with an orange and enjoy.
Notes
While brewing, you can cover the container with a tea towel or other covering, but be sure it isn't air tight.
The recipe makes around 24 fluid ounces, which should be enough for 3 servings when you add ice. You can store any extra in the fridge for a week or two. | https://pullandpourcoffee.com/wprm_print/recipe/1736 |
Q:
Exponential generating function question help
I have the following formula I am looking to find an explicit formula for the coefficient $ a_n $: here $ a_0 = 1; a_1 = 2 $ for $n\geq2$
$$ a_n = n(a_{n-1} + a_{n-2}) $$
define the exponential generating function:
$$f(x) = \sum_{n\geq0}a_n\frac{x^n}{n!} $$
multiplying by $ \frac{x^n}{n!}$ and summing over the value for n we get:
$$ \sum_{n\geq2}a_n\frac{x^n}{n!} = \sum_{n\geq2}na_{n-1}\frac{x^n}{n!} + \sum_{n\geq2}na_{n-2}\frac{x^n}{n!} $$
this gives:
$$f(x) - 2x - 1 = xf(x) + x^2 \sum_{n\geq2}a_{n-2}\frac{x^{n-2}}{(n-1)!} $$
I have kind of hit a dead end here, how do I make the last term on the RHS to make sense? Any help would be appreciated.
A:
If you don’t see anything better, it doesn’t hurt to gather some data by computing the first few terms $a_n$:
$$\begin{array}{c|cc}
n&0&1&2&3&4&5\\\hline
a_n&1&2&6&24&120&720
\end{array}$$
This strongly suggests the conjecture that $a_n=(n+1)!$. Try it: for $n\ge 0$ let $b_n=(n+1)!$. Then $b_0=1=a_0$, $b_1=2=a_1$, and
$$n(b_{n-1}+b_{n-2})=n\big(n!+(n-1)!\big)=n(n+1)(n-1)!=(n+1)!=b_n\;,$$
so by induction $a_n=b_n=(n+1)!$ for all $n\ge 0$.
| |
WARNER ROBINS -- For 18 years, Second Baptist Church has offered music lessons to young and old in the community.
The reason: to teach and develop students to play music to the glory of God.
First known as The Conservatory and now as the School of the Arts, or SOTA, the church has an ongoing commitment of time, space, resources and people to teaching musical arts.
“In terms of our spiritual mission, not only is music an expression of the heart, it also moves the heart,” said Gary Morton, who oversees SOTA as pastor of worship and administration at Second Baptist. “It connects us with others, and we want to take every opportunity to connect with those around us.”
Morton said he hopes SOTA trains musicians to develop and use their talents for the Lord, but in terms of music being a cultural benefit to the community, he said SOTA simply offers assistance in developing the best musicians possible whatever their calling or ambition.
Monique Gatton is a music ministry assistant at the church who coordinates SOTA.
She plays oboe and clarinet and has taught at the school since its beginning. She’s a former Air Force musician, as is her husband, Gary, and is a member of the church’s worship orchestra and of the popular community group, the Wellston Winds.
“In 1997, our instrumental music minister had a vision to reach out to the community and offer excellent music instruction from some of the finest Christian musicians in the area in a safe, nurturing environment,” she said. “Several people in the church’s orchestra were already teaching privately so it made sense to bring us together.”
Gatton said at the time, the church’s orchestra had only a few members. It now has 37. She made clear not all orchestra members teach, and not all teachers are orchestra members or attend Second Baptist. But they all are highly qualified and well-screened.
“We have a pool of about 20 instructors with some teaching more, some less,” she said. “We’re always looking for more. We have student waiting lists and always want to help them get into lessons.”
Gatton said there are typically 120 to 150 students in SOTA’s 16-lesson fall and spring semesters. There’s also a shorter summer session that helps would-be students explore music, dedicated students get extra lessons and interested students try other, new instruments.
Gatton said lessons vary in cost depending on length but a semester’s worth of 30-minute lessons is $320 or $20 per lesson.
She said the most popular instruments, often with the longest waiting lists, are guitar and piano, but SOTA also offers lessons in flute, voice, oboe, clarinet, bass guitar, trumpet, drums/percussion, trombone, saxophone and violin. Lessons are usually offered from 1 p.m. to 8 p.m. and open to ages 6 and up. Though there are students in their 70s, and students who plan to go on to professional careers, both secular and sacred, the bulk of SOTA students are youngsters -- students who attend public, private and home schools.
She said there are hopes SOTA will extend beyond the musical to visual, performing and other arts.
In addition to lessons, Gatton said SOTA offers associated student recitals, a concert series, studio gatherings where students play for and learn from their peers, and is a National Federation of Music Clubs festival venue where musicians perform for ratings.
Gatton said the next event in SOTA’s concert series is April 23 and will feature the Wellston Winds. It is free at the church and begins at 7 p.m.
Though Second Baptist and SOTA are Christ-centered and Gospel-oriented, Gatton said the school is not simply a tool for evangelism. She said people of many denominations and faiths take part.
“Our goal is not to evangelize students but support them in the gifts God has given them,” she said. “As a parent, I know we want our children to have the benefits of a well-rounded life, and music lends great benefit to a well-rounded life. We want students to excel to best of their abilities. One of my favorite sayings is that people can make beautiful music and music can make beautiful people. We’re helping create beautiful people and God is glorified in that.”
Contact Michael W. Pannell at [email protected]. | https://www.macon.com/news/local/community/houston-peach/the-sun-news/article30225501.html |
How to write USD currency amouns on checks, dollars and cents, both in numerals and out in (US) American English words.
1. How to write amounts of money on checks, both in numbers and out in (US) American English words? For start we'll work with some even amount, without cents.
Paper Money. The seven denominations of US currency in production are: $1 one dollar, $2 two dollar, $5 five dollar, $10 ten dollar, $20 twenty dollar, $50 fifty dollar and $100 one hundred dollar notes.
Coins. The United States issues several denominations, with the most common being: 1¢ (one cent = 0.01 dollars), 5¢ (five cents = 0.05 dollars), 10¢ (ten cents = 0.1 dollars), 25¢ (twenty-five cents = 0.25 dollars), 50¢ (fifty cents = 0.5 dollars) and $1 (one dollar).
Rounding off: with the smallest denomination of US curency being 1¢ (1 cent = 0.01 dollars) it means that we cannot have currency amounts with more than two decimals. If calculations give you amounts of money that have more than two decimals, then you have to round those numbers off to two decimals. If the third decimal is 5 or more, then round it up, if it is 4 or less, then round it down.
Ex: 2.4325 ≈ 2.43; 12.5956 ≈ 12.60; 25.4941 ≈ 25.49; 5.666666 ≈ 5.67; 5.333333 ≈ 5.33.
How to read a decimal number that represents an amount of money: the number before the decimal mark (to the left) is the dollar amount and the number after the decimal mark (to the right) is the cent amount. Examples below.
555.25$ = five hundred fifty-five dollars + twenty-five cents.
2,379.5$ = two thousand three hundred seventy-nine dollars + fifty cents.
0.01$ = one cent = a penny.
0.05$ = five cents = a nickel.
0.1$ = ten cents = a dime.
0.25$ = twenty-five cents = a quarter.
0.5$ = fifty cents = half dollar (not so common a coin).
3. How to write USD currency amounts of money, dollars and cents, on checks, using both numbers and (US) American English words?
Let's write a check of 10,295.43$.
1.1. How to write 10,295.43$ in numbers, on the check.
The number before the decimal mark (to the left) represents the dollar amount. The number after the decimal mark (to the right) represents the cent amount.
Write the number 10,295.43 in the amount box.
Notice the decimal point that separates dollars and cents.
Draw a horizontal line after the amount 10,295.43, that runs from the right of the amount up to the end of the blank space. This is to prevent other people from changing / adding to your amount.
1.2. Write out the decimal number 10,295.43.
The number before the decimal mark (to the left) represents the dollar amount: 10,295. The number after the decimal mark (to the right) represents the cent amount: 43.
Only the dollar amount is to be written out. The cent amount is to be written in numerals, as a fraction: 43/100.
Knowing the place value of each digit, write out 10,295: it has a 1 in the ten thousands place, a 0 in the thousands place, a 2 in the hundreds place, a 9 in the tens place and a 5 in the ones place.
= ten thousand two hundred ninety-five.
Connect the dollar amount and the cent amount with an "and": 10,295.43$ = ten thousand two hundred ninety-five and 43/100 dollars.
1.3. How to write 10,295.43$ out in words, on the check.
Write 10,295.43$ out in words on the line which has the currency type written at the end of it (dollars): ten thousand two hundred ninety-five and 43/100 (the word "dollars" is already printed).
Draw a horizontal line after the "43/100" fraction, that runs to the end of the blank space. This is to prevent people from changing / adding to your amount.
1: Note the hyphen (or the minus sign) in "ninety-five" above. Technically, it's correct to hyphenate compound numbers between twenty-one, 21, and ninety-nine, 99. | http://number-word.calculators.ro/how-to-write-checks-amounts-USD-currency-in-words.php |
Spatial disperse behaviors rely on the location and size of parent trees to determine the number and placement of seeds. The placement of the seeds is controlled by a probability distribution function. You can choose between the Weibull and lognormal functions.
The Weibull function is as follows:
where,
and where:
The lognormal function is as follows:
where,
and where:
The maximum distance that seeds are allowed to disperse is the length of the grid in the longest direction, up to a maximum of 1000 meters. Because of the torus shape of the plot, a seed deposited at the very limit of the distance could end up back underneath the parent tree. For this reason, if you are using a very flat dispersal kernel, you may wish to consider a non-spatial disperse method.
The normalizer (Equation 3 of Ribbens et al 1994) serves two functions. It reduces parameter correlation between STR and the dispersion parameter (D); and scales the distance-dependent dispersion term so that STR is in meaningful units - i.e. the total # of seedlings produced in the entire seedling shadow of a 30 cm DBH parent tree. | https://sortie-admin.readyhosting.com/help/manuals/Help/data/disperse_behaviors/spatial_disperse.html |
MUTARE, Zimbabwe, June 27 (Thomson Reuters Foundation) - Divas Matinyadze's 47 beehives are hidden away in a dense patch of forest, along a narrow dirt path beside a small river in Mpudzi Resettlement Scheme.
"If you cut a tree anywhere near my beehives, you are assured of trouble from me," chuckled Matinyadze. "These trees belong to my bees".
He carefully inspected one of the traditional hives, fashioned from a dead tree trunk, warning in a whisper: "Don't come close - the bees are only used to me and can easily be upset."
In this part of eastern Zimbabwe, vast tracts of land have been cleared over the past decade, mostly by tobacco farmers who use firewood to cure their crop.
Efforts by the government to encourage those farmers to plant and maintain their own woodlots for a ready supply of fuel have gained little traction.
Up to a fifth of the country's 330,000 hectares (815,448 acres) of natural forest is cut down by tobacco farmers each year, according to Zimbabwe's Forestry Commission.
Selling firewood has also become big business for rural and peri-urban communities due to the frequent power outages experienced in the country.
But there are greener alternatives for making a living, experts say, such as beekeeping.
Every district now has flourishing beekeeping projects, sustaining thousands of households. The number of beekeepers is growing steadily, and has topped 50,000, according to the Beekeepers Association of Zimbabwe.
Beekeeping is fast becoming a profitable activity thanks to high domestic demand for honey as a food and other products such as beeswax which is used to make candles, the association says.
Beekeeping is also proving an innovative way to protect forests.
"As beekeepers we jealously look after the environment because beekeeping depends on good water sources and good forage for pollen," Matinyadze said. "There are lots of trees where my beehives are."
Matinyadze was taught beekeeping under a programme initiated by the government's Department of Agricultural Technical and Extension Services (Agritex).
International organisations have also been involved in training beekeepers, and processing and marketing honey, including development charity World Vision Zimbabwe and the EU-funded Forest Forces project.
DROUGHT HITS CROPS
With weather patterns becoming more erratic, harvests from rain-fed agriculture are increasingly unreliable, forcing many farmers to look for other ways to keep up their income.
This year, the country suffered one of the worst El Nino-induced droughts in history, hot on the heels of a devastating drought in the 2014/15 farming season.
The impact on agriculture has left more than 4.5 million Zimbabweans without enough to eat this year, according to the government, which estimates at least $1.6 billion is needed to feed them.
Before switching to beekeeping, Matinyadze was a successful cotton and maize farmer, but he abandoned those crops for bees in 2014.
The results have been encouraging. "Beekeeping is profitable - it's a sweet business," he said.
Matinyadze earns up to $60 per beehive during the honey harvest twice a year. He can afford to buy food for his family, but is quick to add that the current drought has cut honey production.
"I have delayed my March harvest as there is little pollen, but the effect of the drought has not been as bad on my bees as it was on my crops," he noted.
BUZZ OFF
Another beekeeper in Chipinge district, Isaac Mamboza, told the Thomson Reuters Foundation he had joined a group of 25 to start a beekeeping project.
"We have discovered that beekeeping can help to protect our forests," Mamboza said. "Most of our beehives are on trees near our dam - no one will tamper with (them)."
Amon Vhumbu, a traditional leader in Chipinge, said his community was looking at ways to incentivise forest conservation through beekeeping.
"Beekeepers are protecting our forests at the same time as making money out of the initiative," he said.
Traditional leaders see themselves as custodians of natural resources in rural communities. "We take protection of our environment seriously - anyone caught cutting down a tree in this area is heavily fined," Vhumbu said.
Bee enthusiast Mathew Matongwani said every modern beekeeper needed to maintain a forest plot in which to place their beehives.
"Apart from the business of honey, beekeepers are committed to protecting and conserving the forests from anyone who causes fire outbreaks, or wood poachers," he said.
Matongwani gained significant beekeeping experience when working for Environment Africa, a regional organisation that has assisted thousands of beekeepers through green action groups.
"Water flow in some rivers has improved significantly as a result of conservation of catchment areas by local beekeepers," Matongwani said.
(Reporting by Andrew Mambondiyani; editing by Megan Rowling. Please credit the Thomson Reuters Foundation, the charitable arm of Thomson Reuters, that covers humanitarian news, women's rights, trafficking, corruption and climate change. Visit http://news.trust.org)
Our Standards: The Thomson Reuters Trust Principles. | https://news.trust.org/item/20160627082604-ddjeu/?source=hpOtherNews3 |
A six-month stay in space induces physiological changes to the human body and a trip to Mars will be thrice that duration
In the first 58 years as a spacefaring species, humans have mastered lower Earth orbit and missions to the moon. We are now in an age where not only government agencies such as NASA and Roscosmos have access to space, we now have commercial entities pushing the boundaries and ambitions for missions to Mars.
It took three days for the crew of the Apollo missions to reach the moon, a mere 0.38 million km away. On current technology, a mission to Mars will take around seven months to travel 55 million km, and this is if the planets align (literally) to make the journey shorter. A successful manned mission to Mars would arguably be the greatest achievement in human history. After decades of research on spaceflight, one crucial question remains: is it possible to send humans to Mars and return them in a healthy condition?
A mission to Mars presents significant physiological and psychological challenges. The body has evolved in a 1G environment on Earth, so our skeletal (movement) muscles, bones, balance (vestibular) system and our engine (the cardiovascular system) are all adapted to work effectively here on Earth.
Once in space, the body will begin to adapt to an environment without gravity, where physical and physiological capabilities are surplus to requirement. These changes take place on six-month missions to the International Space Station but it is a whole magnitude greater on a potential 18-month mission to Mars, where there is greater exposure to space radiation, limited space to exercise, and of course, three times the duration.
Skeletal muscles spend all waking hours resisting gravity and stopping us from crumpling to the floor. In space, muscle of the size and strength we are familiar with are excessive, so the body begins to get rid of them.
Bones are adapted to resist reaction forces from the ground as we take our several thousand steps per day. In gravity, there are no ground reaction forces and a distinct lack of steps for around 22 hours per day. Loss of a trabecular bone found in the pelvic bones and vertebrae in the spinal column will likely degrade to such an extent during a Mars mission that it is impossible to recover. This could render astronaut’s frail and prone to fractures upon return to Earth.
Our bodies use the heart and lungs as an engine to drive everything that we do. Our bodies take in oxygen, which is delivered around the body to produce ATP [adenosine triphosphate, or energy-carrying molecule found in the cells of all living things]—the universal energy currency that powers everything from digestion, to brain activity, and movement. On Earth, the heart constantly works against gravity. When someone faints, we lie them flat so that this effect of gravity is removed taking the stress off the heart. In space, this stress is completely absent as we have no weight (which is a product of mass and gravity, the latter of which is absent). In the days following arrival to space, blood and other fluids shift towards the head causing the "puffy face" that is often seen in astronauts. After a few weeks, the body adapts by reducing the volume of blood in the body. The movement muscles are less active, so demand for energy and oxygen are reduced; and since demand for the supply of oxygen is reduced, the transport vessels (the blood) are reduced.
PSYCHOLOGICAL CHALLENGES are just as profound as physiological challenges. Astronauts are sent on a nine-month journey, in a small spacecraft with finite resources, separated from the most extreme environment known to man, by just a few millimetres of metal. If things go wrong on the Martian surface, the SOS of: “Houston, we have a problem”, will not receive a basic reply for over 30 minutes. The psychological impact of these challenges cannot be underestimated and are arguably as important as the effect of spaceflight on the whole body physiology.
We need to do more to find counter-measures for these declines. This could involve traditional exercise-based countermeasures (which we know at best only slow the rate of decline), drugs, or even modern health technologies, such as gene therapy. For any countermeasures to be effective, we first need to understand the mechanisms through which we lose muscle in space. This can be achieved using model organisms such as C elegans, recently sent to the International Space Station to study muscle loss. We could send these microscopic roundworms to Mars over several generations to see how these simple organisms adapt over such a long period in space. Other candidate interstellar species include eight-legged "water bears" known as tardigrades, which are found in extreme environments around the world and are known for their resilience. These organisms survive extreme temperatures, pressure, and even boiling. If these organisms can’t survive a round trip to Mars, humans have no chance.
AFTER PROLONGED spaceflight, the human body is suited to spaceflight and is no longer compatible with life in a 1G environment. This creates significant challenges for the proposed return mission from Mars. Spaceflight is a model of accelerated ageing. If we sent a 40-year-old astronaut to Mars, after 18 months of spaceflight s/he could return with the physiology of an 80-year-old. We know from International Space Station missions that some of these losses can be recovered, but this is after six months in space and in an environment you can move around in and exercise effectively in. What if the astronaut lives in a capsule such as the NASA Orion space-craft proposed for a Mars mission? This is the size of a car—how much can you realistically do living, eating, sleeping in a car for 18 months floating through space?
One potential solution has been identified by the Dutch Space exploration company, Mars One. A one-way mission mitigates several of the deconditioning problems of spaceflight. If you become adapted to an environment without gravity or with significantly less gravity (1/3G on Mars), you simply don’t come back to Earth. But is this really a solution? To not come back?
THE SURVIVAL of any species is determined by its ability to reproduce and sustain life. Can our species sustain itself on Mars? Would embryonic development produce viable offspring on Mars, and either way, would it even be ethical to try? Research in simulated microgravity (using equipment called a clinostat) has shown that fertilisation can take place in microgravity, but birth rates are negatively affected as placental cells do not develop properly. It is important to note that these experiments do not simulate the effects of space radiation. Radiation (of a sufficient dose) can kill embryos but in surviving offspring, major malformations are unlikely. The expected effects of space radiation might include an increased incidence of cancer or impaired cognitive function. Little research has been done in the area of mammalian reproduction in space, but it is an area we need to explore if colonising Mars is to become a reality.
In 2013 there were over 0.2 million applicants for a one-way mission to Mars with the company Mars One. The aim is to create the first settlement on Mars by 2031. One thing is for sure, we are entering an era of the second space race, and one where more than two players are in the game.
(Christopher Gaffney is a lecturer in sports science at the UK's Lancaster Medical School and a researcher on spaceflight-induced muscle loss)
(This article was first published in Down To Earth's print edition dated May 1-15, 2019)
We are a voice to you; you have been a support to us. Together we build journalism that is independent, credible and fearless. You can further help us by making a donation. This will mean a lot for our ability to bring you news, perspectives and analysis from the ground so that we can make change together.
Comments are moderated and will be published only after the site moderator’s approval. Please use a genuine email ID and provide your name. Selected comments may also be used in the ‘Letters’ section of the Down To Earth print edition. | https://www.downtoearth.org.in/blog/science-technology/space-race-2-0-can-astronauts-survive-the-mars-mission--64262 |